Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,094)

Search Parameters:
Keywords = modular approach

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
24 pages, 3527 KiB  
Article
On the Numerical Investigation of Two-Phase Evaporative Spray Cooling Technology for Data Centre Applications
by Ning Gao, Syed Mughees Ali and Tim Persoons
Fluids 2024, 9(12), 284; https://doi.org/10.3390/fluids9120284 (registering DOI) - 29 Nov 2024
Viewed by 279
Abstract
Two-phase evaporative spray cooling technology can significantly reduce power consumption in data centre cooling applications. However, the literature lacks an established methodology for assessing the overall performance of such evaporation systems in terms of the water-energy nexus. The current study develops a Lagrangian–Eulerian [...] Read more.
Two-phase evaporative spray cooling technology can significantly reduce power consumption in data centre cooling applications. However, the literature lacks an established methodology for assessing the overall performance of such evaporation systems in terms of the water-energy nexus. The current study develops a Lagrangian–Eulerian computational fluid dynamics (CFD) modelling approach to examine the functionality of these two-phase evaporative spray cooling systems. To replicate a modular system, a hollow spray cone nozzle with Rosin–Rammler droplet size distribution is simulated in a turbulent convective natural-air environment. The model was validated against the available experimental data from the literature. Parametric studies on geometric, flow, and climatic conditions, namely, domain length, droplet size, water mass flow rate, temperature, and humidity, were performed. The findings indicate that at elevated temperatures and low humidity, evaporation results in a bulk temperature reduction of up to 12 °C. A specific focus on the climatic conditions of Dublin, Ireland, was used as an example to optimize the evaporative system. A new formulation for the coefficient of performance (COP) is established to assess the performance of the system. Results showed that doubling the injector water mass flow rate improved the evaporated mass flow rate by 188% but reduced the evaporation percentage by 28%, thus reducing the COP. Doubling the domain length improved the temperature drop by 175% and increased the relative humidity by 160%, thus improving the COP. The COP of the evaporation system showed a systematic improvement with a reduction in the droplet size and the mass flow rate for a fixed domain length. The evaporated system COP improves by two orders of magnitude (~90 to 9500) with the reduction in spray Sauter mean diameter (SMD) from 292 m to 8–15 m. Under this reduction, close to 100% evaporation rate was achieved in comparison to only a 1% evaporation rate for the largest SMD. It was concluded that the utilization of a fine droplet spray nozzle provides an effective solution for the reduction in water consumption (97% in our case) for data centres, whilst concomitantly augmenting the proportion of evaporation. Full article
(This article belongs to the Special Issue Evaporation, Condensation and Heat Transfer)
26 pages, 6967 KiB  
Article
An Efficient Systematic Methodology for Noise and Vibration Analysis of a Reconfigurable Dynamic System Using Receptance Coupling Formulation
by Behzad Hamedi and Saied Taheri
Appl. Sci. 2024, 14(23), 11166; https://doi.org/10.3390/app142311166 - 29 Nov 2024
Viewed by 305
Abstract
This study presents a generalized and systematic approach to modeling complex dynamic systems using Frequency-Based Substructuring (FBS). The aim is to develop an efficient method for system identification and subsystem decomposition, enabling the creation of reduced-order models for non-linear dynamic systems that are [...] Read more.
This study presents a generalized and systematic approach to modeling complex dynamic systems using Frequency-Based Substructuring (FBS). The aim is to develop an efficient method for system identification and subsystem decomposition, enabling the creation of reduced-order models for non-linear dynamic systems that are modular and reconfigurable. The methodology combines receptance (Frequency Response Function, FRF) properties from individual subsystems to predict the overall system’s response. This technique extends existing methods by Jetmundsen and D.D. Klerk and adapts them to subsystems with full degrees of freedom (DoFs), making it suitable for flexible and distributed structures. To demonstrate its effectiveness, the method is applied to vehicle noise and vibration analysis, where subsystems are initially treated as rigid bodies, but are later adapted to flexible characteristics. The results show that this hybrid approach accurately predicts system responses, offering significant advantages for NVH target setting when subsystem FRF matrices are sourced either from testing or numerical simulations. This methodology enhances the capability to model complex dynamic systems with improved precision and reduced computational cost. A comparison with traditional modeling techniques confirms the validity of the approach. Full article
(This article belongs to the Special Issue Nonlinear Dynamics and Vibration)
Show Figures

