Oshin Rawlley, Shashank Gupta, Jatin Kumar Panwar et al.
Hasil untuk "Transportation and communication"
Menampilkan 20 dari ~1606194 hasil · dari CrossRef, DOAJ
Alaa Alsaeed, Saleh Almowuena, Aasem N. Alyahya
The Internet of Vehicles (IoV) is an emerging area within intelligent transportation systems, enabling real-time communication among vehicles, infrastructure, and pedestrians. While this connectivity enhances traffic management and safety, it also introduces significant security challenges—particularly in authentication, authorization, and data integrity. To address these concerns, blockchain technology is explored to eliminate centralized points of failure and support secure, decentralized communication in IoV environments. A solution titled Blockchain-based Authentication and Authorization in IoV (BAAIoV) is proposed, utilizing smart contracts and a distributed ledger to manage vehicle identities and securely control access to network resources. A simulation environment was established using Simulation of Urban Mobility (SUMO) for traffic modeling and Hyperledger Fabric for blockchain implementation. Python-based middleware facilitated real-time interaction between the simulation and the blockchain system. The results indicate that the BAAIoV model significantly reduces authentication delays, enhances emergency vehicle recognition, and mitigates threats like spoofing and replay attacks. These improvements demonstrate the potential of blockchain to enhance the security, efficiency, and reliability of vehicular networks. This research contributes to the development of secure communication frameworks for IoV. It highlights the potential for future blockchain integration with edge computing, artificial intelligence, and post-quantum cryptography technologies. Such integrations are expected to further strengthen smart transportation infrastructures and advance the capabilities of next-generation intelligent mobility systems.
Molk Oukili Garti, Jabir Arif, Fouad Jawab et al.
<i>Background</i>: The objective of this qualitative research was to explore the impact of certain predefined factors on the sustainability of supply chains in Industry 5.0. The sustainability of supply chains was assessed by considering six factors from the existing literature: circular logistics, Industry 5.0 technologies, intellectual level and learning, logistics innovation, sustainable supply chain practices, and the managerial strategy of the company. <i>Methods</i>: Semi-structured interviews were conducted based on an interview guide with 14 participants who serve as managers and executives in supply chain management in Morocco. The interviews were transcribed, followed by lexical and thematic analysis using QSR NVivo 15 software. <i>Results</i>: The results showed that all the factors studied play a major role in achieving sustainable supply chain management. The testimonies of all participants highlighted the crucial role that Industry 5.0 technologies play in achieving the sustainability of supply chains, while combining them with the other factors studied. Consequently, these results made it possible to validate and confirm the six factors previously identified from the existing literature, while retaining them for potential future quantitative studies. <i>Conclusions</i>: To meet the dimensions of sustainability, it is recommended to focus on the most impactful factors in maintaining a sustainable supply chain and on all the possible interactions between these factors. Indeed, this study represents, on the one hand, an invitation for supply chain managers to pay greater attention to factors related to sustainability, and on the other hand, an initial pathway for future research that may subsequently highlight the interactions between factors leading to sustainability. This could help propose applicable models for supply chain managers, enabling them to adopt more effective strategies and identify the most feasible combinations of factors to achieve sustainable logistics.
Rosa Hilda Félix-Jácquez, Óscar Hernández-Uribe, Leonor Adriana Cárdenas-Robledo et al.
<i>Background</i>: Remanufacturing products for sustainability involves layout and production planning, tools and equipment, material arrangement and handling, inventory management, technology integration, and more. This study presents an empirical vision through a discrete event simulation (DES) model integrating lean manufacturing (LM) and supply chain (SC) strategies with industry 4.0 (I4.0) technologies, applied to a case in a railway company. <i>Methods</i>: The work presents scenarios following a methodology with an incremental approach to implement strategies of lean manufacturing (LM) and supply chain (SC) in the context of I4.0 and their effects represented in DES models with applicability in remanufacturing and production line management. Five simulation scenarios were analyzed according to strategies layered incrementally. <i>Results</i>: Behaviors and outcomes were compared across the scenarios considering the remanufactured engines, percentage of process time, human labor occupation, and the statistical analysis of the process capability. Scenario five achieved the objective of remanufacturing 40 engines in one year with a cycle time of 214.45 h. <i>Conclusions</i>: The purpose was to design an engine remanufacturing line incorporating LM and SC strategies via a DES model, highlighting the importance of their gradual adoption toward I4.0 implementation. The integration of previous strategies improves flexibility and productivity in manufacturing processes.
