Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

Search Results (172)

Search Parameters:
Keywords = abnormal behavior monitoring

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
26 pages, 9112 KiB  
Article
On Construction of Real-Time Monitoring System for Sport Cruiser Motorcycles Using NB-IoT and Multi-Sensors
by Endah Kristiani, Tzu-Hao Yu and Chao-Tung Yang
Sensors 2024, 24(23), 7484; https://doi.org/10.3390/s24237484 - 23 Nov 2024
Viewed by 341
Abstract
This study leverages IoT technology to develop a real-time monitoring system for large motorcycles. We collaborated with professional mechanics to define the required data types and system architecture, ensuring practicality and efficiency. The system integrates the NB-IoT for efficient remote data transmission and [...] Read more.
This study leverages IoT technology to develop a real-time monitoring system for large motorcycles. We collaborated with professional mechanics to define the required data types and system architecture, ensuring practicality and efficiency. The system integrates the NB-IoT for efficient remote data transmission and uses MQTT for optimized messaging. It also includes advanced database management and intuitive data visualization for enhancing the user experience. For hardware installation, the system follows strict guidelines to avoid damaging the motorcycle’s original structure, comply with Taiwan’s legal standards, and prevent unauthorized modifications. The implementation of this real-time monitoring system is anticipated to significantly reduce safety risks associated with mechanical failures as it continuously monitors inappropriate driving behaviors and detects mechanical abnormalities in real time. The study indicates that the integration of advanced technologies, such as the NB-IoT and multi-sensor systems, can lead to improved driving safety and operational efficiency. Furthermore, the research suggests that the system’s ability to provide instant notifications and alerts through the platforms’ instant messaging can enhance user responsiveness to potential hazards, thereby contributing to a safer riding experience. Full article
(This article belongs to the Special Issue Sensing and Mobile Edge Computing)
Show Figures

Figure 1

Figure 1
<p>Layers’ functions and design.</p>
Full article ">Figure 2
<p>System architecture.</p>
Full article ">Figure 3
<p>Vehicle status flowchart.</p>
Full article ">Figure 4
<p>Sensor connection architecture.</p>
Full article ">Figure 5
<p>Infrared temperature sensor.</p>
Full article ">Figure 6
<p>OLED screen.</p>
Full article ">Figure 7
<p>Six-axis accelerometer sensor.</p>
Full article ">Figure 8
<p>GPS sensor.</p>
Full article ">Figure 9
<p>NB-IoT module.</p>
Full article ">Figure 10
<p>Temperature and humidity sensor.</p>
Full article ">Figure 11
<p>Vibration sensor.</p>
Full article ">Figure 12
<p>System installation.</p>
Full article ">Figure 13
<p>Grafana Interface.</p>
Full article ">Figure 14
<p>Speed and Voltage.</p>
Full article ">Figure 15
<p>Angle, inclination angle, acceleration, and GPS status.</p>
Full article ">Figure 16
<p>Temperature, humidity, and water tank (engine) temperature status.</p>
Full article ">Figure 17
<p>Vehicle coordinates.</p>
Full article ">Figure 18
<p>LINE notifications.</p>
Full article ">Figure 19
<p>The route map of two rounds of maintenance testing.</p>
Full article ">Figure 20
<p>Comparison of water tank temperatures in the same temperature and humidity range.</p>
Full article ">Figure 21
<p>Multivariate analysis.</p>
Full article ">
20 pages, 2074 KiB  
Article
Assessment of Slow Feature Analysis and Its Variants for Fault Diagnosis in Process Industries
by Abid Aman, Yan Chen and Liu Yiqi
Technologies 2024, 12(12), 237; https://doi.org/10.3390/technologies12120237 - 21 Nov 2024
Viewed by 511
Abstract
Accurate monitoring of complex industrial plants is crucial for ensuring safe operations and reliable management of desired quality. Early detection of abnormal events is essential to preempt serious consequences, enhance system performance, and reduce manufacturing costs. In this work, we propose a novel [...] Read more.
Accurate monitoring of complex industrial plants is crucial for ensuring safe operations and reliable management of desired quality. Early detection of abnormal events is essential to preempt serious consequences, enhance system performance, and reduce manufacturing costs. In this work, we propose a novel methodology for fault detection based on Slow Feature Analysis (SFA) tailored for time series models and statistical process control. Fault detection is critical in process monitoring and can ensure that systems operate efficiently and safely. This study investigates the effectiveness of various multivariate statistical methods, including Slow Feature Analysis (SFA), Kernel Slow Feature Analysis (KSFA), Dynamic Slow Feature Analysis (DSFA), and Principal Component Analysis (PCA) in detecting faults within the Tennessee Eastman (TE), Benchmark Simulation Model No. 1 (BSM 1) datasets and Beijing wastewater treatment plant (real world). Our comprehensive analysis indicates that KSFA and DSFA significantly outperform traditional methods by providing enhanced sensitivity and fault detection capabilities, particularly in complex, nonlinear, and dynamic data environments. The comparative analysis underscores the superior performance of KSFA and DSFA in capturing comprehensive process behavior, making them robust, cutting-edge choices for advanced fault detection applications. Such methodologies promise substantial improvements in industrial plant monitoring, contributing to heightened system reliability, safety, and overall operational efficiency. Full article
Show Figures