Figure 1

Figure 1
<p>Flowchart describing the road map for modeling of reconfigurable dynamic systems using generalized coupling method.</p>
Full article ">Figure 2
<p>Coupling of two subsystems A and B with both internal and connection DoFs and the interface forces λ.</p>
Full article ">Figure 3
<p>Coupling of three substructures for road noise prediction.</p>
Full article ">Figure 4
<p>Comparison of receptance for the assembled quarter car system obtained experimentally and through coupling of tire and suspension [<a href="#B31-applsci-14-11166" class="html-bibr">31</a>].</p>
Full article ">Figure 5
<p>Tesla Model S chassis 2; image retrieved from TurboSquid [<a href="#B32-applsci-14-11166" class="html-bibr">32</a>].</p>
Full article ">Figure 6
<p>Vibrational model of EV suspension assembly using receptance coupling and three substructures.</p>
Full article ">Figure 7
<p>Dynamic structure consists of three substructures with beam element.</p>
Full article ">Figure 8
<p>Comparison between the system receptance matrix elements.</p>
Full article ">Figure 9
<p>Comparison of the receptance component H<sub>11</sub> (<math display="inline"><semantics> <mrow> <msubsup> <mrow> <mi mathvariant="normal">H</mi> </mrow> <mrow> <msub> <mrow> <mi mathvariant="normal">y</mi> </mrow> <mrow> <mn>1</mn> </mrow> </msub> <mi mathvariant="normal">y</mi> <mn>1</mn> </mrow> <mrow> <mi mathvariant="normal">A</mi> <mi mathvariant="normal">B</mi> <mi mathvariant="normal">C</mi> </mrow> </msubsup> </mrow> </semantics></math>) using three different methods.</p>
Full article ">Figure 10
<p>Comparison of the receptance component H<sub>12</sub> (<math display="inline"><semantics> <mrow> <msubsup> <mrow> <mi mathvariant="normal">H</mi> </mrow> <mrow> <msub> <mrow> <mi mathvariant="normal">y</mi> </mrow> <mrow> <mn>1</mn> </mrow> </msub> <msub> <mrow> <mi mathvariant="normal">θ</mi> </mrow> <mrow> <mn>1</mn> </mrow> </msub> </mrow> <mrow> <mi mathvariant="normal">A</mi> <mi mathvariant="normal">B</mi> <mi mathvariant="normal">C</mi> </mrow> </msubsup> </mrow> </semantics></math>) using three different methods.</p>
Full article ">Figure 11
<p>Comparison of the receptance component H<sub>21</sub> (<math display="inline"><semantics> <mrow> <msubsup> <mrow> <mi mathvariant="normal">H</mi> </mrow> <mrow> <mtext> </mtext> <msub> <mrow> <mi mathvariant="normal">θ</mi> </mrow> <mrow> <mn>1</mn> </mrow> </msub> <msub> <mrow> <mi mathvariant="normal">y</mi> </mrow> <mrow> <mn>1</mn> </mrow> </msub> </mrow> <mrow> <mi mathvariant="normal">A</mi> <mi mathvariant="normal">B</mi> <mi mathvariant="normal">C</mi> </mrow> </msubsup> <mo>=</mo> <msubsup> <mrow> <mi mathvariant="normal">H</mi> </mrow> <mrow> <msub> <mrow> <mi mathvariant="normal">y</mi> </mrow> <mrow> <mn>1</mn> </mrow> </msub> <msub> <mrow> <mi mathvariant="normal">θ</mi> </mrow> <mrow> <mn>1</mn> </mrow> </msub> </mrow> <mrow> <mi mathvariant="normal">A</mi> <mi mathvariant="normal">B</mi> <mi mathvariant="normal">C</mi> </mrow> </msubsup> </mrow> </semantics></math>) using three different methods.</p>
Full article ">Figure 12
<p>Comparison of the receptance component H<sub>22</sub> (<math display="inline"><semantics> <mrow> <msubsup> <mrow> <mi mathvariant="normal">H</mi> </mrow> <mrow> <msub> <mrow> <mi mathvariant="normal">θ</mi> </mrow> <mrow> <mn>1</mn> </mrow> </msub> <msub> <mrow> <mi mathvariant="normal">θ</mi> </mrow> <mrow> <mn>1</mn> </mrow> </msub> </mrow> <mrow> <mi mathvariant="normal">A</mi> <mi mathvariant="normal">B</mi> <mi mathvariant="normal">C</mi> </mrow> </msubsup> </mrow> </semantics></math>) using three different methods.</p>
Full article ">Figure 13
<p>Comparison of the receptance component H<sub>13</sub> <math display="inline"><semantics> <mrow> <msubsup> <mrow> <mo>(</mo> <mi mathvariant="normal">H</mi> </mrow> <mrow> <msub> <mrow> <mi mathvariant="normal">y</mi> </mrow> <mrow> <mn>1</mn> </mrow> </msub> <msub> <mrow> <mi mathvariant="normal">y</mi> </mrow> <mrow> <mn>2</mn> </mrow> </msub> </mrow> <mrow> <mi mathvariant="normal">A</mi> <mi mathvariant="normal">B</mi> <mi mathvariant="normal">C</mi> </mrow> </msubsup> <mo stretchy="false">)</mo> </mrow> </semantics></math> using three different methods.</p>
Full article ">Figure 14
<p>Comparison of the receptance component H<sub>14</sub> <math display="inline"><semantics> <mrow> <msubsup> <mrow> <mo>(</mo> <mi mathvariant="normal">H</mi> </mrow> <mrow> <msub> <mrow> <mi mathvariant="normal">y</mi> </mrow> <mrow> <mn>1</mn> </mrow> </msub> <msub> <mrow> <mi mathvariant="normal">θ</mi> </mrow> <mrow> <mn>2</mn> </mrow> </msub> </mrow> <mrow> <mi mathvariant="normal">A</mi> <mi mathvariant="normal">B</mi> <mi mathvariant="normal">C</mi> </mrow> </msubsup> <mo stretchy="false">)</mo> </mrow> </semantics></math> using three different methods.</p>
Full article ">Figure 15
<p>Comparison of the receptance component H<sub>34</sub> <math display="inline"><semantics> <mrow> <msubsup> <mrow> <mo>(</mo> <mi mathvariant="normal">H</mi> </mrow> <mrow> <msub> <mrow> <mi mathvariant="normal">y</mi> </mrow> <mrow> <mn>2</mn> </mrow> </msub> <msub> <mrow> <mi mathvariant="normal">θ</mi> </mrow> <mrow> <mn>2</mn> </mrow> </msub> </mrow> <mrow> <mi mathvariant="normal">A</mi> <mi mathvariant="normal">B</mi> <mi mathvariant="normal">C</mi> </mrow> </msubsup> <mo stretchy="false">)</mo> </mrow> </semantics></math> using three different methods.</p>
Full article ">
31 pages, 17063 KiB  
Article
Length Optimization of MEP Pipeline Integrated Modular Based on Genetic Algorithm
by Xuefeng Zhao, Qiantai Yang, Gangwen Yan, Xiongtao Fan, Yinghui Yang, Huizhong Zhang and Song Chen
Buildings 2024, 14(12), 3826; https://doi.org/10.3390/buildings14123826 - 28 Nov 2024
Viewed by 354
Abstract
This study aims to optimize the length partitioning of modular MEP systems in building construction using a genetic algorithm, addressing challenges such as avoiding fittings (e.g., tees and crosses) and achieving standardized module lengths. To this end, this paper proposes an optimization method [...] Read more.
This study aims to optimize the length partitioning of modular MEP systems in building construction using a genetic algorithm, addressing challenges such as avoiding fittings (e.g., tees and crosses) and achieving standardized module lengths. To this end, this paper proposes an optimization method utilizing the customization of Revit 2021. The method comprehensively considers factors such as the location of pipe fittings, module length, production, transportation, and installation, achieving a more systematic partitioning of modules. The results show that the optimized partitioning scheme effectively avoids critical pipe fittings, and the optimized module lengths are comparable to those created manually. However, the optimized scheme includes more standardized segments, which is conducive to factory-standardized production. Additionally, cost analysis reveals that production and transportation costs account for a significant proportion of total costs, while lifting costs are relatively low. Furthermore, the presence of modules with non-standard lengths introduces corresponding penalty costs. This paper discusses the advantages and limitations of the proposed method and suggests future directions for further optimizing the algorithm and improving module partitioning. The novelty of this research lies in the integration of a genetic algorithm with BIM software to optimize MEP module partitioning, offering a more efficient and systematic approach to the modular construction process. Full article
(This article belongs to the Section Architectural Design, Urban Science, and Real Estate)
Show Figures

Figure 1

Figure 1
<p>Workflow for MEP Pipeline Assembly.</p>
Full article ">Figure 2
<p>Implementation Process for MEP Modular Pipelines on Standard Floors.</p>
Full article ">Figure 3
<p>Right-Angle Corridor Transportation Problem.</p>
Full article ">Figure 4
<p>Geometric Representation of the Right-Angle Corridor Transportation Problem.</p>
Full article ">Figure 5
<p>Flowchart of the Improved Genetic Algorithm for Optimizing MEP Integrated Module Lengths.</p>
Full article ">Figure 6
<p>Actual Partitioning Diagram of the MEP Modular System.</p>
Full article ">Figure 7
<p>Sectional View of the MEP Modular System.</p>
Full article ">Figure 8
<p>BIM 3D View (<b>left</b>) and Real-World Application (<b>right</b>) of the MEP Modular System.</p>
Full article ">Figure 9
<p>Genetic Algorithm Parameter Settings.</p>
Full article ">Figure 10
<p>Software Interface After Module Partitioning Using the Genetic Algorithm.</p>
Full article ">Figure 11
<p>MEP Module Layout After Partitioning Using the Genetic Algorithm.</p>
Full article ">Figure 12
<p>Software Interface for Automatic Verification of Hanger Crossbars and Rods.</p>
Full article ">Figure 13
<p>Vehicle Loading Arrangement for MEP Modules.</p>
Full article ">Figure 14
<p>Avoidance of Equipment Fittings (Tees, Crosses, etc.).</p>
Full article ">Figure 15
<p>Cost Breakdown After Partitioning.</p>
Full article ">
19 pages, 2693 KiB  
Article
Adaptive Switching Redundant-Mode Multi-Core System for Photovoltaic Power Generation
by Liang Liu, Xige Zhang, Jiahui Zhou, Kai Niu, Zixuan Guo, Yawen Zhao and Meng Zhang
Sensors 2024, 24(23), 7561; https://doi.org/10.3390/s24237561 - 27 Nov 2024
Viewed by 263
Abstract
As maximum power point tracking (MPPT) algorithms have developed towards multi-task intelligent computing, processors in photovoltaic power generation control systems must be capable of achieving a higher performance. However, the challenges posed by the complex environment of photovoltaic fields with regard to processor [...] Read more.
As maximum power point tracking (MPPT) algorithms have developed towards multi-task intelligent computing, processors in photovoltaic power generation control systems must be capable of achieving a higher performance. However, the challenges posed by the complex environment of photovoltaic fields with regard to processor reliability cannot be overlooked. To address these issues, we proposed a novel approach. Our approach uses error rate and performance as switching metrics and performs joint statistics to achieve efficient adaptive switching. Based on this, our work designed a redundancy-mode switchable three-core processor system to balance performance and reliability. Additionally, by analyzing the relationship between performance and reliability, we proposed optimization methods to improve reliability while ensuring a high performance was maintained. Finally, we designed an error injection method and verified the system’s reliability by analyzing the error rate probability model in different scenarios. The results of the analysis show that compared with the traditional MPPT controller, the redundancy mode switchable multi-core processor system proposed in this paper exhibits a reliability approximately 5.58 times that of a non-fault-tolerant system. Furthermore, leveraging the feature of module switching, the system’s performance has been enhanced by 26% compared to a highly reliable triple modular redundancy systems, significantly improving the system’s reliability while ensuring a good performance is maintained. Full article
Show Figures

