Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (547)

Search Parameters:
Keywords = Semantic Web

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
20 pages, 2706 KiB  
Review
The Impact of Digital Devices on Children’s Health: A Systematic Literature Review
by Valentina Presta, Alessandro Guarnieri, Fabiana Laurenti, Salvatore Mazzei, Maria Luisa Arcari, Prisco Mirandola, Marco Vitale, Michael Yong Hwa Chia, Giancarlo Condello and Giuliana Gobbi
J. Funct. Morphol. Kinesiol. 2024, 9(4), 236; https://doi.org/10.3390/jfmk9040236 - 14 Nov 2024
Viewed by 487
Abstract
Background: The impact of prolonged digital device exposure on physical and mental health in children has been widely investigated by the scientific community. Additionally, the lockdown periods due to the COVID-19 pandemic further exposed children to screen time for e-learning activities. The aim [...] Read more.
Background: The impact of prolonged digital device exposure on physical and mental health in children has been widely investigated by the scientific community. Additionally, the lockdown periods due to the COVID-19 pandemic further exposed children to screen time for e-learning activities. The aim of this systematic review (PROSPERO Registration: CRD42022315596) was to evaluate the effect of digital device exposure on children’s health. The impact of the COVID-19 pandemic was additionally explored to verify the further exposure of children due to the e-learning environment. Methods: Available online databases (PubMed, Google Scholar, Semantic Scholar, BASE, Scopus, Web of Science, and SPORTDiscus) were searched for study selection. The PICO model was followed by including a target population of children aged 2 to 12 years, exposed or not to any type of digital devices, while evaluating changes in both physical and mental health outcomes. The quality assessment was conducted by using the Joanna Briggs Institute (JBI) Critical Appraisal Tool. Synthesis without meta-analysis (SWiM) guidelines were followed to provide data synthesis. Results: Forty studies with a total sample of 75,540 children were included in this systematic review. The study design was mainly cross-sectional (n = 28) and of moderate quality (n = 33). Overall, the quality score was reduced due to recall, selection, and detection biases; blinding procedures influenced the quality score of controlled trials, and outcome validity reduced the quality score of cohort studies. Digital device exposure affected physical activity engagement and adiposity parameters; sleep and behavioral problems emerged in children overexposed to digital devices. Ocular conditions were also reported and associated with higher screen exposure. Home confinement during COVID-19 further increased digital device exposure with additional negative effects. Conclusions: The prolonged use of digital devices has a significant negative impact on children aged 2 to 12, leading to decreased physical activity, sleep disturbances, behavioral issues, lower academic performance, socioemotional challenges, and eye strain, particularly following extended online learning during lockdowns. Full article
(This article belongs to the Special Issue Physical Activity for Optimal Health)
Show Figures