Figure 1

Figure 1
<p>Main diagram of the Tennessee Eastman Process comprises of Reactor, Condenser, Stripper, Compressor, Vapour liquid separator.</p>
Full article ">Figure 2
<p>Tennessee Eastman (TE) fault detection performance on: (<b>a</b>) Slow Feature Analysis (SFA); (<b>b</b>) Kernel Slow Feature Analysis (KSFA); (<b>c</b>) Dynamic Slow Feature Analysis (DSFA); (<b>d</b>) Principal Component Analysis (PCA).</p>
Full article ">Figure 3
<p>BSM 1 Plant layout comprises of five units.</p>
Full article ">Figure 4
<p>Benchmark Simulation Model (BSM1) fault detection performance on: (<b>a</b>) Slow Feature Analysis (SFA); (<b>b</b>) Kernel Slow Feature Analysis (KSFA); (<b>c</b>) Dynamic Slow Feature Analysis (DSFA); (<b>d</b>) Principal Component Analysis (PCA).</p>
Full article ">Figure 5
<p>Schematic diagram of Beijing Plant oxidation ditch process.</p>
Full article ">Figure 6
<p>Beijing wastewater treatment plant fault detection performance on: (<b>a</b>) Slow Feature Analysis (SFA); (<b>b</b>) Kernel Slow Feature Analysis (KSFA); (<b>c</b>) Dynamic Slow Feature Analysis (DSFA); (<b>d</b>) Principal Component Analysis (PCA).</p>
Full article ">
13 pages, 277 KiB  
Article
Effect of Grazing on the Welfare of Dairy Cows Raised Under Different Housing Conditions in Compost Barns
by Beatriz Danieli, Maksuel Gatto de Vitt, Ana Luiza Bachmann Schogor, Maria Luísa Appendino Nunes Zotti, Patrícia Ferreira Ponciano Ferraz and Aline Zampar
Animals 2024, 14(23), 3350; https://doi.org/10.3390/ani14233350 - 21 Nov 2024
Viewed by 358
Abstract
There is currently no established information for assessing the general welfare conditions and behavior of dairy cows housed in compost-bedded pack barns (CBPs) that allow access to pasture. Therefore, the objective of this study was to evaluate and classify the welfare and behavior [...] Read more.
There is currently no established information for assessing the general welfare conditions and behavior of dairy cows housed in compost-bedded pack barns (CBPs) that allow access to pasture. Therefore, the objective of this study was to evaluate and classify the welfare and behavior of dairy cows in three different housing conditions within CBPs in southern Brazil. During both the cold and hot seasons, nine farms were divided into three groups: CONV (conventional, large, full-time barns), ADAP (conventionally adapted, full-time barns), and PART (part-time barns). The European Welfare Quality® (WQ®) protocol takes into account the characteristics of the animals, animal housing, and farm management to set an overall score to assess animal welfare, which is why WQ® was used in this study. Daytime behavior was monitored over a period of four consecutive hours on two days. The 29 WQ® measures were grouped into 11 criteria, then into four principles, and finally into the general welfare category. The experimental design employed was a randomized block design in a 2 × 3 factorial scheme (two climatic seasons and three groups), with the means of the measures, principles, and criteria for each group, season, and interaction (group × season) compared using the Tukey test. The diurnal behavior of the cows was described by the average absolute frequency of each observed behavioral measure. There were no differences among the groups in any of the measures assessed by the WQ® protocol. However, there was a significant increase in both the incidence of diarrhea and the duration of lying down during the cold season. Only the principle of appropriate behavior varied among the groups, with the PART group demonstrating superior scores. Regardless of the season, the welfare of dairy cows maintained in CBPs was classified as “improved”. No abnormalities in behavior were observed among cows housed in the different groups or seasons. Cows in the PART group laid down less frequently during the hot season. Overall, the CBP system provided favorable welfare and behavioral conditions for cows in Brazil, and access to grazing further enhanced the welfare of animals housed in the PART group. Full article
(This article belongs to the Collection Monitoring of Cows: Management and Sustainability)
22 pages, 8045 KiB  
Article
A GIS Plugin for the Assessment of Deformations in Existing Bridge Portfolios via MTInSAR Data
by Mirko Calò, Sergio Ruggieri, Andrea Nettis and Giuseppina Uva
Remote Sens. 2024, 16(22), 4293; https://doi.org/10.3390/rs16224293 - 18 Nov 2024
Viewed by 326
Abstract
The paper presents a GIS plugin, named Bridge Assessment System via MTInSAR (BAS-MTInSAR), aimed at assessing deformations in existing simply supported concrete girder bridges through Multi-Temporal Interferometry Synthetic Aperture Radar (MTInSAR). Existing bridges require continuous maintenance to ensure functionality toward external effects undermining [...] Read more.
The paper presents a GIS plugin, named Bridge Assessment System via MTInSAR (BAS-MTInSAR), aimed at assessing deformations in existing simply supported concrete girder bridges through Multi-Temporal Interferometry Synthetic Aperture Radar (MTInSAR). Existing bridges require continuous maintenance to ensure functionality toward external effects undermining the safety of these structures, such as aging, material degradation, and environmental factors. Although effective and standardized methodologies exist (e.g., structural monitoring, periodic onsite inspections), new emerging technologies could be employed to provide time- and cost-effective information on the current state of structures and to drive prompt interventions to mitigate risk. One example is represented by MTInSAR data, which can provide near-continuous information about structural displacements over time. To easily manage these data, the paper presents BAS-MTInSAR. The tool allows users to insert information of the focused bridge (displacement time series, structural information, temperature data) and, through a user-friendly GUI, observe the occurrence of abnormal deformations. In addition, the tool implements a procedure of multisource data management and defines proper thresholds to assess bridge behavior against current code prescriptions. BAS-MTInSAR is fully described throughout the text and was tested on a real case study, showing the main potentialities of the tool in managing bridge portfolios. Full article
Show Figures