Figure 1

Figure 1
<p>The relationship between performance and reliability.</p>
Full article ">Figure 2
<p>Reliability simulation of real scenarios. Impact of switching metrics on mode transitions in PV controllers.</p>
Full article ">Figure 3
<p>Adaptive mode switching based on performance requirements and fault rate levels.</p>
Full article ">Figure 4
<p>Adaptive fault-tolerance registers.</p>
Full article ">Figure 5
<p>Cache mode-switching state update between different modes.</p>
Full article ">Figure 6
<p>RMSM Processor system structure.</p>
Full article ">Figure 7
<p>Software–hardware coordinated checkpoint backup.</p>
Full article ">Figure 8
<p>Pipeline rollback process.</p>
Full article ">Figure 9
<p>Fault-isolation method based on read–write cache flag for pipeline checkpointing.</p>
Full article ">Figure 10
<p>Evaluation framework.</p>
Full article ">Figure 11
<p>MPPT validation platform.</p>
Full article ">Figure 12
<p>MPPT algorithm execution result. (<b>A</b>) Power tracking curve under high-performance mode. (<b>B</b>) Execution times of different modes.</p>
Full article ">Figure 13
<p>Mode efficiency comparison: adaptive mode versus single-mode systems.</p>
Full article ">Figure 14
<p>Comparison of the adaptive switching mode and other modes under different benchmarks used to simulate the intelligent MPPT algorithms.</p>
Full article ">
14 pages, 6418 KiB  
Article
Research on Fast SOC Balance Control of Modular Battery Energy Storage System
by Jianlin Wang, Shenglong Zhou and Jinlu Mao
Energies 2024, 17(23), 5907; https://doi.org/10.3390/en17235907 - 25 Nov 2024
Viewed by 280
Abstract
Early SOC balancing techniques primarily centered on simple hardware circuit designs. Passive balancing circuits utilize resistors to consume energy, aiming to balance the SOC among batteries; however, this approach leads to considerable energy wastage. As research progresses, active balancing circuits have garnered widespread [...] Read more.
Early SOC balancing techniques primarily centered on simple hardware circuit designs. Passive balancing circuits utilize resistors to consume energy, aiming to balance the SOC among batteries; however, this approach leads to considerable energy wastage. As research progresses, active balancing circuits have garnered widespread attention. Successively, active balancing circuits utilizing capacitors, inductors, and transformers have been proposed, enhancing balancing efficiency to some extent. Nevertheless, challenges persist, including energy wastage during transfers between non-adjacent batteries and the complexity of circuit designs. In recent years, SOC balancing methods based on software algorithms have gained popularity. For instance, intelligent control algorithms are being integrated into battery management systems to optimize control strategies for SOC balancing. However, these methods may encounter issues such as high algorithmic complexity and stringent hardware requirements in practical applications. This paper proposes a fast state-of-charge (SOC) balance control strategy that incorporates a weighting factor within a modular battery energy storage system architecture. The modular distributed battery system consists of battery power modules (BPMs) connected in series, with each BPM comprising a battery cell and a bidirectional buck–boost DC-DC converter. By controlling the output voltage of each BPM, SOC balance can be achieved while ensuring stable regulation of the DC bus voltage without the need for external equalization circuits. Building on these BPMs, a sliding mode control strategy with adaptive acceleration coefficient weighting factors is designed to increase the output voltage difference of each BPM, thereby reducing the balancing time. Simulation and experimental results demonstrate that the proposed control strategy effectively increases the output voltage difference among the BPMs, facilitating SOC balance in a short time. Full article
(This article belongs to the Section D2: Electrochem: Batteries, Fuel Cells, Capacitors)
Show Figures

Figure 1

Figure 1
<p>Traditional battery energy storage system.</p>
Full article ">Figure 2
<p>Modular battery energy storage system.</p>
Full article ">Figure 3
<p>Buck–boost-type MBESS.</p>
Full article ">Figure 4
<p>Current path with the faulty battery.</p>
Full article ">Figure 5
<p>Distributed controller control.</p>
Full article ">Figure 6
<p>Flowchart of SOC balance control.</p>
Full article ">Figure 7
<p>Simulation waveforms with the proportional-SOC balance control. (<b>a</b>) BPM output voltage. (<b>b</b>) BPM SOC value.</p>
Full article ">Figure 8
<p>Simulation waveforms with the proposed SOC balance control. (<b>a</b>) BPM output voltage. (<b>b</b>) BPM SOC value.</p>
Full article ">Figure 9
<p>Experimental prototype of MBESS.</p>
Full article ">Figure 10
<p>Experimental waveforms of BPM output voltage. (<b>a</b>) No-balance control switched to the proposed control. (<b>b</b>) Proportional-SOC balance control switched to the proposed control.</p>
Full article ">Figure 11
<p>Experimental waveforms of BPM output voltage when bypassing.</p>
Full article ">
17 pages, 3203 KiB  
Article
XModNN: Explainable Modular Neural Network to Identify Clinical Parameters and Disease Biomarkers in Transcriptomic Datasets
by Jan Oldenburg, Jonas Wagner, Sascha Troschke-Meurer, Jessica Plietz, Lars Kaderali, Henry Völzke, Matthias Nauck, Georg Homuth, Uwe Völker and Stefan Simm
Biomolecules 2024, 14(12), 1501; https://doi.org/10.3390/biom14121501 - 25 Nov 2024
Viewed by 398
Abstract
The Explainable Modular Neural Network (XModNN) enables the identification of biomarkers, facilitating the classification of diseases and clinical parameters in transcriptomic datasets. The modules within XModNN represent specific pathways or genes of a functional hierarchy. The incorporation of biological insights into the architectural [...] Read more.
The Explainable Modular Neural Network (XModNN) enables the identification of biomarkers, facilitating the classification of diseases and clinical parameters in transcriptomic datasets. The modules within XModNN represent specific pathways or genes of a functional hierarchy. The incorporation of biological insights into the architectural design reduced the number of parameters. This is further reinforced by the weighted multi-loss progressive training, which enables successful classification with a reduced number of replicates. The combination of this workflow with layer-wise relevance propagation ensures a robust post hoc explanation of the individual module contribution. Two use cases were employed to predict sex and neuroblastoma cell states, demonstrating that XModNN, in contrast to standard statistical approaches, results in a reduced number of candidate biomarkers. Moreover, the architecture enables the training on a limited number of examples, attaining the same performance and robustness as support vector machine and random forests. The integrated pathway relevance analysis improves a standard gene set overrepresentation analysis, which relies solely on gene assignment. Two crucial genes and three pathways were identified for sex classification, while 26 genes and six pathways are highly important to discriminate adrenergic–mesenchymal cell states in neuroblastoma cancer. Full article
(This article belongs to the Special Issue Application of Bioinformatics in Medicine)
Show Figures