Figure 1

Figure 1
<p>Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) flow diagram from the identification of the inclusion of studies in the systematic review.</p>
Full article ">Figure 2
<p>Quality assessment of randomized controlled trials (RCTs) included (n = 3, starting from the top Kiefer et al. [<a href="#B66-jfmk-09-00236" class="html-bibr">66</a>], Mayer et al. [<a href="#B67-jfmk-09-00236" class="html-bibr">67</a>], Straker et al. [<a href="#B68-jfmk-09-00236" class="html-bibr">68</a>]), according to the Joanna Briggs Institute (JBI) Critical Appraisal Checklist for Randomized Controlled Trials [<a href="#B37-jfmk-09-00236" class="html-bibr">37</a>]. <span class="html-fig-inline" id="jfmk-09-00236-i001"><img alt="Jfmk 09 00236 i001" src="/jfmk/jfmk-09-00236/article_deploy/html/images/jfmk-09-00236-i001.png"/></span> = no/unclear, 0 point; <span class="html-fig-inline" id="jfmk-09-00236-i002"><img alt="Jfmk 09 00236 i002" src="/jfmk/jfmk-09-00236/article_deploy/html/images/jfmk-09-00236-i002.png"/></span> = yes, 1 point. Q1: Was true randomization used for assignment of participants to treatment groups? Q2: Was allocation to treatment groups concealed? Q3: Were treatment groups similar at the baseline? Q4: Were participants blind to treatment assignment? Q5: Were those delivering treatment blind to treatment assignment? Q6: Were outcomes assessors blind to treatment assignment? Q7: Were treatment groups treated identically other than the intervention of interest? Q8: Was follow-up completed, and if not, were differences between groups in terms of their follow-up adequately described and analyzed? Q9: Were participants analyzed in the groups to which they were randomized? Q10: Were outcomes measured in the same way for treatment groups? Q11: Were outcomes measured in a reliable way? Q12: Was appropriate statistical analysis used? Q13: Was the trial design appropriate, and any deviations from the standard RCT design (individual randomization, parallel groups) accounted for in the conduct and analysis of the trial?</p>
Full article ">Figure 3
<p>Quality assessment of cohort studies included (n = 9, starting from the top Hu et al. [<a href="#B69-jfmk-09-00236" class="html-bibr">69</a>], Ma et al. [<a href="#B70-jfmk-09-00236" class="html-bibr">70</a>], Ma et al. [<a href="#B71-jfmk-09-00236" class="html-bibr">71</a>], Madigan et al. [<a href="#B72-jfmk-09-00236" class="html-bibr">72</a>], Martzog &amp; Suggate [<a href="#B73-jfmk-09-00236" class="html-bibr">73</a>], McArthur et al. [<a href="#B74-jfmk-09-00236" class="html-bibr">74</a>], McNeill et al. [<a href="#B75-jfmk-09-00236" class="html-bibr">75</a>], Veraksa et al. [<a href="#B76-jfmk-09-00236" class="html-bibr">76</a>], Zhang et al. [<a href="#B30-jfmk-09-00236" class="html-bibr">30</a>]), according to the Joanna Briggs Institute (JBI) Critical Appraisal Checklist for Cohort Studies [<a href="#B37-jfmk-09-00236" class="html-bibr">37</a>]. <span class="html-fig-inline" id="jfmk-09-00236-i001"><img alt="Jfmk 09 00236 i001" src="/jfmk/jfmk-09-00236/article_deploy/html/images/jfmk-09-00236-i001.png"/></span> = no/unclear, 0 point; <span class="html-fig-inline" id="jfmk-09-00236-i002"><img alt="Jfmk 09 00236 i002" src="/jfmk/jfmk-09-00236/article_deploy/html/images/jfmk-09-00236-i002.png"/></span> = yes, 1 point. Q1: Were the two groups similar and recruited from the same population? Q2: Were the exposures measured similarly to assign people to both exposed and unexposed groups? Q3: Was the exposure measured in a valid and reliable way? Q4: Were confounding factors identified? Q5: Were strategies to deal with confounding factors stated? Q6: Were the groups/participants free of the outcome at the start of the study (or at the moment of exposure)? Q7: Were the outcomes measured in a valid and reliable way? Q8: Was the follow-up time reported and sufficient to be long enough for outcomes to occur? Q9: Was follow-up complete, and if not, were the reasons to loss to follow-up described and explored? Q10: Were strategies to address incomplete follow-up utilized? Q11: Was appropriate statistical analysis used?</p>
Full article ">Figure 4
<p>Quality assessment of cross-sectional studies included (n = 28, starting from the top Abid et al. [<a href="#B39-jfmk-09-00236" class="html-bibr">39</a>], Bochicchio et al. [<a href="#B40-jfmk-09-00236" class="html-bibr">40</a>], Bohnert &amp; Gracia [<a href="#B41-jfmk-09-00236" class="html-bibr">41</a>], Canaslan-Akyar &amp; Sungur [<a href="#B42-jfmk-09-00236" class="html-bibr">42</a>], Cardoso-Leite et al. [<a href="#B43-jfmk-09-00236" class="html-bibr">43</a>], Chang et al. [<a href="#B44-jfmk-09-00236" class="html-bibr">44</a>], Chaput et al. [<a href="#B45-jfmk-09-00236" class="html-bibr">45</a>], Chaput et al. [<a href="#B20-jfmk-09-00236" class="html-bibr">20</a>], Chia et al. [<a href="#B46-jfmk-09-00236" class="html-bibr">46</a>], Cox et al. [<a href="#B47-jfmk-09-00236" class="html-bibr">47</a>], Dadson et al. [<a href="#B48-jfmk-09-00236" class="html-bibr">48</a>], Dube et al. [<a href="#B49-jfmk-09-00236" class="html-bibr">49</a>], Gonzalez-Valero et al. [<a href="#B50-jfmk-09-00236" class="html-bibr">50</a>], Hasanen et al. [<a href="#B51-jfmk-09-00236" class="html-bibr">51</a>], Hiltunen et al. [<a href="#B52-jfmk-09-00236" class="html-bibr">52</a>], Hosokawa &amp; Katsura [<a href="#B53-jfmk-09-00236" class="html-bibr">53</a>], Howie et al. [<a href="#B54-jfmk-09-00236" class="html-bibr">54</a>], Jago et al. [<a href="#B55-jfmk-09-00236" class="html-bibr">55</a>], Kostyrka-Allchorne et al. [<a href="#B56-jfmk-09-00236" class="html-bibr">56</a>], Lopez et al. [<a href="#B57-jfmk-09-00236" class="html-bibr">57</a>], Mineshita et al. [<a href="#B58-jfmk-09-00236" class="html-bibr">58</a>], Nabi &amp; Wolfers [<a href="#B59-jfmk-09-00236" class="html-bibr">59</a>], Nobusako et al. [<a href="#B60-jfmk-09-00236" class="html-bibr">60</a>], Ribner et al. [<a href="#B61-jfmk-09-00236" class="html-bibr">61</a>], Santaliestra-Pasías et al. [<a href="#B62-jfmk-09-00236" class="html-bibr">62</a>], Shen et al. [<a href="#B63-jfmk-09-00236" class="html-bibr">63</a>], Tay et al. [<a href="#B64-jfmk-09-00236" class="html-bibr">64</a>], Zhu et al. [<a href="#B65-jfmk-09-00236" class="html-bibr">65</a>]), according to the Joanna Briggs Institute (JBI) Critical Appraisal Checklist for Analytical Cross-Sectional Studies [<a href="#B37-jfmk-09-00236" class="html-bibr">37</a>]. <span class="html-fig-inline" id="jfmk-09-00236-i001"><img alt="Jfmk 09 00236 i001" src="/jfmk/jfmk-09-00236/article_deploy/html/images/jfmk-09-00236-i001.png"/></span> = no/unclear, 0 point; <span class="html-fig-inline" id="jfmk-09-00236-i002"><img alt="Jfmk 09 00236 i002" src="/jfmk/jfmk-09-00236/article_deploy/html/images/jfmk-09-00236-i002.png"/></span> = yes, 1 point. Q1: Were the criteria for inclusion in the sample clearly defined? Q2: Were the study subjects and the setting described in detail? Q3: Was the exposure measured in a valid and reliable way? Q4: Were objective, standard criteria used for measurement of the condition? Q5: Were confounding factors identified? Q6: Were strategies to deal with confounding factors stated? Q7: Were the outcomes measured in a valid and reliable way? Q8: Was appropriate statistical analysis used?</p>
Full article ">
20 pages, 7344 KiB  
Article
Research on a Joint Extraction Method of Track Circuit Entities and Relations Integrating Global Pointer and Tensor Learning
by Yanrui Chen, Guangwu Chen and Peng Li
Sensors 2024, 24(22), 7128; https://doi.org/10.3390/s24227128 - 6 Nov 2024
Viewed by 362
Abstract
To address the issue of efficiently reusing the massive amount of unstructured knowledge generated during the handling of track circuit equipment faults and to automate the construction of knowledge graphs in the railway maintenance domain, it is crucial to leverage knowledge extraction techniques [...] Read more.
To address the issue of efficiently reusing the massive amount of unstructured knowledge generated during the handling of track circuit equipment faults and to automate the construction of knowledge graphs in the railway maintenance domain, it is crucial to leverage knowledge extraction techniques to efficiently extract relational triplets from fault maintenance text data. Given the current lag in joint extraction technology within the railway domain and the inefficiency in resource utilization, this paper proposes a joint extraction model for track circuit entities and relations, integrating Global Pointer and tensor learning. Taking into account the associative characteristics of semantic relations, the nesting of domain-specific terms in the railway sector, and semantic diversity, this research views the relation extraction task as a tensor learning process and the entity recognition task as a span-based Global Pointer search process. First, a multi-layer dilate gated convolutional neural network with residual connections is used to extract key features and fuse the weighted information from the 12 different semantic layers of the RoBERTa-wwm-ext model, fully exploiting the performance of each encoding layer. Next, the Tucker decomposition method is utilized to capture the semantic correlations between relations, and an Efficient Global Pointer is employed to globally predict the start and end positions of subject and object entities, incorporating relative position information through rotary position embedding (RoPE). Finally, comparative experiments with existing mainstream joint extraction models were conducted, and the proposed model’s excellent performance was validated on the English public datasets NYT and WebNLG, the Chinese public dataset DuIE, and a private track circuit dataset. The F1 scores on the NYT, WebNLG, and DuIE public datasets reached 92.1%, 92.7%, and 78.2%, respectively. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