Emine Hande Aydos, Sevcan Yağan, İpek Öztürk et al.
Abstract Aim of the study is to explore the experiences of earthquake-affected preschool as they returned to their profession following the devastating February 6, 2023, earthquakes in Kahramanmaraş in Turkey. These earthquakes, among the most destructive in the region’s history, profoundly disrupted communities, including educators and children. The research addresses a critical gap by exploring how these natural disasters impact the teaching profession and educational practices. This phenomenological study with seven participants -six women and one man, aged 24–40- focuses on teachers from Hatay, Gaziantep, Kilis, and Malatya, collected via semi-structured interviews. Analysis followed a rigorous phenomenological approach to uncover the shared essence of their experiences. Findings reveal that teachers faced inadequate infrastructural preparations, including damaged schools and limited transportation. Psychologically, they felt unsupported, despite the limited training provided by the Ministry of Education. Housing and living conditions further compounded their struggles, with some teachers resorting to living in schools. For children, the study reports significant emotional, behavioral, and social changes. Earthquake-themed play and communication emerged as coping mechanisms, reflecting trauma, fear, and resilience. Teachers observed increased dependence, anxiety, and regressive behaviors such as thumb-sucking and bed-wetting among the children. Teachers assumed expanded roles as saviors, healers, and observers, focusing on creating safe environments, fostering resilience, and addressing both their own and the children’s emotional needs. They adapted their classroom routines, shifting the emphasis from cognitive to social and emotional activities to aid recovery. Despite initial resistance, parents later recognized the value of resuming education in providing stability and healing for their children. The research underscores the critical role of teachers in disaster recovery, emphasizing their influence on children’s emotional and psychological resilience. It calls for targeted disaster preparedness training for teachers, addressing their mental health needs, and prioritizing school infrastructure and resources. Collaborative efforts involving policymakers, educators, and mental health professionals are recommended to build a more robust educational response to natural disasters. This study highlights the transformative potential of education in emergencies, advocating for a proactive approach to equipping teachers and schools to navigate crises effectively while fostering long-term community resilience.
Xinxin Wang, Hongfei Gao, Xiaokai Ma et al.
Aiming at the real-time object detection requirements of the intelligent control system for laboratory item transportation in mobile embedded unmanned vehicles, this paper proposes a lightweight hybrid detection system based on the OpenMV vision module. The system adopts a two-stage detection mechanism: in long-distance scenarios (>32 cm), fast target positioning is achieved through red threshold segmentation based on the HSV(Hue, Saturation, Value) color space; when in close range (≤32 cm), it switches to a lightweight deep learning model for fine-grained recognition to reduce invalid computations. By integrating the MobileNetV2 backbone network with the FOMO (Fast Object Matching and Occlusion) object detection algorithm, the FOMO MobileNetV2 model is constructed, achieving an average classification accuracy of 94.1% on a self-built multi-dimensional dataset (including two variables of light intensity and object distance, with 820 samples), which is a 26.5% improvement over the baseline MobileNetV2. In terms of hardware, multiple functional components are integrated: OLED display, Bluetooth communication unit, ultrasonic sensor, OpenMV H7 Plus camera, and servo pan-tilt. Target tracking is realized through the PID control algorithm, and finally, the embedded terminal achieves a real-time processing performance of 55 fps. Experimental results show that the system can effectively and in real-time identify and track the detection targets set in the laboratory. The designed unmanned vehicle system provides a practical solution for the automated and low-power transportation of small items in the laboratory environment.