Figure 1

Figure 1
<p>Benchmark overview scheme. The scheme represents, for our use cases, the split for the tenfold cross-validation (test: orange; green: validation; blue: training). The four different models (fully connected NN: Full-NN; XModNN; RF; SVM) are trained, validated (only Full-NN and XModNN), and tested. The important gene lists are used for the pre-ranked GSEA ending up in the prediction of enriched pathways.</p>
Full article ">Figure 2
<p>Explainable modular neural network. (<b>A</b>) shows the XModNN architecture with the integrated hierarchical structure of the KEGG/Brite hierarchy (levels A to D) to the Output O (purple bars). The yellow modules represent individual pathways/genes. Each module consists of an adaptable NN with its own loss, detailed view at the top right. The weighted multi-loss progressive training is shown in light blue and described in the formula, reflecting sequential addition of weighted losses per layer to the training process. (<b>B</b>) illustrates the backpropagation of the custom LRP through XModNN, with relevance represented by a red color gradient.</p>
Full article ">Figure 3
<p>Benchmark for sex prediction. Confusion matrices from the tenfold cross-validation of all combined test sets: (<b>A</b>) all XModNN models, (<b>B</b>) all SVM models, and (<b>C</b>) all RF models. (<b>D</b>) A Venn diagram comparing the important genes identified by AI models with those detected by Limma.</p>
Full article ">Figure 4
<p>Relevance network for sex discrimination using XModNN. This network created with Cytoscape illustrates the identified relevant genes and pathways based on the XModNN output for the sex use case on the SHIP dataset, with node shapes indicating KEGG hierarchy levels A, B, C, and D. Genes and pathways outlined in blue are deemed exceptionally relevant based on the XModNN threshold. The color gradient within the nodes reflects the calculated XModNN relevance, ranging from white (irrelevant, low) to red (relevant, high).</p>
Full article ">Figure 5
<p>Benchmark of Neuroblastoma cell state prediction. Confusion matrices from the tenfold cross-validation of all combined test sets: (<b>A</b>) all XModNN models, (<b>B</b>) all SVM models, and (<b>C</b>) all RF models. (<b>D</b>) A Venn diagram comparing the important genes identified by AI models with those detected by Limma.</p>
Full article ">Figure 6
<p>Relevance network for of Neuroblastoma cell state discrimination using XModNN. This network created with Cytoscape illustrates the identified relevant genes and pathways based on the XModNN output for the neuroblastoma use case, with node shapes indicating KEGG hierarchy levels A, B, C, and D. Genes and pathways outlined in blue are deemed exceptionally relevant based on the XModNN threshold. The color gradient within the nodes reflects the calculated XModNN relevance, ranging from white (irrelevant, low) to red (relevant, high).</p>
Full article ">
9 pages, 2218 KiB  
Communication
Online Monitoring of Catalytic Processes by Fiber-Enhanced Raman Spectroscopy
by John T. Kelly, Christopher J. Koch, Robert Lascola and Tyler Guin
Sensors 2024, 24(23), 7501; https://doi.org/10.3390/s24237501 - 25 Nov 2024
Viewed by 405
Abstract
An innovative solution for real-time monitoring of reactions within confined spaces, optimized for Raman spectroscopy applications, is presented. This approach involves the utilization of a hollow-core waveguide configured as a compact flow cell, serving both as a conduit for Raman excitation and scattering [...] Read more.
An innovative solution for real-time monitoring of reactions within confined spaces, optimized for Raman spectroscopy applications, is presented. This approach involves the utilization of a hollow-core waveguide configured as a compact flow cell, serving both as a conduit for Raman excitation and scattering and seamlessly integrating into the effluent stream of a cracking catalytic reactor. The analytical technique, encompassing device and optical design, ensures robustness, compactness, and cost-effectiveness for implementation into process facilities. Notably, the modularity of the approach empowers customization for diverse gas monitoring needs, as it readily adapts to the specific requirements of various sensing scenarios. As a proof of concept, the efficacy of a spectroscopic approach is shown by monitoring two catalytic processes: CO2 methanation (CO2 + 4H2 → CH4 + 2H2O) and ammonia cracking (2NH3 → N2 + 3H2). Leveraging chemometric data processing techniques, spectral signatures of the individual components involved in these reactions are effectively disentangled and the results are compared to mass spectrometry data. This robust methodology underscores the versatility and reliability of this monitoring system in complex chemical environments. Full article
(This article belongs to the Special Issue Advances in Fiber Optic Sensors for Energy Applications)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Experimental design of optical elements for sampling and collection of Raman spectra by workstation, (<b>top</b>) laser path in green and extra waveguide in blue. The (<b>bottom</b>) sample flow through the waveguide is highlighted in yellow.</p>
Full article ">Figure 2
<p>Raman spectra of CO<sub>2</sub> methanation acquired over 10 s spectral accumulations.</p>
Full article ">Figure 3
<p>Traces from Raman spectra of CH<sub>4</sub> (blue), H<sub>2</sub> (green) and CO<sub>2</sub> (black) with changes to the flow rate conditions of the feed gases to the reactor.</p>
Full article ">Figure 4
<p>Raman spectra of ammonia reactant (<b>top</b>) and hydrogen/nitrogen product (<b>bottom</b>) flowing at 50 mL min and acquired over 10 s spectral accumulations.</p>
Full article ">Figure 5
<p>Low-wavenumber Raman spectra of ammonia (<b>top</b>) and hydrogen and nitrogen (<b>bottom</b>) flowing at 50 mL min and acquired over 30 s spectral accumulations.</p>
Full article ">Figure 6
<p>Peak heights of select Raman features of ammonia reactant (<b>top</b>) and hydrogen/nitrogen product (<b>bottom</b>) flowing at 50 mL min and acquired over 10 s spectral accumulations.</p>
Full article ">
31 pages, 870 KiB  
Article
Advances in Data Pre-Processing Methods for Distributed Fiber Optic Strain Sensing
by Bertram Richter, Lisa Ulbrich, Max Herbers and Steffen Marx
Sensors 2024, 24(23), 7454; https://doi.org/10.3390/s24237454 - 22 Nov 2024
Viewed by 452
Abstract
Because of their high spatial resolution over extended lengths, distributed fiber optic sensors (DFOS) enable us to monitor a wide range of structural effects and offer great potential for diverse structural health monitoring (SHM) applications. However, even under controlled conditions, the useful signal [...] Read more.
Because of their high spatial resolution over extended lengths, distributed fiber optic sensors (DFOS) enable us to monitor a wide range of structural effects and offer great potential for diverse structural health monitoring (SHM) applications. However, even under controlled conditions, the useful signal in distributed strain sensing (DSS) data can be concealed by different types of measurement principle-related disturbances: strain reading anomalies (SRAs), dropouts, and noise. These disturbances can render the extraction of information for SHM difficult or even impossible. Hence, cleaning the raw measurement data in a pre-processing stage is key for successful subsequent data evaluation and damage detection on engineering structures. To improve the capabilities of pre-processing procedures tailored to DSS data, characteristics and common remediation approaches for SRAs, dropouts, and noise are discussed. Four advanced pre-processing algorithms (geometric threshold method (GTM), outlier-specific correction procedure (OSCP), sliding modified z-score (SMZS), and the cluster filter) are presented. An artificial but realistic benchmark data set simulating different measurement scenarios is used to discuss the features of these algorithms. A flexible and modular pre-processing workflow is implemented and made available with the algorithms. Dedicated algorithms should be used to detect and remove SRAs. GTM, OSCP, and SMZS show promising results, and the sliding average is inappropriate for this purpose. The preservation of crack-induced strain peaks’ tips is imperative for reliable crack monitoring. Full article
(This article belongs to the Section Optical Sensors)
Show Figures