Figure 1
<p>Example of overlapping relations.</p>
Full article ">Figure 2
<p>The structure of the joint extraction model for track circuit entities and relations integrates Global Pointer and tensor learning.</p>
Full article ">Figure 3
<p>The structure of a multi-layer dilate gated convolutional neural network.</p>
Full article ">Figure 4
<p>Example of how to construct a three-dimension word relation tensor from word tables.</p>
Full article ">Figure 5
<p>Knowledge association structure diagram.</p>
Full article ">Figure 6
<p>The results of different methods on the track circuit validation set.</p>
Full article ">Figure 7
<p>The experimental results using different upstream models on the track circuit test set.</p>
Full article ">Figure 8
<p>The triplet extraction performance under different dimensions of the core tensor <math display="inline"><semantics> <mi mathvariant="script">G</mi> </semantics></math>.</p>
Full article ">Figure 9
<p>The parameter-tuning experiment for <math display="inline"><semantics> <mi>α</mi> </semantics></math>.</p>
Full article ">Figure 10
<p>The parameter-tuning experiment for <math display="inline"><semantics> <mi>γ</mi> </semantics></math>.</p>
Full article ">Figure 11
<p>The model extracts entity types from case sentences.</p>
Full article ">Figure 12
<p>The model extracts relation types from case sentences.</p>
Full article ">
28 pages, 10396 KiB  
Article
Ontology-Based Spatial Data Quality Assessment Framework
by Cemre Yılmaz, Çetin Cömert and Deniz Yıldırım
Appl. Sci. 2024, 14(21), 10045; https://doi.org/10.3390/app142110045 - 4 Nov 2024
Viewed by 495
Abstract
Spatial data play a critical role in various domains such as cadastre, environment, navigation, and transportation. Therefore, ensuring the quality of geospatial data is essential to obtain reliable results and make accurate decisions. Typically, data are generated by institutions according to specifications including [...] Read more.
Spatial data play a critical role in various domains such as cadastre, environment, navigation, and transportation. Therefore, ensuring the quality of geospatial data is essential to obtain reliable results and make accurate decisions. Typically, data are generated by institutions according to specifications including application schemas and can be shared through the National Spatial Data Infrastructure. The compliance of the produced data to the specifications must be assessed by institutions. Quality assessment is typically performed manually by domain experts or with proprietary software. The lack of a standards-based method for institutions to evaluate data quality leads to software dependency and hinders interoperability. The diversity in application domains makes an interoperable, reusable, extensible, and web-based quality assessment method necessary for institutions. Current solutions do not offer such a method to institutions. This results in high costs, including labor, time, and software expenses. This paper presents a novel framework that employs an ontology-based approach to overcome these drawbacks. The framework is primarily based on two types of ontologies and comprises several components. The ontology development component is responsible for formalizing rules for specifications by using a GUI. The ontology mapping component incorporates a Specification Ontology containing domain-specific concepts and a Spatial Data Quality Ontology with generic quality concepts including rules equipped with Semantic Web Rule Language. These rules are not included in the existing data quality ontologies. This integration completes the framework, allowing the quality assessment component to effectively identify inconsistent data. Domain experts can create Specification Ontologies through the GUI, and the framework assesses spatial data against the Spatial Data Quality Ontology, generating quality reports and classifying errors. The framework was tested on a 1/1000-scale base map of a province and effectively identified inconsistencies. Full article
(This article belongs to the Special Issue Current Practice and Future Directions of Semantic Web Technologies)
Show Figures

Figure 1

Figure 1
<p>Data Quality Assessment Framework, components, and interactions.</p>
Full article ">Figure 2
<p>Spatial data to RDF conversion.</p>
Full article ">Figure 3
<p>Ontology interaction.</p>
Full article ">Figure 4
<p>Main classes of SDQO ontology mapped with GeoSPARQL.</p>
Full article ">Figure 5
<p>Ontological correspondence of “Contours must not cross any lake and building” rule.</p>
Full article ">Figure 6
<p>GUI to generate SfO ontology.</p>
Full article ">Figure 7
<p>A path of subclass relations in a SfO.</p>
Full article ">Figure 8
<p>SDQO, SfO, and data.</p>
Full article ">Figure 9
<p>SDQO, SfO, DO, and SWRL rule applied to infer contours which are crossing over buildings when it is not allowed.</p>
Full article ">Figure 10
<p>Map of Trabzon city center, a section of the study area.</p>
Full article ">Figure 11
<p>A building that is not within a cadastral parcel.</p>
Full article ">Figure 12
<p>Examples of “Forbidden”-type rules in the use of case data: (<b>a</b>) Overlapping buildings and (<b>b</b>) Roads crossing over buildings.</p>
Full article ">Figure 13
<p>Data conversion.</p>
Full article ">Figure 14
<p>A sample road feature (Yol8644).</p>
Full article ">Figure 15
<p>Roads that cross buildings (erroneous roads and buildings are shown in yellow).</p>
Full article ">Figure 16
<p>Overlapping cadastral parcels (light yellow or red).</p>
Full article ">Figure 17
<p>Overlapping buildings (light yellow or red).</p>
Full article ">Figure 18
<p>Buildings that are not within cadastral parcels (painted in red).</p>
Full article ">Figure 19
<p>An excerpt from resulting ontology for “overlapping buildings in the same layer”. “Error code 2” represents “overlapping features”.</p>
Full article ">Figure 20
<p>An excerpt from resulting ontology for “road features that are crossing over buildings”. “Error code 1” represents “crossing features”.</p>
Full article ">
20 pages, 1579 KiB  
Article
A Semantic and Optimized Focused Crawler Based on Semantic Graph and Genetic Algorithm
by Wenhao Huang, Xiaoyan Li, Xiao Zhou, Deyu Qi, Jianqing Xi, Wenjun Liu and Feiyu Zhao
Symmetry 2024, 16(11), 1439; https://doi.org/10.3390/sym16111439 - 30 Oct 2024
Viewed by 797
Abstract
A focused crawler automatically retrieves, organizes, and extracts specific topic-related information from the internet for analysis and application. Currently, most focused crawlers assess the relevance of web pages to a given topic through methods such as keyword matching, semantic analysis, and link structures. [...] Read more.
A focused crawler automatically retrieves, organizes, and extracts specific topic-related information from the internet for analysis and application. Currently, most focused crawlers assess the relevance of web pages to a given topic through methods such as keyword matching, semantic analysis, and link structures. However, these existing focused crawlers suffer from issues such as misleading directions and reduced accuracy due to the lack of semantic analysis of topic terms, as well as biased computation of topic relevance caused by the absence of effective weighting factors. To solve the above-mentioned problems, this study proposes a semantic and optimized focused crawler based on Semantic Graph and Genetic Algorithm. The proposed crawler eliminates ambiguous terms by constructing a semantic graph, optimizes the weighting factors of topic relevance with asymmetry by using a genetic algorithm, and combines both above two points to predict the priority of each unvisited hyperlink. The experiment results indicate that the proposed SG-GA Crawler improves the evaluation indicators compared with the other three focused crawlers, including VSM Crawler, SSRM Crawler, and SG Crawler. More specifically, the percentage improvement achieved by the proposed method exceeds 19%, 19%, and 13% in terms of three evaluation indicators, including the number of relevant web pages, acquisition rate, and average relevance, respectively. In conclusion, the proposed focused crawler can grab more quantity and higher quality topic-related web pages from the Internet. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