Zhipeng Wang, Soon Xin Ng, Mohammed El-Hajjar
Unmanned aerial vehicles (UAVs) can be considered in many applications, such as wireless communication, logistics transportation, agriculture and disaster prevention. The flexible maneuverability of UAVs also means that the UAV often operates in complex 3D environments, which requires efficient and reliable path planning system support. However, as a limited resource platform, the UAV systems cannot support highly complex path planning algorithms in lots of scenarios. In this paper, we propose a 3D spatial information compression (3DSIC) based deep reinforcement learning (DRL) algorithm for UAV path planning in cluttered 3D environments. Specifically, the proposed algorithm compresses the 3D spatial information to 2D through 3DSIC, and then combines the compressed 2D environment information with the current UAV layer spatial information to train UAV agents for path planning using neural networks. Additionally, the proposed 3DSIC is a plug and use module that can be combined with various DRL frameworks such as Deep Q-Network (DQN) and deep deterministic policy gradient (DDPG). Our simulation results show that the training efficiency of 3DSIC-DQN is 4.028 times higher than that directly implementing DQN in a <inline-formula><tex-math notation="LaTeX">$100 \times 100 \times 50$</tex-math></inline-formula> 3D cluttered environment. Furthermore, the training efficiency of 3DSIC-DDPG is 3.9 times higher than the traditional DDPG in the same environment. Moreover, 3DSIC combined with fast recurrent stochastic value gradient (FRSVG), which can be considered as the most state-of-the-art DRL algorithm for UAV path planning, exhibits 2.35 times faster training speed compared with the original FRSVG algorithm.
Aleksey Mironov, Pavel Doronkin
Jeļena Samoilenko, Yulia Stukalina
Marius Mažeika, Darius Juodvalkis
Natalia Konovalova, Luis Moreira Pinto
Lázaro Florido-Benítez
<i>Background:</i> The purpose of this study is to provide an assessment of international airports and airlines, ‘IAAs’, and to organize and classify the literature on air transport to stage the importance of this topic and encourage future research in the projection of the aviation and tourism sectors. <i>Methods:</i> It is a bibliographic study, and this work focuses on IAA documents published in major international journals, conferences, and books from 2000 to 9 June 2021; this topic is scattered across various journals and has secondary data in many disciplines. <i>Results:</i> The findings suggest a new paradigm applied to the IAA topic and are classified in four first-order research streams: airports; airlines; connectivity; and competition. This study identifies new challenges and opportunities for researchers, airport and airline operators, and stakeholders to make better future decisions. <i>Conclusions:</i> There is no agreement on an explicit definition of the IAA concept that captures the true nature of this topic. For this reason, this article is innovative in the new IAA concept and in how it will possibly change the theoretical frameworks in future scientific research in the aviation and tourism sectors. This study has been needed to better understand the effectiveness, projection, and different business strategies to be adopted by researchers and organizations in the aviation and tourism future.
Evgeny Starozhuk, Natalia Salienko, Maria Yakovleva
Mehran Alalhesabi, Mahboobeh Mazarei
Today, historical contexts have been forgotten with the expansion of cities and their rapid growth. The design of urban spaces for the passage of cars has caused historical context destructions and the removal of pedestrians from these spaces. In addition, the presence of valuable elements in these contexts has made the need to protect the old context of cities even more apparent. The historical context of Bushehr city also contains a rich cultural heritage. Problems such as the buildings' destruction and the unfavorable visual condition, distinctive architecture, the lack of spatial connection between valuable historical elements, and cultural customs that are being forgotten, formed the idea of this research. This research solves these issues to identify the tourist route in the historical context with the culture-based tourism approach using a descriptive-analytical method. The information required for this study was extracted through library and field methods. After scrutiny of the studied area, it was analyzed by various methods such as interviews and related software. The research results indicate many tourism potentials in historical-cultural, religious, commercial, and customs fields in the historical context of Bushehr. In order to introduce these potentials to tourists, three different scenarios of tourism are defined in the historical context of Bushehr, which has been tried to have the most significant tourism potential. It is appropriate to introduce these potentials to local and foreign tourists by defining specific tourist routes in the historical context and leading to boost the residents' economy and brand the historical context of Bushehr.IntroductionThe historical context of Bushehr, which dates back to the Afshariya period, is one of the few historical contexts in Iran that have been provided for the formation of its urban skeleton in three different periods. Identifying tourist walking routes to establish spatial connections between valuable historical elements is one of the ways to save the historical context from decay and destruction. The lack of spatial communication through these routes leads to the forgetting of the context, the loss of identity and the forgetting of the authentic culture and old traditions of Bushehr, the absence of a good mentality towards the context, the lack of attention to the needs of the residents and the provision