Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (5,098)

Search Parameters:
Keywords = network theory

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
21 pages, 4387 KiB  
Article
Assessing Construction Safety Performance in Urban Underground Space Development Projects from a Resilience Enhancement Perspective
by Xiaohua Yang, Xiaer Xiahou, Kang Li and Qiming Li
Buildings 2025, 15(5), 726; https://doi.org/10.3390/buildings15050726 - 24 Feb 2025
Abstract
Urban underground space construction frequently encounters issues of inadequate prevention and ineffective resistance to various disturbances, resulting in safety accidents that are difficult to recover from. Resilience pertains to a system’s capacity to absorb, resist, recover, and adapt when faced with disruptions. Enhancing [...] Read more.
Urban underground space construction frequently encounters issues of inadequate prevention and ineffective resistance to various disturbances, resulting in safety accidents that are difficult to recover from. Resilience pertains to a system’s capacity to absorb, resist, recover, and adapt when faced with disruptions. Enhancing the construction safety resilience of underground spaces can effectively tackle the issue of frequent accidents and the challenge of pre-controlling risks at construction sites. Utilizing systems engineering theory, this paper investigates the factors that affect the construction safety resilience of underground spaces and establishes a general framework for evaluating the safety performance of the construction process. Utilizing a large-scale underground construction project as a case study, the Bayesian network inference technique is applied to ascertain the project’s safety resilience value. Through reverse reasoning, the method identifies the most likely sequence of causes leading to construction safety incidents, and subsequently, the resilience assessment framework’s efficacy is tested. The research findings suggest that the core of construction safety management is the prevention of unsafe human behaviors and that the key to enhancing resilience lies in the optimization of response capabilities. The proposed “PFR-EFR-LFR” whole-process resilience analysis method can be applied to safety assessments for various types of underground space construction projects. Full article
Show Figures

Figure 1

Figure 1
<p>An illustration of a BN with five variables.</p>
Full article ">Figure 2
<p>Evolution curve of construction safety resilience.</p>
Full article ">Figure 3
<p>Research framework for construction safety resilience.</p>
Full article ">Figure 4
<p>Construction section distribution.</p>
Full article ">Figure 5
<p>Bayesian network for underground space construction safety resilience.</p>
Full article ">Figure 6
<p>The backward reasoning process of the Bayesian network.</p>
Full article ">
19 pages, 8309 KiB  
Article
Experimental Study on Factors Influencing the Propagation of Hydraulic Fractures in Shale Reservoirs with Developed Natural Weak Planes
by Yitao Huang, Juhui Zhu, Yongming Li, Le He, Zeben Fang and Xiyu Chen
Energies 2025, 18(5), 1100; https://doi.org/10.3390/en18051100 - 24 Feb 2025
Abstract
Hydraulic fracturing is a key technology to build productivity in shale reservoirs; however, the evolution mechanism of fractures is extremely complex, especially in reservoirs with natural weak-planes development. There is an urgent need to conduct systematic research on the influence of natural weak [...] Read more.
Hydraulic fracturing is a key technology to build productivity in shale reservoirs; however, the evolution mechanism of fractures is extremely complex, especially in reservoirs with natural weak-planes development. There is an urgent need to conduct systematic research on the influence of natural weak planes on the vertical propagation of hydraulic fractures. This article takes the deep shale gas block of Luzhou in Southern Sichuan as the research basis and conducts different conditions of true triaxial large-scale hydraulic fracturing physical simulation experiments as well as the characteristics of natural weak-plane reservoir development and reservoir geological characteristics. This study clarifies the interaction mechanism between hydraulic fractures and natural weak planes and identifies the influence of parameters such as vertical stress difference, natural fracture strength, and approach angle on the propagation path of hydraulic fractures in reservoirs with developed natural weak planes, which help us gain a deeper insight into the interaction mechanism between fracture and weak plane. This study indicates that the widely developed natural weak planes in shale reservoirs significantly affect the initiation, propagation, and final distribution of hydraulic fractures. Based on pressure response characteristics, the fracture initiation types can be categorized into two scenarios: initiation along the direction of the maximum principal stress and initiation along natural weak planes. The propagation modes of fractures can be divided into three types: propagation perpendicular to natural weak planes, propagation parallel to natural weak planes, and multi-fracture propagation. The post-pressure fracture distribution patterns can be classified into four types: through-going fractures, T-shaped fractures, compound fractures, and complex fracture networks. The absence of developed natural weak planes, high vertical stress differences, high natural weak-plane cementation strength, and large intersection angles are favorable conditions for the vertical propagation of hydraulic fractures. The research findings enrich the fundamental theory of vertical propagation of hydraulic fractures in shale reservoirs with developed natural weak planes and provide a scientific basis for the formulation and optimization of stimulation schemes for deep shale reservoirs, contributing to better stimulation effects in the Southern Sichuan shale gas block. Full article
Show Figures