Figure 1

Figure 1
<p>Schematic of the different measurement disturbances: SRAs, dropouts, and noise. The variation in the signal marked as local effects is not caused by the measurement principle.</p>
Full article ">Figure 2
<p>The task and workflow duality implemented by the pre-processing module of <tt>fosanalysis</tt>. (<b>a</b>) Class inheritance hierarchy of task objects. (<b>b</b>) Structure of a pre-processing workflow object. (<b>c</b>) Pre-processing workflow with an exemplary sequence of task objects.</p>
Full article ">Figure 3
<p>GTM for one-dimensional case, as presented in [<a href="#B19-sensors-24-07454" class="html-bibr">19</a>]; additions are highlighted in grey.</p>
Full article ">Figure 4
<p>OSCP, adapted from [<a href="#B34-sensors-24-07454" class="html-bibr">34</a>].</p>
Full article ">Figure 5
<p>Algorithm of the <span class="html-italic">z</span>-score family.</p>
Full article ">Figure 6
<p>Cluster filter, according to [<a href="#B42-sensors-24-07454" class="html-bibr">42</a>].</p>
Full article ">Figure 7
<p>Benchmark data scenarios: (<b>a</b>) zero signal; (<b>b</b>) ramps; (<b>c</b>) strain profile with weak DFOS bond; (<b>d</b>) strain profile with medium DFOS bond; (<b>e</b>) strain profile with stiff DFOS bond. The data set is available in [<a href="#B60-sensors-24-07454" class="html-bibr">60</a>].</p>
Full article ">Figure 8
<p>SRA detection accuracy for the algorithms for scenario (a) zero.</p>
Full article ">Figure 9
<p>SRA detection accuracy for the algorithms for scenario (b) ramps.</p>
Full article ">Figure 10
<p>SRA detection accuracy for the algorithms for scenario (c) weak bond.</p>
Full article ">Figure 11
<p>SRA detection accuracy for the algorithms for scenario (d) normal bond.</p>
Full article ">Figure 12
<p>SRA detection accuracy for the algorithms for scenario (e) stiff bond.</p>
Full article ">Figure 13
<p>Results of filter benchmarks for case 1: noisy signal without SRAs or dropouts.</p>
Full article ">Figure 14
<p>Results of filter benchmarks for case 2: noisy signal with SRAs and dropouts.</p>
Full article ">Figure 15
<p>Section of strain data pre-processed with the filters: sliding average (<math display="inline"><semantics> <mrow> <mi>r</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>), sliding median (<math display="inline"><semantics> <mrow> <mi>r</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>), cluster filter (<math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mrow> <mn>1.3</mn> <mo>×</mo> <msup> <mn>10</mn> <mn>5</mn> </msup> </mrow> </mrow> </semantics></math>). (<b>a</b>) Scenario (b), (<b>b</b>) scenario (d).</p>
Full article ">Figure 16
<p>Left column: normalized strain peak with applied dropouts; right column: reconstructed strain peak with (i) <math display="inline"><semantics> <mrow> <mi>t</mi> <mo>=</mo> <mrow> <mn>0.25</mn> </mrow> </mrow> </semantics></math>, (ii) <math display="inline"><semantics> <mrow> <mi>t</mi> <mo>=</mo> <mrow> <mn>0.75</mn> </mrow> </mrow> </semantics></math>, and (iii) <math display="inline"><semantics> <mrow> <mi>t</mi> <mo>=</mo> <mrow> <mn>1.25</mn> </mrow> </mrow> </semantics></math>. The right-hand-side plot details the highlighted part in the left-hand-side plot.</p>
Full article ">Figure 17
<p>Error in crack widths <math display="inline"><semantics> <mrow> <mi mathvariant="sans-serif">Δ</mi> <msub> <mi>w</mi> <mrow> <mi>cr</mi> <mo>,</mo> <mi>rel</mi> </mrow> </msub> </mrow> </semantics></math> for linear and <span class="html-small-caps">Akima</span> spline interpolation, depending on the amount of dropout <span class="html-italic">t</span>. The right-hand-side plot is the highlighted detail of the left plot.</p>
Full article ">
30 pages, 1831 KiB  
Article
MultiTagging: A Vulnerable Smart Contract Labeling and Evaluation Framework
by Shikah J. Alsunaidi, Hamoud Aljamaan and Mohammad Hammoudeh
Electronics 2024, 13(23), 4616; https://doi.org/10.3390/electronics13234616 - 22 Nov 2024
Viewed by 438
Abstract
Identifying vulnerabilities in Smart Contracts (SCs) is crucial, as they can lead to significant financial losses if exploited. Although various SC vulnerability identification methods exist, selecting the most effective approach remains challenging. This article examines these challenges and introduces solutions to enhance SC [...] Read more.
Identifying vulnerabilities in Smart Contracts (SCs) is crucial, as they can lead to significant financial losses if exploited. Although various SC vulnerability identification methods exist, selecting the most effective approach remains challenging. This article examines these challenges and introduces solutions to enhance SC vulnerability identification. It introduces MultiTagging, a modular SC multi-labeling framework designed to overcome limitations in existing SC vulnerability identification approaches. MultiTagging automates SC vulnerability tagging by parsing analysis reports and mapping tool-specific tags to standardized labels, including SC Weakness Classification (SWC) codes and Decentralized Application Security Project (DASP) ranks. Its mapping strategy and the proposed vulnerability taxonomy resolve tool-level labeling inconsistencies, where different tools use distinct labels for identical vulnerabilities. The framework integrates an evaluation module to assess SC vulnerability identification methods. MultiTagging enables both tool-based and vote-based SC vulnerability labeling. To improve labeling accuracy, the article proposes Power-based voting, a method that systematically defines voter roles and voting thresholds for each vulnerability. MultiTagging is used to evaluate labeling across six tools: MAIAN, Mythril, Semgrep, Slither, Solhint, and VeriSmart. The results reveal high coverage for Mythril, Slither, and Solhint, which identified eight, seven, and six DASP classes, respectively. Tool performance varied, underscoring the impracticality of relying on a single tool to identify all vulnerability classes. A comparative evaluation of Power-based voting and two threshold-based methods—AtLeastOne and Majority voting—shows that while voting methods can increase vulnerability identification coverage, they may also reduce detection performance. Power-based voting proved more effective than pure threshold-based methods across all vulnerability classes. Full article
Show Figures

Figure 1

Figure 1
<p>Mapping SWC codes to CWE.</p>
Full article ">Figure 2
<p>Mapping SWC codes to DASP Top 10.</p>
Full article ">Figure 3
<p>Overview of MultiTagging framework.</p>
Full article ">Figure 4
<p>Flowchart of the Power-based voting algorithm.</p>
Full article ">Figure 5
<p>Overview of used benchmarks.</p>
Full article ">Figure 6
<p>Analysis tools efficiency metrics.</p>
Full article ">Figure 7
<p>Performance overview of analysis tools and voting methods using a portion of the benchmark.</p>
Full article ">Figure 8
<p>Overlap of analysis tool findings.</p>
Full article ">Figure 9
<p>Overlap of analysis tool findings per vulnerability.</p>
Full article ">
19 pages, 3800 KiB  
Article
Fully Open-Source Meeting Minutes Generation Tool
by Amma Liesvarastranta Haz, Yohanes Yohanie Fridelin Panduman, Nobuo Funabiki, Evianita Dewi Fajrianti and Sritrusta Sukaridhoto
Future Internet 2024, 16(11), 429; https://doi.org/10.3390/fi16110429 - 20 Nov 2024
Viewed by 1426
Abstract
With the increasing use of online meetings, there is a growing need for efficient tools that can automatically generate meeting minutes from recorded sessions. Current solutions often rely on proprietary systems, limiting adaptability and flexibility. This paper investigates whether various open-source models and [...] Read more.
With the increasing use of online meetings, there is a growing need for efficient tools that can automatically generate meeting minutes from recorded sessions. Current solutions often rely on proprietary systems, limiting adaptability and flexibility. This paper investigates whether various open-source models and methods such as audio-to-text conversion, summarization, keyword extraction, and optical character recognition (OCR) can be integrated to create a meeting minutes generation tool for recorded video presentations. For this purpose, a series of evaluations are conducted to identify suitable models. Then, the models are integrated into a system that is modular yet accurate. The utilization of an open-source approach ensures that the tool remains accessible and adaptable to the latest innovations, thereby ensuring continuous improvement over time. Furthermore, this approach also benefits organizations and individuals by providing a cost-effective and flexible alternative. This work contributes to creating a modular and easily extensible open-source framework that integrates several advanced technologies and future new models into a cohesive system. The system was evaluated on ten videos created under controlled conditions, which may not fully represent typical online presentation recordings. It showed strong performance in audio-to-text conversion with a low word-error rate. Summarization and keyword extraction were functional but showed room for improvement in terms of precision and relevance, as gathered from the users’ feedback. These results confirm the system’s effectiveness and efficiency in generating usable meeting minutes from recorded presentation videos, with room for improvement in future works. Full article
(This article belongs to the Special Issue Deep Learning and Natural Language Processing II)
Show Figures

Figure 1

Figure 1
<p>Overview of meeting minutes generation system.</p>
Full article ">Figure 2
<p>Acceptable document format.</p>
Full article ">Figure 3
<p>Workflow for <span class="html-italic">information correlation function</span>.</p>
Full article ">Figure 4
<p>Sample of organized data for each slide.</p>
Full article ">Figure 5
<p>(<b>a</b>) Input field for recorded video and presentation document; (<b>b</b>) extracted results for each slide.</p>
Full article ">
18 pages, 1819 KiB  
Article
Detecting Adversarial Attacks in IoT-Enabled Predictive Maintenance with Time-Series Data Augmentation
by Flora Amato, Egidia Cirillo, Mattia Fonisto and Alberto Moccardi
Information 2024, 15(11), 740; https://doi.org/10.3390/info15110740 - 20 Nov 2024
Viewed by 515
Abstract
Despite considerable advancements in integrating the Internet of Things (IoT) and artificial intelligence (AI) within the industrial maintenance framework, the increasing reliance on these innovative technologies introduces significant vulnerabilities due to cybersecurity risks, potentially compromising the integrity of decision-making processes. Accordingly, this study [...] Read more.
Despite considerable advancements in integrating the Internet of Things (IoT) and artificial intelligence (AI) within the industrial maintenance framework, the increasing reliance on these innovative technologies introduces significant vulnerabilities due to cybersecurity risks, potentially compromising the integrity of decision-making processes. Accordingly, this study aims to offer comprehensive insights into the cybersecurity challenges associated with predictive maintenance, proposing a novel methodology that leverages generative AI for data augmentation, enhancing threat detection capabilities. Experimental evaluations conducted using the NASA Commercial Modular Aero-Propulsion System Simulation (N-CMAPSS) dataset affirm the viability of this approach leveraging the state-of-the-art TimeGAN model for temporal-aware data generation and building a recurrent classifier for attack discrimination in a balanced dataset. The classifier’s results demonstrate the satisfactory and robust performance achieved in terms of accuracy (between 80% and 90%) and how the strategic generation of data can effectively bolster the resilience of intelligent maintenance systems against cyber threats. Full article
Show Figures

