Figure 4 - uploaded by Hao Xu
Content may be subject to copyright.
5: The hardware block diagram of End system

5: The hardware block diagram of End system

Source publication
Thesis
Full-text available
The commercial airliner aircraft has seen dramatic changes in recent decades, from the first data bus to the latest Integrated Modular Avionics. Avionics has seen more advancement than any other parts of the aircraft, which did not have any major breakthrough regarding how we operate and fly the aircraft. Avionics, however, is evolutionary in past...

Similar publications

Article
Full-text available
The establishment of a remote administration system in university institutions in the DRC is a relevant development for the scientific community. It makes it possible to solve the problems linked to the democratization and geospatial freedom of communicating entities, while offering transparent and secure access to applications and remote machine...
Article
Full-text available
Intelligent buildings are an important part of sustainability practices that the establishment of intelligent buildings is a way to promote sustainability. The technology of that buildings includes advanced systems that represent different building services, The various devices, and systems in the building are connected through a wireless communica...
Technical Report
Full-text available
After outlining the phenomenal growth in Irish milk production post quota this research compares the performance of the Irish dairy industry post milk quota removal against a number of leading processors in key EU dairy producing countries – Denmark, Germany, the Netherlands, France, and the United Kingdom (UK), as well as New Zealand with referenc...
Article
Full-text available
Purpose: The main objective of this article was to determine the technical efficiency of Polish dairy farms in 2008-2017, taking into account the dependence on the herd size, the milk yield of cows and the effects of scale. Design/Methodology/Approach: The non-parametric DEA method based on the concept of border efficiency was used to assess techni...
Article
Full-text available
Aiming at examining the problems of the low cache hit ratio and high-average routing hops in named data networking (NDN), this paper proposes a cache-optimization strategy based on dynamic popularity and replacement value. When the requested content arrives at the routing node, the latest popularity is calculated based on the number of requests in...

Citations

Thesis
Full-text available
This dissertation was written as part of my MSc degree in Cybersecurity at the International Hellenic University. More specifically, this paper critically examines the cybersecurity aspects and requirements of aerial networks, being formed between aircraft and other flying vehicles and the ground, including Air Traffic Control services, operators and users. It does that in the general context of the currently evolving aviation industry that strives to incorporate new basically wireless communication and networking technologies to enhance automation and efficiency. To introduce the unfamiliar reader to the aviation operational environment and the aspects of cybersecurity, this thesis provides an introductory description of the general context of the aviation industry and its evolution, as well as the challenges it faces with regards to cybersecurity that shape its evolution. The examination of a real world scenario as a test case was attempted next as an example of a cybersecurity aware design method. The scenario involves the development of a new air traffic control service similar to ADS-B. The system addresses the need to incorporate small aircraft and UAVs into the Air Traffic Management System and is based on low consumption wireless protocol LoRa and the Internet of Things (IoT) concept. The system was developed as a proof of concept and was subsequently analyzed to assess the threats and risks involved. Contingency measures for the hardening of the system were proposed and used to update the design. Finally, the paper studies more closely some of the measures proposed, with focus on the wireless physical level security. The use of encryption in this layer, as part of the modulation as well as Multi Input Multi Output (MIMO) techniques, is explored through simulations and possible advantages and disadvantages are identified.