Figure 1

Figure 1
<p>Natural weak plane system in Shale Reservoir.</p>
Full article ">Figure 2
<p>Experimental rock samples with undeveloped natural weak planes.</p>
Full article ">Figure 3
<p>Experimental rock samples with developed orthogonal natural weak planes.</p>
Full article ">Figure 4
<p>Experimental rock samples with developed non-orthogonal natural weak planes.</p>
Full article ">Figure 5
<p>Rock sample and stress loading direction diagram.</p>
Full article ">Figure 6
<p>True triaxial hydraulic fracturing simulation system.</p>
Full article ">Figure 7
<p>Experimental procedure.</p>
Full article ">Figure 8
<p>Experimental results.</p>
Full article ">Figure 8 Cont.
<p>Experimental results.</p>
Full article ">Figure 8 Cont.
<p>Experimental results.</p>
Full article ">Figure 9
<p>Pressure characteristics of different hydraulic fracturing initiation modes.</p>
Full article ">Figure 10
<p>Pressure curve of hydraulic fracture along the maximum principal stress direction.</p>
Full article ">Figure 11
<p>Pressure curve of hydraulic fracture along natural weak planes and multiple fractures.</p>
Full article ">Figure 12
<p>The fracture distribution patterns after pressure in different states of natural weak-plane development.</p>
Full article ">Figure 13
<p>The number of post-stress fractures under different stress conditions.</p>
Full article ">Figure 14
<p>Fracture distribution patterns under varying weak-plane cementation strengths.</p>
Full article ">Figure 15
<p>Fracture distribution patterns at different intersection angles.</p>
Full article ">
24 pages, 2118 KiB  
Article
New μ-Synchronization Criteria for Nonlinear Drive–Response Complex Networks with Uncertain Inner Couplings and Variable Delays of Unknown Bounds
by Anran Zhou, Chongming Yang, Chengbo Yi and Hongguang Fan
Axioms 2025, 14(3), 161; https://doi.org/10.3390/axioms14030161 - 23 Feb 2025
Abstract
Since the research of μ-synchronization helps to explore how complex networks (CNs) work together to produce complex behaviors, the μ-synchronization task for uncertain time-delayed CNs is studied in our work. Especially, bounded external perturbations and variable delays of unknown bounds containing [...] Read more.
Since the research of μ-synchronization helps to explore how complex networks (CNs) work together to produce complex behaviors, the μ-synchronization task for uncertain time-delayed CNs is studied in our work. Especially, bounded external perturbations and variable delays of unknown bounds containing coupling delays, internal delays, and pulse delays are all taken into consideration, making the model more general. Through the μ-stable theory together with the hybrid impulsive control technique, the problems caused by uncertain inner couplings, time-varying delays, and perturbations can be solved, and novel synchronization criteria are gained for the μ-synchronization of the considered CNs. Different from traditional models, it is not necessary for the coupling matrices to meet the zero-row-sum condition, and the control protocol relaxes the constraint of time delays on impulse intervals. Moreover, numerical experiments and image encryption algorithms are carried out to verify our theoretical results’ effectiveness. Full article
(This article belongs to the Special Issue Complex Networks and Dynamical Systems)
Show Figures

