Search results
1 – 10 of over 1000Subbarama Kousik Suraparaju, Arjun Singh K., Vijesh Jayan and Sendhil Kumar Natarajan
The utilisation of renewable energy sources for generating electricity and potable water is one of the most sustainable approaches in the current scenario. Therefore, the current…
Abstract
Purpose
The utilisation of renewable energy sources for generating electricity and potable water is one of the most sustainable approaches in the current scenario. Therefore, the current research aims to design and develop a novel co-generation system to address the electricity and potable water needs of rural areas.
Design/methodology/approach
The cogeneration system mainly consists of a solar parabolic dish concentrator (SPDC) system with a concentrated photo-voltaic module at the receiver for electricity generation. It is further integrated with a low-temperature thermal desalination (LTTD) system for generating potable water. Also, a novel corn cob filtration system is introduced for the pre-treatment to reduce the salt content in seawater before circulating it into the receiver of the SPDC system. The designed novel co-generation system has been numerically and experimentally tested to analyse the performance at Karaikal, U.T. of Puducherry, India.
Findings
Because of the pre-treatment with a corn cob, the scale formation in the pipes of the SPDC system is significantly reduced, which enhances the efficiency of the system. It is observed that the conductivity, pH and TDS of seawater are reduced significantly after the pre-treatment by the corncob filtration system. Also, the integrated system is capable of generating 6–8 litres of potable water per day.
Originality/value
The integration of the corncob filtration system reduced the scaling formation compared to the general circulation of water in the hoses. Also, the integrated SPDC and LTTD systems are comparatively economical to generate higher yields of clean water than solar stills.
Details
Keywords
Peter Reji Ramanatt, K. Natarajan and K.R. Shobha
Aircraft manufacturers for a long time have been looking to reduce the weight of on board equipment to enhance performance both from commercial aspect and from military aspect…
Abstract
Purpose
Aircraft manufacturers for a long time have been looking to reduce the weight of on board equipment to enhance performance both from commercial aspect and from military aspect. The existing wired technology, using cables to connect different on board line replaceable unit apart from increasing the weight also increases the complexity related to electromagnetic interference, installation and maintenance. With continuous technology upgradation in the wireless domain, aviation industry is in the process of using wireless technology for intra-aircraft communication. Wireless technology can meet most of the challenges of modern avionics systems and significantly reduce the weight. This paper aims to look at various aspects of implementing a wireless network including issues related to wired network, aircraft channel, interference issues, suitable wireless protocols for aircraft applications and security aspects.
Design/methodology/approach
The paper has relied on literature study on wireless avionics intra-communications (WAIC) and the research work carried out in specific areas related to channel inside an aircraft, interference issues of wireless systems with onboard and external systems operating in the same band and security issues related to wireless network and security requirements of implementing an avionics wireless network (AWN). To identify suitable wireless protocol for AWN literature review and simulation to compare different protocols was carried out.
Findings
A single wireless protocol may not be suitable for all aircraft systems, and therefore, there may be a requirement to use multiple technologies. Mutual interference is not expected between WAIC systems with on board and external systems operating in the same band. The channel inside an aircraft is expected to be Rician (LOS) or Rayleigh (NLOS). However, additional measurements may have to be undertaken to have a generalized channel model. Security aspects in an AWN are critical and needs to be analyzed in detail prior to any wireless deployment.
Practical implications
Implementation of wireless technology can pave the way for usage of wireless technology for future generation avionics. With International Telecommunication Union allotting dedicated band for WAIC operations, considerable amount of research has been initiated in this field. It is believed that in the coming 2-3 years, the designers will be ready to replace the existing data wires with wireless transceivers. With radio technical commission for aeronautics and EURACAE involved in development of minimum operations performance standards for WAIC systems use of wireless for intra communication is bound to happen. Therefore, it is necessary to look at different issues for integrating wireless in the avionics domain.
Originality/value
The existing studies have been carried out in individual domains of using wireless in avionics. Separate studies and research work has been carried out for identifying wireless protocols, aircraft channel models, interference issues and security aspects. The paper has attempted to look at all these aspects together including certification.
Swathi Pennapareddy, Ramprasad Srinivasan and Natarajan K.
Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one…
Abstract
Purpose
Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one of the most precise ways for tracking aircraft position. ADS-B is intended to provide greater situational awareness to the pilots by displaying the traffic information like aircraft ID, altitude, speed and other critical parameters on the Cockpit Display of Traffic Information displays in the cockpit. Unfortunately, due to the initial proposed nature of ADS-B protocol, it is neither encrypted nor has any other innate security mechanisms, which makes it an easy target for malicious attacks. The system is vulnerable to various active and passive attacks like message ingestion, message deletion, eavesdropping, jamming, etc., which has become an area of concern for the aviation industry. The purpose of this study is to propose a method based on modified advanced encryption standard (AES) algorithm to secure the ADS=B messages and increase the integrity of ADS-B data transmissions.
Design/methodology/approach
Though there are various cryptographic and non-cryptographic methods proposed to secure ADS-B data transmissions, it is evident that most of these systems have limitations in terms of cost, implementation or feasibility. The new proposed method implements AES encryption techniques on the ADS-B data on the sender side and correlated decryption mechanism at the receiver end. The system is designed based on the flight schedule data available from any flight planning systems and implementing the AES algorithm on the ADS-B data from each aircraft in the flight schedule.
Findings
The suitable hardware was developed using Raspberry pi, ESP32 and Ra-02. Several runs were done to verify the original message, transmitted data and received data. During transmission, encryption algorithm was being developed, which has got very high secured transmission, and during the reception, the data was secured. Field test was conducted to validate the transmission and quality. Several trials were done to validate the transmission process. The authors have successfully shown that the ADS-B data can be encrypted using AES algorithm. The authors are successful in transmitting and receiving the ADS-B data packet using the discussed hardware and software methodology. One major advantage of using the proposed solution is that the information received is encrypted, and the receiver ADS-B system can decrypt the messages on the receiving end. This clearly proves that when the data is received by an unknown receiver, the messages cannot be decrypted, as the receiver is not capable of decrypting the AES-authenticated messages transmitted by the authenticated source. Also, AES encryption is highly unlikely to be decrypted if the encryption key and the associated decryption key are not known.
Research limitations/implications
Implementation of the developed solution in actual onboard avionics systems is not within the scope of this research. Hence, assessing in the real-time distances is not covered.
Social implications
The authors propose to extend this as a software solution to the onboard avionics systems by considering the required architectural changes. This solution can also bring in positive results for unmanned air vehicles in addition to the commercial aircrafts. Enhancement of security to the key operational and navigation data elements is going to be invaluable for future air traffic management and saving lives of people.
Originality/value
The proposed solution has been practically implemented by developing the hardware and software as part of this research. This has been clearly brought out in the paper. The implementation has been tested using the actual ADS-B data/messages received from using the ADS-B receiver. The solution works perfectly, and this brings immense value to the aircraft-to-aircraft and aircraft-to-ground communications, specifically while using ADS-B data for communicating the position information. With the proposed architecture and minor software updates to the onboard avionics, this solution can enhance safety of flights.
Details
Keywords
Swathi Pennapareddy and K. Natarajan
The purpose of this paper is to study the various solutions and recommendations provided by researchers in applying the blockchain concept to different problems in aviation…
Abstract
Purpose
The purpose of this paper is to study the various solutions and recommendations provided by researchers in applying the blockchain concept to different problems in aviation industry. It will discuss and highlight the specific approaches that leverages blockchain to mitigate the automatic dependent surveillance-broadcast (ADS-B) security issues. Furthermore, it introduces an innovative design and method to secure ADS-B data using a tamper-resistant distributed public ledger of authenticated flight plans and validates the position and other parameters of the associated aircraft identifier against the flight paths/routes that are stored in the blockchain ledger.
Design/methodology/approach
ADS-B is the key technology that is mandated by Federal Aviation Administration in USA by 2020. However, ADS-B data is neither encrypted nor authenticated. This paper proposes a novel solution using blockchain to secure the ADS-B data communications and in-depth analysis of existing solutions covering the following aspects: classification of various possible attacks on ADS-B. Presents various solutions proposed by different researchers regarding use of blockchain in aviation industry. Discuss a new solution to secure ADS-B using blockchain. Discuss the high-level architectural framework of the proposed and patented solution. Finally, presents the conclusions and future work scope.
