Nothing Special   »   [go: up one dir, main page]

Next Issue
Volume 14, August-1
Previous Issue
Volume 14, July-1
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
applsci-logo

Journal Browser

Journal Browser

Appl. Sci., Volume 14, Issue 14 (July-2 2024) – 424 articles

Cover Story (view full-size image): A high-sensitivity pH sensor based on an AlGaN/GaN high-electron mobility transistor (HEMT) with a 10 nm thick Au-gated sensing membrane was investigated. The Au nanolayer as a sensing membrane was deposited by electron-beam evaporation and patterned onto the GaN cap layer, which provides more surface-active sites and a more robust adsorption capacity for hydrogen ions (H+) and hydroxide ions (OH), and thus, the sensitivity of the sensor can be significantly enhanced. The results indicate that this pH sensor can meet most application requirements for advanced medical and chemical analyses. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
20 pages, 7429 KiB  
Article
Research on Path Planning of a Mining Inspection Robot in an Unstructured Environment Based on an Improved Rapidly Exploring Random Tree Algorithm
by Jingwen Wu, Liang Zhao and Ruixue Liu
Appl. Sci. 2024, 14(14), 6389; https://doi.org/10.3390/app14146389 - 22 Jul 2024
Cited by 1 | Viewed by 1172
Abstract
To ensure the safe production of mines, the intelligent trend of underground mining operations is gradually advancing. However, the operational environment of subterranean mining is intricate, making the conventional path-planning algorithm used by mining inspection robots frequently inadequate for real requirements. To safeguard [...] Read more.
To ensure the safe production of mines, the intelligent trend of underground mining operations is gradually advancing. However, the operational environment of subterranean mining is intricate, making the conventional path-planning algorithm used by mining inspection robots frequently inadequate for real requirements. To safeguard the mining inspection robot, targeting the problem of low search efficiency and path redundancy in the path planning of the existing rapidly exploring random tree (RRT) algorithm in the narrow and complex unstructured environment, a path-planning algorithm combining improved RRT and a probabilistic road map (PRM) is proposed. Initially, the target area is efficiently searched according to the fan-shaped goal orientation strategy and the adaptive step size expansion strategy. Subsequently, the PRM algorithm and the improved RRT algorithm are combined to reduce the redundant points of the planning path. Ultimately, considering the kinematics of the vehicle, the path is optimized by the third-order Bessel curve. The experimental simulation results show that the proposed path-planning algorithm has a higher success rate, smoother path, and shorter path length than other algorithms in complex underground mining environments, which proves the effectiveness of the proposed algorithm. Full article
Show Figures

Figure 1

Figure 1
<p>The traditional RRT extended-node method.</p>
Full article ">Figure 2
<p>Sampling point selection principle diagram, where <span class="html-italic">x<sub>rand</sub></span> is the sampling point, <span class="html-italic">goal</span> is the goal point, <span class="html-italic">θ</span> is the offset angle, <span class="html-italic">α</span> is the angle to the x-axis, and <span class="html-italic">x<sub>new</sub></span> is a new node obtained by step expansion with a certain step size.</p>
Full article ">Figure 3
<p>Bridge detection algorithm diagram.</p>
Full article ">Figure 4
<p>The fitting results of the Bessel curve.</p>
Full article ">Figure 5
<p>Simulated maps. (<b>a</b>) Map 1; (<b>b</b>) Map 2; (<b>c</b>) Map 3.</p>
Full article ">Figure 6
<p>The average time to generate the initial path. (<b>a</b>) The average time of generating the initial path with different steps in Map 1; (<b>b</b>) the average time of generating the initial path with different steps in Map 2; (<b>c</b>) the average time of generating the initial path with different steps in Map 3.</p>
Full article ">Figure 7
<p>The path-planning results of Map 1. (<b>a</b>) Traditional RRT algorithm; (<b>b</b>) EP-RRT* algorithm; (<b>c</b>) FGA-RRT and PRM fusion algorithm.</p>
Full article ">Figure 8
<p>The path-planning results of Map 2. (<b>a</b>) Traditional RRT algorithm; (<b>b</b>) EP-RRT* algorithm; (<b>c</b>) FGA-RRT and PRM fusion algorithm.</p>
Full article ">Figure 9
<p>The path-planning results of Map 3. (<b>a</b>) Traditional RRT algorithm; (<b>b</b>) EP-RRT* algorithm; (<b>c</b>) FGA-RRT and PRM fusion algorithm.</p>
Full article ">Figure 10
<p>Third-order Bessel curve smoothing diagram. (<b>a</b>) Map 1; (<b>b</b>) Map 2; (<b>c</b>) Map 3.</p>
Full article ">Figure 11
<p>Mining inspection robot.</p>
Full article ">Figure 12
<p>TW-T600 industrial computer.</p>
Full article ">Figure 13
<p>RPLIDARA2.</p>
Full article ">Figure 14
<p>Inertial measurement unit.</p>
Full article ">Figure 15
<p>Servo driver.</p>
Full article ">Figure 16
<p>Real-world simulated environment 1. (<b>a</b>) Front; (<b>b</b>) back.</p>
Full article ">Figure 17
<p>The actual path of the robot in environment 1.</p>
Full article ">Figure 18
<p>Real-world simulated environment 2. (<b>a</b>) Front; (<b>b</b>) back.</p>
Full article ">Figure 19
<p>The actual path of the robot in environment 2.</p>
Full article ">
19 pages, 2015 KiB  
Article
Peculiarities of Applying Partial Convolutions to the Computation of Reduced Numerical Convolutions
by Ibragim Suleimenov, Aruzhan Kadyrzhan, Dinara Matrassulova and Yelizaveta Vitulyova
Appl. Sci. 2024, 14(14), 6388; https://doi.org/10.3390/app14146388 - 22 Jul 2024
Cited by 2 | Viewed by 973
Abstract
A method is proposed that reduces the computation of the reduced digital convolution operation to a set of independent convolutions computed in Galois fields. The reduced digital convolution is understood as a modified convolution operation whose result is a function taking discrete values [...] Read more.
A method is proposed that reduces the computation of the reduced digital convolution operation to a set of independent convolutions computed in Galois fields. The reduced digital convolution is understood as a modified convolution operation whose result is a function taking discrete values in the same discrete scale as the original functions. The method is based on the use of partial convolutions, reduced to computing a modulo integer q0, which is the product of several prime numbers: q0=p1p2pn. It is shown that it is appropriate to use the expansion of the number q0, to q=p0p1p2pn, where p0 is an additional prime number, to compute the reduced digital convolution. This corresponds to the use of additional digits in the number system used to convert to partial convolutions. The inverse procedure, i.e., reducing the result of calculations modulo q to the result corresponding to calculations modulo q0, is provided by the formula that used only integers proved in this paper. The possibilities of practical application of the obtained results are discussed. Full article
Show Figures

Figure 1

Figure 1
<p>Illustration of the lemma proof; <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>w</mi> </mrow> <mrow> <mn>1</mn> </mrow> </msub> <mo>=</mo> <mn>19</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>w</mi> </mrow> <mrow> <mn>2</mn> </mrow> </msub> <mo>=</mo> <mn>17</mn> </mrow> </semantics></math>, curve 1 (blue)—calculations of <span class="html-italic">q</span> by formula (31), i.e., through the operation of calculating the integer part of the number, curve 2 (red)—values of the sum <span class="html-italic">q</span> + 3, where <span class="html-italic">q</span> is calculated by formula (32), i.e., using only modulo operations.</p>
Full article ">Figure 2
<p>Illustration of the lemma proof; <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>w</mi> </mrow> <mrow> <mn>1</mn> </mrow> </msub> <mo>=</mo> <mn>11</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>w</mi> </mrow> <mrow> <mn>2</mn> </mrow> </msub> <mo>=</mo> <mn>9</mn> </mrow> </semantics></math>, curve 1 (blue)—calculations of <span class="html-italic">q</span> by formula (31), i.e., through the operation of calculating the integer part of the number, curve 2 (red)—values of the sum <span class="html-italic">q</span> + 3, where <span class="html-italic">q</span> is calculated by formula (32), i.e., using only modulo operations.</p>
Full article ">Figure 3
<p>Model function <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>f</mi> </mrow> <mrow> <mn>1</mn> </mrow> </msub> </mrow> </semantics></math> (curve 1, red dots) and the result of applying the moving average calculation operation to it (curve 2, green dots).</p>
Full article ">Figure 4
<p>Model function <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>f</mi> </mrow> <mrow> <mn>1</mn> </mrow> </msub> </mrow> </semantics></math> smoothed using the moving average method (curve 1, green dots) and the result of calculating the analogue using formula (51), curve 2, red dots.</p>
Full article ">Figure 5
<p>Plots of partial convolutions for three digits of number representation modulo 110; (<b>a</b>–<b>c</b>) correspond to partial convolutions in Galois fields <math display="inline"><semantics> <mrow> <mi mathvariant="normal">G</mi> <mi mathvariant="normal">F</mi> <mo>(</mo> <mn>2</mn> <mo>)</mo> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi mathvariant="normal">G</mi> <mi mathvariant="normal">F</mi> <mo>(</mo> <mn>5</mn> <mo>)</mo> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi mathvariant="normal">G</mi> <mi mathvariant="normal">F</mi> <mo>(</mo> <mn>11</mn> <mo>)</mo> </mrow> </semantics></math>, respectively.</p>
Full article ">
19 pages, 859 KiB  
Article
A Longitudinal Study on the Adoption of Cloud Computing in Micro, Small, and Medium Enterprises in Montenegro
by Ivana Ognjanović, Ramo Šendelj, Milica Daković-Tadić and Ines Kožuh
Appl. Sci. 2024, 14(14), 6387; https://doi.org/10.3390/app14146387 - 22 Jul 2024
Viewed by 2481
Abstract
In recent years, small and medium enterprises worldwide have increasingly adopted digital technologies and cloud computing. The pace of this digital transition has varied across countries, and the socioeconomic conditions during the pandemic have further accelerated the digitalization of enterprises. This situation calls [...] Read more.
In recent years, small and medium enterprises worldwide have increasingly adopted digital technologies and cloud computing. The pace of this digital transition has varied across countries, and the socioeconomic conditions during the pandemic have further accelerated the digitalization of enterprises. This situation calls for an examination of the reasons, benefits, and risks associated with enterprises adopting cloud computing in different settings. Our study aimed to collect longitudinal data from 71 Montenegrin micro, small, and medium enterprises. We conducted a repeated measurement study with two measurement periods: 2017 and 2023. The quantitative results were analyzed alongside qualitative data from a semi-structured interview (N = 15) conducted in 2023. The findings revealed substantial shifts in SME attitudes towards cloud computing, highlighting key catalysts and influencing factors such as security, technological accessibility, external expertise, effort expectations, privacy, social influence, perceived security and safety, ease of use, and usefulness. These factors were examined in the context of global digital innovation, the impact of the COVID-19 pandemic, and recent cyberattacks that disrupted national e-services in Montenegro for 3–9 months. The findings provide new insights into how enterprises can become more prepared to effectively use cloud computing. Full article
(This article belongs to the Special Issue Cloud Computing: Challenges, Application and Prospects)
Show Figures

Figure 1

Figure 1
<p>Methodological approach: longitudinal study with causal factor identification.</p>
Full article ">Figure 2
<p>Tree diagram: hierarchical illustration of influencing factors.</p>
Full article ">
16 pages, 2741 KiB  
Article
Composite Copolymer Beads Incorporating Red Mud for Water Amendment by Adsorption—Oxidation Processes
by Teodor Sandu, Elena Alina Olaru, Raul-Augustin Mitran, Andreea Miron, Sorin-Viorel Dolana, Anamaria Zaharia, Ana-Mihaela Gavrilă, Marinela-Victoria Dumitru, Anita-Laura Chiriac, Andrei Sârbu and Tanța-Verona Iordache
Appl. Sci. 2024, 14(14), 6386; https://doi.org/10.3390/app14146386 - 22 Jul 2024
Viewed by 1020
Abstract
We face significant environmental pollution problems due to various industries, such as the aluminum industry, which generates large amounts of red mud (RM) waste, or agriculture, in which case the use of pesticides creates huge water pollution problems. In this context, the present [...] Read more.
We face significant environmental pollution problems due to various industries, such as the aluminum industry, which generates large amounts of red mud (RM) waste, or agriculture, in which case the use of pesticides creates huge water pollution problems. In this context, the present study offers a better perspective to originally solve both environmental issues. Thus, the main target of the study referred to using RM waste as a filler for preparing composite copolymer beads. Thereafter, this can achieve significant removal of water pollutants due to their adsorption/oxidation characteristics. As evidenced by the changes in chemical structure and composition, thermal stability, morphology, and porosity, RM was homogenously incorporated in poly(acrylonitrile-co-acrylic acid) beads prepared by wet phase inversion. The final assessment for the removal of pesticides by adsorption and oxidation processes was proven successful. In this regard, 2,4-dichlorophenoxyacetic acid was chosen as a model pollutant, for which an adsorption capacity of 16.08 mg/g composite beads was achieved. Full article
(This article belongs to the Special Issue Pollution Control Chemistry II)
Show Figures

Figure 1

Figure 1
<p>(<b>A</b>). Chemical structure of 2,4-DCFA, with formula C<sub>8</sub>H<sub>6</sub>Cl<sub>2</sub>O<sub>3</sub> and a molar mass of 221.04 g/mol; (<b>B</b>). schematic representation of the preparation process for composite beads with RM; (<b>C</b>). pictures of lyophilized series of beads with RM (1-RM, 2-RM, and 3-RM) and the control beads (1-Ref, 2-Ref, and 3-Ref) with diameters of 2–4 mm.</p>
Full article ">Figure 2
<p>FTIR spectra of analyzed composite copolymer beads compared to RM alone and their corresponding precursor copolymer: (<b>A</b>) C1-based series; (<b>B</b>) C2-based series; (<b>C</b>) C3-based series.</p>
Full article ">Figure 3
<p>Thermogravimetric analyses (<b>A</b>–<b>C</b>) and differential thermal analysis (<b>D</b>–<b>F</b>) of the composite copolymer beads and their corresponding references, compared to the precursor materials of RM alone and corresponding copolymers.</p>
Full article ">Figure 4
<p>Micrographs of reference (<b>top</b>) and composite beads (<b>bottom</b>) taken at 50 µm scale: (<b>A</b>). section view and (<b>B</b>). surface view.</p>
Full article ">Figure 5
<p>FTIR spectra of (<b>A</b>) 3-RM, 3-RM before and after adsorption (3-RM-Ads)/oxidation (3-RM-Ox) processes; (<b>B</b>) 3-RM after reconditioning from the two procedures (3-RM-R-Ads after adsorption and 3-RM-R-Ox after oxidation).</p>
Full article ">
19 pages, 7129 KiB  
Article
Controller of Pneumatic Muscles Implemented in Active Seat Suspension
by Igor Maciejewski, Sebastian Pecolt, Andrzej Błażejewski, Tomasz Krzyzynski and Sebastian Glowinski
Appl. Sci. 2024, 14(14), 6385; https://doi.org/10.3390/app14146385 - 22 Jul 2024
Viewed by 973
Abstract
In this work, we present a study on seat suspension technology that integrates pneumatic muscles, marking a significant advancement in active vibration control. This innovative approach addresses the limitations of traditional suspension systems, providing enhanced comfort and adaptability. A key achievement is the [...] Read more.
In this work, we present a study on seat suspension technology that integrates pneumatic muscles, marking a significant advancement in active vibration control. This innovative approach addresses the limitations of traditional suspension systems, providing enhanced comfort and adaptability. A key achievement is the development of a mathematical model for controlling horizontal seat vibration, which serves as a valuable design tool for evaluating seat suspension under various conditions and control strategies. The creation of a custom microcontroller, benchmarked against a standard from National Instruments, highlights the practical applications of this research. Positive results suggest a promising future for this technology in industrial settings, where vibration reduction is critical. The system’s scalability and user-adjustable signal levels further enhance its potential for widespread industrial adoption. Full article
Show Figures