Figure 1

Figure 1
<p>Relationship between vulnerabilities and impact of attacks.</p>
Full article ">Figure 2
<p>Failure-data scarcity and augmentation practices in predictive maintenance.</p>
Full article ">Figure 3
<p>NASA Commercial Modular Aero-Propulsion Simulation System (N-CMAPSS) [<a href="#B34-information-15-00740" class="html-bibr">34</a>].</p>
Full article ">Figure 4
<p>Compact workflow diagram for IoT system integration.</p>
Full article ">Figure 5
<p>Time-series data augmentation.</p>
Full article ">Figure 6
<p>Time GAN architecture, kernels and loss functions.</p>
Full article ">Figure 7
<p>Exploratory data analysis of FD001 N-CMAPSS dataset.</p>
Full article ">Figure 8
<p>TimeGAN training process.</p>
Full article ">Figure 9
<p>Visualization of synthetic data and original data with PCA and t-SNE.</p>
Full article ">Figure 10
<p>Training and validation performance of the classifier over 250 epochs. The left panel shows accuracy, and the right panel shows AUC. Solid lines represent training metrics, and dashed lines represent validation metrics.</p>
Full article ">
17 pages, 11075 KiB  
Article
Vehicle Motion Control for Overactuated Vehicles to Enhance Controllability and Path Tracking
by Philipp Mandl, Johannes Edelmann and Manfred Plöchl
Appl. Sci. 2024, 14(22), 10718; https://doi.org/10.3390/app142210718 - 19 Nov 2024
Viewed by 496
Abstract
The motion control of vehicles poses distinct challenges for both vehicle stability and path tracking, especially under critical environmental and driving conditions. Overactuated vehicles can effectively utilize the available tyre–road friction potential by leveraging additional actuators, thus enhancing their stability and controllability even [...] Read more.
The motion control of vehicles poses distinct challenges for both vehicle stability and path tracking, especially under critical environmental and driving conditions. Overactuated vehicles can effectively utilize the available tyre–road friction potential by leveraging additional actuators, thus enhancing their stability and controllability even in challenging scenarios. This paper introduces a novel modular upstream control architecture for overactuated vehicles, integrating a fast and robust linear time-varying model predictive path and speed tracking controller with a model following approach and nonlinear control allocation to form a holistic vehicle motion controller. The architecture decouples the path and speed tracking task from the actuator allocation, where torque vectoring and rear-wheel steering are applied to achieve linear understeer reference vehicle behavior. It allows for the use of a simpler path tracking controller, enabling long preview horizons and enhanced computational efficiency. Nonlinearities, such as the mutual influence of lateral and longitudinal tyre forces, are accounted for within the control allocation. The simulation results demonstrate that the proposed control architecture and overactuation improve vehicle stability in critical driving conditions and reduce path tracking errors compared to a dual-motor vehicle. Full article
(This article belongs to the Special Issue Trends and Prospects in Vehicle System Dynamics)
Show Figures

Figure 1

Figure 1
<p>Impact of integrated control on friction circle; adapted from [<a href="#B2-applsci-14-10718" class="html-bibr">2</a>].</p>
Full article ">Figure 2
<p>Vehicle motion controller as part of a multilayered upstream control architecture [<a href="#B3-applsci-14-10718" class="html-bibr">3</a>].</p>
Full article ">Figure 3
<p>Control architecture composed of LTV-MPC for path and speed tracking, MF for global demand generation and CA. Inputs: segment of the reference path via <math display="inline"><semantics> <msub> <mi mathvariant="bold-italic">V</mi> <mi>ref</mi> </msub> </semantics></math> and <math display="inline"><semantics> <mi>ρ</mi> </semantics></math>, along with current tracking errors <span class="html-italic">e</span> and <math display="inline"><semantics> <mi>θ</mi> </semantics></math> and vehicle state. Outputs: wheel torques <math display="inline"><semantics> <msub> <mi mathvariant="bold-italic">T</mi> <mi>w</mi> </msub> </semantics></math> and steering angles <math display="inline"><semantics> <msub> <mi>δ</mi> <mi>f</mi> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>δ</mi> <mi>r</mi> </msub> </semantics></math>.</p>
Full article ">Figure 4
<p>(<b>a</b>) Two-wheel vehicle model used in MPC and MF. (<b>b</b>) Four-wheel vehicle model used in CA.</p>
Full article ">Figure 5
<p>Left plot shows the normalized lateral tyre force <math display="inline"><semantics> <mstyle scriptlevel="0" displaystyle="true"> <mfrac> <msub> <mi>F</mi> <mi>y</mi> </msub> <msub> <mi>F</mi> <mi>z</mi> </msub> </mfrac> </mstyle> </semantics></math> over the normalized longitudinal tyre force <math display="inline"><semantics> <mstyle scriptlevel="0" displaystyle="true"> <mfrac> <msub> <mi>F</mi> <mi>x</mi> </msub> <msub> <mi>F</mi> <mi>z</mi> </msub> </mfrac> </mstyle> </semantics></math> for various tyre sideslip angles <math display="inline"><semantics> <mi>α</mi> </semantics></math>. Right plot shows the normalized longitudinal force <math display="inline"><semantics> <mstyle scriptlevel="0" displaystyle="true"> <mfrac> <msub> <mi>F</mi> <mi>x</mi> </msub> <msub> <mi>F</mi> <mi>z</mi> </msub> </mfrac> </mstyle> </semantics></math> over the longitudinal tyre slip <math display="inline"><semantics> <mi>κ</mi> </semantics></math> for various tyre side slip angles <math display="inline"><semantics> <mi>α</mi> </semantics></math>, with the gray area defining the slip constraint for the CA.</p>
Full article ">Figure 6
<p>(<b>a</b>) Euler spiral path (top) and handling diagram for uncontrolled vehicle and reference vehicle behavior (bottom). (<b>b</b>) U-turn path (top) and desired acceleration in gg diagram with corresponding reference vehicle velocity (bottom).</p>
Full article ">Figure 7
<p>Multi-body vehicle model.</p>
Full article ">Figure 8
<p>Euler spiral maneuver simulated with the overactuated and dual-motor configurations. Linear (reference) vehicle behavior given in gray. Top row shows front steering angle <math display="inline"><semantics> <msub> <mi>δ</mi> <mi>f</mi> </msub> </semantics></math>, vehicle sideslip angle <math display="inline"><semantics> <mi>β</mi> </semantics></math> and path tracking error <span class="html-italic">e</span> characteristics over <math display="inline"><semantics> <msub> <mi>a</mi> <mi>n</mi> </msub> </semantics></math>. Bottom row shows actuator usage for wheel torques <math display="inline"><semantics> <msub> <mi>T</mi> <mrow> <mi>w</mi> <mo>,</mo> <mi>i</mi> </mrow> </msub> </semantics></math> and rear-wheel steering angle <math display="inline"><semantics> <msub> <mi>δ</mi> <mi>r</mi> </msub> </semantics></math>.</p>
Full article ">Figure 9
<p>Phase planes at varying FWS angles corresponding to the dual-motor and overactuated configurations at <math display="inline"><semantics> <mrow> <mi>V</mi> <mo>=</mo> <mn>25</mn> <mrow> <mi mathvariant="normal">m</mi> <mo>/</mo> <mi>s</mi> </mrow> </mrow> </semantics></math>. Stable and unstable regions are shown in white and red, respectively. The <math display="inline"><semantics> <msub> <mi>I</mi> <mi>MF</mi> </msub> </semantics></math> measure is overlaid in grayscale. Red dots indicate stable equilibria corresponding to <a href="#applsci-14-10718-f008" class="html-fig">Figure 8</a> (top).</p>
Full article ">Figure 10
<p>U-turn maneuver at varying reference acceleration levels <math display="inline"><semantics> <mrow> <mrow> <mo>|</mo> </mrow> <msub> <mi>a</mi> <mi>ref</mi> </msub> <mrow> <mo>|</mo> </mrow> </mrow> </semantics></math>. Results are shown for the dual-motor configuration (dotted), the overactuated configuration (solid) and the reference trajectory (red with circle markers).</p>
Full article ">Figure 11
<p>U-turn actuator commands at reference acceleration level <math display="inline"><semantics> <mrow> <mrow> <mo>|</mo> </mrow> <msub> <mi>a</mi> <mi>ref</mi> </msub> <mrow> <mo>|</mo> <mo>=</mo> <mn>8</mn> </mrow> <mrow> <mi mathvariant="normal">m</mi> <mo>/</mo> <msup> <mi>s</mi> <mn>2</mn> </msup> </mrow> </mrow> </semantics></math> for the overactuated vehicle configuration.</p>
Full article ">
16 pages, 7450 KiB  
Article
Latent Graph Attention for Spatial Context in Light-Weight Networks: Multi-Domain Applications in Visual Perception Tasks
by Ayush Singh, Yash Bhambhu, Himanshu Buckchash, Deepak K. Gupta and Dilip K. Prasad
Appl. Sci. 2024, 14(22), 10677; https://doi.org/10.3390/app142210677 - 19 Nov 2024
Viewed by 312
Abstract
Global contexts in images are quite valuable in image-to-image translation problems. Conventional attention-based and graph-based models capture the global context to a large extent; however, these are computationally expensive. Moreover, existing approaches are limited to only learning the pairwise semantic relation between any [...] Read more.
Global contexts in images are quite valuable in image-to-image translation problems. Conventional attention-based and graph-based models capture the global context to a large extent; however, these are computationally expensive. Moreover, existing approaches are limited to only learning the pairwise semantic relation between any two points in the image. In this paper, we present Latent Graph Attention (LGA), a computationally inexpensive (linear to the number of nodes) and stable modular framework for incorporating the global context in existing architectures. This framework particularly empowers small-scale architectures to achieve performance closer to that of large architectures, making the light-weight architectures more useful for edge devices with lower compute power and lower energy needs. LGA propagates information spatially using a network of locally connected graphs, thereby facilitating the construction of a semantically coherent relation between any two spatially distant points that also takes into account the influence of the intermediate pixels. Moreover, the depth of the graph network can be used to adapt the extent of contextual spread to the target dataset, thereby able to explicitly control the added computational cost. To enhance the learning mechanism of LGA, we also introduce a novel contrastive loss term that helps our LGA module to couple well with the original architecture at the expense of minimal additional computational load. We show that incorporating LGA improves performance in three challenging applications, namely transparent object segmentation, image restoration for dehazing and optical flow estimation. Full article
Show Figures