Figure 1
<p>The flowchart of a focused crawler based on SG and GA.</p>
Full article ">Figure 2
<p>The example of topic graph establishment.</p>
Full article ">Figure 3
<p>An example of the ambiguous term recognition.</p>
Full article ">Figure 4
<p>An example of disambiguation term acquisition.</p>
Full article ">Figure 5
<p>The comparison of RN indicators for four focused crawlers based on VSM, SSRM, SG, and SG-GA, respectively.</p>
Full article ">Figure 6
<p>The comparison of HR indicators for four focused crawlers based on VSM, SSRM, SG, and SG-GA, respectively.</p>
Full article ">Figure 7
<p>The comparison of AS indicators for four focused crawlers based on VSM, SSRM, SG, and SG-GA, respectively.</p>
Full article ">
17 pages, 7822 KiB  
Article
A New Winter Wheat Crop Segmentation Method Based on a New Fast-UNet Model and Multi-Temporal Sentinel-2 Images
by Mohamad M. Awad
Agronomy 2024, 14(10), 2337; https://doi.org/10.3390/agronomy14102337 - 10 Oct 2024
Viewed by 638
Abstract
Mapping and monitoring crops are the most complex and difficult tasks for experts processing and analyzing remote sensing (RS) images. Classifying crops using RS images is the most expensive task, and it requires intensive labor, especially in the sample collection phase. Fieldwork requires [...] Read more.
Mapping and monitoring crops are the most complex and difficult tasks for experts processing and analyzing remote sensing (RS) images. Classifying crops using RS images is the most expensive task, and it requires intensive labor, especially in the sample collection phase. Fieldwork requires periodic visits to collect data about the crop’s physiochemical characteristics and separating them using the known conventional machine learning algorithms and remote sensing images. As the problem becomes more complex because of the diversity of crop types and the increase in area size, sample collection becomes more complex and unreliable. To avoid these problems, a new segmentation model was created that does not require sample collection or high-resolution images and can successfully distinguish wheat from other crops. Moreover, UNet is a well-known Convolutional Neural Network (CNN), and the semantic method was adjusted to become more powerful, faster, and use fewer resources. The new model was named Fast-UNet and was used to improve the segmentation of wheat crops. Fast-UNet was compared to UNet and Google’s newly developed semantic segmentation model, DeepLabV3+. The new model was faster than the compared models, and it had the highest average accuracy compared to UNet and DeepLabV3+, with values of 93.45, 93.05, and 92.56 respectively. Finally, new datasets of time series NDVI images and ground truth data were created. These datasets, and the newly developed model, were made available publicly on the Web. Full article
Show Figures

Figure 1

Figure 1
<p>Area of Study.</p>
Full article ">Figure 2
<p>Field crop boundaries.</p>
Full article ">Figure 3
<p>The processes of creating datasets for training the new model for identifying winter wheat.</p>
Full article ">Figure 4
<p>General view of the UNet structure.</p>
Full article ">Figure 5
<p>The Fast-UNet model that processes sub-images of size 256 × 256 × N.</p>
Full article ">Figure 6
<p>Original 256 × 256 × 3, ground truth, and segmented images by Fast-UNet.</p>
Full article ">Figure 6 Cont.
<p>Original 256 × 256 × 3, ground truth, and segmented images by Fast-UNet.</p>
Full article ">Figure 7
<p>Accuracy and loss values for processing 256 × 256 × 3 images using (<b>a</b>) Fast-UNet, (<b>b</b>) UNet, and (<b>c</b>) DeepLabV3+.</p>
Full article ">Figure 7 Cont.
<p>Accuracy and loss values for processing 256 × 256 × 3 images using (<b>a</b>) Fast-UNet, (<b>b</b>) UNet, and (<b>c</b>) DeepLabV3+.</p>
Full article ">Figure 8
<p>Original, ground truth, segmented by Fast-UNet, and ground truth images (128 × 128 × 3).</p>
Full article ">Figure 8 Cont.
<p>Original, ground truth, segmented by Fast-UNet, and ground truth images (128 × 128 × 3).</p>
Full article ">Figure 9
<p>Accuracy and loss values for processing 128 × 128 × 3 images by (<b>a</b>) Fast-UNet, (<b>b</b>) UNet, and (<b>c</b>) DeepLabV3+.</p>
Full article ">Figure 9 Cont.
<p>Accuracy and loss values for processing 128 × 128 × 3 images by (<b>a</b>) Fast-UNet, (<b>b</b>) UNet, and (<b>c</b>) DeepLabV3+.</p>
Full article ">
17 pages, 4134 KiB  
Article
Design and Development Model of a Web Accessibility Ecosystem
by Galina Bogdanova, Todor Todorov, Juliana Dochkova-Todorova, Nikolay Noev and Negoslav Sabev
Information 2024, 15(10), 613; https://doi.org/10.3390/info15100613 - 7 Oct 2024
Viewed by 682
Abstract
The article examines issues of web accessibility ecosystems for people with special needs. Methods, models, accessibility standards, and technologies related to the structure, design, and functionality of the web accessibility ecosystem are studied. The stages of developing an accessibility ecosystem are explored. The [...] Read more.
The article examines issues of web accessibility ecosystems for people with special needs. Methods, models, accessibility standards, and technologies related to the structure, design, and functionality of the web accessibility ecosystem are studied. The stages of developing an accessibility ecosystem are explored. The accessibility of the design, functionalities, structure, and content of a particular ecosystem are presented. Several themes for the design of the system with an emphasis on its accessibility for blind users are explored and analyzed. UX/UI design and the ontological model of accessibility, used in the implementation of the model of the ecosystem and its elements, are studied. A web accessibility ecosystem model has been developed, compliant with the Web Content Accessibility Guidelines and based on semantic technologies. Other qualities of this model are easy access to information resources on the topic of accessibility, convenience for users with different needs, and the possibility of expansion and enrichment in the future. Full article
(This article belongs to the Special Issue Feature Papers in Information in 2024–2025)
Show Figures

Figure 1

Figure 1
<p>Schema of the Stages in the Development of an Accessibility Ecosystem.</p>
Full article ">Figure 2
<p>Schema of the Accessibility Ecosystem Modules.</p>
Full article ">Figure 3
<p>A Model of Part of the Content of the Accessibility Ontology Related to the AB Ecosystem.</p>
Full article ">Figure 4
<p>Scheme of Arrangement of Elements in the Ecosystem.</p>
Full article ">Figure 5
<p>Main Menu in the Ecosystem.</p>
Full article ">Figure 6
<p>An Example Tag Cloud.</p>
Full article ">Figure 7
<p>Scheme with the Ecosystem Map.</p>
Full article ">Figure 8
<p>Widget Customization via CSS.</p>
Full article ">Figure 9
<p>AB Ecosystem Accessibility Panel.</p>
Full article ">
21 pages, 3719 KiB  
Review
Evaluating Multi-Criteria Decision-Making Methods for Sustainable Management of Forest Ecosystems: A Systematic Review
by Cokou Patrice Kpadé, Lota D. Tamini, Steeve Pepin, Damase P. Khasa, Younes Abbas and Mohammed S. Lamhamedi
Forests 2024, 15(10), 1728; https://doi.org/10.3390/f15101728 - 29 Sep 2024
Viewed by 1013
Abstract
Multi-criteria decision-making (MCDM) methods provide a framework for addressing sustainable forest management challenges, especially under climate change. This study offers a systematic review of MCDM applications in forest management from January 2010 to March 2024. Descriptive statistics were employed to analyze trends in [...] Read more.
Multi-criteria decision-making (MCDM) methods provide a framework for addressing sustainable forest management challenges, especially under climate change. This study offers a systematic review of MCDM applications in forest management from January 2010 to March 2024. Descriptive statistics were employed to analyze trends in MCDM use and geographic distribution. Thematic content analysis investigated the appearance of MCDM indicators supplemented by Natural Language Processing (NLP). Factorial Correspondence Analysis (FCA) explored correlations between models and publication outlets. We systematically searched Web of Science (WoS), Scopus, Google Scholar, Semantic Scholar, CrossRef, and OpenAlex using terms such as ‘MCDM’, ‘forest management’, and ‘decision support’. We found that the Analytical Hierarchy Process (AHP) and the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) were the most commonly used methods, followed by the Preference Ranking Organization Method for Enrichment Evaluation (PROMETHEE), the Analytic Network Process (ANP), GIS, and Goal Programming (GP). Adoption varied across regions, with advanced models such as AHP and GIS less frequently used in developing countries due to technological constraints. These findings highlight emerging trends and gaps in MCDM application, particularly for argan forests, emphasizing the need for context-specific frameworks to support sustainable management in the face of climate change. Full article
Show Figures