Figure 1

Figure 1
<p>Active Seat Suspension System.</p>
Full article ">Figure 2
<p>Measured force characteristics of the passive sub-system.</p>
Full article ">Figure 3
<p>Simulated and measured force characteristics of the active sub-system.</p>
Full article ">Figure 4
<p>The calculated air pressure values <span class="html-italic">p</span><sub>m1</sub> (<b>a</b>) and <span class="html-italic">p</span><sub>m2</sub> (<b>b</b>) in individual pneumatic muscles as functions of active forces and relative displacement of the suspension system.</p>
Full article ">Figure 5
<p>Block Diagram of Information Flow in the Microcontroller.</p>
Full article ">Figure 6
<p>Power supply diagram with filtration.</p>
Full article ">Figure 7
<p>Input signals diagram.</p>
Full article ">Figure 8
<p>Wiring diagram of output signals.</p>
Full article ">Figure 9
<p>Microcontroller wiring diagram.</p>
Full article ">Figure 10
<p>Top panel connection diagram.</p>
Full article ">Figure 11
<p>Driver PCB board with components: view from the top (<b>a</b>), from the bottom (<b>b</b>), top panel PCB board with components (<b>c</b>), programmer and FTDI232 (<b>d</b>).</p>
Full article ">Figure 12
<p>A laboratory station for determining the vibration isolation properties of an active suspension system (<b>a</b>) and a custom microcontroller developed for the purpose of controlling seat vibrations in real-time (<b>b</b>).</p>
Full article ">Figure 13
<p>Time histories of the acceleration signals: EM3 (<b>a</b>), EM5 (<b>c</b>), EM6 (<b>e</b>) and corresponding Power Spectral Densities of the excitation signals: EM3 (<b>b</b>), EM5 (<b>d</b>), EM6 (<b>f</b>).</p>
Full article ">Figure 14
<p>Acceleration waveforms of the isolated body’s vibrations and relative displacement of the suspension system obtained using the NI CompactRIO-9074 controller and the custom microcontroller with the signals EM3 (<b>a</b>,<b>b</b>), EM5 (<b>c</b>,<b>d</b>), EM6 (<b>e</b>,<b>f</b>).</p>
Full article ">Figure 15
<p>Power Spectral Densities (PSD) of the acceleration of the isolated body vibration and transfer functions (Tp) of the suspension system obtained using the NI CompactRIO-9074 controller and the custom microcontroller in comparison with a passive system for the excitation signals: EM3 (<b>a</b>,<b>b</b>), EM5 (<b>c</b>,<b>d</b>), EM6 (<b>e</b>,<b>f</b>).</p>
Full article ">
18 pages, 1868 KiB  
Article
Open-Pit Mining Area Extraction Using Multispectral Remote Sensing Images: A Deep Learning Extraction Method Based on Transformer
by Qinghua Qiao, Yanyue Li and Huaquan Lv
Appl. Sci. 2024, 14(14), 6384; https://doi.org/10.3390/app14146384 - 22 Jul 2024
Cited by 1 | Viewed by 1101
Abstract
In the era of remote sensing big data, the intelligent interpretation of remote sensing images is a key technology for mining the value of remote sensing big data and promoting a number of major applications, mainly including land cover classification and extraction. Among [...] Read more.
In the era of remote sensing big data, the intelligent interpretation of remote sensing images is a key technology for mining the value of remote sensing big data and promoting a number of major applications, mainly including land cover classification and extraction. Among these, the rapid extraction of open-pit mining areas plays a vital role in current practices for refined mineral resources development and management and ecological–environmental protection in China. However, existing methods are not accurate enough for classification, not fine enough for boundary extraction, and poor in terms of multi-scale adaptation. To address these issues, we propose a new semantic segmentation model based on Transformer, which is called Segmentation for Mine—SegMine—and consists of a Vision Transformer-based encoder and a lightweight attention mask decoder. The experimental results show that SegMine enhances the network’s ability to obtain local spatial detail information and improves the problem of disappearing small-scale object features and insufficient information expression. It also better preserves the boundary details of open-pit mining areas. Using the metrics of mIoU, precision, recall, and dice, experimental areas were selected for comparative analysis, and the results show that the new method is significantly better than six other existing major Transformer variants. Full article
Show Figures

Figure 1

Figure 1
<p>Overall architecture of SegMine.</p>
Full article ">Figure 2
<p>The overall flow of the information injection module.</p>
Full article ">Figure 3
<p>Overall flow of the attention mask module.</p>
Full article ">Figure 4
<p>Segmentation of seven models on the open-pit mining area dataset.</p>
Full article ">
22 pages, 6169 KiB  
Article
Design of Robust Broadband Frequency-Invariant Broadside Beampatterns for the Differential Loudspeaker Array
by Yankai Zhang, Hongjian Wei and Qiaoxi Zhu
Appl. Sci. 2024, 14(14), 6383; https://doi.org/10.3390/app14146383 - 22 Jul 2024
Cited by 1 | Viewed by 949
Abstract
The directional loudspeaker array has various applications due to its capability to direct sound generation towards the target listener and reduce noise pollution. Differential beamforming has recently been applied to the loudspeaker line array to produce a broadside frequency-invariant radiation pattern. However, the [...] Read more.
The directional loudspeaker array has various applications due to its capability to direct sound generation towards the target listener and reduce noise pollution. Differential beamforming has recently been applied to the loudspeaker line array to produce a broadside frequency-invariant radiation pattern. However, the existing methods cannot achieve a compromise between robustness and broadband frequency-invariant beampattern preservation. This paper proposed a robust broadband differential beamforming design to allow the loudspeaker line array to radiate broadside frequency-invariant radiation patterns with robustness. Specifically, we propose a method to determine the ideal broadside differential beampattern by combining multiple criteria, namely null positions, maximizing the directivity factor, and achieving a desired beampattern with equal sidelobes. We derive the above ideal broadside differential beampattern into the target beampattern in the modal domain. We propose a robust modal matching method with Tikhonov regularization to optimize the loudspeaker weights in the modal domain. Simulations and experiments show improved frequency-invariant broadside beamforming over the 250–4k Hz frequency range compared with the existing modal matching and null-constrained methods. Full article
(This article belongs to the Special Issue Noise Measurement, Acoustic Signal Processing and Noise Control)
Show Figures

Figure 1

Figure 1
<p>Broadside beamforming with a differential loudspeaker line array.</p>
Full article ">Figure 2
<p>The target broadside radiation pattern was designed by multiple criteria. (<b>a</b>) The second-order broadside beampattern with nulls at 15° and 165°. (<b>b</b>) The fourth-order target beampattern with nulls at 15°, 45°, 135°, and 165°. (<b>c</b>) The second-order target beampattern with maximum directivity factor. (<b>d</b>) The fourth-order target beampattern with maximum directivity factor. (<b>e</b>) The fourth-order ideal beampattern with equal sidelobe level, where S is set to 10 dB. (<b>f</b>) The fourth-order ideal beampattern with equal sidelobe levels, where S is set to 20 dB.</p>
Full article ">Figure 2 Cont.
<p>The target broadside radiation pattern was designed by multiple criteria. (<b>a</b>) The second-order broadside beampattern with nulls at 15° and 165°. (<b>b</b>) The fourth-order target beampattern with nulls at 15°, 45°, 135°, and 165°. (<b>c</b>) The second-order target beampattern with maximum directivity factor. (<b>d</b>) The fourth-order target beampattern with maximum directivity factor. (<b>e</b>) The fourth-order ideal beampattern with equal sidelobe level, where S is set to 10 dB. (<b>f</b>) The fourth-order ideal beampattern with equal sidelobe levels, where S is set to 20 dB.</p>
Full article ">Figure 3
<p>Synthesized broadside beampatterns for a line array of 31 loudspeakers. (<b>a</b>) Second-order, (<b>b</b>) fourth-order, (<b>c</b>) sixth-order, (<b>d</b>) eighth-order.</p>
Full article ">Figure 3 Cont.
<p>Synthesized broadside beampatterns for a line array of 31 loudspeakers. (<b>a</b>) Second-order, (<b>b</b>) fourth-order, (<b>c</b>) sixth-order, (<b>d</b>) eighth-order.</p>
Full article ">Figure 4
<p>The performance of the different-order synthesized beamformers: (<b>a</b>) WNG and (<b>b</b>) DI.</p>
Full article ">Figure 5
<p>Performance comparison of the sixth-order synthesized beamformer with different regularization parameters: (<b>a</b>) WNG and (<b>b</b>) DI.</p>
Full article ">Figure 6
<p>The simulated and ideal beampatterns of the sixth-order broadside differential beamformers synthesized by MM-JAD and the proposed method at different frequencies. (<b>a</b>) 250 Hz, (<b>b</b>) 500 Hz, (<b>c</b>) 750 Hz, (<b>d</b>) 1 kHz.</p>
Full article ">Figure 7
<p>The averaged simulated and ideal beampatterns of the sixth-order broadside differential beamformers synthesized by MM-JAD and the proposed method with the perturbation added to the frequency response of the loudspeakers at different frequencies. (<b>a</b>) 250 Hz, (<b>b</b>) 500 Hz, (<b>c</b>) 750 Hz, and (<b>d</b>) 1 kHz.</p>
Full article ">Figure 7 Cont.
<p>The averaged simulated and ideal beampatterns of the sixth-order broadside differential beamformers synthesized by MM-JAD and the proposed method with the perturbation added to the frequency response of the loudspeakers at different frequencies. (<b>a</b>) 250 Hz, (<b>b</b>) 500 Hz, (<b>c</b>) 750 Hz, and (<b>d</b>) 1 kHz.</p>
Full article ">Figure 8
<p>Performance of generating the sixth-order broadside differential beampattern regarding (<b>a</b>) WNG and (<b>b</b>) DI.</p>
Full article ">Figure 9
<p>Synthesized beampatterns of (<b>a</b>) DD, (<b>b</b>) MN, (<b>c</b>) MNA, and (<b>d</b>) proposed method.</p>
Full article ">Figure 10
<p>Photo of the line array with 31 loudspeakers and experimental setup of the measurement: (<b>a</b>) the line array and (<b>b</b>) the experimental setup.</p>
Full article ">Figure 11
<p>The measured radiation patterns of different methods for the design of a sixth-order broadside differential pattern: (<b>a</b>) Ref. [<a href="#B26-applsci-14-06383" class="html-bibr">26</a>] A, (<b>b</b>) Ref. [<a href="#B26-applsci-14-06383" class="html-bibr">26</a>] B, (<b>c</b>) Ref. [<a href="#B29-applsci-14-06383" class="html-bibr">29</a>], (<b>d</b>) proposed.</p>
Full article ">Figure 12
<p>Comparisons of the measured beampattern generated by MM-JAD and the proposed method with the ideal beampattern at (<b>a</b>) 250 Hz, (<b>b</b>) 500 Hz, (<b>c</b>) 750 Hz, (<b>d</b>) 1 kHz.</p>
Full article ">Figure 13
<p>The measured radiation patterns of the benchmark methods (<b>a</b>) DAS and (<b>b</b>) MVDR.</p>
Full article ">
22 pages, 23375 KiB  
Article
AnimalEnvNet: A Deep Reinforcement Learning Method for Constructing Animal Agents Using Multimodal Data Fusion
by Zhao Chen, Dianchang Wang, Feixiang Zhao, Lingnan Dai, Xinrong Zhao, Xian Jiang and Huaiqing Zhang
Appl. Sci. 2024, 14(14), 6382; https://doi.org/10.3390/app14146382 - 22 Jul 2024
Viewed by 1096
Abstract
Simulating animal movement has long been a central focus of study in the area of wildlife behaviour studies. Conventional modelling methods have difficulties in accurately representing changes over time and space in the data, and they generally do not effectively use telemetry data. [...] Read more.
Simulating animal movement has long been a central focus of study in the area of wildlife behaviour studies. Conventional modelling methods have difficulties in accurately representing changes over time and space in the data, and they generally do not effectively use telemetry data. Thus, this paper introduces a new and innovative deep reinforcement learning technique known as AnimalEnvNet. This approach combines historical trajectory data and remote sensing images to create an animal agent using deep reinforcement learning techniques. It overcomes the constraints of conventional modelling approaches. We selected pandas as the subject of our research and carried out research using GPS trajectory data, Google Earth images, and Sentinel-2A remote sensing images. The experimental findings indicate that AnimalEnvNet reaches convergence during supervised learning training, attaining a minimal mean absolute error (MAE) of 28.4 m in single-step prediction when compared to actual trajectories. During reinforcement learning training, the agent has the capability to replicate animal locomotion for a maximum of 12 iterations, while maintaining an error margin of 1000 m. This offers a novel approach and viewpoint for mimicking animal behaviour. Full article
Show Figures

Figure 1

Figure 1
<p>Panda trajectory information.</p>
Full article ">Figure 2
<p>Remote sensing image map of the research area. (<b>A</b>,<b>B</b>) Sentinel-2 remote sensing image example. (<b>C</b>,<b>D</b>) Google Earth remote sensing image example.</p>
Full article ">Figure 3
<p>The technical framework.</p>
Full article ">Figure 4
<p>Histogram depicting the correlation between the discrepancies in XDIFF and YDIFF.</p>
Full article ">Figure 5
<p>Overview of the study area.</p>
Full article ">Figure 6
<p>The agent reinforcement training network framework.</p>
Full article ">Figure 7
<p>Comparison of model MAE results.</p>
Full article ">Figure 8
<p>Comparison of model MSELoss results.</p>
Full article ">Figure 9
<p>Comparison of model MAE results.</p>
Full article ">Figure 10
<p>Comparison of model MSELoss results.</p>
Full article ">Figure 11
<p>Reward learning curve.</p>
Full article ">Figure 12
<p>Average steps of agent in single episode.</p>
Full article ">Figure 13
<p>Comparison of differences between actual and predicted trajectories. (<b>A</b>–<b>D</b>) represent four different moments.</p>
Full article ">
20 pages, 5975 KiB  
Article
Research on the Reasonable Width of Coal Pillar Driving along Goaf under Thick Hard Roof
by Wei Gu, Dalong Xu, Zhenfei Han and Hao Zhang
Appl. Sci. 2024, 14(14), 6381; https://doi.org/10.3390/app14146381 - 22 Jul 2024
Cited by 1 | Viewed by 873
Abstract
There are fewer studies on the width of coal pillar retaining under a thick, hard roof. This paper takes the thick limestone roof in the 10110 working face of Jinniu Coal Mine as the background, taking the reasonable coal pillar width and its [...] Read more.
There are fewer studies on the width of coal pillar retaining under a thick, hard roof. This paper takes the thick limestone roof in the 10110 working face of Jinniu Coal Mine as the background, taking the reasonable coal pillar width and its stability control technology as research objectives. Taking the theoretical analysis and calculation, numerical simulation to study the stress distribution along goaf under different parameters of the roof cutting, the stress distribution of the roadway, and displacement of the surrounding rock under different coal pillar widths, finally examined through on-site industrial experiments. The results show that (1) the vertical stress along goaf shows a gradual decrease with the increase of the roof cutting height and angle; after considering the cost and the difficulty, the optimal height and angle are chosen to be 21 m and 15°; (2) the vertical peak stress of coal pillar decreases with the increase of the width, coal pillar is gradually transformed from the crushed state to the elastic state, the displacement of the roadway also decreases with the increase of the width of the pillar, and the width of the coal pillar is chosen to be 8.0 m after comprehensive analysis; (3) during the roadway excavation and working face mining, the deformation of the surrounding rock is in a reasonable range, and the anchors and bolts are in a good state of stress, which indicates that retaining 8 m coal pillar is a success. This paper also provides theoretical references and implications for coal pillar retaining in similar geological mining conditions. Full article
(This article belongs to the Section Civil Engineering)
Show Figures