Figure 1

Figure 1
<p>Segmentation results obtained for a transparent object using CCNet [<a href="#B8-applsci-14-10677" class="html-bibr">8</a>] and our method (LGA). Note that due to the lack of semantic coherence between far-away points, CCNet produces partially incorrect segmentation.</p>
Full article ">Figure 2
<p>We present the novel concept of latent graph attention (LGA), which can be easily integrated in wide variety of applications and architectures. Three challenging and open problems are considered as example applications of LGA in this article.</p>
Full article ">Figure 3
<p>Operations performed by the LGA layer are shown in the expanded view. Starting with the encoder’s feature maps (<math display="inline"><semantics> <msup> <mi>F</mi> <mi>in</mi> </msup> </semantics></math>), edge maps are created using 2D convolution. The dotted arrow between the <span class="html-italic">edge map</span> and <span class="html-italic">adjacency matrix</span> implies that this transfer happens only once, even if the LGA layer is repeated multiple times. Next, the normalized adjacency matrix is used to calculate the output (<math display="inline"><semantics> <msub> <mi>X</mi> <mrow> <mi>i</mi> <mo>+</mo> <mn>1</mn> </mrow> </msub> </semantics></math>) for the <span class="html-italic">i</span>th LGA layer. The LGA contrastive loss (<math display="inline"><semantics> <msub> <mi mathvariant="script">L</mi> <mi>LGA</mi> </msub> </semantics></math>) is computed between the output of the LGA module (<math display="inline"><semantics> <msup> <mi>F</mi> <mi>out</mi> </msup> </semantics></math>) and the ground truth. <math display="inline"><semantics> <msub> <mi>X</mi> <mrow> <mi>i</mi> <mo>+</mo> <mn>1</mn> </mrow> </msub> </semantics></math> becomes the input to the <span class="html-italic">i</span> + 1th LGA layer.</p>
Full article ">Figure 4
<p>The top row shows the conversion of feature map <math display="inline"><semantics> <msub> <mi>X</mi> <mi>i</mi> </msub> </semantics></math> to graph nodes. Each cell of <math display="inline"><semantics> <msub> <mi>X</mi> <mi>i</mi> </msub> </semantics></math> in an <math display="inline"><semantics> <mrow> <mi>H</mi> <mo>×</mo> <mi>W</mi> </mrow> </semantics></math> plane (at all depths) is considered as one node in the graph. The graph information is extracted by 9 kernels—1 for each direction. Edge maps (in top row) correspond to the input, gt, and predicted triplet (bottom left). The middle-bottom figure shows how the node intensities represent the edge weights. The bottom-right figure shows how connectivity strength information propagates through recursive LGA layers.</p>
Full article ">Figure 5
<p>Examples of segmentation results of previous methods. Eleven classes of objects are color-coded.</p>
Full article ">Figure 6
<p>Example input and ground-truth samples from the I-Haze dataset and the respective results of dehazing obtained using various methods. BPP results are presented with and without the inclusion of our LGA module [<a href="#B35-applsci-14-10677" class="html-bibr">35</a>,<a href="#B36-applsci-14-10677" class="html-bibr">36</a>,<a href="#B37-applsci-14-10677" class="html-bibr">37</a>,<a href="#B38-applsci-14-10677" class="html-bibr">38</a>,<a href="#B39-applsci-14-10677" class="html-bibr">39</a>].</p>
Full article ">Figure 7
<p>Results of unsupervised optical flow prediction on the MPI Sintel final-pass benchmark [<a href="#B40-applsci-14-10677" class="html-bibr">40</a>]. The first row shows the input samples, and the next two rows show the estimated flow for ARFlow [<a href="#B26-applsci-14-10677" class="html-bibr">26</a>] and LGA with ARFlow. The last two rows visualize the incurred EPE-all errors for each of the methods on the final pass. Notable differences are highlighted by red boxes.</p>
Full article ">
27 pages, 10812 KiB  
Article
Grid Matrix-Based Ground Risk Map Generation for Unmanned Aerial Vehicles in Urban Environments
by Yuanjun Zhu, Xuejun Zhang, Yan Li, Yang Liu and Jianxiang Ma
Drones 2024, 8(11), 678; https://doi.org/10.3390/drones8110678 - 17 Nov 2024
Viewed by 409
Abstract
As a novel mode of urban air mobility (UAM), unmanned aerial vehicles (UAVs) pose a great amount of risk to ground people. Assessing ground risk and mitigation effects correctly is a focused issue. This paper proposes a grid-based risk matrix framework for assessing [...] Read more.
As a novel mode of urban air mobility (UAM), unmanned aerial vehicles (UAVs) pose a great amount of risk to ground people. Assessing ground risk and mitigation effects correctly is a focused issue. This paper proposes a grid-based risk matrix framework for assessing the ground risk associated with two types of UAVs, namely fixed-wing and quadrotor. The framework has a three-stage structure of “intrinsic risk assessment—mitigation effect—final map generation”. First, the intrinsic risk to ground populations caused by potential UAV crashes is quantified. Second, the mitigation effects are measured by establishing a mathematical model with a focus on the ground sheltering and parachute systems. Finally, a modular approach is presented for generating a ground risk map of UAVs, aiming to effectively characterize the effects of each influencing factor on the failure process of UAVs. The framework facilitates the modular analysis and quantification of the impact of diverse risk factors on UAV ground risk. It also provides a new perspective for analyzing ground risk mitigation measures, such as ground sheltering and UAV parachute systems. A case study experiment on a realistic urban environment in Shenzhen shows that the risk map generated by the presented framework can accurately characterize the distribution of ground risk posed by various UAVs. Full article
(This article belongs to the Topic Civil and Public Domain Applications of Unmanned Aviation)
Show Figures