Figure 1

Figure 1
<p>Systematic literature review process based on ROSES protocol; adapted from Ishtiaque [<a href="#B49-forests-15-01728" class="html-bibr">49</a>].</p>
Full article ">Figure 2
<p>Single (one MCDM model only) versus multiple (&gt;1 MCDM model) approaches adopted in the reviewed studies (<span class="html-italic">n</span> = 46).</p>
Full article ">Figure 3
<p>Radar showing the frequency of MCDM models.</p>
Full article ">Figure 4
<p>Relative frequency comparison of MCDM models in forestry over time (<b>A</b>–<b>F</b>).</p>
Full article ">Figure 5
<p>Relative frequency comparison of most model combinations of reviews over time.</p>
Full article ">Figure 6
<p>Hierarchy chart showing the number of countries and models used in forestry.</p>
Full article ">Figure 7
<p>Factorial correspondence analysis between models used in forestry and publishing journals. Legend: Ejud: Expert_judgment; Spr: Scoring_process; PFr: Pareto_Frontier; PROM: PROMETHEE; GMCDM: GIS-MCDM; Dme: Delphi_method; DEM: DEMATEL; Flogn: Fuzzy_logic_norm; GISM: GIS_SMCD; CJFR: Canadian Journal of Forest Research; ECOL: Ecological Indicators; JFOR: Journal of Forest Planning; ISAH: ISAHP Proceedings; FORp: Forest Policy and Economics; ENVI: Environmental Monitoring and Assessment; LIFE: Life Science Journal; FORt: Forests; JENV: Journal of Environmental Planning and Management; ANFR: Annals of Forest Research; COMP: Computers and Electronics in Agriculture; IOPC: IOP Conference Series: Materials Science and Engineering; SUST: Sustainability; SUMA: Sumarski List; IJEG: International Journal of Environment and Geoinformatics; ICIE: International Conference on Industrial Engineering and Management; IJSA: International Journal of Sustainable Agricultural Management and Informatics; JINN: Journal of Innovation &amp; Knowledge; FIRE: Fire; JCLE: Journal of Cleaner Production; JPLA: Jurnal Ilmiah PLATAX; APPL: Applied Geography; FORm: Forest Ecology and Management; E3SW: E3S Web of Conferences; SCIR: Scientific Reports; SSRN: SSRN Electronic Journal; RESQ: Research Square; CEFJ: Central European Forestry Journal; ECOI: Ecology of Iranian Forests; GEOS: Geo-spatial Information Science; F1: First dimension of FCA, and F2: Second dimension of FCA.</p>
Full article ">Figure 8
<p>Radar chart depicting the average number of indicators used in empirical studies by models.</p>
Full article ">
19 pages, 2296 KiB  
Article
A Hybrid Approach to Ontology Construction for the Badini Kurdish Language
by Media Azzat, Karwan Jacksi and Ismael Ali
Information 2024, 15(9), 578; https://doi.org/10.3390/info15090578 - 19 Sep 2024
Viewed by 1037
Abstract
Semantic ontologies have been widely utilized as crucial tools within natural language processing, underpinning applications such as knowledge extraction, question answering, machine translation, text comprehension, information retrieval, and text summarization. While the Kurdish language, a low-resource language, has been the subject of some [...] Read more.
Semantic ontologies have been widely utilized as crucial tools within natural language processing, underpinning applications such as knowledge extraction, question answering, machine translation, text comprehension, information retrieval, and text summarization. While the Kurdish language, a low-resource language, has been the subject of some ontological research in other dialects, a semantic web ontology for the Badini dialect remains conspicuously absent. This paper addresses this gap by presenting a methodology for constructing and utilizing a semantic web ontology for the Badini dialect of the Kurdish language. A Badini annotated corpus (UOZBDN) was created and manually annotated with part-of-speech (POS) tags. Subsequently, an HMM-based POS tagger model was developed using the UOZBDN corpus and applied to annotate additional text for ontology extraction. Ontology extraction was performed by employing predefined rules to identify nouns and verbs from the model-annotated corpus and subsequently forming semantic predicates. Robust methodologies were adopted for ontology development, resulting in a high degree of precision. The POS tagging model attained an accuracy of 95.04% when applied to the UOZBDN corpus. Furthermore, a manual evaluation conducted by Badini Kurdish language experts yielded a 97.42% accuracy rate for the extracted ontology. Full article
(This article belongs to the Special Issue Knowledge Representation and Ontology-Based Data Management)
Show Figures

Figure 1

Figure 1
<p>System architecture for ontology extraction from Badini Kurdish text.</p>
Full article ">Figure 2
<p>A sample of manually annotated text.</p>
Full article ">Figure 3
<p>Noun suffixes.</p>
Full article ">Figure 4
<p>Suffixes for proper nouns.</p>
Full article ">Figure 5
<p>Suffixes used for transitive and intransitive verbs.</p>
Full article ">Figure 6
<p>Suffixes used for time adverbs, location adverbs, description adverbs, and degree adverbs.</p>
Full article ">Figure 7
<p>Suffixes for descriptive adjectives and indefinite adjectives.</p>
Full article ">
24 pages, 4447 KiB  
Article
LPG Semantic Ontologies: A Tool for Interoperable Schema Creation and Management
by Eleonora Bernasconi, Miguel Ceriani and Stefano Ferilli
Information 2024, 15(9), 565; https://doi.org/10.3390/info15090565 - 13 Sep 2024
Viewed by 550
Abstract
Ontologies are essential for the management and integration of heterogeneous datasets. This paper presents OntoBuilder, an advanced tool that leverages the structural capabilities of semantic labeled property graphs (SLPGs) in strict alignment with semantic web standards to create a sophisticated framework for data [...] Read more.
Ontologies are essential for the management and integration of heterogeneous datasets. This paper presents OntoBuilder, an advanced tool that leverages the structural capabilities of semantic labeled property graphs (SLPGs) in strict alignment with semantic web standards to create a sophisticated framework for data management. We detail OntoBuilder’s architecture, core functionalities, and application scenarios, demonstrating its proficiency and adaptability in addressing complex ontological challenges. Our empirical assessment highlights OntoBuilder’s strengths in enabling seamless visualization, automated ontology generation, and robust semantic integration, thereby significantly enhancing user workflows and data management capabilities. The performance of the linked data tools across multiple metrics further underscores the effectiveness of OntoBuilder. Full article
(This article belongs to the Special Issue Knowledge Graph Technology and its Applications II)
Show Figures