Figure 1

Figure 1
<p>Framework of BAS-MTInSAR.</p>
Full article ">Figure 2
<p>Example of simply supported deck divided in three equally distributed sub-regions: 1st sub-region (blue) near the pinned support, 2nd sub-region (cyan) at midspan, and 3rd sub-region (purple) near the roller support. The bearing typology shown in the example is unbonded elastomeric, where the greater the bearing height, the lower the translation stiffness (i.e., higher displacement).</p>
Full article ">Figure 3
<p>Example of simply supported deck together with L-T-V reference system, in black, for each sub-region. In this case, each sub-region of the bridge is rotated by <span class="html-italic">γ</span> angle with respect to the East direction, reported by the red reference system (i.e., East-North-Zenith).</p>
Full article ">Figure 4
<p>Example of (<b>a</b>) STL and (<b>b</b>) LSRM decompositions of a generic time series from Step 2.</p>
Full article ">Figure 5
<p>Example of displacement scenario and simple analytical model employed (colored dots represent sub-region centroids): (<b>a</b>) Free longitudinal displacements under constant temperature delta, Δ<span class="html-italic">T<sub>C</sub></span>. The dashed shapes show the deformed configuration of the deck under positive and negative Δ<span class="html-italic">T<sub>C</sub></span>; (<b>b</b>) Vertical displacements under linear temperature delta, Δ<span class="html-italic">T<sub>L</sub></span>. The dashed shape shows the deformed configuration of the deck under positive and negative Δ<span class="html-italic">T<sub>L</sub></span>.</p>
Full article ">Figure 6
<p>QDialog window named “Bridge Analysis” with boxes showing the most recurrent GUI elements employed in BAS-MTInSAR.</p>
Full article ">Figure 7
<p>Deck and beam information defined in the QTableWidgets of “Deck section design” and “Beam section design” QFrames for a single span. The green reference system on the right shows the convention sign for bridge displacements of Steps 2 and 3 in the case in which the bridge centerline is drawn from the left to the right, which is from the beginning of the 1st sub-region to the end of the 3rd sub-region in the figure.</p>
Full article ">Figure 8
<p>“Database” QTabWidget of “Bridge analysis” QDialog window. Listed bridges (e.g., Bridge 1 in QListWidget) and numbers in the Summary QTableWidget are fictitious and added by the authors for demonstration purposes only. The Fiumicino (Rome) bridge is the one discussed in <a href="#sec4-remotesensing-16-04293" class="html-sec">Section 4</a>.</p>
Full article ">Figure 9
<p>“Inspection report” QDialog window.</p>
Full article ">Figure 10
<p>Single-span simply supported concrete girder bridge, Fiumicino, Rome (Italy) and a scale axonometric view. The single-span bridge, characterized by 10 double-T beams of equal sections is divided into three sub-regions (i.e., 1st, 2nd, and 3rd sub-region). The 1st sub-region is characterized by roller bearings, while the 3rd one by pinned bearings. Red and blue lines on the left of the deck represent the expected direction of free longitudinal displacements under constant temperature gradient Δ<span class="html-italic">T<sub>C</sub></span><sub>.</sub></p>
Full article ">Figure 11
<p>Definition of input data through the “Data collection” QTabWidget of “Bridge analysis” QDialog window and “Temperature” QDialog window. “Deck Section design” and “Beam Section design” are defined according to <a href="#remotesensing-16-04293-f003" class="html-fig">Figure 3</a>, resulting in <a href="#remotesensing-16-04293-f010" class="html-fig">Figure 10</a>. Regarding temperature data, the chart shows monthly average temperatures in 2017, 2018, 2019, and 2020 (red cross, blue cross, green cross, and red circle, respectively) used in the cosine temperature model [<a href="#B32-remotesensing-16-04293" class="html-bibr">32</a>]. The purple line is the cosine model, the parameters of which are the average of the model itself fitted over each year of temperature acquisition.</p>
Full article ">Figure 12
<p>“PS Selection” QTabWidget of “Bridge analysis” QDialog window.</p>
Full article ">Figure 13
<p>“Displacement time series” QTabWidget of “Bridge analysis” QDialog window.</p>
Full article ">Figure 14
<p>“Seasonal-Trend components” QTabWidget of “Bridge analysis” QDialog window.</p>
Full article ">Figure 15
<p>“Deformation scenarios” QTabWidget of “Bridge analysis” QDialog window.</p>
Full article ">Figure 16
<p>Longitudinal seasonal deformation scenario. Blue, cyan, and purple lines refers to 1st, 2nd, and 3rd sub-regions, while the red patch refers to the range defined by the temperature threshold under Δ<span class="html-italic">T<sub>C</sub></span>.</p>
Full article ">Figure 17
<p>Vertical seasonal deformation scenario. Blue, cyan, and purple lines refers to 1st, 2nd, and 3rd sub-regions, while the red patch refers to the range defined by the temperature threshold under Δ<span class="html-italic">T<sub>L</sub></span>.</p>
Full article ">Figure 18
<p>Some of the evaluated bridge displacement scenarios on the Fiumicino (Rome) bridge. (<b>a</b>) Longitudinal seasonal displacement scenario, dashed lines represent the deformed shape of the bridge under Δ<span class="html-italic">T<sub>C</sub></span>. Red lines refer to a positive Δ<span class="html-italic">T<sub>C</sub></span> (negative displacement), blue ones to a negative Δ<span class="html-italic">T<sub>C</sub></span> (positive displacement); (<b>b</b>) Longitudinal trend displacement scenario, focusing on the 3rd sub-region with the dashed lines showing a uniform positive displacement toward the East (black reference system on top left); (<b>c</b>) Vertical trend displacement scenario, focusing on the 3rd sub-region with the dashed lines showing a uniform downward negative displacement. Deformed shapes of the span are not scaled and represented only for description purposes.</p>
Full article ">
19 pages, 4719 KiB  
Article
Anomaly Detection and Analysis in Nuclear Power Plants
by Abhishek Chaudhary, Junseo Han, Seongah Kim, Aram Kim and Sunoh Choi
Electronics 2024, 13(22), 4428; https://doi.org/10.3390/electronics13224428 - 12 Nov 2024
Viewed by 483
Abstract
Industries are increasingly adopting digital systems to improve control and accessibility by providing real-time monitoring and early alerts for potential issues. While digital transformation fuels exponential growth, it exposes these industries to cyberattacks. For critical sectors such as nuclear power plants, a cyberattack [...] Read more.
Industries are increasingly adopting digital systems to improve control and accessibility by providing real-time monitoring and early alerts for potential issues. While digital transformation fuels exponential growth, it exposes these industries to cyberattacks. For critical sectors such as nuclear power plants, a cyberattack not only risks damaging the facility but also endangers human lives. In today’s digital world, enormous amounts of data are generated, and the analysis of these data can help ensure effectiveness, including security. In this study, we analyzed the data using a deep learning model for early detection of abnormal behavior. We first examined the Asherah Nuclear Power Plant simulator by initiating three different cyberattacks, each targeting a different system, thereby collecting and analyzing data from the simulator. Second, a Bi-LSTM model was used to detect anomalies in the simulator, which detected it before the plant’s protection system was activated in response to a threat. Finally, we applied explainable AI (XAI) to acquire insight into how distinctive features contribute to the detection of anomalies. XAI provides valuable explanations of model behavior by revealing how specific features influence anomaly detection during attacks. This research proposes an effective anomaly detection technique and interpretability to better understand counter-cyber threats in critical industries, such as nuclear plants. Full article
Show Figures