Figure 1

Figure 1
<p>Mine location and working face layout. (<b>a</b>) Location of Jinniu Coal Mine in China; (<b>b</b>) Location of Jinniu Coal Mine in Linfen City; (<b>c</b>) the working face layout; (<b>d</b>) the histogram of the working face.</p>
Full article ">Figure 2
<p>Structural model of the overburden rock strata before and after roof cutting. (<b>a</b>) before roof cutting. (<b>b</b>) after roof cutting.</p>
Full article ">Figure 3
<p>Coal pillar bearing structure in goaf excavation.</p>
Full article ">Figure 4
<p>Flac<sup>3D</sup> numerical calculation model and its boundary diagram.</p>
Full article ">Figure 5
<p>Schematic diagrams of different roof-cutting parameters. (<b>a</b>) Simulation parameters for roof cutting height; (<b>b</b>) simulation parameters for roof cutting angle.</p>
Full article ">Figure 6
<p>Stress distribution along goaf under different roof cutting heights. (<b>a</b>) Not roof cutting. (<b>b</b>) Roof cutting height 18 m. (<b>c</b>) Roof cutting height 21 m. (<b>d</b>) Roof cutting height 24 m.</p>
Full article ">Figure 7
<p>Stress distribution curve along goaf under different roof cutting heights.</p>
Full article ">Figure 8
<p>Stress distribution and curve along goaf under different roof cutting angles. (<b>a</b>) Roof cutting angle 5°. (<b>b</b>) Roof cutting angle 10°. (<b>c</b>) Roof cutting angle 15°. (<b>d</b>) Roof cutting angle 20°. (<b>e</b>) Stress distribution curve along goaf under different roof cutting angles.</p>
Full article ">Figure 9
<p>Vertical stress distribution of the roadway under different widths of coal pillars during excavation. (<b>a</b>) Width of coal pillar 7 m. (<b>b</b>) Width of coal pillar 8 m. (<b>c</b>) Width of coal pillar 9 m. (<b>d</b>) Width of coal pillar 10 m. (<b>e</b>) Width of coal pillar 11 m.</p>
Full article ">Figure 10
<p>Deformation of roadway under different widths of coal pillars.</p>
Full article ">Figure 11
<p>Schematic diagram of mining roadway station layout.</p>
Full article ">Figure 12
<p>Observation methods and equipment. (<b>a</b>) Cross-point method. (<b>b</b>) MCS-400 force measurement gauge.</p>
Full article ">Figure 13
<p>Surface displacement observations of measuring points during excavation and working face mining. (<b>a</b>) Observations on the displacement of the roadway at point 1 (during excavation); (<b>b</b>) observations of the displacement of the roadway at point 2 (during the mining of the working face).</p>
Full article ">Figure 14
<p>Anchor (bolt) monitoring map.</p>
Full article ">Figure 15
<p>Anchor and cable force monitoring results during roadway excavation. (<b>a</b>) Results of bolt stress monitoring. (<b>b</b>) Results of anchor stress monitoring.</p>
Full article ">
22 pages, 6251 KiB  
Article
A New Adaptive Strategy for Enhancing the Stability of Isolated Grids through the Integration of Renewable Energy and V2G Management
by Edisson Villa-Ávila, Paul Arévalo, Danny Ochoa-Correa, Vinicio Iñiguez-Morán and Francisco Jurado
Appl. Sci. 2024, 14(14), 6380; https://doi.org/10.3390/app14146380 - 22 Jul 2024
Viewed by 1292
Abstract
The integration of renewable energy sources into isolated microgrids introduces significant power fluctuations due to their intermittent nature. This study addresses the need for advanced power smoothing methods to enhance the stability of isolated networks. An innovative adaptive strategy is presented, combining photovoltaic [...] Read more.
The integration of renewable energy sources into isolated microgrids introduces significant power fluctuations due to their intermittent nature. This study addresses the need for advanced power smoothing methods to enhance the stability of isolated networks. An innovative adaptive strategy is presented, combining photovoltaic solar generation with vehicle-to-grid technology, utilizing an enhanced adaptive moving average filter with fuzzy logic control. The primary objective is to dynamically optimize the time frame of the Li-ion battery energy storage system for immediate power stabilization, leveraging the high energy density and rapid response capabilities inherent in electric vehicle batteries. The methodology encompasses data acquisition from photovoltaic panels, definition of fuzzy logic control rules, and implementation of the proposed method within a computer-controlled system connected to a bidirectional three-phase inverter. Experimental results highlight the proposed method’s superiority over conventional moving averages and ramp-rate filters. Full article
Show Figures

Figure 1

Figure 1
<p>General scheme of the proposed methodology. Reproduced with permission from [<a href="#B33-applsci-14-06380" class="html-bibr">33</a>].</p>
Full article ">Figure 2
<p>Schematic diagram of the proposed Fuzzy Logic Controller. Reproduced with permission from [<a href="#B33-applsci-14-06380" class="html-bibr">33</a>].</p>
Full article ">Figure 3
<p>Proposed FLC membership functions for power smoothing control: (<b>a</b>) Input 1: Power (P), (<b>b</b>) Input 2: SoC, (<b>c</b>) Frequency, and (<b>d</b>) Output: data time window size (WS). Categories include NS (no smoothing), LS (low smoothing), S (smoothing), MS (moderate smoothing), and HS (high smoothing). Input 1 values are represented as VL (very low), L (low), M (medium), H (high), and VH (very high). Input 2 values denote percentages: very low = 10%, low = 30%, medium = 50%, high = 70%, and very high = 90%. Reproduced with permission from [<a href="#B33-applsci-14-06380" class="html-bibr">33</a>].</p>
Full article ">Figure 4
<p>Graphical representation depicting the inputs and output generated by the newly developed FLC.</p>
Full article ">Figure 5
<p>Test bench implemented in the laboratory. Reproduced with permission from [<a href="#B33-applsci-14-06380" class="html-bibr">33</a>].</p>
Full article ">Figure 6
<p>Flowchart for the implementation of the V2GSUN power smoothing method.</p>
Full article ">Figure 7
<p>Typical power fluctuations in the daily PV production with a photographic record of the sun every hour during the day. Reproduced with permission from [<a href="#B33-applsci-14-06380" class="html-bibr">33</a>].</p>
Full article ">Figure 8
<p>Power response results without using V2G, baseline case: (<b>a</b>) PV power, (<b>b</b>) GD power, (<b>c</b>) generator frequency, and (<b>d</b>) generator line voltages.</p>
Full article ">Figure 8 Cont.
<p>Power response results without using V2G, baseline case: (<b>a</b>) PV power, (<b>b</b>) GD power, (<b>c</b>) generator frequency, and (<b>d</b>) generator line voltages.</p>
Full article ">Figure 9
<p>Results of implementing the MA method for V2G aimed at smoothing PV power: (<b>a</b>) GD power, (<b>b</b>) PV power compensated with Psc, (<b>c</b>) Generator frequency, and (<b>d</b>) generator line voltages.</p>
Full article ">Figure 10
<p>Experimental outcomes of applying the R-R filter method for V2G to smooth PV power: (<b>a</b>) GD power, (<b>b</b>) PV power compensated with Psc, (<b>c</b>) generator frequency, and (<b>d</b>) generator line voltages.</p>
Full article ">Figure 11
<p>Implementation of the proposed “V2GSUN” algorithm for V2G to mitigate PV intermittence: (<b>a</b>) GD power, (<b>b</b>) PV power compensated with Psc, (<b>c</b>) generator frequency, and (<b>d</b>) generator line voltages.</p>
Full article ">Figure 12
<p>Indicators of frequency variability reduction achieved in each case of study: MA filter using FLC (proposed V2GSUN method), R-R filter, MA filter, and case base.</p>
Full article ">Figure 13
<p>The behavior of Li-Ion BESS’s SoC by implementing diferent V2G power smoothing approaches: MA filter, RR filter, and MA filter using FLC (V2GSUN).</p>
Full article ">Figure 14
<p>Real-time window size updating is featured in the proposal (V2GSUN).</p>
Full article ">Figure 15
<p>Experimental test outcomes by applying the V2G concept with the proposed “V2GSUN” filter method for charging priority: (<b>a</b>) GD power. (<b>b</b>) PV power compensated with Psc. (<b>c</b>) generator frequency, and (<b>d</b>) generator line voltages.</p>
Full article ">Figure 16
<p>Result of prioritized SoC charging for storage system using V2G while mitigating generated power peaks.</p>
Full article ">Figure 17
<p>Real-time adjustment of data window size (t).</p>
Full article ">Figure 18
<p>Results of sensibility analysis of power smoothing metrics.</p>
Full article ">
17 pages, 14445 KiB  
Article
Are Clinical Balance Measures Linked to Cycling Performance?
by Tasman Harris, Kevin Netto, Caitlin M. Hillier, Sharni Burgess and Simon M. Rosalie
Appl. Sci. 2024, 14(14), 6379; https://doi.org/10.3390/app14146379 - 22 Jul 2024
Viewed by 954
Abstract
Balance is paramount to safe and successful cycling, both in competition and recreation. Balance has been investigated in the return-to-cycling context, but its relationship to cycling performance is unknown. Our study aimed to analyse the relationship between balance, measured by common clinical balance [...] Read more.
Balance is paramount to safe and successful cycling, both in competition and recreation. Balance has been investigated in the return-to-cycling context, but its relationship to cycling performance is unknown. Our study aimed to analyse the relationship between balance, measured by common clinical balance tests, and cycling performance. Seven competitive cyclists participated in this cross-sectional correlational study. We collected field-based measures of cycling performance, including mean velocity, minimum and maximum velocity, mean corner speed, average lap time, and lean angle. Also, we measured balance via the balance error scoring system, the star excursion balance test, the lateral reach test, and the modified Bass test of dynamic balance. Strong correlations between cornering performance and cycling performance (r = 0.65–0.87, p < 0.01) were detected. Weak correlations between clinical balance tests and cycling performance (r = 0.33–0.53, p < 0.05) were observed. In conclusion, our study showed that improving cornering performance has the potential to improve overall cycling performance. We also found no clear correlations between our clinical balance tests and cycling performance. These weak correlations between postural control in standing and cycling performance suggest that standing balance and balancing during cycling are distinct motor control processes. Full article
(This article belongs to the Special Issue Exercise Physiology and Biomechanics in Human Health)
Show Figures

Figure 1

Figure 1
<p>An aerial map of the circuit, including the corners and the start/finish.</p>
Full article ">Figure 2
<p>Scatter plot of lap time and mean corner speed.</p>
Full article ">Figure 3
<p>Scatter plot of mean lap velocity and mean corner speed.</p>
Full article ">Figure A1
<p>Bipedal stance condition of the BESS.</p>
Full article ">Figure A2
<p>Unipedal stance condition of the BESS.</p>
Full article ">Figure A3
<p>Tandem stance condition of the BESS.</p>
Full article ">Figure A4
<p>Star excursion balance test setup. The above participant is reaching in the posterior medial direction. The foot remains flat, with the ball of the foot on the section where the pieces of tape overlap. The reaching foot lightly taps the section of tape.</p>
Full article ">Figure A5
<p>Star excursion balance setup. The above participant is reaching in the medial direction. The hands are free to move and can be used by the participant to aid their balance.</p>
Full article ">Figure A6
<p>Experimental setup of the lateral reach test. The participant is tasked with reaching as far as possible in a horizontal direction, while keeping their contralateral arm stationary by their side, and their feet flat on the floor.</p>
Full article ">Figure A7
<p>The participant jumps to the first marker.</p>
Full article ">Figure A8
<p>The participant remains balanced for five seconds per marker.</p>
Full article ">Figure A9
<p>After five seconds, the participants jumps to the next marker.</p>
Full article ">
16 pages, 6284 KiB  
Article
Estimating Urban Traffic Safety and Analyzing Spatial Patterns through the Integration of City-Wide Near-Miss Data: A New York City Case Study
by Chuan Xu, Jingqin Gao, Fan Zuo and Kaan Ozbay
Appl. Sci. 2024, 14(14), 6378; https://doi.org/10.3390/app14146378 - 22 Jul 2024
Cited by 1 | Viewed by 1451
Abstract
City-wide near-miss data can be beneficial for traffic safety estimation. In this study, we evaluate urban traffic safety and examine spatial patterns by incorporating city-wide near-miss data (59,277 near-misses). Our methodology employs a grid-based method, the Empirical Bayes (EB) approach, and spatial analysis [...] Read more.
City-wide near-miss data can be beneficial for traffic safety estimation. In this study, we evaluate urban traffic safety and examine spatial patterns by incorporating city-wide near-miss data (59,277 near-misses). Our methodology employs a grid-based method, the Empirical Bayes (EB) approach, and spatial analysis tools including global Moran’s I and local Moran’s I. The study findings reveal that near-misses have the strongest correlation with observed crash frequency among all the variables studied. Interestingly, the ratio of near-misses to crashes is roughly estimated to be 1957:1, providing a potentially useful benchmark for urban areas. For other variables, an increased number of intersections and bus stops, along with a greater road length, contribute to a higher crash frequency. Conversely, residential and open-space land use rates show a negative correlation with crash frequency. Through spatial analysis, potential risk hotspots including roads linking bridges and tunnels, and avenues bustling with pedestrian activity, are highlighted. The study also identified negative local spatial correlations in crash frequencies, suggesting significant safety risk variations within relatively short distances. By mapping the differences between observed and predicted crash frequencies, we identified specific grid areas with unexpectedly high or low crash frequencies. These findings highlight the crucial role of near-miss data in urban traffic safety policy and planning, particularly relevant with the imminent rise of autonomous and connected vehicles. By integrating near-miss data into safety estimations, we can develop a more comprehensive understanding of traffic safety and, thus, more effectively address urban traffic risks. Full article
(This article belongs to the Special Issue Vehicle Safety and Crash Avoidance)
Show Figures

Figure 1

Figure 1
<p>Grid generation in the study area.</p>
Full article ">Figure 2
<p>The concepts of FCWs, BCWs, and PCWs (Source: Mobileye).</p>
Full article ">Figure 3
<p>ME8 and OEM collision warning locations and distributions.</p>
Full article ">Figure 3 Cont.
<p>ME8 and OEM collision warning locations and distributions.</p>
Full article ">Figure 4
<p>The land use group spatial distribution in the study area.</p>
Full article ">Figure 5
<p><b>The correlation matrix of the safety–related variables.</b> Note: a black cross on a number means the correlation coefficient is insignificant. Crash_tot is the total crash count in a grid.</p>
Full article ">Figure 6
<p>The spatial map of grid-based EB-estimated crash frequency.</p>
Full article ">Figure 7
<p>Univariate LISA cluster maps.</p>
Full article ">Figure 8
<p>Observation and prediction difference between observation and model prediction.</p>
Full article ">
20 pages, 4002 KiB  
Article
A Novel Method of Time-Varying Formation Control Based on a Directed Graph for Multiple Autonomous Underwater Vehicles
by Gang Shao, Lei Wan and Huixi Xu
Appl. Sci. 2024, 14(14), 6377; https://doi.org/10.3390/app14146377 - 22 Jul 2024
Viewed by 1194
Abstract
Currently, autonomous underwater vehicles (AUVs) are facing various challenges, rendering multiple-AUV (multi-AUV) formation control a pivotal research direction. The issues surrounding formation control for a multi-AUV system to establish time-varying formations must be investigated. This paper discusses the formation protocol of multi-AUV systems [...] Read more.
Currently, autonomous underwater vehicles (AUVs) are facing various challenges, rendering multiple-AUV (multi-AUV) formation control a pivotal research direction. The issues surrounding formation control for a multi-AUV system to establish time-varying formations must be investigated. This paper discusses the formation protocol of multi-AUV systems in order to establish the defined time-varying formations. First, when these systems establish formations, the speed of each AUV can be equivalent. After that, consensus-based methods are used to solve the time-varying formation-control problem. The necessary and sufficient process of multi-AUV in achieving time-varying formations is proved. Furthermore, the formula for the time-varying formation center function is provided. Further, we present a protocol law for multi-AUVs to establish time-varying formations. Finally, the theoretical results of a simulation are presented, which validate the formation protocol. Full article
(This article belongs to the Special Issue Modeling, Guidance and Control of Marine Robotics)
Show Figures