of the services they need, the destruction of the building and destruction of the urban landscape, lack of economic growth, and finally migration of primary residents and destruction of historic fabric. This research has been done to develop and facilitate tourism in the historical context of Bushehr with a tourism-based approach. Now, the critical issue is how to help attract tourists to Bushehr by regenerating the historical context of Bushehr city and identifying the tourism route in it. Materials and MethodsThe present study, in terms of purpose, has been applied to the research group. In terms of method, it has a descriptive-analytical and qualitative approach. The required information related to the research sample has been obtained through observation, field observations, interviews, and completed questionnaires from people living in the area and tourists.The research analysis is in such a way that criteria are determined for the extracted indicators so they can be checked. These criteria have been analyzed and checked by spatial analysis in the Arc GIS software. According to the 2016 census, the population of the historical context of Bushehr is estimated at 11,940 people. Based on the mentioned number and using Cochran's formula method, 372 questionnaires have been completed in the old context. Discussion and ResultsThe indicators of the presence of mixed-use and the existence of service and welfare facilities have been analyzed to investigate the performance component. Due to the location of commercial-service areas along the principal axes, access to residential areas located in the center of the neighborhoods is unfavorable. The mobility and accessibility component includes priority indicators for pedestrian versus vehicular movement, emergency vehicle passage, and access to public transportation stations. In general, the state of public transportation and the level of people's acceptance and use of it in Bushehr is unfavorable. The component of comfort and convenience has been examined by the index of the absence of noise and noise pollution, and the indicators of the presence of vegetation and green space and good sun exposure and shading have presented the environmental component. In order to examine the physical component, several indicators, such as centers and historical elements with capacity for development, the presence of physical permeability, and the rest, have been used. The safety and security component has been measured with two indicators the presence of night activities and the presence of residential units along the axis. The lack of night activities and lighting in the old context has reduced security at night. Social and cultural values include two indicators of cultural, historical, commercial, and religious signs and buildings (tangible cultural heritage) and collective and ritual ceremonies (intangible cultural heritage).CunclusionsThe first step in reviving the historical context of Bushehr is to identify the valuable historical and cultural elements. In order to determine the path of tourists in the historical context and design the selected route, three scenarios have been considered. In each scenario, the effort has been to cross the route with more historical monuments while maintaining the average length of the route and the proximity to the public transport station and passing nearby or the routes that can provide appropriate relief. The first scenario, the trip to old Lian, is 1.92 km long and mainly passes through the historical cores of the neighborhoods. In addition, this route passes through well-known and restored buildings. The second scenario is called the lost mansions, and with a length of 2.22 km, it connects the centers of the old neighborhoods of the past like a ring and, on its way, introduces many historical mansions that are less known to tourists. The third scenario is called market walking, and with a length of 1.48 km, it passes through the lines of the old market. In this way, it has been tried to introduce tourists to some historical and religious monuments and various ceremonies in addition to passing through the old market. By scoring based on the extracted indicators, the second scenario (lost mansions) was introduced as the best scenario.
Lei Deng, Yuchen Niu, Limin Jia et al.
Illegal transshipment of maritime ships is usually closely related to illegal activities such as smuggling, human trafficking, piracy plunder, and illegal fishing. Intelligent identification of illegal transshipment has become an important technical means to ensure the safety of maritime transport. However, due to different geographical environments, legal policies and regulatory requirements in each sea area, there are differences in the movement characteristics and geographical distribution of illegal transshipment behavior in different time and space. Moreover, in areas with dense traffic flow, normal navigation behavior can easily be identified as illegal transshipment, resulting in a high rate of misidentification. This paper proposes a hybrid rule-based and data-driven approach to solve the problem of missing identification in fixed threshold methods and introduces a traffic density feature to reduce the misidentification rate in dense traffic areas. The method is both interpretable and adaptable through unsupervised clustering to get suitable threshold distribution combination for regulatory sea areas. The evaluation results in two different sea areas show that the proposed method is applicable. Compared with other widely used identification methods, this method identifies more illegal transshipment events, which are highly suspicious, and gives warning much earlier. The proposed method can even filter out misidentification events from compared methods’ results, which account for more than half of the total number.