Figure 1

Figure 1
<p>Basic Asherah NPP simulator.</p>
Full article ">Figure 2
<p>Three different RPS states: (<b>a</b>) normal, (<b>b</b>) under attack with RPS disabled, and (<b>c</b>) under attack with RPS enabled.</p>
Full article ">Figure 3
<p>Attack scenarios in different systems.</p>
Full article ">Figure 4
<p>(<b>a</b>) CC Pump speed after the attack, (<b>b</b>) RPS activation point, and (<b>c</b>) shutdown of the reactor after RPS activation.</p>
Full article ">Figure 5
<p>(<b>a</b>) FW Pump flow after attack, (<b>b</b>) RPS activation point, and (<b>c</b>) shutdown of the reactor after RPS activation.</p>
Full article ">Figure 6
<p>(<b>a</b>) Pressurizer spray valve command after the attack, (<b>b</b>) RPS activation point, and (<b>c</b>) shutdown of the reactor after RPS activation.</p>
Full article ">Figure 7
<p>Proposed approach.</p>
Full article ">Figure 8
<p>(<b>a</b>) CC Pump attack detection and (<b>b</b>) log-scale plot of (<b>a</b>).</p>
Full article ">Figure 9
<p>(<b>a</b>) FW Pump attack detection and (<b>b</b>) log-scale plot of (<b>a</b>).</p>
Full article ">Figure 10
<p>(<b>a</b>) PZ spray valve attack detection and (<b>b</b>) log-scale plot of (<b>a</b>).</p>
Full article ">Figure 11
<p>(<b>a</b>) CC Pump attack at ‘Initial Detection’, (<b>b</b>) CC Pump attack after ‘RPS Activated’, (<b>c</b>) CC_PumpSpeed at initial detection, and (<b>d</b>) RX_ReactorPower contribution after ‘RPS Activated’.</p>
Full article ">Figure 12
<p>(<b>a</b>) FW Pump attack at initial detection, (<b>b</b>) FW attack after ‘RPS Activated’, (<b>c</b>) FW_Pump1Flow feature contribution by the FW Pump at initial detection, and (<b>d</b>) RX_ReactorPower feature contribution after RPS activation.</p>
Full article ">Figure 13
<p>PZ spray valve (<b>a</b>) at initial detection and (<b>b</b>) after RPS activation; (<b>c</b>) PZ_Press feature contribution at initial detection; (<b>d</b>) RX_ReactorPower feature contribution after RPS activation.</p>
Full article ">Figure 14
<p>Anomaly detection by TranAD on (<b>a</b>) CC Pump attack, (<b>b</b>) Feed Water attack, and (<b>c</b>) pressurizer spray valve attack.</p>
Full article ">
16 pages, 2351 KiB  
Review
COVID-19 and Its Potential Impact on Children Born to Mothers Infected During Pregnancy: A Comprehensive Review
by Cristiana Stolojanu, Gabriela Doros, Melania Lavinia Bratu, Iulia Ciobanu, Krisztina Munteanu, Emil Radu Iacob, Laura Andreea Ghenciu, Emil Robert Stoicescu and Mirabela Dima
Diagnostics 2024, 14(21), 2443; https://doi.org/10.3390/diagnostics14212443 - 31 Oct 2024
Viewed by 601
Abstract
Pregnancy is a vulnerable period of time during which pregnant people are prone to infections like COVID-19, which can increase risks for both the mother and fetus. These infections may lead to complications such as preterm birth, developmental delays, and congenital abnormalities. While [...] Read more.
Pregnancy is a vulnerable period of time during which pregnant people are prone to infections like COVID-19, which can increase risks for both the mother and fetus. These infections may lead to complications such as preterm birth, developmental delays, and congenital abnormalities. While COVID-19 poses additional risks like placental dysfunction and neonatal infections, studies on long-term effects remain limited. Ongoing research and monitoring are essential to understand and mitigate potential cognitive and developmental challenges in children born to mothers infected with COVID-19. This review aims to guide clinicians in managing these risks throughout childhood. Maternal COVID-19 infection during pregnancy can have significant implications for fetal development, even if the newborn is not infected at birth. The release of inflammatory cytokines may cross the placental barrier, potentially disrupting fetal brain development and increasing the risk of long-term cognitive and behavioral issues, such as ADHD or autism. Placental dysfunction, caused by inflammation or thrombosis, can lead to intrauterine growth restriction (IUGR), preterm birth, or hypoxia, affecting both neurological and respiratory health in newborns. Furthermore, a compromised fetal immune system can increase susceptibility to autoimmune conditions and infections. The early diagnosis and management of infections during pregnancy are crucial in mitigating risks to both the mother and fetus. Swift intervention can prevent complications like preterm birth and long-term developmental challenges, ensuring better health outcomes for both the mother and child. Long-term monitoring of children born to mothers infected with COVID-19 is necessary to understand the full extent of the virus’s impact. This review evaluates the long-term systemic effects of maternal COVID-19 infection during pregnancy on fetuses, newborns, and children, focusing beyond vertical transmission. It highlights the broader impacts on fetal development, offering insights to help clinicians manage potential issues that may arise later in life. Full article
(This article belongs to the Special Issue Diagnosis and Management in Prenatal Medicine, 3rd Edition)
Show Figures

Figure 1

Figure 1
<p>Algorithm for the literature search.</p>
Full article ">Figure 2
<p>VOSviewer map and the study directions.</p>
Full article ">Figure 3
<p>The main possible repercussions of maternal COVID-19 in the newborn.</p>
Full article ">
26 pages, 9019 KiB  
Review
A Survey of Artificial Intelligence Applications in Nuclear Power Plants
by Chaima Jendoubi and Arghavan Asad
IoT 2024, 5(4), 666-691; https://doi.org/10.3390/iot5040030 - 29 Oct 2024
Viewed by 710
Abstract
Nuclear power plants (NPPs) rely on critical, complex systems that require continuous monitoring to ensure safe operation under both normal and abnormal conditions. Despite the potential of artificial intelligence (AI) to enhance predictive capabilities in these systems, limited research has been conducted on [...] Read more.
Nuclear power plants (NPPs) rely on critical, complex systems that require continuous monitoring to ensure safe operation under both normal and abnormal conditions. Despite the potential of artificial intelligence (AI) to enhance predictive capabilities in these systems, limited research has been conducted on the application of AI algorithms within NPPs. This presents a knowledge gap in the integration of AI for improving safety, reliability, and decision making in NPP. In this study, we explore the use of AI methods, including machine learning and real-time data analytics, applied to NPP components to address the nonlinearity and dynamic behavior inherent in reactor operations. Through the implementation of AI and Internet of Things (IoT) devices, we propose a system that enables early warning and real-time data transmission to regulatory authorities and decision-makers, ensuring better coordination during incidents. Lessons from past nuclear accidents, such as Chernobyl, emphasize the importance of timely information dissemination to mitigate risks. However, this integration also presents challenges, including cybersecurity risks and the need for updated regulations to address AI use in safety-critical environments. The results of this study highlight the urgent need for further research on the application of AI in NPPs, with a particular focus on addressing these challenges to ensure safe implementation. Full article
Show Figures

Figure 1

Figure 1
<p>Article structure.</p>
Full article ">Figure 2
<p>NPP data source.</p>
Full article ">Figure 3
<p>Summary of modern AI algorithms used in NPPs.</p>
Full article ">Figure 4
<p>Formation of private cloud [<a href="#B13-IoT-05-00030" class="html-bibr">13</a>].</p>
Full article ">Figure 5
<p>Modeling of IoT infrastructure in nuclear power plants.</p>
Full article ">Figure 6
<p>Concept of using AI and mobile computing in NPPs.</p>
Full article ">Figure 7
<p>Modeling of AI and mobile computing application during LOCA in NPPs.</p>
Full article ">Figure 8
<p>AI and mobile computing applications for remote real-time coordination during large nuclear accidents.</p>
Full article ">Figure 9
<p>Application of AI and mobile computing throughout the lifecyle of NPPs.</p>
Full article ">Figure 10
<p>Challenges of using AI and mobile computing in NPPs.</p>
Full article ">Figure 11
<p>Potential future areas in NPPs for integrating AI and mobile computing.</p>
Full article ">Figure 12
<p>Number of published papers in different years.</p>
Full article ">
30 pages, 8185 KiB  
Review
A Review of Abnormal Crowd Behavior Recognition Technology Based on Computer Vision
by Rongyong Zhao, Feng Hua, Bingyu Wei, Cuiling Li, Yulong Ma, Eric S. W. Wong and Fengnian Liu
Appl. Sci. 2024, 14(21), 9758; https://doi.org/10.3390/app14219758 - 25 Oct 2024
Viewed by 612
Abstract
Abnormal crowd behavior recognition is one of the research hotspots in computer vision. Its goal is to use computer vision technology and abnormal behavior detection models to accurately perceive, predict, and intervene in potential abnormal behaviors of the crowd and monitor the status [...] Read more.
Abnormal crowd behavior recognition is one of the research hotspots in computer vision. Its goal is to use computer vision technology and abnormal behavior detection models to accurately perceive, predict, and intervene in potential abnormal behaviors of the crowd and monitor the status of the crowd system in public places in real time, to effectively prevent and deal with public security risks and ensure public life safety and social order. To this end, focusing on the abnormal crowd behavior recognition technology in the computer vision system, a systematic review study of its theory and cutting-edge technology is conducted. First, the crowd level and abnormal behaviors in public places are defined, and the challenges faced by abnormal crowd behavior recognition are expounded. Then, from the dimensions based on traditional methods and based on deep learning, the mainstream technologies of abnormal behavior recognition are discussed, and the design ideas, advantages, and limitations of various methods are analyzed. Next, the mainstream software tools are introduced to provide a comprehensive reference for the technical framework. Secondly, typical abnormal behavior datasets at home and abroad are sorted out, and the characteristics of these datasets are compared in detail from multiple perspectives such as scale, characteristics, and uses, and the performance indicators of different algorithms on the datasets are compared and analyzed. Finally, the full text is summarized and the future development direction of abnormal crowd behavior recognition technology is prospected. Full article
Show Figures