Figure 1

Figure 1
<p>The autonomous underwater vehicle (AUV) coordinate diagram.</p>
Full article ">Figure 2
<p>Two-loop formation-control scheme for multiple-AUV (multi-AUV) systems.</p>
Full article ">Figure 3
<p>All AUVs operate at the same height (distance from the ocean floor).</p>
Full article ">Figure 4
<p>AUV formation on the X–Y plane with <span class="html-italic">N</span> = 5.</p>
Full article ">Figure 5
<p>Directed interaction topology <span class="html-italic">G</span> about the five AUVs.</p>
Full article ">Figure 6
<p>The trajectories of five AUVs and <math display="inline"><semantics> <mrow> <mi>c</mi> <mfenced> <mi>t</mi> </mfenced> </mrow> </semantics></math> in the simulation. (<b>a</b>) The position trajectories of five AUVs in the simulation; (<b>b</b>) the velocity trajectories of five AUVs in the simulation.</p>
Full article ">Figure 7
<p>Position snapshots of <math display="inline"><semantics> <mrow> <mi>θ</mi> <mfenced> <mi>t</mi> </mfenced> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>c</mi> <mfenced> <mi>t</mi> </mfenced> </mrow> </semantics></math> for <math display="inline"><semantics> <mrow> <mi>c</mi> <mfenced> <mi>t</mi> </mfenced> <mi>t</mi> <mo>∈</mo> <mfenced close="]" open="["> <mrow> <mn>16</mn> <mi mathvariant="normal">s</mi> <mo>,</mo> <mn>21</mn> <mi mathvariant="normal">s</mi> </mrow> </mfenced> </mrow> </semantics></math> in the simulation.</p>
Full article ">Figure 8
<p>State trajectories of five AUVs in the simulation and <math display="inline"><semantics> <mrow> <mi>c</mi> <mfenced> <mi>t</mi> </mfenced> </mrow> </semantics></math>. (<b>a</b>) The position trajectories of five AUVs in the simulation; (<b>b</b>) the velocity trajectories of five AUVs in the simulation.</p>
Full article ">Figure 9
<p>State trajectories of the five AUVs in the simulation and <math display="inline"><semantics> <mrow> <mi>c</mi> <mfenced> <mi>t</mi> </mfenced> </mrow> </semantics></math>. (<b>a</b>) The position trajectories of the five AUVs in the simulation; (<b>b</b>) the velocity trajectories of the five AUVs in the simulation.</p>
Full article ">Figure 9 Cont.
<p>State trajectories of the five AUVs in the simulation and <math display="inline"><semantics> <mrow> <mi>c</mi> <mfenced> <mi>t</mi> </mfenced> </mrow> </semantics></math>. (<b>a</b>) The position trajectories of the five AUVs in the simulation; (<b>b</b>) the velocity trajectories of the five AUVs in the simulation.</p>
Full article ">
20 pages, 22124 KiB  
Article
A Reversible Data-Hiding Method for Encrypted Images Based on Adaptive Quadtree Partitioning and MSB Prediction
by Ya Yue, Minqing Zhang, Fuqiang Di and Peizheng Lai
Appl. Sci. 2024, 14(14), 6376; https://doi.org/10.3390/app14146376 - 22 Jul 2024
Viewed by 885
Abstract
To address the vulnerability of the widely used block permutation and co-XOR (BPCX) encryption algorithm in reversible data-hiding in the encrypted domain (RDH-ED), which is susceptible to known-plaintext attacks (KPAs), and to enhance embedding capacity, we propose a novel technique of reversible data-hiding [...] Read more.
To address the vulnerability of the widely used block permutation and co-XOR (BPCX) encryption algorithm in reversible data-hiding in the encrypted domain (RDH-ED), which is susceptible to known-plaintext attacks (KPAs), and to enhance embedding capacity, we propose a novel technique of reversible data-hiding in encrypted images (RDH-EI). This method incorporates adaptive quadtree partitioning and most significant bit (MSB) prediction. To counteract KPAs, we introduce pixel modulation specifically targeting pixels within blocks of the same level during the encryption phase. During data embedding, we utilize tagging bits to indicate the state of the pixel blocks, capitalizing on pixel redundancy within those blocks to augment embedding capacity. Our experimental results demonstrate that our method not only achieves reversibility and separability but also significantly boosts embedding capacity and method security. Notably, the average embedding rate across the 10,000 images tested stands at 2.4731, surpassing previous methods by 0.2106 and 0.037, respectively. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

Figure 1
<p>The structure of the pixel block.</p>
Full article ">Figure 2
<p>Pixel bit reconstruction.</p>
Full article ">Figure 3
<p>Example of pixel bit reconstruction.</p>
Full article ">Figure 4
<p>Pixel values of the selected block (<b>a</b>) and the partitioning result (<b>b</b>).</p>
Full article ">Figure 5
<p>Pixel bit reconstruction of a 4 × 4 block in [<a href="#B14-applsci-14-06376" class="html-bibr">14</a>].</p>
Full article ">Figure 6
<p>The framework of the proposed method.</p>
Full article ">Figure 7
<p>Example of Pixel bit modulation.</p>
Full article ">Figure 8
<p>Pixel bit reconstruction of a 4 × 4 block.</p>
Full article ">Figure 9
<p>Surroundings of 2 × 2 size block.</p>
Full article ">Figure 10
<p>Pixel bit reconstruction in the presence of unusable blocks.</p>
Full article ">Figure 11
<p>Pixel bit reconstruction when all blocks are usable.</p>
Full article ">Figure 12
<p>An example of reconstructed encrypted image pixels: (<b>a</b>) <span class="html-italic">Dim</span> = <span class="html-italic">D(2)</span>, (<b>b</b>) <span class="html-italic">Dim</span> = <span class="html-italic">D(1)</span>, (<b>c</b>) <span class="html-italic">Dim</span> = <span class="html-italic">D(0)</span>.</p>
Full article ">Figure 13
<p>Embedded data.</p>
Full article ">Figure 14
<p>Image demonstration of several key stages of the proposed method: (<b>a</b>) original image, (<b>b</b>) original encrypted image, (<b>c</b>) pixel-modulated encrypted image, (<b>d</b>) marked image, (<b>e</b>) extracted data, (<b>f</b>) recovered image.</p>
Full article ">Figure 14 Cont.
<p>Image demonstration of several key stages of the proposed method: (<b>a</b>) original image, (<b>b</b>) original encrypted image, (<b>c</b>) pixel-modulated encrypted image, (<b>d</b>) marked image, (<b>e</b>) extracted data, (<b>f</b>) recovered image.</p>
Full article ">Figure 15
<p>PSNR of recovered image comparison between the proposed method and previous methods when Tiffany is cover image [<a href="#B5-applsci-14-06376" class="html-bibr">5</a>,<a href="#B8-applsci-14-06376" class="html-bibr">8</a>,<a href="#B10-applsci-14-06376" class="html-bibr">10</a>,<a href="#B16-applsci-14-06376" class="html-bibr">16</a>,<a href="#B17-applsci-14-06376" class="html-bibr">17</a>,<a href="#B19-applsci-14-06376" class="html-bibr">19</a>,<a href="#B24-applsci-14-06376" class="html-bibr">24</a>].</p>
Full article ">Figure 16
<p>Histogram of different images obtained in this paper.</p>
Full article ">Figure 17
<p>The results of the attack test on eight standard test images encrypted by the BPCX method without pixel bit modulation: (<b>a</b>) Tiffany, (<b>b</b>) Splash, (<b>c</b>) Barbara, (<b>d</b>) F16, (<b>e</b>) Goldhill, (<b>f</b>) House, (<b>g</b>) Lake, (<b>h</b>) Peppers.</p>
Full article ">Figure 18
<p>The results of the proposed method in this paper for the attack test after encrypting eight standard test images: (<b>a</b>) Tiffany, (<b>b</b>) Splash, (<b>c</b>) Barbara, (<b>d</b>) F16, (<b>e</b>) Goldhill, (<b>f</b>) House, (<b>g</b>) Lake, (<b>h</b>) Peppers.</p>
Full article ">
13 pages, 3138 KiB  
Article
Iteratively Refined Multi-Channel Speech Separation
by Xu Zhang, Changchun Bao, Xue Yang and Jing Zhou
Appl. Sci. 2024, 14(14), 6375; https://doi.org/10.3390/app14146375 - 22 Jul 2024
Viewed by 864
Abstract
The combination of neural networks and beamforming has proven very effective in multi-channel speech separation, but its performance faces a challenge in complex environments. In this paper, an iteratively refined multi-channel speech separation method is proposed to meet this challenge. The proposed method [...] Read more.
The combination of neural networks and beamforming has proven very effective in multi-channel speech separation, but its performance faces a challenge in complex environments. In this paper, an iteratively refined multi-channel speech separation method is proposed to meet this challenge. The proposed method is composed of initial separation and iterative separation. In the initial separation, a time–frequency domain dual-path recurrent neural network (TFDPRNN), minimum variance distortionless response (MVDR) beamformer, and post-separation are cascaded to obtain the first additional input in the iterative separation process. In iterative separation, the MVDR beamformer and post-separation are iteratively used, where the output of the MVDR beamformer is used as an additional input to the post-separation network and the final output comes from the post-separation module. This iteration of the beamformer and post-separation is fully employed for promoting their optimization, which ultimately improves the overall performance. Experiments on the spatialized version of the WSJ0-2mix corpus showed that our proposed method achieved a signal-to-distortion ratio (SDR) improvement of 24.17 dB, which was significantly better than the current popular methods. In addition, the method also achieved an SDR of 20.2 dB on joint separation and dereverberation tasks. These results indicate our method’s effectiveness and significance in the multi-channel speech separation field. Full article
(This article belongs to the Special Issue Advanced Technology in Speech and Acoustic Signal Processing)
Show Figures

Figure 1

Figure 1
<p>The overall structure of the initial separation.</p>
Full article ">Figure 2
<p>The structure of iBeam-TFDPRNN.</p>
Full article ">Figure 3
<p>Spectrographic comparison of the separated speech at different stages.</p>
Full article ">
21 pages, 15472 KiB  
Article
Research on Bifurcated Origami Hydraulic Dampers for Real Road Vibration Loads
by Jingchao Guan, Baoluo Zheng, Yalan Li, Wei Zhao and Xilu Zhao
Appl. Sci. 2024, 14(14), 6374; https://doi.org/10.3390/app14146374 - 22 Jul 2024
Viewed by 888
Abstract
Cylindrical hydraulic dampers are commonly utilized to mitigate vibrations in machinery and structural applications. These devices generally feature a single linear stroke and are often linked to rotary joints to handle complex loading conditions. However, their installation in confined spaces, such as vehicle [...] Read more.
Cylindrical hydraulic dampers are commonly utilized to mitigate vibrations in machinery and structural applications. These devices generally feature a single linear stroke and are often linked to rotary joints to handle complex loading conditions. However, their installation in confined spaces, such as vehicle suspensions, poses considerable difficulties. In this research, we introduce an innovative bifurcated origami hydraulic damper with nonlinear damping capabilities. Initially, we formulated the collapsible conditional equations essential for the design of the bifurcated origami hydraulic dampers. We then examined the fluid dynamics within the damper and its flow channels, determining that the damping force is proportional to the square of the velocity. Furthermore, we developed motion equations based on the derived damping force and suggested vibration analysis methods using the Runge–Kutta approach. For the mass-spring vibration system, we created an experimental setup with the bifurcated origami hydraulic damper and performed vibration tests using noise signals recorded from a vehicle traveling on a gravel road, thus validating its damping performance and efficacy. Additional tests, which varied the orifice size at the end of the origami structure, as well as the type and temperature of the internal fluid, showed that the orifice size had a more pronounced effect on damping efficiency than the fluid type and temperature. This confirmed the vibration-damping effectiveness of the bifurcated origami hydraulic damper. Full article
(This article belongs to the Special Issue Vibration Problems in Engineering Science)
Show Figures

Figure 1

Figure 1
<p>Stroke comparison of conventional cylinder dampers and origami structures.</p>
Full article ">Figure 2
<p>Conceptual diagram of the origami hydraulic damper.</p>
Full article ">Figure 3
<p>Inner workings of bifurcated origami hydraulic damper.</p>
Full article ">Figure 4
<p>Closing the one unit of cylindrical origami structure.</p>
Full article ">Figure 5
<p>The folded one unit of origami structure.</p>
Full article ">Figure 6
<p>Main origami hydraulic damper device. (<b>a</b>) Polyethylene cylindrical tube. (<b>b</b>) Origami damper film. (<b>c</b>) Mian origami damper. (<b>d</b>) Spring frame. (<b>e</b>) Vibration test device.</p>
Full article ">Figure 7
<p>Bifurcated origami hydraulic tanks. (<b>a</b>) Bifurcated origami tanks. (<b>b</b>) the frame of bifurcated origami tank. (<b>c</b>) Assembly completed for the two bifurcated origami tanks. (<b>d</b>) Overall view of the test device.</p>
Full article ">Figure 8
<p>Experimental setup of the bifurcated origami hydraulic damper.</p>
Full article ">Figure 9
<p>The orifice hole structure at the lower end of the bifurcated origami hydraulic damper.</p>
Full article ">Figure 10
<p>Bottom interface orifice structure.</p>
Full article ">Figure 11
<p>Bottom interface orifice structure.</p>
Full article ">Figure 12
<p>Experimental setup for vibration testing using the bifurcated origami hydraulic damper.</p>
Full article ">Figure 13
<p>Comparison of the vibration displacement from the measurement experiment and numerical analysis results.</p>
Full article ">Figure 14
<p>Collection of the acceleration vibration waves when driving on a gravel road.</p>
Full article ">Figure 15
<p>Acceleration waveform measured during actual driving.</p>
Full article ">Figure 16
<p>Spectral distribution of acceleration waveform measured during actual driving.</p>
Full article ">Figure 17
<p>Measurement results when excited under the vibration waves on a gravel road.</p>
Full article ">Figure 18
<p>Comparison of the average and maximum response.</p>
Full article ">Figure 19
<p>Effect of different diameters of the orifice hole on the bifurcated origami damper.</p>
Full article ">Figure 20
<p>Relationship between the orifice hole diameter and the standard deviation of acceleration.</p>
Full article ">Figure 21
<p>Effect of liquid type on the bifurcated origami hydraulic damper.</p>
Full article ">Figure 22
<p>Effect of liquid temperature on the bifurcated origami hydraulic damper.</p>
Full article ">Figure 23
<p>Eccentrically placed mass block on the vibration platform and its weight mass.</p>
Full article ">Figure 24
<p>Comparison of the acceleration response of the bifurcated origami hydraulic damper on the x-axis.</p>
Full article ">Figure 25
<p>Comparison of the acceleration response of the bifurcated origami hydraulic damper on the y-axis.</p>
Full article ">Figure 26
<p>Comparison of the acceleration response of the bifurcated origami hydraulic damper on the z-axis.</p>
Full article ">Figure 27
<p>Comparison of the modulus of the sum of the acceleration vectors under multi-dimensional vibration.</p>
Full article ">
19 pages, 5105 KiB  
Article
Peak and Residual Shear Interface Measurement between Sand and Continuum Surfaces Using Ring Shear Apparatus
by Rayed Almasoudi, Firas Daghistani and Hossam Abuel-Naga
Appl. Sci. 2024, 14(14), 6373; https://doi.org/10.3390/app14146373 - 22 Jul 2024
Viewed by 910
Abstract
This study uses a ring shear apparatus to measure the interface shear stress between five types of sand and three surfaces: steel, PVC, and stone. Experiments were conducted under normal stresses of 25, 50, and 100 kPa at a constant shear rate of [...] Read more.
This study uses a ring shear apparatus to measure the interface shear stress between five types of sand and three surfaces: steel, PVC, and stone. Experiments were conducted under normal stresses of 25, 50, and 100 kPa at a constant shear rate of 0.5 mm/min. The research examines the impact of various sand properties, including particle size distribution, median particle size, particle shape, and initial density, as well as the surface roughness and hardness of continuum materials. The results show that interface shear strength is significantly influenced by the mechanical interlock between sand particles and surface asperities, which is affected by the normalized roughness and hardness of the materials. Machine learning models, including Multiple Linear Regression and Random Forest Regression, were used to predict peak and residual shear strengths, demonstrating high accuracy. Additionally, an empirical equation was generated using eight input parameters, considering the peak and residual interface shear strength as outputs. Full article
Show Figures