Findings
While the main intention of this paper is to bring together all the existing solutions using blockchain to secure aviation and ADS-B data at one place, the proposed novel solution could contribute to maintaining security and privacy for aircrafts flying in the airspace at any point in time. Continuously securing the ADS-B data transmissions based upon the filed flight plans in real time can provide a mechanism to identify spoofed aircraft messages and communicate the same to ground stations for authentication of existence of such a malicious aircraft. Thus, this solution also differs from all the existing ones.
Practical implications
As aviation industry is in its infancy stage in implementing blockchain-based solutions, practical implementation of the proposed concept might take longer.
Originality/value
This paper is a comprehensive survey and review paper. To the best of the authors’ knowledge, this is the first of its kind that presents various use cases for usage of blockchain in aviation industry along with a detailed review of existing proposed or implemented solutions using blockchain to secure ADS-B data. This can serve as an invaluable reference for the future researchers on this topic in both industry and academia.
Details
Keywords
E. Grant, K.A. Luthy, J.F. Muth, L.S. Mattos, J.C. Braly, A. Seyam, T. Ghosh, A. Dhawan and K. Natarajan
This research deals with the production of electronic textiles (e‐textiles) demonstrators. Initially, the research dealt with the creation of 4×5 microphone array on a large area…
Abstract
This research deals with the production of electronic textiles (e‐textiles) demonstrators. Initially, the research dealt with the creation of 4×5 microphone array on a large area conformal textile substrate. Once the interface electronics were connected to the 4×5 microphone array, this system became an effective acoustic array. Here, a new acoustic eight microphone array design has been designed, fabricated and tested. Changes were made to improve microphone array performance, and to optimize the associated software for data capture and analysis. This new design was based on UC‐Berkeley mote microcomputer technology. The mote‐based system addresses the issue of scaling acoustic arrays, to allow for distributing microphones over large‐areas, and to allow performance comparisons to be made with the original 4×5 microphone acoustic array.
Details
Keywords
Soumyajit Adhikari and Nilendu Chatterjee
Over the past decade, India has emerged as one of the major exporters of agricultural products in the international market. Although agriculture in India accounts for about 50% of…
Abstract
Over the past decade, India has emerged as one of the major exporters of agricultural products in the international market. Although agriculture in India accounts for about 50% of the economy's employment, its contribution as share to India's gross domestic product is significantly low. India primarily has emphasized on the production of food grains since the government policies promote not only exports but also food security and sustenance of rural and vulnerable sections of the economy. In recent times, India has witnessed a sharp increase in the productivity of food grains, but the underlying factors are of grave concern since issues such as suboptimal production, underutilization of resources and inability to adopt advanced technologies remain unacknowledged. The present study delves into various aspects of the production of food grains across 30 Indian states and emphasizes upon measuring the efficiency of food grain production across the 30 states on the basis of the non-parametric technique of Data Envelopment Analysis (DEA). The evaluation also considers economies of scale. The results highlight the fact that the Indian states are about 21% inefficient in terms of food grain production with the average efficiency score being 0.79. The methodology adopted for this study incorporates crucial factors such as usage of land area, usage of fertilizers and allocation of bank credit to carry the analysis forward. The present study has also aimed at providing certain policy recommendations for the policymakers in this regard so that the states can sustainably improve their efficiency in terms of the production of food grains.
Details
Keywords
Venkateswaran M., Govindaraju C. and Santhosh T.K.
Power converters are an integral part of the energy conversion process in solar photovoltaic (PV) systems which is used to match the solar PV generation with the load…
Abstract
Purpose
Power converters are an integral part of the energy conversion process in solar photovoltaic (PV) systems which is used to match the solar PV generation with the load requirements. The increased penetration of renewable invokes intermittency in the generated power affecting the reliability and continuous energy supply of such converters. DC-DC converters deployed in solar PV systems impose stringent restrictions on supplied power, continuous operation and fault prediction scenarios by continuously observing state variables to ensure continuous operation of the converter.
Design/methodology/approach
A converter deployed for a mission-critical application has to ensure continuous regulated output for which the converter has to ensure fault-free operation. The fault diagnostic algorithm relies on the measurement of a state variable to assess the type of fault. In the same line, a predictive controller depends on the measurement of a state variable to predict the control variable of a converter system to regulate the converter output around a fixed or a variable reference. Consequently, both the fault diagnosis and the predictive control algorithms depend on the measurement of a state variable. Once measured, the available data can be used for both algorithms interchangeably.