Figure 1

Figure 1
<p>Paper structure diagram.</p>
Full article ">Figure 2
<p>The framework of the acceleration optical flow method. Note, blue color indicates the period from <span class="html-italic">t</span> to <span class="html-italic">t</span> + <span class="html-italic">k</span> and is used to extract the acceleration descriptors of the crowd. Yellow represents the visible layer of the restricted Boltzmann machine, and green represents the hidden layer of the restricted Boltzmann machine, which is used for behavior feature learning.</p>
Full article ">Figure 3
<p>The framework of the SFA method.</p>
Full article ">Figure 4
<p>The structure of CNN.</p>
Full article ">Figure 5
<p>The structure of TS-CNN.</p>
Full article ">Figure 6
<p>The structure of LDA-Net. Note, the red rectangles are the detected boundary of the moving objects. The yellow rectangle is the YOLO5 model, in which the blue ones are convolutional layers and are used for extracting features, the pink ones are bottleneck structure modules and are used for reducing network parameters, and the orange ones are Concat modules and are used for connecting feature maps of different layers.</p>
Full article ">Figure 7
<p>The structure of an AutoEncoder.</p>
Full article ">Figure 8
<p>Anomaly behavior recognition process based on similarity measurement.</p>
Full article ">Figure 9
<p>Abnormal behavior recognition process based on hidden feature representation learning.</p>
Full article ">Figure 10
<p>The structure of SDAE.</p>
Full article ">Figure 11
<p>The structure of GAN.</p>
Full article ">Figure 12
<p>Enhanced reconstruction process combined with autoencoders.</p>
Full article ">Figure 13
<p>The structure of LSTM.</p>
Full article ">Figure 14
<p>The structure of FCN-LSTM.</p>
Full article ">Figure 15
<p>The process of attention mechanism computation.</p>
Full article ">Figure 16
<p>The structure of SAFA.</p>
Full article ">Figure 17
<p>The structure of SABiAE. Note, SABiAE is composed of non-local encoder, non-local bidirectional long short-term memory network and decoder.</p>
Full article ">Figure 18
<p>The structure of A2D-GAN.</p>
Full article ">Figure 19
<p>Diagram of the algorithm for occlusion removal based on skeleton points.</p>
Full article ">Figure 20
<p>Examples of anomalies in the datasets. Note, the red rectangles are the detected boundary of the moving objects.</p>
Full article ">
16 pages, 8982 KiB  
Article
A Two-Stream Method for Human Action Recognition Using Facial Action Cues
by Zhimao Lai, Yan Zhang and Xiubo Liang
Sensors 2024, 24(21), 6817; https://doi.org/10.3390/s24216817 - 23 Oct 2024
Viewed by 671
Abstract
Human action recognition (HAR) is a critical area in computer vision with wide-ranging applications, including video surveillance, healthcare monitoring, and abnormal behavior detection. Current HAR methods predominantly rely on full-body data, which can limit their effectiveness in real-world scenarios where occlusion is common. [...] Read more.
Human action recognition (HAR) is a critical area in computer vision with wide-ranging applications, including video surveillance, healthcare monitoring, and abnormal behavior detection. Current HAR methods predominantly rely on full-body data, which can limit their effectiveness in real-world scenarios where occlusion is common. In such situations, the face often remains visible, providing valuable cues for action recognition. This paper introduces Face in Action (FIA), a novel two-stream method that leverages facial action cues for robust action recognition under conditions of significant occlusion. FIA consists of an RGB stream and a landmark stream. The RGB stream processes facial image sequences using a fine-spatio-multitemporal (FSM) 3D convolution module, which employs smaller spatial receptive fields to capture detailed local facial movements and larger temporal receptive fields to model broader temporal dynamics. The landmark stream processes facial landmark sequences using a normalized temporal attention (NTA) module within an NTA-GCN block, enhancing the detection of key facial frames and improving overall recognition accuracy. We validate the effectiveness of FIA using the NTU RGB+D and NTU RGB+D 120 datasets, focusing on action categories related to medical conditions. Our experiments demonstrate that FIA significantly outperforms existing methods in scenarios with extensive occlusion, highlighting its potential for practical applications in surveillance and healthcare settings. Full article
Show Figures

Figure 1

Figure 1
<p>Surveillance cameras are installed indoors and in vehicles to capture clear images of people’s faces. In these public settings, body occlusion occurs frequently.</p>
Full article ">Figure 2
<p>Samples of facial image sequences and landmark sequences in NTU RGB+D 120. (<b>a</b>) sneeze/cough, (<b>b</b>) staggering, (<b>c</b>) falling down, (<b>d</b>) headache, (<b>e</b>) nausea/vomiting, and (<b>f</b>) yawn.</p>
Full article ">Figure 3
<p>Sample frames of the human action recognition datasets collected from the Internet. The rows show the data from ActionNet, HMDB, Kinetics, something-Something V1, something-Something V2, and UCF.</p>
Full article ">Figure 4
<p>The method of the Face in Action (FIA) method.</p>
Full article ">Figure 5
<p>(<b>a</b>) 2D Inception module; (<b>b</b>) 3D Inception module; (<b>c</b>) 3D temporal separable Inception module; (<b>d</b>) Fine-spatial-multitemporal 3D convolution module.</p>
Full article ">Figure 6
<p>(<b>a</b>) The spatio-temporal excitation (STE) of our RGB stream; (<b>b</b>) The FSM module.</p>
Full article ">Figure 7
<p>(<b>a</b>) The basic block of our landmark stream; (<b>b</b>) The NTA module.</p>
Full article ">Figure 8
<p>The visualization compares the average features obtained from the temporal attention module using NTA and the without-attended method. The zeroth row shows the average features of sixteen frames without attention, while the first row displays the average features of sixteen frames after applying the NTA module.</p>
Full article ">Figure 9
<p>The class accuracy of the whole-body method and our proposed Face in Action (FIA) method on the cross-subject (CS) benchmark of the NTU dataset.</p>
Full article ">
17 pages, 1075 KiB  
Article
Adaptive Ransomware Detection Using Similarity-Preserving Hashing
by Anas AlMajali, Adham Elmosalamy, Omar Safwat and Hassan Abouelela
Appl. Sci. 2024, 14(20), 9548; https://doi.org/10.3390/app14209548 - 19 Oct 2024
Viewed by 868
Abstract
Crypto-ransomware is a type of ransomware that encrypts the victim’s files and demands a ransom to return the files. This type of attack has been on the rise in recent years, as it offers a lucrative business model for threat actors. Research into [...] Read more.
Crypto-ransomware is a type of ransomware that encrypts the victim’s files and demands a ransom to return the files. This type of attack has been on the rise in recent years, as it offers a lucrative business model for threat actors. Research into developing solutions for detecting and halting the spread of ransomware is vast, and it uses different approaches. Some approaches rely on analyzing system calls made via processes to detect malicious behavior, while other methods focus on the affected files by creating a file integrity monitor to detect rapid and abnormal changes in file hashes. In this paper, we present a novel approach that utilizes hashing and can accommodate large files and dynamically take into account the amount of change within each file. Mainly, our approach relies on dividing each file into partitions and then performing selective hashing on those partitions to rapidly detect encrypted partitions due to ransomware. Our new approach addresses the main weakness of a previous implementation that relies on hashing files, not file partitions. This new implementation strikes a balance between the detection time and false positives based on the partition size and the threshold of partition changes before issuing an alert. Full article
Show Figures