Figure 1

Figure 1
<p>OntoBuilder architecture.</p>
Full article ">Figure 2
<p>Activity diagram of ontology creation.</p>
Full article ">Figure 3
<p>System interface to build SLPG ontology.</p>
Full article ">Figure 4
<p>LPG to RDF mapping.</p>
Full article ">Figure 5
<p>Neo4j explore graph (LPG).</p>
Full article ">Figure 6
<p>SKATEBOARD Interface (SPARQL endpoint).</p>
Full article ">Figure 7
<p>Class and property creation in OntoBuilder through CSV import model.</p>
Full article ">Figure 8
<p>Neo4j Class explorer.</p>
Full article ">Figure 9
<p>Extract classes and related properties from unstructured text.</p>
Full article ">Figure 10
<p>Persons exploration in SKATEBOARD interface.</p>
Full article ">Figure 11
<p>OntoBuilder performance metrics.</p>
Full article ">
25 pages, 2396 KiB  
Article
Internet of Conscious Things: Ontology-Based Social Capabilities for Smart Objects
by Michele Ruta, Floriano Scioscia, Giuseppe Loseto, Agnese Pinto, Corrado Fasciano, Giovanna Capurso and Eugenio Di Sciascio
Future Internet 2024, 16(9), 327; https://doi.org/10.3390/fi16090327 - 8 Sep 2024
Viewed by 748
Abstract
Emerging distributed intelligence paradigms for the Internet of Things (IoT) call for flexible and dynamic reconfiguration of elementary services, resources and devices. In order to achieve such capability, this paper faces complex interoperability and autonomous decision problems by proposing a thorough framework based [...] Read more.
Emerging distributed intelligence paradigms for the Internet of Things (IoT) call for flexible and dynamic reconfiguration of elementary services, resources and devices. In order to achieve such capability, this paper faces complex interoperability and autonomous decision problems by proposing a thorough framework based on the integration of the Semantic Web of Things (SWoT) and Social Internet of Things (SIoT) paradigms. SWoT enables low-power knowledge representation and autonomous reasoning at the edge of the network through carefully optimized inference services and engines. This layer provides service/resource management and discovery primitives for a decentralized collaborative social protocol in the IoT, based on the Linked Data Notifications(LDN) over Linked Data Platform on Constrained Application Protocol (LDP-CoAP). The creation and evolution of friend and follower relationships between pairs of devices is regulated by means of novel dynamic models assessing trust as a usefulness reputation score. The close SWoT-SIoT integration overcomes the functional limitations of existing proposals, which focus on either social device or semantic resource management only. A smart mobility case study on Plug-in Electric Vehicles (PEVs) illustrates the benefits of the proposal in pervasive collaborative scenarios, while experiments show the computational sustainability of the dynamic relationship management approach. Full article
(This article belongs to the Special Issue Social Internet of Things (SIoT))
Show Figures

Figure 1

Figure 1
<p>Semantic Web of Things architecture for SIoT.</p>
Full article ">Figure 2
<p>Social IoT framework and interaction model.</p>
Full article ">Figure 3
<p>Reference ontology-based data modeling.</p>
Full article ">Figure 4
<p>Distributed service/resource discovery.</p>
Full article ">Figure 5
<p>Sample network with loosely connected nodes.</p>
Full article ">Figure 6
<p>Social smart mobility scenario.</p>
Full article ">Figure 7
<p>Electric taxi profile semantic description.</p>
Full article ">Figure 8
<p>Semantic annotations of taxi request and friends’ services.</p>
Full article ">Figure 9
<p>Semantic description of selected service.</p>
Full article ">Figure 10
<p>Test results for small-size networks. Legend denotes values of parameters for each configuration (&lt;generation algorithm&gt;_&lt;number of nodes&gt;_&lt;request rate&gt;).</p>
Full article ">Figure 11
<p>Test results for medium-size networks. Legend denotes values of parameters for each configuration (&lt;generation algorithm&gt;_&lt;number of nodes&gt;_&lt;request rate&gt;).</p>
Full article ">Figure 12
<p>Test results for large-size networks. Legend denotes values of parameters for each configuration (&lt;generation algorithm&gt;_&lt;number of nodes&gt;_&lt;request rate&gt;).</p>
Full article ">Figure 13
<p>Comparison of dynamic (this paper) vs. static [<a href="#B9-futureinternet-16-00327" class="html-bibr">9</a>] relationship management.</p>
Full article ">
25 pages, 683 KiB  
Article
DynER: Optimized Test Case Generation for Representational State Transfer (REST)ful Application Programming Interface (API) Fuzzers Guided by Dynamic Error Responses
by Juxing Chen, Yuanchao Chen, Zulie Pan, Yu Chen, Yuwei Li, Yang Li, Min Zhang and Yi Shen
Electronics 2024, 13(17), 3476; https://doi.org/10.3390/electronics13173476 - 1 Sep 2024
Viewed by 957
Abstract
Modern web services widely provide RESTful APIs for clients to access their functionality programmatically. Fuzzing is an emerging technique for ensuring the reliability of RESTful APIs. However, the existing RESTful API fuzzers repeatedly generate invalid requests due to unawareness of errors in the [...] Read more.
Modern web services widely provide RESTful APIs for clients to access their functionality programmatically. Fuzzing is an emerging technique for ensuring the reliability of RESTful APIs. However, the existing RESTful API fuzzers repeatedly generate invalid requests due to unawareness of errors in the invalid tested requests and lack of effective strategy to generate legal value for the incorrect parameters. Such limitations severely hinder the fuzzing performance. In this paper, we propose DynER, a new test case generation method guided by dynamic error responses during fuzzing. DynER designs two strategies of parameter value generation for purposefully revising the incorrect parameters of invalid tested requests to generate new test requests. The strategies are, respectively, based on prompting Large Language Model (LLM) to understand the semantics information in error responses and actively accessing API-related resources. We apply DynER to the state-of-the-art fuzzer RESTler and implement DynER-RESTler. DynER-RESTler outperforms foREST on two real-world RESTful services, WordPress and GitLab with a 41.21% and 26.33% higher average pass rate for test requests and a 12.50% and 22.80% higher average number of unique request types successfully tested, respectively. The experimental results demonstrate that DynER significantly improves the effectiveness of test cases and fuzzing performance. Additionally, DynER-RESTler finds three new bugs. Full article
Show Figures