Figure 1

Figure 1
<p>Chart for estimating the roundness and sphericity of sedimentary particles [<a href="#B21-applsci-14-06373" class="html-bibr">21</a>].</p>
Full article ">Figure 2
<p>Particle size distribution curves for sand samples used in this study.</p>
Full article ">Figure 3
<p>Types of continuous surfaces used in the experiments: (<b>a</b>) steel, (<b>b</b>) PVC, and (<b>c</b>) stone.</p>
Full article ">Figure 4
<p>The modified ring shear apparatus.</p>
Full article ">Figure 5
<p>The testing procedure was used to measure the peak and residual interface shear strength at different normal stresses.</p>
Full article ">Figure 6
<p>Average shear strength versus normal stress, where (<b>a</b>) Soil-A, (<b>b</b>) Soil-B, (<b>c</b>) Soil-C, (<b>d</b>) Soil-D, and (<b>e</b>) Soil-E.</p>
Full article ">Figure 7
<p>Profilometer Initial Roughness Contours for (<b>a</b>) Steel, (<b>b</b>) PVC, and (<b>c</b>) Stone.</p>
Full article ">Figure 8
<p>Interface shear strength versus (<b>a</b>) normalized roughness and (<b>b</b>) hardness.</p>
Full article ">Figure 9
<p>Impact of porosity on peak interface fiction coefficient at different normal stress levels.</p>
Full article ">Figure 10
<p>Peak interface friction coefficient versus continuum surfaces for medium Sand-A and coarse Sand-B.</p>
Full article ">Figure 11
<p>Peak interface friction coefficient versus displacement for Sand-A (poorly graded) and Sand-C (well graded) with interfaces of (<b>a</b>) steel, (<b>b</b>) PVC, and (<b>c</b>) stone.</p>
Full article ">Figure 12
<p>Comparison of actual and predicted peak interface shear strength using MLR for (<b>a</b>) the training dataset, (<b>b</b>) the testing dataset, and (<b>c</b>) 10-fold cross-validation.</p>
Full article ">Figure 13
<p>Comparison of actual and predicted residual interface shear strength using MLR for (<b>a</b>) the training dataset, (<b>b</b>) the testing dataset, and (<b>c</b>) 10-fold cross-validation.</p>
Full article ">Figure 14
<p>Comparison of actual and predicted peak interface shear strength using RFR for (<b>a</b>) the training dataset, (<b>b</b>) the testing dataset, and (<b>c</b>) 10-fold cross-validation.</p>
Full article ">Figure 15
<p>Comparison of actual and predicted residual interface shear stress using RFR for (<b>a</b>) the training dataset, (<b>b</b>) the testing dataset, and (<b>c</b>) 10-fold cross-validation.</p>
Full article ">Figure 16
<p>Feature importance analysis in 10-fold cross-validation: (<b>a</b>) MLR for peak interface friction, (<b>b</b>) RFR for peak interface friction, (<b>c</b>) MLR for residual interface friction, and (<b>d</b>) RFR for residual interface friction.</p>
Full article ">
19 pages, 9190 KiB  
Review
Effect of the Inter-Ring Delay Time on Rock Fragmentation: Field Tests at the Underground Mine
by Hui Chen, Chengyu Liu, Yin Feng and Haojie Yin
Appl. Sci. 2024, 14(14), 6372; https://doi.org/10.3390/app14146372 - 22 Jul 2024
Viewed by 1071
Abstract
The effect of inter-ring delay time (IRDT) on rock fragmentation in the tunnel excavation blasting was studied at the Xinjiang Beizhan Iron Mine, China, to improve the rock fragmentation and optimize the blast design. Blasting tests were conducted with an IRDT of 50, [...] Read more.
The effect of inter-ring delay time (IRDT) on rock fragmentation in the tunnel excavation blasting was studied at the Xinjiang Beizhan Iron Mine, China, to improve the rock fragmentation and optimize the blast design. Blasting tests were conducted with an IRDT of 50, 100, 150, 200, and 500 ms; each adjacent ring had an equal IRDT, and two replicate tests were conducted. The blasting plan with IRDT of 100 ms was the original blasting plan used in the mine. Two optimized blasting plans were proposed and implemented based on the experimental results, along with a control experiment using the original blasting plan. The fragment size of each blast test was measured and analyzed by the block-analyzed software. Both collision theoretical and field tests indicated that the IRDT plays an important role in rock fragmentation and that as the IRDT increases, the degree of rock fragmentation increases first and then decreases. For example, the fragment sizes X20, X50, and X80 showed an increase followed by a decrease; the percentage of large fragments (1-P750) showed a decline followed by a rise; the percentage of small fragments P25 showed an increase followed by a decline. The blasting plan with an IRDT of 150 ms had the most optimal rock fragmentation effect, with the lowest percentage of large fragments, the highest percentage of small fragments, and the smallest average fragment size of X50. Furthermore, the two optimized blasting plans demonstrated better control over blasting costs and rock fragmentation compared to the original blasting plan. Full article
Show Figures

Figure 1

Figure 1
<p>The schematic diagram of blasting rock-breaking.</p>
Full article ">Figure 2
<p>Original blasting pattern.</p>
Full article ">Figure 3
<p>Schematic diagram of an inelastic collision: (<b>a</b>) a central collision; (<b>b</b>) a non-central collision.</p>
Full article ">Figure 4
<p>Rock damage caused by explosive blast.</p>
Full article ">Figure 5
<p>Explosive load and rock interaction processes: (<b>a</b>) experience <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>t</mi> </mrow> <mrow> <mn>1</mn> </mrow> </msub> <mo>+</mo> <msub> <mrow> <mi>t</mi> </mrow> <mrow> <mn>2</mn> </mrow> </msub> </mrow> </semantics></math> time to form a free surface; (<b>b</b>) experience <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>t</mi> </mrow> <mrow> <mn>1</mn> </mrow> </msub> <mo>+</mo> <msub> <mrow> <mi>t</mi> </mrow> <mrow> <mn>2</mn> </mrow> </msub> <mo>+</mo> <msub> <mrow> <mi>t</mi> </mrow> <mrow> <mn>3</mn> </mrow> </msub> </mrow> </semantics></math> time to form a blasting funnel, where <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>t</mi> </mrow> <mrow> <mn>3</mn> </mrow> </msub> </mrow> </semantics></math> is the rock throwing time; (<b>c</b>) burst rock is completely thrown.</p>
Full article ">Figure 6
<p>Tunnel excavation blasting model with different IRDTs: (<b>a</b>) tunnel excavation blasting model with IRDT of <math display="inline"><semantics> <mrow> <msub> <mrow> <mo>∆</mo> <mi>t</mi> </mrow> <mrow> <mn>1</mn> </mrow> </msub> </mrow> </semantics></math>; (<b>b</b>) tunnel excavation blasting model with IRDT of <math display="inline"><semantics> <mrow> <msub> <mrow> <mo>∆</mo> <mi>t</mi> </mrow> <mrow> <mn>2</mn> </mrow> </msub> </mrow> </semantics></math>; (<b>c</b>) tunnel excavation blasting model with IRDT of <math display="inline"><semantics> <mrow> <msub> <mrow> <mo>∆</mo> <mi>t</mi> </mrow> <mrow> <mn>3</mn> </mrow> </msub> </mrow> </semantics></math> (<math display="inline"><semantics> <mrow> <msub> <mrow> <mo>∆</mo> <mi>t</mi> </mrow> <mrow> <mn>3</mn> </mrow> </msub> </mrow> </semantics></math> is larger); where <math display="inline"><semantics> <mrow> <msub> <mrow> <msub> <mrow> <mo>∆</mo> <mi>t</mi> </mrow> <mrow> <mn>3</mn> </mrow> </msub> <mo>&gt;</mo> <mo>∆</mo> <mi>t</mi> </mrow> <mrow> <mn>2</mn> </mrow> </msub> <mo>&gt;</mo> <msub> <mrow> <mo>∆</mo> <mi>t</mi> </mrow> <mrow> <mn>1</mn> </mrow> </msub> </mrow> </semantics></math>.</p>
Full article ">Figure 7
<p>Blast hole field distribution.</p>
Full article ">Figure 8
<p>Blast test design for reduced hole.</p>
Full article ">Figure 9
<p>Blastholes for the blasting plan 2 field distribution.</p>
Full article ">Figure 10
<p>Blasting test area (3464 layers).</p>
Full article ">Figure 11
<p>Split-Desktop 4.0 Software Operation Procedure.</p>
Full article ">Figure 12
<p>Picture sample and processing picture of muck pile: (<b>a</b>) picture sample; (<b>b</b>) processing picture.</p>
Full article ">Figure 13
<p>Accumulated mass passing (%) versus fragment size in the test field 1. (<b>a</b>) In a linear scale; (<b>b</b>) in a logarithm scale.</p>
Full article ">Figure 14
<p>Accumulated mass passing (%) versus fragment size in the test field 2. (<b>a</b>) In a linear scale; (<b>b</b>) in a logarithm scale.</p>
Full article ">Figure 15
<p>Accumulated mass passing (%) versus fragment size in the test field 3. (<b>a</b>) In a linear scale; (<b>b</b>) in a logarithm scale.</p>
Full article ">Figure 16
<p>Accumulated mass passing (%) versus fragment size in the test field 4. (<b>a</b>) In a linear scale; (<b>b</b>) in a logarithm scale.</p>
Full article ">
26 pages, 17181 KiB  
Article
The Collection and Compilation of Small Group Data for Scenario Setting of Simulations and Experiments
by Yi Xu and Ying Zhou
Appl. Sci. 2024, 14(14), 6371; https://doi.org/10.3390/app14146371 - 22 Jul 2024
Viewed by 793
Abstract
The influence of small groups in evacuation cannot be ignored. However, the current simulations and experimental studies have oversimplified the settings of small groups and evacuation scenarios. A significant disparity exists between the findings of existing studies and real-world scenarios. This paper compiled [...] Read more.
The influence of small groups in evacuation cannot be ignored. However, the current simulations and experimental studies have oversimplified the settings of small groups and evacuation scenarios. A significant disparity exists between the findings of existing studies and real-world scenarios. This paper compiled data on the number and size of small groups and the location of small group members in built environments. Subsequently, a scenario with intricate functions and shapes was established, and finally, these data was employed in agent-based simulations. The data encompassed 50 small groups comprising a total of 111 members. These groups, ranging from 2 to 4 members each, exhibited spatial separations between members spanning from 1 m to 23 m. Simulation outcomes indicated a detrimental effect of small groups on overall evacuation. A significant and positive correlation was observed between the distance separating small group members and the escalation in evacuation time, total jam time, and evacuation distance. The data provides a foundation for configuring initial scenarios in small group evacuation experiments and simulations. The simulation results can provide a basis for hospital safety evacuation management. Full article
Show Figures

Figure 1

Figure 1
<p>Levels of decision-making behavior of small group members in evacuation.</p>
Full article ">Figure 2
<p>Occupants’ movement process in evacuation experiments and simulations.</p>
Full article ">Figure 3
<p>Research process.</p>
Full article ">Figure 4
<p>Basic situation of the research object.</p>
Full article ">Figure 5
<p>Information of AMsAA.</p>
Full article ">Figure 6
<p>Distance between two MIGs within the same small group.</p>
Full article ">Figure 7
<p>Pathfinder model building.</p>
Full article ">Figure 8
<p>Base data of wheelchair and wheelchair seat.</p>
Full article ">Figure 9
<p>Evacuation behaviors.</p>
Full article ">Figure 10
<p>Number of occupants and their density in the primary and secondary waiting areas.</p>
Full article ">Figure 11
<p>Occupants in AA at 14:37:54. (<b>a</b>) Initial location of the occupants; (<b>b</b>) composition of small groups.</p>
Full article ">Figure 11 Cont.
<p>Occupants in AA at 14:37:54. (<b>a</b>) Initial location of the occupants; (<b>b</b>) composition of small groups.</p>
Full article ">Figure 12
<p>Maximum distances between MIGs.</p>
Full article ">Figure 13
<p>Evacuation curves of exits. (<b>a</b>) Number of occupants arriving at three exits. (<b>b</b>) Number of occupants arriving at each exit.</p>
Full article ">Figure 14
<p>Evacuation paths. (<b>a</b>) Scenario 1.0; (<b>b</b>) Scenario 2.0.</p>
Full article ">Figure 15
<p>Number of small groups of two occupants successfully assembled and their total evacuation time.</p>
Full article ">Figure A1
<p>Density in scenarios 1.0 and 2.0 every 2 s (the first 12 s of evacuation). (<b>a1</b>) Scenario 1.0 0 s; (<b>a2</b>) Scenario 2.0 0 s; (<b>b1</b>) Scenario 1.0 2 s; (<b>b2</b>) Scenario 2.0 2 s; (<b>c1</b>) Scenario 1.0 4 s; (<b>c2</b>) Scenario 2.0 4 s; (<b>d1</b>) Scenario 1.0 6 s; (<b>d2</b>) Scenario 2.0 6 s; (<b>e1</b>) Scenario 1.0 8 s; (<b>e2</b>) Scenario 2.0 8 s; (<b>f1</b>) Scenario 1.0 10 s; (<b>f2</b>) Scenario 2.0 10 s; (<b>g1</b>) Scenario 1.0 12 s; and (<b>g2</b>) Scenario 2.0 12 s.</p>
Full article ">Figure A1 Cont.
<p>Density in scenarios 1.0 and 2.0 every 2 s (the first 12 s of evacuation). (<b>a1</b>) Scenario 1.0 0 s; (<b>a2</b>) Scenario 2.0 0 s; (<b>b1</b>) Scenario 1.0 2 s; (<b>b2</b>) Scenario 2.0 2 s; (<b>c1</b>) Scenario 1.0 4 s; (<b>c2</b>) Scenario 2.0 4 s; (<b>d1</b>) Scenario 1.0 6 s; (<b>d2</b>) Scenario 2.0 6 s; (<b>e1</b>) Scenario 1.0 8 s; (<b>e2</b>) Scenario 2.0 8 s; (<b>f1</b>) Scenario 1.0 10 s; (<b>f2</b>) Scenario 2.0 10 s; (<b>g1</b>) Scenario 1.0 12 s; and (<b>g2</b>) Scenario 2.0 12 s.</p>
Full article ">
15 pages, 6965 KiB  
Article
A New Reversible Data Hiding Method Using a Proportional Relation between Peak Signal-to-Noise Ratio and Embedding Capacity on Convolutional Neural Network
by Yong-Yeol Bae, Dae-Jea Cho and Ki-Hyun Jung
Appl. Sci. 2024, 14(14), 6370; https://doi.org/10.3390/app14146370 - 22 Jul 2024
Viewed by 855
Abstract
In the rapidly evolving fields of artificial intelligence and various industries, the secure processing and management of massive data have become paramount. This paper introduces an innovative reversible data hiding (RDH) method that leverages a Convolutional Neural Network (CNN)-based predictor to generate a [...] Read more.
In the rapidly evolving fields of artificial intelligence and various industries, the secure processing and management of massive data have become paramount. This paper introduces an innovative reversible data hiding (RDH) method that leverages a Convolutional Neural Network (CNN)-based predictor to generate a predicted image from a given cover image. The secret data are ingeniously embedded within the differences in pixel values between the cover and predicted images. Our experimental analysis reveals a notable reduction in image distortion with increasing secret data size, showcasing the method’s potential for diverse applications. The unique aspect of our approach lies in the proportional relation between the Peak Signal-to-Noise Ratio (PSNR) and Embedding Capacity, highlighting its efficacy and efficiency in reversible data hiding. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