Figure 1

Figure 1
<p>Framework of ground risk assessment for UAV operations in urban areas.</p>
Full article ">Figure 2
<p>Relationship between ground risk map and ground risk matrix.</p>
Full article ">Figure 3
<p>An instance of a UAV crossing the contingency volume and crashing in the adjacent area.</p>
Full article ">Figure 4
<p><b>Top panel</b>: the satellite image of Shenzhen city center. The data are obtained from Google Maps. <b>Bottom panel</b>: the matrix of sheltering parameters.</p>
Full article ">Figure 5
<p>Accessible airspace structure diagram for urban environment at a height of 30 m.</p>
Full article ">Figure 6
<p>Analysis of the falling process of a multirotor UAV.</p>
Full article ">Figure 7
<p>Analysis of the fall process of a fixed-wing UAV after failure.</p>
Full article ">Figure 8
<p>The procedure to calculate the final ground risk matrix.</p>
Full article ">Figure 9
<p>The process of generating a ground risk map: (1) Map the final ground risk matrix onto the risk map layer based on the corresponding coordinates. (2) Overlay the airspace structure layer and no-fly zone layer onto the risk map layer. (3) Generate a ground risk map.</p>
Full article ">Figure 10
<p>Population density distribution in the simulation scenario.</p>
Full article ">Figure 11
<p>Grid risk matrix for DJI Phantom4 at a flight altitude of 30 m: (<b>a</b>) intrinsic ground risk matrix; (<b>b</b>) final ground risk matrix. The risk matrix is visually represented in the figure, with high ground risk indicated by red and low ground risk indicated by green. The comparison of the two figures can demonstrate the impact of risk environment measures; a significant reduction in ground risk was achieved after implementing mitigation measures.</p>
Full article ">Figure 12
<p>Static ground risk map for DJI Phantom4 at a flight altitude of 30 m. The gray module in the figure represents the space occupied by buildings that cannot be utilized by UAVs, while the navy-blue part indicates no-fly zones. The remaining airspace available for UAV operations is color-coded on a spectrum from green to red, indicating the corresponding risk levels ranging from low to high.</p>
Full article ">Figure 13
<p>Final ground risk matrices are visually represented in the figure for three types of UAVs at a flight altitude of 30 m: (<b>a</b>) Parrot Disco; (<b>b</b>) Talon; (<b>c</b>) DJI M350.</p>
Full article ">Figure 13 Cont.
<p>Final ground risk matrices are visually represented in the figure for three types of UAVs at a flight altitude of 30 m: (<b>a</b>) Parrot Disco; (<b>b</b>) Talon; (<b>c</b>) DJI M350.</p>
Full article ">Figure 14
<p>The comparison of intrinsic risk values and final risk values at a flight altitude of 30 m: (<b>a</b>) maximum ground risk; (<b>b</b>) minimum ground risk; (<b>c</b>) average ground risk.</p>
Full article ">Figure 15
<p>The comparison of intrinsic risk values and final risk values at a flight altitude of 90 m: (<b>a</b>) maximum ground risk; (<b>b</b>) minimum ground risk; (<b>c</b>) average ground risk.</p>
Full article ">Figure 16
<p>Maximum, minimum, and average ground risk values for UAVs at a flight altitude of 30 m: (<b>a</b>) Parrot Disco; (<b>b</b>) Talon; (<b>c</b>) DJI Phantom4; (<b>d</b>) DJI M350.</p>
Full article ">Figure 17
<p>Comparison of average ground risk values at 30/60/90 flight altitudes: (<b>a</b>) Parrot Disco; (<b>b</b>)Talon; (<b>c</b>) DJI Phantom4; (<b>d</b>) DJI M350.</p>
Full article ">Figure 17 Cont.
<p>Comparison of average ground risk values at 30/60/90 flight altitudes: (<b>a</b>) Parrot Disco; (<b>b</b>)Talon; (<b>c</b>) DJI Phantom4; (<b>d</b>) DJI M350.</p>
Full article ">
19 pages, 3345 KiB  
Article
Integrating Generative Artificial Intelligence and Problem-Based Learning into the Digitization in Construction Curriculum
by Reza Maalek
Buildings 2024, 14(11), 3642; https://doi.org/10.3390/buildings14113642 - 15 Nov 2024
Viewed by 425
Abstract
This study proposes incorporating generative artificial intelligence large language models (LLMs) into the Master of Science (M.Sc.) curriculum on digitization in construction. The aim was to help students generate computer code to solve, automate, and streamline practical challenges in advanced construction engineering and [...] Read more.
This study proposes incorporating generative artificial intelligence large language models (LLMs) into the Master of Science (M.Sc.) curriculum on digitization in construction. The aim was to help students generate computer code to solve, automate, and streamline practical challenges in advanced construction engineering and management (CEM). To this end, a host of problem-based learning (PBL) individual assignments and collaborative team projects were developed, alongside a combination of flipped classroom models and blended learning lessons, in order to teach effective interactions with LLMs and mitigate concerns, such as bias and hallucination. The effective interaction with LLMs not only facilitated code generation, which would otherwise be complex without additional formal training, but also provided a platform for strengthening basic project management skills, such as departmentalization, work breakdown structuring, modularization, activity delegation, and defining key performance indicators. The effectiveness of this approach was quantitatively and qualitatively evaluated within two new modules, Digital Engineering and Construction and Digital Technologies in Field Information Modeling. These modules were offered over three semesters each as part of a new M.Sc. program in Technology and Management in Construction at the Karlsruhe Institute of Technology. It was observed that 86.4% of students fully completed the PBL projects, while the remaining 13.6% achieved over 50% completion across all six semesters. Furthermore, anonymous student surveys indicated a teaching quality index of 100% in five semesters and 96.4% in one semester. These preliminary results suggest that the proposed strategy can be used to effectively integrate LLMs to support students in code generation for open-ended projects in CEM. Further research was, however, found to be necessary to ensure the sustainable revision and redesign of the problems as LLM capabilities evolve. Full article
Show Figures

Figure 1

Figure 1
<p>Solar panel module arrangement optimization assignment; description of the objectives followed by the typical bungalow single family home and the roof, where the desired panel arrangements will be installed. Note that Table 1 mentioned in the assignment text does not refer to Table 1 of this manuscript.</p>
Full article ">Figure 2
<p>Floor detection from point clouds assignment; description of the objectives followed by steps for the detection and segmentation of floors from 3D point clouds: (<b>a</b>) point cloud of the lab; (<b>b</b>) histogram of point height; and (<b>c</b>) colored/segmented flat (planar) surfaces (e.g., floor as green). Note that Figure 1 mentioned in the assignment text refers to the figure just below the text and not the Figure 1 of this manuscript.</p>
Full article ">Figure 3
<p>Assignment on app development for point cloud object detection in building information modeling (BIM) projects; description of the objectives followed by examples of designed apps: (<b>a</b>) automatic registration of rectilinear projects; and (<b>b</b>) AI-based model fitting of non-analytic structures. Note that Figure 1 mentioned in the assignment text refers to the figure just below the text and not the Figure 1 of this manuscript.</p>
Full article ">Figure 4
<p>PBL project for robotic arm optimization; description of objectives and project, followed by the schematics of the concrete column: (<b>a</b>) point cloud; (<b>b</b>) sample hollow section member for initialization; (<b>c</b>) optimal topology to minimize mass; and (<b>d</b>) robotic-arm design simulation. Note that Figure 1 mentioned in the assignment text refers to the figure just below the text and not the Figure 1 of this manuscript.</p>
Full article ">
Back to TopTop