Figure 1

Figure 1
<p>Full hashing method.</p>
Full article ">Figure 2
<p>FSH method.</p>
Full article ">Figure 3
<p>SPH method.</p>
Full article ">Figure 4
<p>Performance of full-hash algorithm.</p>
Full article ">Figure 5
<p>Performance of file-selective hash.</p>
Full article ">Figure 6
<p>Performance of SPH.</p>
Full article ">Figure 7
<p>Comparing the algorithms in terms of the % of files saved.</p>
Full article ">Figure 8
<p>Comparing the algorithms in terms of detection speed since infection.</p>
Full article ">Figure 9
<p>Comparing the partition sizes in terms of the % of files saved.</p>
Full article ">Figure 10
<p>CPU and memory utilization for SPH with 10MB partition size.</p>
Full article ">
16 pages, 4537 KiB  
Article
Research on Abnormal Behavior Monitoring in University Laboratories Based on Video Analysis Technology
by Yangwei Ying, Haotian Wang and Hong Zhou
Appl. Sci. 2024, 14(20), 9374; https://doi.org/10.3390/app14209374 - 14 Oct 2024
Viewed by 545
Abstract
The safety management of laboratories is of utmost importance in the construction and management of university laboratories. Abnormal behaviors such as smoking, incorrect wearing of personal protective equipment (PPE) like lab coats, hats, masks, and gloves pose significant safety hazards. In this paper, [...] Read more.
The safety management of laboratories is of utmost importance in the construction and management of university laboratories. Abnormal behaviors such as smoking, incorrect wearing of personal protective equipment (PPE) like lab coats, hats, masks, and gloves pose significant safety hazards. In this paper, in order to improve the level of laboratory safety management and effectively provide an alert in the case of unsafe behaviors, video analysis technology is employed to achieve abnormal behavior recognition and monitoring through steps such as human key point detection, posture estimation, and behavior recognition. Firstly, the human pose estimation algorithm YOLO is used for human detection, followed by the extraction of human key points after segmentation. Finally, spatiotemporal graph convolution is used for feature detection and classification of abnormal behaviors. The experimental results show that the accuracy of abnormal behavior detection and recognition based on human key points reaches over 85%, which is of great significance for safety management and behavior warning in university laboratories, and thus, improves the efficiency and level of laboratory safety management. Full article
Show Figures

Figure 1

Figure 1
<p>Illustration of the overall architecture of the proposed methods. Behavior monitoring is ultimately viewed as a classification task through the chain of human detection, pose estimation, and action recognition.</p>
Full article ">Figure 2
<p>The detailed architecture of YOLOX.</p>
Full article ">Figure 3
<p>The detailed structure of HRNet.</p>
Full article ">Figure 4
<p>Architecture diagram of the posture estimation algorithm after the introduction of the regression method.</p>
Full article ">Figure 5
<p>Display of object detection and joint point extraction.</p>
Full article ">Figure 6
<p>The confusion matrix for PPE using our method.</p>
Full article ">Figure 7
<p>The confusion matrix for smoking using our method.</p>
Full article ">Figure 8
<p>The validation metrics’ variations by epoch during model training process.</p>
Full article ">Figure 9
<p>The PR curve of our method for PPE.</p>
Full article ">
20 pages, 6774 KiB  
Article
A Driving Warning System for Explosive Transport Vehicles Based on Object Detection Algorithm
by Jinshan Sun, Ronghuan Zheng, Xuan Liu, Weitao Jiang and Mutian Jia
Sensors 2024, 24(19), 6339; https://doi.org/10.3390/s24196339 - 30 Sep 2024
Viewed by 528
Abstract
Due to the flammable and explosive nature of explosives, there are significant potential hazards and risks during transportation. During the operation of explosive transport vehicles, there are often situations where the vehicles around them approach or change lanes abnormally, resulting in insufficient avoidance [...] Read more.
Due to the flammable and explosive nature of explosives, there are significant potential hazards and risks during transportation. During the operation of explosive transport vehicles, there are often situations where the vehicles around them approach or change lanes abnormally, resulting in insufficient avoidance and collision, leading to serious consequences such as explosions and fires. Therefore, in response to the above issues, this article has developed an explosive transport vehicle driving warning system based on object detection algorithms. Consumer-level cameras are flexibly arranged around the vehicle body to monitor surrounding vehicles. Using the YOLOv4 object detection algorithm to identify and distance surrounding vehicles, using a game theory-based cellular automaton model to simulate the actual operation of vehicles, simulating the driver’s decision-making behavior when encountering other vehicles approaching or changing lanes abnormally during actual driving. The cellular automaton model was used to simulate two scenarios of explosive transport vehicles equipped with and without warning systems. The results show that when explosive transport vehicles encounter the above-mentioned dangerous situations, the warning system can timely issue warnings, remind drivers to make decisions, avoid risks, ensure the safety of vehicle operation, and verify the effectiveness of the warning system. Full article
(This article belongs to the Section Sensing and Imaging)
Show Figures