Kennedy Chinedu Okafor, Omowunmi Mary Longe
Intelligent service care robots have increasingly been developed in mission-critical sectors such as healthcare systems, transportation, manufacturing, and environmental applications. The major drawbacks include the open-source Internet of Things (IoT) platform vulnerabilities, node failures, computational latency, and small memory capacity in IoT sensing nodes. This article provides reliable predictive analytics with the optimisation of data transmission characteristics in StreamRobot. Software-defined reliable optimisation design is applied in the system architecture. For the IoT implementation, the edge system model formulation is presented with a focus on edge cluster log-normality distribution, reliability, and equilibrium stability considerations. A real-world scenario for accurate data streams generation from in-built TelosB sensing nodes is converged at a sink-analytic dashboard. Two-phase configurations, namely off-taker and on-demand, link-state protocols are mapped for deterministic data stream offloading. An orphan reconnection trigger mechanism is used for reliable node-to-sink resilient data transmissions. Data collection is achieved, using component-based programming in the experimental testbed. Measurement parameters are derived with TelosB IoT nodes. Reliability validations on remote monitoring and prediction processes are studied considering neural constrained software-defined networking (SDN) intelligence. An OpenFlow-SDN construct is deployed to offload traffic from the edge to the fog layer. At the core, fog detection-to-cloud predictive machine learning (FD-CPML) is used to predict real-time data streams. Prediction accuracy is validated with decision tree, logistic regression, and the proposed FD-CPML. The data streams latency gave 40.00%, 33.33%, and 26.67%, respectively. Similarly, linear predictive scalability behaviour on the network plane gave 30.12%, 33.73%, and 36.15% respectively. The results show satisfactory responses in terms of reliable communication and intelligent monitoring of node failures.
Amir Ehsan Kianfar, Mrityunjaya Sherikar, Andre Gilerson et al.
Suspended monorails are a common mode of transportation for materials and personnel in underground mines. The goal of the EU-funded project “Innovative High Efficiency Power System for Machines and Devices, Increasing the Level of Work Safety in Underground Mining Excavations (HEETII)” is to introduce a single-wire energy transmission system combined with a capacitive-coupling-based wireless transmission system to power the suspended tractor, along with a monitoring system that will monitor the energy network and additional environmental parameters of the mine. Additionally, the monitoring system acts as the wireless communication backbone, allowing for data transmission to surface headquarters, where the data are processed and logged in a central database. This enables operators to detect and take preemptive measures to prevent potential hazards in the mine, improving the overall efficiency of the energy transmission system. This paper describes the additional considerations required for electrical systems in underground mines with potentially explosive atmospheres, as well as the design of the energy transmission system and the monitoring system.
Alexandr Gritsenko, Vladimir Shepelev, Larisa Gabsalikhova et al.
Bernard Aritua, Clemens Wagener, Norbert Wagener et al.
The primary research that underpins this paper seeks to explore the applications of blockchain technology on a specific international corridor and to draw policy implications for decision makers. To analyze the bottlenecks of operating on the New Silk Road and to identify opportunities for applying the blockchain technology on this corridor, a survey was conducted among main train operators and experts working on this route. These responses provide insight into the issues related to the adoption of blockchain technology from front-line actors. The top three challenges are lack of capacities, congestion at transshipment terminals, and slow border crossing. Through the application of blockchain technology, the operators are presented with opportunities for improved accuracy in the processing of data and information, higher reliability of information flows through failure-free transfer of information, and improved traceability of supply chains through irrevocable input of status information. Currently, 50% of the respondents have started to implement blockchain applications or have an actual interest to apply blockchain solutions. For a wider implementation of blockchain solutions, business models need to be developed allowing private and permissioned access that is accepted and open for parties involved. Policy makers should facilitate these digital innovations through flexible and harmonized legal regulations on an international level.
Zhenhua Wang, Wei Xie, Baosheng Wang et al.
Cyber-physical systems (CPSs) are next-generation intelligent systems that integrate computing, communication, and control. Malicious attacks on CPSs can lead to both property damage and casualties. Therefore, it is worth surveying CPS security by reviewing and analyzing the latest high-quality related works. In this paper, we provide an overview of the CPS security studies from the last five years and select 142 related works from A- or B-level conferences/journals recommended by the China Computer Federation (CCF). First, we review the main contents of the selected papers and classify them into 24 topics. Then, we analyze hotspots and trends of CPS security technologies in three dimensions: (1) architecture layers (perception, network, and application); (2) application scenarios (smart grids, health care, smart transportation, smart homes, and general grids); and (3) MADC (Measure, Attack, Defense, and Control) types. Finally, we also perform a statistical analysis in terms of paper publication times, author institutes, countries, and sponsors to show the current worldwide CPS security research situation.
Halaman 42 dari 80310