Findings
The objective of this work is to integrate the fault diagnostic and the predictive control algorithms while sharing the measurement requirements of both these control algorithms. The integrated algorithms thus proposed could be applied to any converter with a single inductor in its energy buffer stage.
Originality/value
laboratory prototype is created to verify the feasibility of the integrated predictive control and fault diagnosis algorithm. As the proposed method combine the fault detection algorithm along with predictive control, a load step variation and manual fault creation methods are used to verify the feasibility of the converter as with the simulation analysis. The value for the capacitors and inductors were chosen based on the charge-second and volt-second balance equations obtained from the steady-state analysis of boost converter.
Details
Keywords
Z.X. Wang, Felix T.S. Chan, S.H. Chung and Ben Niu
The purpose of this paper is to propose a model that determines the strategy of owning and renting trucks in combinations with internal truck scheduling and storage allocation…
Abstract
Purpose
The purpose of this paper is to propose a model that determines the strategy of owning and renting trucks in combinations with internal truck scheduling and storage allocation problems in container terminals.
Design/methodology/approach
To deal with this complicated problem, a two-level heuristic approach is developed, in which the integration problem is decomposed into two levels. The first level determines the daily operations of the internal trucks, while the second level determines the truck employment strategy based on the calculation in the first level.
Findings
The results show that: even if the using cost of owned yard trucks is much lower than the cost of rented yard tucks, terminal companies should not purchase too many trucks when the purchasing price is high. In addition, the empirical truck employment strategies, which are purchasing all the trucks or renting all the trucks, are not cost-effective when compared with the proposed yard truck employment strategy.
Originality/value
The paper provides a novel insight for the internal truck employment strategy in container terminals which is the determination of the strategy of employing renting and outsourcing yard trucks to meet operational daily transportation requirements and minimize the long-term cost of employing yard trucks. A mathematical model is proposed to deal with the practical problem. Also, this study presents better solution than empirical method for employing different types of yard truck. Thus, in order to obtain more benefit, terminal companies should employ the proposed yard truck employment strategy.
Details
Keywords
This chapter presents the survey of selected linear and mixed integer programming multi-objective portfolio optimization. The definitions of selected percentile risk measures are…
Abstract
This chapter presents the survey of selected linear and mixed integer programming multi-objective portfolio optimization. The definitions of selected percentile risk measures are presented. Some contrasts and similarities of the different types of portfolio formulations are drawn out. The survey of multi-criteria methods devoted to portfolio optimization such as weighting approach, lexicographic approach, and reference point method is also presented. This survey presents the nature of the multi-objective portfolio problems focuses on a compromise between the construction of objectives, constraints, and decision variables in a portfolio and the problem complexity of the implemented mathematical models. There is always a trade-off between computational time and the size of an input data, as well as the type of mathematical programming formulation with linear and/or mixed integer variables.
Details
Keywords
Min Lu, Zixuan Yang and Guowei He
This paper aims to propose a new method for robust simulations of passive heat transfer in two-fluid flows with high volumetric heat capacity contrasts.
Abstract
Purpose
This paper aims to propose a new method for robust simulations of passive heat transfer in two-fluid flows with high volumetric heat capacity contrasts.
Design/methodology/approach
This paper implements a prediction–correction scheme to evolve the volumetric heat capacity. In the prediction substep, the volumetric heat capacity is evolved together with the temperature. The bounded downwind version of compressive interface capturing scheme for arbitrary meshes and central difference scheme are used for the spatial discretization of the advection and diffusion terms of the heat transfer equation, respectively. In the correction substep, the volumetric heat capacity is updated in accordance with the interface captured by using a coupled level-set and volume-of-fluid method to capture the interface dynamics precisely.
Findings
The proposed method is verified by simulating the advection of a hot droplet with high volumetric heat capacity, a stationary air–water tank with temperature variation between top and bottom walls and heat transfer during wave plunging at
Originality/value
To ensure the numerical stability, this paper solves an additional conservative form of volumetric heat capacity equation along with the conservative form of temperature equation by using consistent spatial-discretization and temporal-integration schemes.
Details