Figure 1
<p>Cover image divided into dot set image and cross set image.</p>
Full article ">Figure 2
<p>(<b>a</b>) GBVS saliency maps; (<b>b</b>) GC saliency maps.</p>
Full article ">Figure 3
<p>(<b>a</b>) Cover image <span class="html-italic">C</span>; (<b>b</b>) Inner square <math display="inline"><semantics> <mrow> <msub> <mi>I</mi> <mrow> <mi>i</mi> <mi>n</mi> <mi>n</mi> <mi>e</mi> <mi>r</mi> </mrow> </msub> </mrow> </semantics></math>; (<b>c</b>) Outer square <math display="inline"><semantics> <mrow> <msub> <mi>I</mi> <mrow> <mi>o</mi> <mi>u</mi> <mi>t</mi> <mi>e</mi> <mi>r</mi> </mrow> </msub> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>Architecture of the proposed predictor. (<b>a</b>) The proposed CNN-based predictor. (<b>b</b>) The structure of the proposed model.</p>
Full article ">Figure 5
<p>(<b>a</b>) Cover image <span class="html-italic">C</span>. (<b>b</b>) The inner square part of cover image <math display="inline"><semantics> <mrow> <msub> <mi>I</mi> <mrow> <mi>i</mi> <mi>n</mi> <mi>n</mi> <mi>e</mi> <mi>r</mi> </mrow> </msub> </mrow> </semantics></math>. (<b>c</b>) Predicting inner square of the cover image <math display="inline"><semantics> <mrow> <msub> <mover accent="true"> <mi>I</mi> <mo>¯</mo> </mover> <mrow> <mi>o</mi> <mi>u</mi> <mi>t</mi> <mi>e</mi> <mi>r</mi> </mrow> </msub> </mrow> </semantics></math>. (<b>d</b>) Predicted image <span class="html-italic">P</span>.</p>
Full article ">Figure 6
<p>(<b>a</b>) Cover image <span class="html-italic">C</span>. (<b>b</b>) Predicted image <span class="html-italic">P</span>. (<b>c</b>) The difference between the cover image and predicted image <span class="html-italic">G</span>. (<b>d</b>) Result <span class="html-italic">S</span> of Equation (11).</p>
Full article ">Figure 7
<p>The proposed reversible data embedding scheme.</p>
Full article ">Figure 8
<p>The proposed reversible data extracting scheme.</p>
Full article ">Figure 9
<p>The relation between PSNR and EC using the proposed method.</p>
Full article ">Figure 10
<p>Comparison between the proposed method and traditional embedding algorithms.</p>
Full article ">Figure 11
<p>Image that does not follow the saliency map: (<b>a</b>) Sky; (<b>b</b>) Ocean; (<b>c</b>) Ground.</p>
Full article ">Figure 12
<p>The result of the proposed method on the images in <a href="#applsci-14-06370-f011" class="html-fig">Figure 11</a>.</p>
Full article ">Figure 13
<p>Lena: (<b>a</b>) Cover image; (<b>b</b>) Stego-image; (<b>c</b>) Predicted image; (<b>d</b>) Secret data.</p>
Full article ">
23 pages, 9408 KiB  
Article
Evolution of Industrial Robots from the Perspective of the Metaverse: Integration of Virtual and Physical Realities and Human–Robot Collaboration
by Jing You, Zhiyuan Wu, Wei Wei, Ning Li and Yuhua Yang
Appl. Sci. 2024, 14(14), 6369; https://doi.org/10.3390/app14146369 - 22 Jul 2024
Cited by 1 | Viewed by 1971
Abstract
During the transition from Industry 4.0 to Industry 5.0, industrial robotics technology faces the need for intelligent and highly integrated development. Metaverse technology creates immersive and interactive virtual environments, allowing technicians to perform simulations and experiments in the virtual world, and overcoming the [...] Read more.
During the transition from Industry 4.0 to Industry 5.0, industrial robotics technology faces the need for intelligent and highly integrated development. Metaverse technology creates immersive and interactive virtual environments, allowing technicians to perform simulations and experiments in the virtual world, and overcoming the limitations of traditional industrial operations. This paper explores the application and evolution of metaverse technology in the field of industrial robotics, focusing on the realization of virtual–real integration and human–machine collaboration. It proposes a design framework for a virtual–real interaction system based on the ROS and WEB technologies, supporting robot connectivity, posture display, coordinate axis conversion, and cross-platform multi-robot loading. This paper emphasizes the study of two key technologies for the system: virtual–real model communication and virtual–real model transformation. A general communication mechanism is designed and implemented based on the ROS, using the ROS topic subscription to achieve connection and real-time data communication between physical robots and virtual models, and utilizing URDF model transformation technology for model invocation and display. Compared with traditional simulation software, i.e., KUKA Sim PRO (version 1.1) and RobotStudio (version 6.08), the system improves model loading by 45.58% and 24.72%, and the drive response by 41.50% and 28.75%. This system not only supports virtual simulation and training but also enables the operation of physical industrial robots, provides persistent data storage, and supports action reproduction and offline data analysis and decision making. Full article
(This article belongs to the Topic Smart Production in Terms of Industry 4.0 and 5.0)
Show Figures

Figure 1

Figure 1
<p>Industrial metaverse evolution: virtual–physical trajectory diagram.</p>
Full article ">Figure 2
<p>WEB concept industrial metaverse.</p>
Full article ">Figure 3
<p>Industrial robot connection WEB simulation system framework diagram.</p>
Full article ">Figure 4
<p>Robotic arm posture display and workflow.</p>
Full article ">Figure 5
<p>Coordinate axis switching and implementation workflow.</p>
Full article ">Figure 6
<p>Multi-terminal WEB display and implementation workflow.</p>
Full article ">Figure 7
<p>Bidirectional communication diagram between physical robot and ROS.</p>
Full article ">Figure 8
<p>Communication diagram between ROS and WEB platform.</p>
Full article ">Figure 9
<p>Process flow diagram for URDF model conversion.</p>
Full article ">Figure 10
<p>Overall performance and motion diagram of industrial robot.</p>
Full article ">Figure 11
<p>Real-time data reception from robot diagram.</p>
Full article ">Figure 12
<p>Robot model loading.</p>
Full article ">Figure 13
<p>Comparison diagram of loading time with KUKA Sim Pro model.</p>
Full article ">Figure 14
<p>Comparison diagram of model loading time with ABB RobotStudio.</p>
Full article ">Figure 15
<p>Model driving direction diagram (KUKA, top left; ABB, bottom left; system, right).</p>
Full article ">Figure 16
<p>Comparison chart of response time with KUKA Sim Pro driver.</p>
Full article ">Figure 17
<p>Comparison chart of response time with ABB RobotStudio driver.</p>
Full article ">
19 pages, 1263 KiB  
Article
Robust Estimation Method against Poisoning Attacks for Key-Value Data with Local Differential Privacy
by Hikaru Horigome, Hiroaki Kikuchi, Masahiro Fujita and Chia-Mu Yu
Appl. Sci. 2024, 14(14), 6368; https://doi.org/10.3390/app14146368 - 22 Jul 2024
Cited by 1 | Viewed by 1000
Abstract
Local differential privacy (LDP) protects user information from potential threats by randomizing data on individual devices before transmission to untrusted collectors. This method enables collectors to derive user statistics by analyzing randomized data, thereby presenting a promising avenue for privacy-preserving data collection. In [...] Read more.
Local differential privacy (LDP) protects user information from potential threats by randomizing data on individual devices before transmission to untrusted collectors. This method enables collectors to derive user statistics by analyzing randomized data, thereby presenting a promising avenue for privacy-preserving data collection. In the context of key–value data, in which discrete and continuous values coexist, PrivKV has been introduced as an LDP protocol to ensure secure collection. However, this framework is susceptible to poisoning attacks. To address this vulnerability, we propose an expectation maximization (EM)-based algorithm combined with a cryptographic protocol to facilitate secure random sampling. Our LDP protocol, known as emPrivKV, exhibits two key advantages: it improves the accuracy of statistical information estimation from randomized data, and enhances resilience against the manipulation of statistics, that is, poisoning attacks. These attacks involve malicious users manipulating the analysis results without detection. This study presents the empirical results of applying the emPrivKV protocol to both synthetic and open datasets, highlighting a notable improvement in the precision of statistical value estimation and robustness against poisoning attacks. As a result, emPrivKV improved the frequency and the mean gains by 17.1% and 25.9%, respectively, compared to PrivKV, with the number of fake users being 0.1 of the genuine users. Our findings contribute to the ongoing discourse on refining LDP protocols for key–value data in scenarios involving privacy-sensitive information. Full article
(This article belongs to the Special Issue Progress and Research in Cybersecurity and Data Privacy)
Show Figures

Figure 1

Figure 1
<p>Poisoning attack.</p>
Full article ">Figure 2
<p>Proposed method.</p>
Full article ">Figure 3
<p><math display="inline"><semantics> <mrow> <mi>M</mi> <mi>S</mi> <msub> <mi>E</mi> <mi>f</mi> </msub> </mrow> </semantics></math> of mean with regard to <math display="inline"><semantics> <mi>ϵ</mi> </semantics></math>. (<b>a</b>) Synthetic data. (<b>b</b>) MovieLens. (<b>c</b>) Clothing.</p>
Full article ">Figure 4
<p><math display="inline"><semantics> <mrow> <mi>M</mi> <mi>S</mi> <msub> <mi>E</mi> <mi>m</mi> </msub> </mrow> </semantics></math> of mean with regard to <math display="inline"><semantics> <mi>ϵ</mi> </semantics></math>. (<b>a</b>) Synthetic data. (<b>b</b>) MovieLens. (<b>c</b>) Clothing.</p>
Full article ">Figure 5
<p>Frequency gain of poisoning attacks (synthetic data). (<b>a</b>) M2GA. (<b>b</b>) RMA. (<b>c</b>) RKVA.</p>
Full article ">Figure 6
<p>Frequency gains for poisoning attacks (MovieLens). (<b>a</b>) M2GA. (<b>b</b>) RMA. (<b>c</b>) RKVA.</p>
Full article ">Figure 7
<p>Mean gain of poisoning attacks (synthetic data). (<b>a</b>) M2GA. (<b>b</b>) RMA. (<b>c</b>) RKVA.</p>
Full article ">Figure 8
<p>Mean gain of poisoning attacks (MovieLens). (<b>a</b>) M2GA. (<b>b</b>) RMA. (<b>c</b>) RKVA.</p>
Full article ">Figure 9
<p>Frequency gain of poisoning attacks with OT. (<b>a</b>) Synthetic data. (<b>b</b>) MovieLens.</p>
Full article ">Figure 10
<p>Mean gain of poisoning attacks with OT. (<b>a</b>) Synthetic data. (<b>b</b>) MovieLens.</p>
Full article ">Figure 11
<p>Costs of OT protocol. (<b>a</b>) Calculation cost. (<b>b</b>) Communication cost.</p>
Full article ">
13 pages, 3542 KiB  
Article
Study on the Anti-Interference Performance of Substrate-Free PEDOT:PSS ECG Electrodes
by Chunlin Li, Ke Xu and Yuanfen Chen
Appl. Sci. 2024, 14(14), 6367; https://doi.org/10.3390/app14146367 - 22 Jul 2024
Viewed by 1040
Abstract
Substrate-free electrodes are promising dry electrodes for long-term physiological electrical signal monitoring due to their ultra-thinness, conformal contact, and stable skin–electrode impedance. However, the response of substrate-free electrodes to various disturbances during electrocardiogram (ECG) monitoring and the corresponding optimization needs to be investigated. [...] Read more.
Substrate-free electrodes are promising dry electrodes for long-term physiological electrical signal monitoring due to their ultra-thinness, conformal contact, and stable skin–electrode impedance. However, the response of substrate-free electrodes to various disturbances during electrocardiogram (ECG) monitoring and the corresponding optimization needs to be investigated. This paper investigates the specific effects of various influencing factors on skin–electrode impedance and ECG during electrocardiogram (ECG) detection. The research utilizes substrate-free poly(3,4-ethylenedioxythiophene)/poly(styrene-sulfonate) (PEDOT:PSS) electrodes. The investigation employs several methods, including skin–electrode impedance comparison, ECG waveform analysis, spectrum analysis, and signal-to-noise ratio (SNR) evaluation. To avoid the impact of physiological state differences in subjects at different times, relevant data were only compared with the same group of experiments conducted in the same period. The results demonstrate that the substrate-free conformal contact PEDOT:PSS electrode has more stable skin–electrode impedance and could obtain a more stable ECG than partial contact electrodes (the SNR of the partial contact and conformal contact electrodes are 1.2768 ± 4.0299 dB and 7.2637 ± 1.4897 dB, respectively). Furthermore, the ECG signal quality of the substrate-free conformal contact PEDOT:PSS electrode was independent of the electrode area and shape (the SNRs of the large, medium, and small electrodes are 4.0447 ± 0.4616 dB, 3.9115 ± 0.5885 dB, and 4.1556 ± 0.5557 dB, respectively; the SNRs of the circular, square, and triangular electrodes are 9.2649 ± 0.6326 dB, 9.2471 ± 0.6806 dB, and 9.1514 ± 0.6875 dB, respectively), showing high signal acquisition capability that is the same as microneedle electrodes and better than fabric electrodes. The results of clothing friction effects show that skin–electrode impedance stability was important for ECG stability, while the impedance value was not (the SNRs of friction and non-friction electrodes are 2.4128 ± 7.0784 dB and 9.2164 ± 0.6696 dB, respectively). Moreover, the skin–electrode impedance maintains stability even at a high breathing frequency, but the ECG signal fluctuates at a high breathing frequency. This experiment demonstrates that even when the skin–electrode impedance remains stable, the ECG signal can still be susceptible to interference from other factors. This study suggests that substrate-free PEDOT:PSS that could form conformal contact with the skin has higher skin–electrode impedance stability and could measure a high ECG signal even with a small electrode area, demonstrating its potential as dry ECG electrodes, but the interference from other physiological electrical signals may require better circuit design. Full article
(This article belongs to the Section Biomedical Engineering)
Show Figures