Figure 1

Figure 1
<p>Motivation example of revising an invalid tested request to generate new test requests. (<b>a</b>) An invalid tested request and its error response. (<b>b</b>) A new test request generated by revising incorrect parameters according to the semantic information in the error response and the new error response. (<b>c</b>) Constructing a GET request to access the API-related resource information containing the legitimate values for incorrect parameters from SUTs. (<b>d</b>) A new test request generated by revising incorrect parameters according to the API-related resource information and the new success response.</p>
Full article ">Figure 2
<p>Framework of DynER-RESTler: the RESTful API fuzzer optimized with DynER.</p>
Full article ">Figure 3
<p>Framework of DynER.</p>
Full article ">Figure 4
<p>Prompt template for revising incorrect content of an invalid request.</p>
Full article ">Figure 5
<p>Prompt template for finding out the incorrect parameters of an invalid request.</p>
Full article ">Figure 6
<p>The code coverage over time when fuzzing WordPress with DynER-RESTler and foREST, respectively.</p>
Full article ">Figure 7
<p>The code coverage over the number of sent test requests when fuzzing WordPress with DynER-RESTler and foREST, respectively.</p>
Full article ">Figure 8
<p>The code coverage for RESTler, RESTler+Semantics, RESTler+Resource and DynER-RESTler, respectively, over the number of tested requests during fuzzing.</p>
Full article ">Figure 9
<p>The code coverage of RESTler, RESTler+Semantics, RESTler+Resource and DynER-RESTler, respectively, over time during fuzzing.</p>
Full article ">Figure 10
<p>A new interesting bug detected in WordPress <span class="html-italic">Media</span> API. The test request triggering the bug should be in the message format of “multipart/form-data”.</p>
Full article ">Figure 11
<p>Two new interesting bugs detected in GitLab <span class="html-italic">Issues</span> API and <span class="html-italic">Projects API</span>. The test request triggering the first bug should contain the two parameters “project_iid” and “issue_iid”, whose value must be the corresponding <span class="html-italic">existing resource IDs</span>. The second bug is caused by the “use_custom_template” parameter. The test request triggering this bug must assign a valid value for other parameters with format constraints.</p>
Full article ">
19 pages, 11217 KiB  
Article
Neglected Tropical Diseases: A Chemoinformatics Approach for the Use of Biodiversity in Anti-Trypanosomatid Drug Discovery
by Marilia Valli, Thiago H. Döring, Edgard Marx, Leonardo L. G. Ferreira, José L. Medina-Franco and Adriano D. Andricopulo
Biomolecules 2024, 14(8), 1033; https://doi.org/10.3390/biom14081033 - 20 Aug 2024
Cited by 1 | Viewed by 1595
Abstract
The development of new treatments for neglected tropical diseases (NTDs) remains a major challenge in the 21st century. In most cases, the available drugs are obsolete and have limitations in terms of efficacy and safety. The situation becomes even more complex when considering [...] Read more.
The development of new treatments for neglected tropical diseases (NTDs) remains a major challenge in the 21st century. In most cases, the available drugs are obsolete and have limitations in terms of efficacy and safety. The situation becomes even more complex when considering the low number of new chemical entities (NCEs) currently in use in advanced clinical trials for most of these diseases. Natural products (NPs) are valuable sources of hits and lead compounds with privileged scaffolds for the discovery of new bioactive molecules. Considering the relevance of biodiversity for drug discovery, a chemoinformatics analysis was conducted on a compound dataset of NPs with anti-trypanosomatid activity reported in 497 research articles from 2019 to 2024. Structures corresponding to different metabolic classes were identified, including terpenoids, benzoic acids, benzenoids, steroids, alkaloids, phenylpropanoids, peptides, flavonoids, polyketides, lignans, cytochalasins, and naphthoquinones. This unique collection of NPs occupies regions of the chemical space with drug-like properties that are relevant to anti-trypanosomatid drug discovery. The gathered information greatly enhanced our understanding of biologically relevant chemical classes, structural features, and physicochemical properties. These results can be useful in guiding future medicinal chemistry efforts for the development of NP-inspired NCEs to treat NTDs caused by trypanosomatid parasites. Full article
Show Figures

Figure 1

Figure 1
<p>Drugs used for NTDs: (<b>A</b>) drugs for trypanosomatid diseases, (<b>B</b>) drugs for other NTDs.</p>
Full article ">Figure 2
<p>Current clinical pipeline for Chagas disease, leishmaniasis, and HAT: (<b>A</b>) advanced clinical trials, (<b>B</b>) early stages of clinical development. DNDi-2319 uppercase: phosphothionate bases; lowercase: phosphodiester bases. VL: visceral leishmaniasis; PKDL: post-kala-azar dermal leishmaniasis; CL: cutaneous leishmaniasis; LAmB: liposomal amphotericin B.</p>
Full article ">Figure 3
<p>Strategy used to build the dataset used in this study.</p>
Full article ">Figure 4
<p>Profile of the dataset with 678 compounds regarding ring count, structural alerts, and calculated synthetic accessibility: (<b>A</b>) ring count considering any ring size, (<b>B</b>) number of rings in each structure of the dataset, (<b>C</b>) Brenk structural alerts, (<b>D</b>) synthetic accessibility scores using the SwissADME webserver (University of Lausanne and the SIB Swiss Institute of Bioinformatics, Lausanne, Switzerland).</p>
Full article ">Figure 5
<p>Investigation of molecular properties and structural complexity of the dataset compounds: (<b>A</b>) violations of Lipinski’s rule of five, (<b>B</b>) number of stereogenic centers.</p>
Full article ">Figure 6
<p>Chemical diversity analysis of the dataset: (<b>A</b>) structural similarity chart (centroid clustered) indicating the most important regions of similarity (from dark blue to dark red, respectively, 0% to 100% similarity), (<b>B</b>) 3D PCA showing the chemical diversity of the NPs with their corresponding source in distinct colors. The first three components capture 94.8% of the total variance.</p>
Full article ">Figure 7
<p>Scatter plots of associations between lipophilicity (clogP) and molecular weight (MW) and biological activity (IC<sub>50</sub>): (<b>A</b>) clogP versus MW for the entire dataset and (<b>B</b>) clogP versus IC<sub>50</sub> values for a subset of 243 compounds with anti-<span class="html-italic">T. cruzi</span> activity.</p>
Full article ">Figure 8
<p>Box plot of the distribution of MW versus water solubility scores (insoluble &lt; −10 &lt; poorly &lt; −6 &lt; moderately &lt; −4 &lt; soluble &lt; −2 &lt; very &lt; 0 &lt; highly). Red lines indicate the mean, black lines indicate the median, and dots indicate the outliers. Dashed lines indicate the upper and lower quartiles.</p>
Full article ">Figure 9
<p>2D PCA performed using rotatable bonds (nRotB), hydrogen-bond acceptors (HBA), hydrogen-bond donors (HBD), and molecular weight (MW). Solid dot colors represent nRotB and smooth colors represent the fraction of sp<sup>3</sup> hybridized carbon atoms related to the total carbon count (Csp<sup>3</sup>). # = number.</p>
Full article ">Figure 10
<p>(<b>A</b>) Structures of leucinostatin A (<b>89</b>), leucinostatin B (<b>90</b>), and leucinostatin F (<b>91</b>), (<b>B</b>) similarity network for leucinostatin F (<b>91</b>).</p>
Full article ">Figure 11
<p>Structure of drug-like compounds <b>76</b>, <b>154</b>, <b>155</b>, <b>33,</b> and <b>355</b>.</p>
Full article ">Figure 12
<p>(<b>A</b>) Structure of CHT (<b>97</b>), ERGT (<b>98</b>), sesquiterpene (<b>126</b>), β-sitosterol (<b>234</b>) and stigmasterol (<b>235</b>), (<b>B</b>) similarity network for compound <b>97</b>.</p>
Full article ">Figure 13
<p>(<b>A</b>) Structure of compound <b>197</b>, a chalcone derivative, (<b>B</b>) similarity chart for compound <b>197</b>.</p>
Full article ">Figure 14
<p>(<b>A</b>) Structure of compound <b>567</b> (<b>B</b>) similarity chart for compound <b>567</b>.</p>
Full article ">Figure 15
<p>Structure of drug-like terpenoids <b>418</b>, <b>420,</b> and <b>596</b>.</p>
Full article ">
16 pages, 1056 KiB  
Article
Development of a Novel Open Control System Implementation Method under Industrial IoT
by Lisi Liu, Zijie Xu and Xiaobin Qu
Future Internet 2024, 16(8), 293; https://doi.org/10.3390/fi16080293 - 14 Aug 2024
Viewed by 687
Abstract
The closed architecture of modern control systems impedes them from further development in the environment of the industrial IoT. The open control system is proposed to tackle this issue. Numerous open control prototypes have been proposed, but they do not reach high openness. [...] Read more.
The closed architecture of modern control systems impedes them from further development in the environment of the industrial IoT. The open control system is proposed to tackle this issue. Numerous open control prototypes have been proposed, but they do not reach high openness. According to the definition and criteria of open control systems, this paper suggests that the independence between control tasks and the independence between control tasks and infrastructures are the keys to the open control system under the industrial IoT. Through the control domain’s formal description and control task virtualization to deal with the keys, this paper proposes a new method to implement open control systems under the industrial IoT. Specifically, given the hybrid characteristic of the control domain, a hierarchical semantic formal based on an extended finite state machine and a dependency network model with the time property is designed to describe the control domain. Considering the infrastructure’s heterogeneity in the industrial IoT, a hybrid virtualization approach based on containers and WebAssembly is designed to virtualize control tasks. The proposed open control system implementation method is illustrated by constructing an open computer numerical control demonstration and compared to current open control prototypes. Full article
Show Figures