Figure 1

Figure 1
<p>Framework diagram of research ideas.</p>
Full article ">Figure 2
<p>Schematic diagram of monocular camera ranging principle.</p>
Full article ">Figure 3
<p>Dimensions of freight cars.</p>
Full article ">Figure 4
<p>Camera layout.</p>
Full article ">Figure 5
<p>Camera appearance.</p>
Full article ">Figure 6
<p>YOLOv4 network structure [<a href="#B19-sensors-24-06339" class="html-bibr">19</a>].</p>
Full article ">Figure 7
<p>Example of vehicle data images.</p>
Full article ">Figure 8
<p>Training images and box labels.</p>
Full article ">Figure 9
<p>Enhanced training dataset.</p>
Full article ">Figure 10
<p>The results of training.</p>
Full article ">Figure 11
<p>PR curve.</p>
Full article ">Figure 12
<p>Loss function curve.</p>
Full article ">Figure 13
<p>Capturing vehicle image information (safe vehicle distance).</p>
Full article ">Figure 14
<p>Capture vehicle image information (when the current rear distance is less than 60 m or the left and right distance is less than 1.5 m).</p>
Full article ">Figure 15
<p>Lane-changing rules.</p>
Full article ">Figure 16
<p>Flow chart of simulation steps for cellular automata.</p>
Full article ">Figure 17
<p>Traffic flow statistics.</p>
Full article ">Figure 18
<p>Statistical chart of average vehicle speed.</p>
Full article ">Figure 19
<p>Statistical chart of average vehicle density.</p>
Full article ">Figure 20
<p>Simulation process of cellular automata (time step 291).</p>
Full article ">Figure 21
<p>Program warning interface.</p>
Full article ">Figure 22
<p>Collision statistics without warning system.</p>
Full article ">Figure 23
<p>Collision statistics equipped with warning system.</p>
Full article ">
22 pages, 9693 KiB  
Article
A Trusted Supervision Paradigm for Autonomous Driving Based on Multimodal Data Authentication
by Tianyi Shi, Ruixiao Wu, Chuantian Zhou, Siyang Zheng, Zhu Meng, Zhe Cui, Jin Huang, Changrui Ren and Zhicheng Zhao
Big Data Cogn. Comput. 2024, 8(9), 100; https://doi.org/10.3390/bdcc8090100 - 2 Sep 2024
Viewed by 886
Abstract
At the current stage of autonomous driving, monitoring the behavior of safety stewards (drivers) is crucial to establishing liability in the event of an accident. However, there is currently no method for the quantitative assessment of safety steward behavior that is trusted by [...] Read more.
At the current stage of autonomous driving, monitoring the behavior of safety stewards (drivers) is crucial to establishing liability in the event of an accident. However, there is currently no method for the quantitative assessment of safety steward behavior that is trusted by multiple stakeholders. In recent years, deep-learning-based methods can automatically detect abnormal behaviors with surveillance video, and blockchain as a decentralized and tamper-resistant distributed ledger technology is very suitable as a tool for providing evidence when determining liability. In this paper, a trusted supervision paradigm for autonomous driving (TSPAD) based on multimodal data authentication is proposed. Specifically, this paradigm consists of a deep learning model for driving abnormal behavior detection based on key frames adaptive selection and a blockchain system for multimodal data on-chaining and certificate storage. First, the deep-learning-based detection model enables the quantification of abnormal driving behavior and the selection of key frames. Second, the key frame selection and image compression coding balance the trade-off between the amount of information and efficiency in multiparty data sharing. Third, the blockchain-based data encryption sharing strategy ensures supervision and mutual trust among the regulatory authority, the logistic platform, and the enterprise in the driving process. Full article
(This article belongs to the Special Issue Big Data Analytics and Edge Computing: Recent Trends and Future)
Show Figures

Figure 1

Figure 1
<p>Framework of TSPAD based on multimodal data authentication, which illustrates an anomaly detection module integrated with a dual-chain architecture. TSPAD employs a compact anomaly detection model to capture key frames and, through feature extraction and a dynamic selection mechanism, identifies and records potentially abnormal driving behaviors in real time, such as fatigue driving and reckless driving. Upon detecting such behaviors, the system triggers an alert and processes the data using video compression techniques to accommodate real-time uploads to the notary chain. The entire dual-chain architecture comprises a private key chain and a notary chain. The private key chain is responsible for implementing identity authentication and management, ensuring data privacy and security, while the notary chain records real-time driving data to guarantee data integrity and reliability. Blockchain participants such as enterprises, logistics platforms, and regulatory agencies can access vehicle operation information on the notary chain through subscriber channels. This capability enables real-time monitoring and management of the transportation process, thereby enhancing system transparency and security.</p>
Full article ">Figure 2
<p>The logical structure of the “Methods” section in this paper.</p>
Full article ">Figure 3
<p>Trusted evidence dual-chain blockchain architecture which illustrates the core components of the dual-chain blockchain architecture, including foundational components, functional modules, and core modules. The foundational components at the bottom layer (password vault, message bus, storage resources, and certificate repository) provide supportive services for the core modules in the middle section. The private key chain is responsible for user identity authentication, transaction registration, and private key management, providing foundational support for system security and privacy protection. The notary chain handles trust proof, message subscription, blockchain management, and consensus synchronization, ensuring data authenticity and network synchronization. The top-level functional modules enable the extension of system functions and service integration through key distribution, information authentication, and message management. The overall architecture ensures the credibility of information and the traceability of operations through the combination of the notary chain and the private key chain.</p>
Full article ">Figure 4
<p>Evidence service model for evidence upload and retrieval.</p>
Full article ">Figure 5
<p>Framework of abnormal driving behavior detection. The dotted box represents 3 different key frame selection strategies that can be selected in practical applications. The adaptive cluster strategy has the best performance. The colored cuboids represent the feature tensors of video frames, and the gray cubes are indexes of key frames. The colorless modules with solid lines are functional modules of the network, and those with snowflake icons indicate that no training is required. The original images are samples of the public dataset Drive&amp;Act [<a href="#B37-BDCC-08-00100" class="html-bibr">37</a>].</p>
Full article ">Figure 6
<p>Hybrid Coding Architecture. The Hybrid Coding Architecture involves several key components and processes. The Encoded Control determines the strategy for encoding and quantization. Its parameters are output in the form of a Control Vector. The DCT converts the input video signal from the temporal domain into continuous frequency domain signals. Quantization (Q) maps the frequency domain signals into a stepped finite field. Its parameters are output as a Q Vector. Intra Prediction removes spatial redundancy within a single frame. The parameters set for Intra Prediction can be formulated as an Intra Vector. Motion Estimation and Motion Compensation, which eliminate temporal redundancy between adjacent frames, output their parameters as Motion Vector. The Loop Filter reduces block artifacts after quantization. The Decoded Picture Buffer (DPB) stores the decoded image frames for use in interframe prediction. The Entropy Encoder performs lossless encoding of the aforementioned parameters, combined with essential reference frames, to produce the compressed bitstream. The original images are samples of the public dataset Drive&amp;Act [<a href="#B37-BDCC-08-00100" class="html-bibr">37</a>].</p>
Full article ">Figure 7
<p>Comparison between dirty labels and clean labels. In the illustration, panels (<b>a</b>,<b>c</b>) represent the frames of video cases with dirty labels, while (<b>b</b>,<b>d</b>) are frames of video cases with clean labels. The original images are samples of the public dataset Drive&amp;Act [<a href="#B37-BDCC-08-00100" class="html-bibr">37</a>].</p>
Full article ">Figure 8
<p>Histogram of original labels and relabeled labels of Drive&amp;Act [<a href="#B37-BDCC-08-00100" class="html-bibr">37</a>] dataset. Panel (<b>a</b>) represents the histogram of original labels which consists of 12 categories, and panel (<b>b</b>) shows the relabeled labels histogram, which consists of 7 categories.</p>
Full article ">Figure 9
<p>Visual comparison of various video compression algorithms. The original image is a sample from the public dataset Drive&amp;Act [<a href="#B37-BDCC-08-00100" class="html-bibr">37</a>].</p>
Full article ">Figure 10
<p>Comparison of storage (<b>left</b>) and querying (<b>right</b>) efficiency at different data scales.</p>
Full article ">
12 pages, 29803 KiB  
Article
NABNet: Deep Learning-Based IoT Alert System for Detection of Abnormal Neck Behavior
by Hongshuai Qin, Minya Cai and Huibin Qin
Sensors 2024, 24(16), 5379; https://doi.org/10.3390/s24165379 - 20 Aug 2024
Viewed by 714
Abstract
The excessive use of electronic devices for prolonged periods has led to problems such as neck pain and pressure injury in sedentary people. If not detected and corrected early, these issues can cause serious risks to physical health. Detectors for generic objects cannot [...] Read more.
The excessive use of electronic devices for prolonged periods has led to problems such as neck pain and pressure injury in sedentary people. If not detected and corrected early, these issues can cause serious risks to physical health. Detectors for generic objects cannot adequately capture such subtle neck behaviors, resulting in missed detections. In this paper, we explore a deep learning-based solution for detecting abnormal behavior of the neck and propose a model called NABNet that combines object detection based on YOLOv5s with pose estimation based on Lightweight OpenPose. NABNet extracts the detailed behavior characteristics of the neck from global to local and detects abnormal behavior by analyzing the angle of the data. We deployed NABNet on the cloud and edge devices to achieve remote monitoring and abnormal behavior alarms. Finally, we applied the resulting NABNet-based IoT system for abnormal behavior detection in order to evaluate its effectiveness. The experimental results show that our system can effectively detect abnormal neck behavior and raise alarms on the cloud platform, with the highest accuracy reaching 94.13%. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