Figure 1

Figure 1
<p>(<b>a</b>) Ag/AgCl electrode; (<b>b</b>) PEDOT:PSS electrode.</p>
Full article ">Figure 2
<p>(<b>a</b>) PEDOT:PSS dry electrode was attached to the skin surface, dominated by van der Waals force; (<b>b</b>) PEDOT:PSS was wetted and gelled on skin; (<b>c</b>) Conformal contact of PEDOT:PSS with skin, dominated by intermolecular hydrogen bonds.</p>
Full article ">Figure 3
<p>(<b>a</b>) Skin–electrode impedance measurement; (<b>b</b>) Schematic of ECG detection.</p>
Full article ">Figure 4
<p>Schematic diagram of an equivalent circuit model for the skin–electrode impedance.</p>
Full article ">Figure 5
<p>Results of different contact states (<b>a</b>) Bode plot of skin–electrode impedance; (<b>b</b>) Spectrogram of different contact states; (<b>c</b>) ECG of different contact states.</p>
Full article ">Figure 6
<p>Results for different electrode sizes (<b>a</b>) Bode plot of skin–electrode impedance; (<b>b</b>) Spectrogram of different electrode sizes; (<b>c</b>) ECG waveforms.</p>
Full article ">Figure 7
<p>Results of different electrode shapes with the same area (<b>a</b>) Bode plot of skin–electrode impedance; (<b>b</b>) Spectrogram of ECG; (<b>c</b>) ECG waveforms of different shapes.</p>
Full article ">Figure 8
<p>(<b>a</b>) Skin–electrode impedance modulus at 1 Hz frequency; (<b>b</b>) Impedance modulus at 10 Hz frequency; (<b>c</b>) Impedance modulus at 30 Hz frequency; (<b>d</b>) Spectrogram of different electrode states; (<b>e</b>) ECG waveforms of different electrode states.</p>
Full article ">Figure 9
<p>Experimental results for different breathing frequencies. (<b>a</b>) Bode plot of skin–electrode impedance; (<b>b</b>) Spectrogram of ECG; (<b>c</b>) Waveform of ECG.</p>
Full article ">
19 pages, 3852 KiB  
Article
Transforming Interactive Educational Content into Immersive Virtual Reality Learning Objects
by Pranas Jaruševičius, Lukas Paulauskas, Vaidotas Drungilas, Mantas Jurgelaitis and Tomas Blažauskas
Appl. Sci. 2024, 14(14), 6366; https://doi.org/10.3390/app14146366 - 22 Jul 2024
Cited by 3 | Viewed by 1361
Abstract
Currently, the integration of immersive virtual reality applications into learning management systems is limited, which disadvantages kinesthetic learners, as the majority of learning material is mostly written or visual in nature. This research presents a method on how to transform existing conventional learning [...] Read more.
Currently, the integration of immersive virtual reality applications into learning management systems is limited, which disadvantages kinesthetic learners, as the majority of learning material is mostly written or visual in nature. This research presents a method on how to transform existing conventional learning material into immersive virtual reality and integrate it into learning management systems, demonstrating it with a pilot study and an immersive virtual reality application prototype. The prototype application uses WebXR technology and provides integration into the Moodle learning management system using the Sharable Content Object Reference Model standard. The developed learning object was evaluated using the System Usability Scale, Web-based Learning Tool evaluation scale and the igroup Presence Questionnaire. The results of the pilot study revealed that the learning object performed above average in all tested fields and is preferable to established non-IVR solutions. Full article
(This article belongs to the Special Issue Virtual Reality Based Serious Games: Developments and Applications)
Show Figures

Figure 1

Figure 1
<p>The concepts of the proposed IVR application integration to the learning management systems method.</p>
Full article ">Figure 2
<p>Transformation process that adapts existing study courses to include IVR LOs.</p>
Full article ">Figure 3
<p>Screenshots from within the IVR application, showcasing various views and objects throughout the prototype, such as the main menu, the main task, and additional learning material.</p>
Full article ">Figure 4
<p>Architecture for IVR application and its integration into Moodle LMS.</p>
Full article ">Figure 5
<p>Sample Moodle LMS report of the participants’ results in the IVR application.</p>
Full article ">Figure 6
<p>Certified desktop 2D interactive LO from “Emokykla.lt” on the topic of the human skeleton.</p>
Full article ">Figure 7
<p>IVR application and 2D interactive LO WBLT scale scores comparison in the domains of learning, design, and engagement.</p>
Full article ">Figure 8
<p>Graph showing how the percentile ranks associate with SUS scores. The letter notation in the diagram correspond to a grade of the system based on the scores, A meaning excellent, B—good, C and D—okay, and F—poor.</p>
Full article ">
26 pages, 3410 KiB  
Review
Strategic Insights into Integrated Photonics: Core Concepts, Practical Deployments, and Future Outlook
by Muhammad A. Butt and Xavier Mateos
Appl. Sci. 2024, 14(14), 6365; https://doi.org/10.3390/app14146365 - 22 Jul 2024
Cited by 1 | Viewed by 4057
Abstract
Integrated photonics is a cutting-edge field that merges optics and electronics on a single microchip, revolutionizing how we manipulate and transmit light. Imagine traditional bulky optical systems condensed onto a chip smaller than a fingernail, enabling faster communication, more efficient sensors, and advanced [...] Read more.
Integrated photonics is a cutting-edge field that merges optics and electronics on a single microchip, revolutionizing how we manipulate and transmit light. Imagine traditional bulky optical systems condensed onto a chip smaller than a fingernail, enabling faster communication, more efficient sensors, and advanced computing. At its core, integrated photonics relies on guiding light through waveguides etched onto semiconductor substrates, analogous to how wires conduct electricity in traditional electric circuits. These waveguides can route, modulate, and detect light signals with unprecedented precision and speed. This technology holds immense promise across various domains. Despite its immense potential, integrated photonics faces challenges, including manufacturing complexities and integration with existing electronic systems. However, ongoing research and advancements continue to push the boundaries, promising a future where light-based technologies seamlessly integrate into our everyday lives, powering a new era of innovation and connectivity. Full article
(This article belongs to the Special Issue Feature Review Papers in Optics and Lasers)
Show Figures

Figure 1

Figure 1
<p>The aspects of integrated photonics discussed in this paper.</p>
Full article ">Figure 2
<p>A diagram of a PIC featuring numerous transformation optics components. A collection of transformation optics-based photonic elements can be integrated with traditional optical and optoelectronic devices, such as WGs and PDs, on a shared planar substrate. These transformation optics components enable the construction of complex photonic devices and systems, offering diverse functionalities for applications in optical communications, information processing, and sensing. The red arrows indicate the light propagation, which can be managed by both the transformation optics components and on-chip EO devices [<a href="#B49-applsci-14-06365" class="html-bibr">49</a>].</p>
Full article ">Figure 3
<p>(<b>a</b>) Graphical illustration of the sensor layout [<a href="#B71-applsci-14-06365" class="html-bibr">71</a>]; (<b>b</b>) Cross-sectional view of a sensing patch, illustrating the WG, isolation layer, and surface chemistry location [<a href="#B71-applsci-14-06365" class="html-bibr">71</a>]; (<b>c</b>) photographic image showing light propagation along the WG chip [<a href="#B71-applsci-14-06365" class="html-bibr">71</a>], (<b>d</b>) schematic of a broadband NV hybrid EO plasmonic switch. The inset shows a cross-sectional view of the plasmonic slot WG coated with GST [<a href="#B90-applsci-14-06365" class="html-bibr">90</a>]. Mode profiles of the PCM-coated plasmonic slot WG at a telecom wavelength of 1550 nm: (<b>e</b>) amorphous phase and (<b>f</b>) crystalline phase, calculated for TE polarization. Geometric parameters used for mode profile calculations: metal height “h” = 220 nm, slot width “w” = 180 nm, PCM layer thickness “t” = 20 nm [<a href="#B90-applsci-14-06365" class="html-bibr">90</a>], (<b>g</b>) all-optical modulator utilizing a Si rib WG structure [<a href="#B97-applsci-14-06365" class="html-bibr">97</a>], (<b>h</b>) E-field profile of the propagating quasi-TM mode within the WG-integrated modulator, with the dashed white line indicating the graphene sheet plane [<a href="#B97-applsci-14-06365" class="html-bibr">97</a>], (<b>i</b>) experimental setup schematic for passively Q-switched laser operation in Nd:YVO<sub>4</sub> superficial cladding WG. The inset features a microscope image of the laser-inscribed WG [<a href="#B104-applsci-14-06365" class="html-bibr">104</a>], (<b>j</b>) room-temperature fluorescence emission spectra (μPL) depicting transitions from <sup>4</sup>F<sub>3/2</sub> → <sup>4</sup>I<sub>9/2</sub> and <sup>4</sup>F<sub>3/2</sub> → <sup>4</sup>I<sub>11/2</sub> states of Nd<sup>3+</sup> ions. Data obtained from the laser-inscribed WG volume is shown in the red solid line, while bulk Nd:YVO<sub>4</sub> crystal emission is represented by the blue solid line. The inset displays the 2D spatial distribution of Nd<sup>3+</sup> emission intensity captured from the WG’s end-face, corresponding to the region marked within the red dashed square in the microscope image insert (<b>i</b>) [<a href="#B104-applsci-14-06365" class="html-bibr">104</a>].</p>
Full article ">Figure 4
<p>Two-dimensional materials, synthesis, and applications.</p>
Full article ">Figure 5
<p>(<b>a</b>) Graphical illustration of the WG-integrated van der Waals PN heterojunction PD, featuring stacked p-doped black phosphorous and n-doped molybdenum ditelluride layers, which are evanescently coupled with the Si<sub>3</sub>N<sub>4</sub> WG’s guiding mode [<a href="#B141-applsci-14-06365" class="html-bibr">141</a>], (<b>b</b>) <b>Top</b>: Band profiles of black phosphorous and molybdenum ditelluride in the non-equilibrium state. <b>Bottom</b>: Band alignment of the black phosphorous/molybdenum ditelluride PN heterojunction in the thermal equilibrium state [<a href="#B141-applsci-14-06365" class="html-bibr">141</a>], (<b>c</b>) <b>Top</b>: Optical microscope image of the manufactured device, showing the black phosphorous/molybdenum ditelluride heterojunction integrated on one arm of a MZI. <b>Bottom</b>: Close-up view of the device highlighted by the black square box in the top panel [<a href="#B141-applsci-14-06365" class="html-bibr">141</a>].</p>
Full article ">Figure 6
<p>Fabrication methods of integrated photonic devices.</p>
Full article ">Figure 7
<p>Graphical illustration of the deposition process for the SiO<sub>2</sub>: TiO<sub>2</sub> WG film [<a href="#B164-applsci-14-06365" class="html-bibr">164</a>].</p>
Full article ">Figure 8
<p>(<b>a</b>) The process overview describes the new design methodology as follows: Dataset Generation: Initially, datasets are created using traditional numerical methods. Neural Network Training: The dataset is then used to train a neural network to characterize the specific device. Iterative Modeling: Designers often iterate between dataset generation and neural network training until a satisfactory model is developed. Design Applications: Once the model is finalized, it can be applied to various design tasks, such as circuit simulations and inverse design solutions. Fabrication and Validation: The designed devices are fabricated to validate the model’s predictions. Model Sharing and Extension: The validated model can then be shared and further extended. This methodology ensures the development of accurate and efficient models for integrated photonic circuits [<a href="#B172-applsci-14-06365" class="html-bibr">172</a>], (<b>b</b>) comparison of fabrication data with corresponding ANN predictions: (<b>b</b>–<b>e</b>) show the measured transmission responses for gratings with period chirps of 5 nm (<b>b</b>), 10 nm (<b>c</b>), 15 nm (<b>d</b>), and 20 nm (<b>e</b>) [<a href="#B172-applsci-14-06365" class="html-bibr">172</a>].</p>
Full article ">
16 pages, 3790 KiB  
Article
Mechanical Behavior of Low-Strength Hydraulic Lime Concrete Reinforced with Flexible Fibers under Quasi-Static and Dynamic Conditions
by Ángel De La Rosa, Lucía Garijo, Vaibhav W. Masih and Gonzalo Ruiz
Appl. Sci. 2024, 14(14), 6364; https://doi.org/10.3390/app14146364 - 22 Jul 2024
Viewed by 911
Abstract
We investigate the effect of flexible fiber reinforcement on low-strength hydraulic lime concrete. This type of concrete is occasionally necessary to ensure compatibility with the substrate, particularly in the conservation and rehabilitation of historical heritage. For this purpose, we designed a matrix of [...] Read more.
We investigate the effect of flexible fiber reinforcement on low-strength hydraulic lime concrete. This type of concrete is occasionally necessary to ensure compatibility with the substrate, particularly in the conservation and rehabilitation of historical heritage. For this purpose, we designed a matrix of hydraulic lime concrete based on a mix design method we proposed previously and added different amounts of polyvinyl alcohol fiber (volumetric contents of 0.3%, 0.6%, 0.9%, and 1.2%). We then conducted three-point bending tests on prismatic specimens with a central notch under quasi-static (displacement rate of 4 × 104 mm/s) and dynamic (4 mm/s) conditions, using a servo-hydraulic machine. The results indicate that, in both quasi-static and dynamic regimes, the flexural strength, the residual flexural strengths for different crack openings, and the work of fracture increase as the fiber content increases. Furthermore, transitioning from one regime to another (by increasing the strain rate or velocity) leads to a significant increase in these mechanical parameters. Full article
(This article belongs to the Special Issue Advanced Technologies in Cultural Heritage)
Show Figures