Figure 1

Figure 1
<p>The closed architecture of modern control systems.</p>
Full article ">Figure 2
<p>Function block of IEC 61499.</p>
Full article ">Figure 3
<p>Traditional hypervisor- and container-based virtualization.</p>
Full article ">Figure 4
<p>State diagram of machine tool’s behaviors.</p>
Full article ">Figure 5
<p>Continuous control domain described by dependency network model.</p>
Full article ">Figure 6
<p>Classdiagram of the proposed hierarchical formal model.</p>
Full article ">Figure 7
<p>WebAssembly-based virtualization.</p>
Full article ">Figure 8
<p>Hybrid control task virtualization method.</p>
Full article ">Figure 9
<p>Trajectory example.</p>
Full article ">Figure 10
<p>Graphical representation of the proposed open CNC system’s control domain.</p>
Full article ">Figure 11
<p>Activity diagram of the scheduler task.</p>
Full article ">
34 pages, 1997 KiB  
Review
A Review of Computer Vision-Based Crack Detection Methods in Civil Infrastructure: Progress and Challenges
by Qi Yuan, Yufeng Shi and Mingyue Li
Remote Sens. 2024, 16(16), 2910; https://doi.org/10.3390/rs16162910 - 9 Aug 2024
Viewed by 2781
Abstract
Cracks are a common defect in civil infrastructures, and their occurrence is often closely related to structural loading conditions, material properties, design and construction, and other factors. Therefore, detecting and analyzing cracks in civil infrastructures can effectively determine the extent of damage, which [...] Read more.
Cracks are a common defect in civil infrastructures, and their occurrence is often closely related to structural loading conditions, material properties, design and construction, and other factors. Therefore, detecting and analyzing cracks in civil infrastructures can effectively determine the extent of damage, which is crucial for safe operation. In this paper, Web of Science (WOS) and Google Scholar were used as literature search tools and “crack”, “civil infrastructure”, and “computer vision” were selected as search terms. With the keyword “computer vision”, 325 relevant documents were found in the study period from 2020 to 2024. A total of 325 documents were searched again and matched with the keywords, and 120 documents were selected for analysis and research. Based on the main research methods of the 120 documents, we classify them into three crack detection methods: fusion of traditional methods and deep learning, multimodal data fusion, and semantic image understanding. We examine the application characteristics of each method in crack detection and discuss its advantages, challenges, and future development trends. Full article
(This article belongs to the Special Issue Remote Sensing Applications for Infrastructures)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Year-wise distribution of articles.</p>
Full article ">Figure 2
<p>Keywords for crack detection.</p>
Full article ">Figure 3
<p>Performance comparison of multi-source data fusion crack detection.</p>
Full article ">Figure 4
<p>Two-stage detectors from 2014 to present.</p>
Full article ">Figure 5
<p>Single-stage detectors from 2014 to present.</p>
Full article ">
28 pages, 482 KiB  
Systematic Review
Knowledge Graphs and Semantic Web Tools in Cyber Threat Intelligence: A Systematic Literature Review
by Charalampos Bratsas, Efstathios Konstantinos Anastasiadis, Alexandros K. Angelidis, Lazaros Ioannidis, Rigas Kotsakis and Stefanos Ougiaroglou
J. Cybersecur. Priv. 2024, 4(3), 518-545; https://doi.org/10.3390/jcp4030025 - 1 Aug 2024
Viewed by 1961
Abstract
The amount of data related to cyber threats and cyber attack incidents is rapidly increasing. The extracted information can provide security analysts with useful Cyber Threat Intelligence (CTI) to enhance their decision-making. However, because the data sources are heterogeneous, there is a lack [...] Read more.
The amount of data related to cyber threats and cyber attack incidents is rapidly increasing. The extracted information can provide security analysts with useful Cyber Threat Intelligence (CTI) to enhance their decision-making. However, because the data sources are heterogeneous, there is a lack of common representation of information, rendering the analysis of CTI complicated. With this work, we aim to review ongoing research on the use of semantic web tools such as ontologies and Knowledge Graphs (KGs) within the CTI domain. Ontologies and KGs can effectively represent information in a common and structured schema, enhancing interoperability among the Security Operation Centers (SOCs) and the stakeholders on the field of cybersecurity. When fused with Machine Learning (ML) and Deep Learning (DL) algorithms, the constructed ontologies and KGs can be augmented with new information and advanced inference capabilities, facilitating the discovery of previously unknown CTI. This systematic review highlights the advancements of this field over the past and ongoing decade and provides future research directions. Full article
Show Figures

Figure 1

Figure 1
<p>Number of records in each stage of the selection process.</p>
Full article ">Figure 2
<p>Amount of produced works related to CTI-related ontologies and KGs from 2013 to 2023. The significant number of conducted studies during the ongoing decade highlights the increasing popularity of semantic web technologies within the cybersecurity domain.</p>
Full article ">
Back to TopTop