Figure 1
<p>Schematic of the proposed NABNet-based IoT system for abnormal behavior detection.</p>
Full article ">Figure 2
<p>CA mechanism structure.</p>
Full article ">Figure 3
<p>Flowchart of object tracking.</p>
Full article ">Figure 4
<p>(<b>a</b>) The neck state when the object side is towards the camera and (<b>b</b>) the actual neck state.</p>
Full article ">Figure 5
<p>Angle correction via affine transformation. <math display="inline"><semantics> <mover accent="true"> <mi>a</mi> <mo>→</mo> </mover> </semantics></math> denotes the vector between the neck and the head, and <math display="inline"><semantics> <mover accent="true"> <mi>b</mi> <mo>→</mo> </mover> </semantics></math> represents the vector between the neck and the shoulder.</p>
Full article ">Figure 6
<p>NABNet-based IoT alert system structure.</p>
Full article ">Figure 7
<p>Experimental setup.</p>
Full article ">Figure 8
<p>Representative images of positive and negative poses.</p>
Full article ">Figure 9
<p>Illustration of abnormal neck behavior detection displayed on the server screens and cloud.</p>
Full article ">
21 pages, 16422 KiB  
Article
Detection of Feeding Behavior in Lactating Sows Based on Improved You Only Look Once v5s and Image Segmentation
by Luo Liu, Shanpeng Xu, Jinxin Chen, Haotian Wang, Xiang Zheng, Mingxia Shen and Longshen Liu
Agriculture 2024, 14(8), 1402; https://doi.org/10.3390/agriculture14081402 - 19 Aug 2024
Viewed by 834
Abstract
The production management of lactating sows is a crucial aspect of pig farm operations, as their health directly impacts the farm’s production efficiency. The feeding behavior of lactating sows can reflect their health and welfare status, and monitoring this behavior is essential for [...] Read more.
The production management of lactating sows is a crucial aspect of pig farm operations, as their health directly impacts the farm’s production efficiency. The feeding behavior of lactating sows can reflect their health and welfare status, and monitoring this behavior is essential for precise feeding and management. To address the issues of time-consuming and labor-intensive manual inspection of lactating sows’ feeding behavior and the reliance on breeders’ experience, we propose a method based on the improved YOLO (You Only Look Once) v5s algorithm and image segmentation for detecting the feeding behavior of lactating sows. Based on the YOLOv5s algorithm, the SE (Squeeze-and-Excitation) attention module was added to enhance the algorithm’s performance and reduce the probability of incorrect detection. Additionally, the loss function was replaced by WIoU (Weighted Intersection over Union) to accelerate the model’s convergence speed and improve detection accuracy. The improved YOLOv5s-C3SE-WIoU model is designed to recognize pre-feeding postures and feed trough conditions by detecting images of lactating sows. Compared to the original YOLOv5s, the improved model achieves an 8.9% increase in [email protected] and a 4.7% increase in [email protected] to 0.95. This improvement satisfies the requirements for excellent detection performance, making it suitable for deployment in large-scale pig farms. From the model detection results, the trough remnant image within the detection rectangle was extracted. This image was further processed using image processing techniques to achieve trough remnant image segmentation and infer the remnant amount. Based on the detection model and residue inference method, video data of lactating sows’ feeding behavior were processed to derive the relationship between feeding behavior, standing time, and residue amount. Using a standing duration of 2 s and a leftover-feed proportion threshold of 2% achieves the highest accuracy, enabling the identification of abnormal feeding behavior. We analyzed the pre-feeding postures and residual feed amounts of abnormal and normal groups of lactating sows. Our findings indicated that standing time was significantly lower and residual feed amount was higher in the abnormal groups compared to the normal groups. By combining standing time and residual feed amount information, accurate detection of the feeding status of lactating sows can be realized. This approach facilitates the accurate detection of abnormal feeding behaviors of lactating sows in large-scale pig farm environments. Full article
(This article belongs to the Section Farm Animal Production)
Show Figures

Figure 1

Figure 1
<p>Schematic diagram of data collection equipment.</p>
Full article ">Figure 2
<p>YOLO v5s network structure diagram.</p>
Full article ">Figure 3
<p>Original SE module and improved C3SE module architecture.</p>
Full article ">Figure 4
<p>Roadmap for quantitative research on residual feed in the trough.</p>
Full article ">Figure 5
<p>Train box-loss comparison of different loss functions.</p>
Full article ">Figure 6
<p>Comparison of YOLO v5s and YOLO v5s-C3SE-WIoU train curve.</p>
Full article ">Figure 7
<p>Complex environment detection effect comparison.</p>
Full article ">Figure 8
<p>Feeding-behavior test results of lactating sows.</p>
Full article ">Figure 9
<p>Feed-trough test results.</p>
Full article ">Figure 10
<p>Statistical-result chart of standing time.</p>
Full article ">Figure 11
<p>Statistical-result chart of remaining material ratio.</p>
Full article ">
Back to TopTop