Figure 1

Figure 1
<p>(<b>a</b>) Particle size distribution of aggregates; (<b>b</b>) polyvinyl alcohol fibers.</p>
Full article ">Figure 2
<p>Configuration for a three-point bending test setup.</p>
Full article ">Figure 3
<p>(<b>a</b>) <math display="inline"><semantics> <msub> <mi>f</mi> <mi>c</mi> </msub> </semantics></math> at 28 days, (<b>b</b>) <math display="inline"><semantics> <msub> <mi>f</mi> <mi>c</mi> </msub> </semantics></math> at 156 days, and (<b>c</b>) <math display="inline"><semantics> <msub> <mi>E</mi> <mi>c</mi> </msub> </semantics></math> at 28 days, in a quasi-static regime.</p>
Full article ">Figure 4
<p>(<b>a</b>) <math display="inline"><semantics> <msub> <mi>σ</mi> <mi>N</mi> </msub> </semantics></math> and (<b>b</b>) <math display="inline"><semantics> <msub> <mi>W</mi> <mi>F</mi> </msub> </semantics></math> for both velocities (in notched prismatic specimens, 420 × 100 × 100 mm<sup>3</sup>, length × height × width).</p>
Full article ">Figure 5
<p>(<b>a</b>) <math display="inline"><semantics> <msub> <mi>σ</mi> <mi>L</mi> </msub> </semantics></math> and (<b>b</b>) <math display="inline"><semantics> <msub> <mi>σ</mi> <mrow> <mi>R</mi> <mn>1</mn> </mrow> </msub> </semantics></math> for both velocities (in notched prismatic specimens, 420 × 100 × 100 mm<sup>3</sup>, length × height × width).</p>
Full article ">Figure 6
<p>(<b>a</b>) <math display="inline"><semantics> <msub> <mi>σ</mi> <mrow> <mi>R</mi> <mn>2</mn> </mrow> </msub> </semantics></math> and (<b>b</b>) <math display="inline"><semantics> <msub> <mi>σ</mi> <mrow> <mi>R</mi> <mn>3</mn> </mrow> </msub> </semantics></math> for higher velocity (in notched prismatic specimens, 420 × 100 × 100 mm<sup>3</sup>, length × height × width).</p>
Full article ">Figure 7
<p>Evolution of flexural strengths: (<b>a</b>) <math display="inline"><semantics> <msub> <mi>σ</mi> <mi>N</mi> </msub> </semantics></math> (quasi-static regime); (<b>b</b>) <math display="inline"><semantics> <msub> <mi>σ</mi> <mrow> <mi>R</mi> <mi>i</mi> </mrow> </msub> </semantics></math> (dynamic regime).</p>
Full article ">Figure 8
<p>Three-point bending test curves: (<b>a</b>) <math display="inline"><semantics> <msub> <mi>v</mi> <mn>1</mn> </msub> </semantics></math> = 4 × <math display="inline"><semantics> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>4</mn> </mrow> </msup> </semantics></math> mm/s; (<b>b</b>) <math display="inline"><semantics> <msub> <mi>v</mi> <mn>2</mn> </msub> </semantics></math> = 4 mm/s.</p>
Full article ">Figure 9
<p>Typical crack patterns for quasi-static three point bending test: (<b>a</b>) <math display="inline"><semantics> <msub> <mi>ϕ</mi> <mi>f</mi> </msub> </semantics></math> = 0%, (<b>b</b>) <math display="inline"><semantics> <msub> <mi>ϕ</mi> <mi>f</mi> </msub> </semantics></math> = 0.3%, (<b>c</b>) <math display="inline"><semantics> <msub> <mi>ϕ</mi> <mi>f</mi> </msub> </semantics></math> = 0.6%, (<b>d</b>) <math display="inline"><semantics> <msub> <mi>ϕ</mi> <mi>f</mi> </msub> </semantics></math> = 0.9%, (<b>e</b>) <math display="inline"><semantics> <msub> <mi>ϕ</mi> <mi>f</mi> </msub> </semantics></math> = 1.2%.</p>
Full article ">Figure 10
<p>Crack patterns in mode I of fracture dynamic: (<b>a</b>) <math display="inline"><semantics> <msub> <mi>ϕ</mi> <mi>f</mi> </msub> </semantics></math> = 0%, (<b>b</b>) <math display="inline"><semantics> <msub> <mi>ϕ</mi> <mi>f</mi> </msub> </semantics></math> = 0.3%, (<b>c</b>) <math display="inline"><semantics> <msub> <mi>ϕ</mi> <mi>f</mi> </msub> </semantics></math> = 0.6%, (<b>d</b>) <math display="inline"><semantics> <msub> <mi>ϕ</mi> <mi>f</mi> </msub> </semantics></math> = 0.9%, (<b>e</b>) <math display="inline"><semantics> <msub> <mi>ϕ</mi> <mi>f</mi> </msub> </semantics></math> = 1.2%, (<b>f</b>) detail of fibers crossing the crack in hydraulic lime fiber-reinforced concrete with <math display="inline"><semantics> <msub> <mi>ϕ</mi> <mi>f</mi> </msub> </semantics></math> = 1.2%.</p>
Full article ">Figure 11
<p>Perceivable inter-granular failure of fracture dynamic tests: (<b>a</b>) <math display="inline"><semantics> <msub> <mi>ϕ</mi> <mi>f</mi> </msub> </semantics></math> = 0%, (<b>b</b>) <math display="inline"><semantics> <msub> <mi>ϕ</mi> <mi>f</mi> </msub> </semantics></math> = 0.3%, (<b>c</b>) <math display="inline"><semantics> <msub> <mi>ϕ</mi> <mi>f</mi> </msub> </semantics></math> = 0.6%, (<b>d</b>) <math display="inline"><semantics> <msub> <mi>ϕ</mi> <mi>f</mi> </msub> </semantics></math> = 0.9%, (<b>e</b>) <math display="inline"><semantics> <msub> <mi>ϕ</mi> <mi>f</mi> </msub> </semantics></math> = 1.2%, (<b>f</b>) detail of inter-granular fracture in hydraulic lime fiber-reinforced concrete with <math display="inline"><semantics> <msub> <mi>ϕ</mi> <mi>f</mi> </msub> </semantics></math> = 0.9%.</p>
Full article ">
28 pages, 3615 KiB  
Review
Shipbuilding 4.0: A Systematic Literature Review
by Xiaowei Zhang and Daoyi Chen
Appl. Sci. 2024, 14(14), 6363; https://doi.org/10.3390/app14146363 - 22 Jul 2024
Cited by 1 | Viewed by 3048
Abstract
Existing research in the shipbuilding field tends to focus on isolated single aspects of Industry 4.0 (I4.0) without a full picture. To address this gap, this paper seeks to offer a thorough and in-depth examination of the concepts and technologies necessary to integrate [...] Read more.
Existing research in the shipbuilding field tends to focus on isolated single aspects of Industry 4.0 (I4.0) without a full picture. To address this gap, this paper seeks to offer a thorough and in-depth examination of the concepts and technologies necessary to integrate I4.0 into the design, construction, maintenance, and other stages throughout the entire life cycle of a ship. This paper will firstly examine the recent developments and identify the gaps in I4.0 application within shipbuilding. By conducting a systematic literature review on 68 publications through an appropriate review methodology, we synthesize the current state of I4.0 research in the shipbuilding industry, propose a framework for the application of I4.0 in shipbuilding to analyze the progression and research agenda of I4.0 in the shipbuilding sector, and discuss its implications. The Shipbuilding 4.0 framework proposed comprises five main components: concepts, value chain, smart factory, smart manufacturing, infrastructure, and technologies. The proposed framework aims to enhance the understanding of both academics and practitioners regarding the specific needs of the shipbuilding industry and the role I4.0 can and should play in its advancement. Full article
(This article belongs to the Special Issue Smart Factory, Industry 4.0 and Sustainability)
Show Figures

Figure 1

Figure 1
<p>(<b>a</b>) Year-wise publication details; (<b>b</b>) journal publication details.</p>
Full article ">Figure 2
<p>(<b>a</b>) Distribution of research categories; (<b>b</b>) distribution of research categories during 2015–2022.</p>
Full article ">Figure 3
<p>Life cycle and technology categorization.</p>
Full article ">Figure 4
<p>Level of research approach on I4.0 domains.</p>
Full article ">Figure 5
<p>Frequently used keywords (count ≥ 2).</p>
Full article ">Figure 6
<p>Co-occurrence of keyword network—keywords of 2 minimum.</p>
Full article ">Figure 7
<p>Co-occurrence of keywords in minimum 3 documents.</p>
Full article ">Figure 8
<p>Co-occurrence of keywords network—keywords of 4 minimum after removing keyword of “shipbuilding”.</p>
Full article ">Figure 9
<p>Shipbuilding 4.0 framework.</p>
Full article ">
14 pages, 5500 KiB  
Article
Laboratory Evaluation of Wear Particle Emissions and Suspended Dust in Tire–Asphalt Concrete Pavement Friction
by Jongsub Lee, Ohsun Kwon, Yujoong Hwang and Gyumin Yeon
Appl. Sci. 2024, 14(14), 6362; https://doi.org/10.3390/app14146362 - 22 Jul 2024
Cited by 1 | Viewed by 1011
Abstract
This study aims to evaluate the tire–road-wear particles (TRWPs) and suspended dust generated based on the nominal maximum aggregate size (NMAS) of the polymer-modified stone mastic asphalt (SMA) mixtures indoors. The SMA mixtures containing styrene butadiene styrene (SBS) polymer and the NMASs of [...] Read more.
This study aims to evaluate the tire–road-wear particles (TRWPs) and suspended dust generated based on the nominal maximum aggregate size (NMAS) of the polymer-modified stone mastic asphalt (SMA) mixtures indoors. The SMA mixtures containing styrene butadiene styrene (SBS) polymer and the NMASs of 19, 13, 10, 8, and 6 mm were used. Dust was generated from the wear of the tires and the pavement inside the indoor chamber by using the laboratory tire–road-wear particle generation and evaluation tester (LTRWP tester) developed by Korea Expressway Corporation (KEC). In this method, a cylindrical asphalt-mixture specimen rotates in the center, and a load is applied using three tires on the sides of the test specimen. During the test, a digital sensor was used to measure the concentration for each particle size. After the test was completed, the dust was collected and weighed. According to the test results, the generated TRWP emissions were reduced by approximately 0.15 g as the NMAS of the SMA mixture decreased by 1 mm. TRWP emissions decreased by 20% when using the 6 mm SMA mixture compared to the 13 mm SMA mixture. For practical application, a predicted equation of TRWP emissions estimation was developed by using the concentration of suspended dust measured by the digital sensor in the LTRWP tester. LTRWP can be used as an indoor test method to evaluate pavement and tire materials to reduce the amount of dust generated from tire and pavement wear. Full article
(This article belongs to the Special Issue Advances in Renewable Asphalt Pavement Materials)
Show Figures

Figure 1

Figure 1
<p>Research procedure.</p>
Full article ">Figure 2
<p>Wear test and dust measurement method.</p>
Full article ">Figure 3
<p>Visual inspection of specimen deformation by test’s starting temperature.</p>
Full article ">Figure 4
<p>Laboratory tire–road-wear particle generation and evaluation tester.</p>
Full article ">Figure 5
<p>TRWP emissions.</p>
Full article ">Figure 6
<p>Aggregate grading of mixtures with maximum aggregate sizes of 19 mm, 13 mm, 10 mm, 8 mm, and 6 mm.</p>
Full article ">Figure 7
<p>Results of cumulative number of wear particles over LTRWP test time.</p>
Full article ">Figure 8
<p>Results of the TRWP emission tests on PSMA mixture with maximum aggregate sizes.</p>
Full article ">Figure 9
<p>Results of the TSP tests on PSMA mixture with maximum aggregate sizes.</p>
Full article ">Figure 10
<p>Results of suspended dust concentrations by PM size.</p>
Full article ">Figure 11
<p>Relationship of PM<sub>5</sub> and PM<sub>10</sub> suspended dust concentrations in PSMA mixtures with maximum aggregate sizes.</p>
Full article ">Figure 12
<p>Relationship between suspended dust concentrations and TRWP emissions.</p>
Full article ">
20 pages, 2140 KiB  
Article
Providing Security for Flash Loan System Using Cryptocurrency Wallets Supported by XSalsa20 in a Blockchain Environment
by Mishall Al-Zubaidie and Wid Alaa Jebbar
Appl. Sci. 2024, 14(14), 6361; https://doi.org/10.3390/app14146361 - 22 Jul 2024
Cited by 2 | Viewed by 2087
Abstract
The days of long lines at banks and piles of paperwork are long gone. The lending landscape has been completely transformed by digital loans, which provide a quick, easy, and frequently paperless transactions. A payee can apply for a digital loan anytime, anywhere. [...] Read more.
The days of long lines at banks and piles of paperwork are long gone. The lending landscape has been completely transformed by digital loans, which provide a quick, easy, and frequently paperless transactions. A payee can apply for a digital loan anytime, anywhere. The entire lending procedure is accessible and efficient, but the availability of data on the Internet provides many risks and threats, where there are certain difficulties in the world of digital lending and data security, and privacy are major concerns. It is important to address the possibility of predatory lending practices that target weaker payees, especially with flash loans, which are considered a critical type of digital loan, as they add additional pressure to banks in terms of security because they return to the same block of the blockchain, and the possibility of tampering with them is considered great. Therefore, we have developed a security protocol based on the principle of digital cryptocurrency wallets: these digital wallets are protected by our use of the Xsalsa20 algorithm. It has high specifications and is enhanced with the usage of the Crow search algorithm, which guarantees fast and efficient search results. After the analysis of the proposed system in the Tamarin Prover tool, we obtained proof of a lot of security properties like data authenticity, perfect forward secrecy, and many others, which constitute the matter that gives our system the power of security. Also, we obtained 0.6667 ms. as the rate of processing speed, 2990 ms. as the time required by the proposed system to repay loans after the conditions are met, and, finally, our proposed system has the power to present a flexible property by creating 29,700 loans every 3 s; by this, we obtained a system that is secure, authentic, fast, and flexible. Full article
Show Figures

Figure 1

Figure 1
<p>Centralized mechanism of loans (<b>a</b>). Decentralized mechanism of loans with blockchain (<b>b</b>).</p>
Full article ">Figure 2
<p>Flash loans mechanism of work.</p>
Full article ">Figure 3
<p>Proposed protocol workflow.</p>
Full article ">Figure 4
<p>Organizational structure of the proposed system.</p>
Full article ">Figure 5
<p>Attack prevention methods in the proposed system.</p>
Full article ">Figure 6
<p>Tamarin Prover security properties result.</p>
Full article ">Figure 7
<p>Loan processing speed.</p>
Full article ">Figure 8
<p>Time to repay loan.</p>
Full article ">Figure 9
<p>Loan system flexibility.</p>
Full article ">Figure 10
<p>XSalsa key generating using CSPRNG.</p>
Full article ">Figure 11
<p>XSalsa key generating using crypto box keypair library.</p>
Full article ">Figure 12
<p>The proposed system encryption and decryption speed.</p>
Full article ">
18 pages, 10474 KiB  
Article
Adaptive Frame Sampling and Feature Alignment for Multi-Frame Infrared Small Target Detection
by Chuanhong Yao and Haitao Zhao
Appl. Sci. 2024, 14(14), 6360; https://doi.org/10.3390/app14146360 - 22 Jul 2024
Viewed by 1196
Abstract
In recent years, infrared images have attracted widespread attention, due to their extensive application in low-visibility search and rescue, forest fire monitoring, ground target monitoring, and other fields. Infrared small target detection technology plays a vital role in these applications. Although there has [...] Read more.
In recent years, infrared images have attracted widespread attention, due to their extensive application in low-visibility search and rescue, forest fire monitoring, ground target monitoring, and other fields. Infrared small target detection technology plays a vital role in these applications. Although there has been significant research over the years, accurately detecting infrared small targets in complex backgrounds remains a significant challenge. Multi-frame detection methods can significantly improve detection performance in these cases. However, current multi-frame methods face difficulties in balancing the number of input frames and detection speed, and cannot effectively handle the background motion caused by movement of the infrared camera. To address these issues, we propose an adaptive frame sampling method and a detection network aligned at the feature level. Our adaptive frame sampling method uses mutual information to measure motion changes between adjacent frames, construct a motion distribution, and sample frames with uniform motion based on the averaged motion distribution. Our detection network handles background motion by predicting a homography flow matrix that aligns features at the feature level. Extensive evaluation of all components showed that the proposed method can more effectively perform multi-frame infrared small target detection. Full article
Show Figures

Figure 1

Figure 1
<p>Redundant continuous frame pictures.</p>
Full article ">Figure 2
<p>The process of adaptive frame sampling based on mutual information.</p>
Full article ">Figure 3
<p>The architecture of the detection network. This network consists of three parts, namely a feature extraction and alignment module, temporal feature fusion module, and decoding module.</p>
Full article ">Figure 4
<p>The framework of the feature alignment module.</p>
Full article ">Figure 5
<p>The framework of time feature fusion module.</p>
Full article ">Figure 6
<p>The framework of the decoder module.</p>
Full article ">Figure 7
<p>Typical small target examples.</p>
Full article ">Figure 8
<p>Performance under different <math display="inline"><semantics> <mi>μ</mi> </semantics></math>.</p>
Full article ">Figure 9
<p>Sample eight frames from 40 continuous frames in data14.</p>
Full article ">
Previous Issue
Next Issue
Back to TopTop