Figure 1

Figure 1
<p>(<b>a</b>) State trajectories of <math display="inline"><semantics> <mrow> <mrow> <mo>∥</mo> </mrow> <msub> <mi>e</mi> <mi>i</mi> </msub> <mrow> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> <mo>∥</mo> <mo>,</mo> <mrow> <mo>(</mo> <mi>i</mi> <mo>=</mo> <mn>1</mn> <mo>,</mo> <mn>2</mn> <mo>,</mo> <mn>3</mn> <mo>,</mo> <mn>4</mn> <mo>,</mo> <mn>5</mn> <mo>,</mo> <mn>6</mn> <mo>)</mo> </mrow> </mrow> </mrow> </semantics></math> under a proper value of <math display="inline"><semantics> <mrow> <mi mathvariant="normal">Θ</mi> <mo>=</mo> <mo>[</mo> <mn>0.1570</mn> <mo>,</mo> <mn>0.0294</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0.0791</mn> <mo>]</mo> </mrow> </semantics></math>, which means that CNs (<a href="#FD20-axioms-14-00161" class="html-disp-formula">20</a>) and (<a href="#FD21-axioms-14-00161" class="html-disp-formula">21</a>) reach synchronization. (<b>b</b>) State trajectories of <math display="inline"><semantics> <mrow> <mrow> <mo>∥</mo> </mrow> <msub> <mi>e</mi> <mi>i</mi> </msub> <mrow> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> <mo>∥</mo> <mo>,</mo> <mrow> <mo>(</mo> <mi>i</mi> <mo>=</mo> <mn>1</mn> <mo>,</mo> <mn>2</mn> <mo>,</mo> <mn>3</mn> <mo>,</mo> <mn>4</mn> <mo>,</mo> <mn>5</mn> <mo>,</mo> <mn>6</mn> <mo>)</mo> </mrow> </mrow> </mrow> </semantics></math> under the changed value of <math display="inline"><semantics> <mrow> <msup> <mi mathvariant="normal">Θ</mi> <mo>*</mo> </msup> <mo>=</mo> <mi mathvariant="normal">Θ</mi> <mo>+</mo> <mn>0.2</mn> <mi>I</mi> </mrow> </semantics></math>, which shows that CNs (<a href="#FD20-axioms-14-00161" class="html-disp-formula">20</a>) and (<a href="#FD21-axioms-14-00161" class="html-disp-formula">21</a>) are not synchronized.</p>
Full article ">Figure 2
<p>(<b>a</b>) Time evolution of <math display="inline"><semantics> <mrow> <mi>E</mi> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </semantics></math> under different internal delays <math display="inline"><semantics> <mrow> <msub> <mi>v</mi> <mn>1</mn> </msub> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </mrow> </semantics></math>. (<b>b</b>) Time evolution of <math display="inline"><semantics> <mrow> <mi>E</mi> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </semantics></math> under different impulsive delays <math display="inline"><semantics> <msub> <mi>ϑ</mi> <mi>k</mi> </msub> </semantics></math>.</p>
Full article ">Figure 3
<p>(<b>a</b>) State trajectories of <math display="inline"><semantics> <mrow> <mrow> <mo>∥</mo> </mrow> <msub> <mi>e</mi> <mi>i</mi> </msub> <mrow> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> <mo>∥</mo> <mo>,</mo> <mrow> <mo>(</mo> <mi>i</mi> <mo>=</mo> <mn>1</mn> <mo>,</mo> <mn>2</mn> <mo>,</mo> <mn>3</mn> <mo>,</mo> <mn>4</mn> <mo>,</mo> <mn>5</mn> <mo>,</mo> <mn>6</mn> <mo>)</mo> </mrow> </mrow> </mrow> </semantics></math> under a proper value of <math display="inline"><semantics> <mrow> <mi mathvariant="normal">Θ</mi> <mo>=</mo> <mo>[</mo> <mn>0.1483</mn> <mo>,</mo> <mn>0.1668</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0.0825</mn> <mo>]</mo> </mrow> </semantics></math>, which means that CNs (<a href="#FD20-axioms-14-00161" class="html-disp-formula">20</a>) and (<a href="#FD21-axioms-14-00161" class="html-disp-formula">21</a>) reach synchronization. (<b>b</b>) State trajectories of <math display="inline"><semantics> <mrow> <mrow> <mo>∥</mo> </mrow> <msub> <mi>e</mi> <mi>i</mi> </msub> <mrow> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> <mo>∥</mo> <mo>,</mo> <mrow> <mo>(</mo> <mi>i</mi> <mo>=</mo> <mn>1</mn> <mo>,</mo> <mn>2</mn> <mo>,</mo> <mn>3</mn> <mo>,</mo> <mn>4</mn> <mo>,</mo> <mn>5</mn> <mo>,</mo> <mn>6</mn> <mo>)</mo> </mrow> </mrow> </mrow> </semantics></math> under the changed value of <math display="inline"><semantics> <mrow> <msup> <mi mathvariant="normal">Θ</mi> <mo>*</mo> </msup> <mo>=</mo> <mi mathvariant="normal">Θ</mi> <mo>−</mo> <mn>0.2</mn> <mi>I</mi> </mrow> </semantics></math>, which shows that CNs (<a href="#FD20-axioms-14-00161" class="html-disp-formula">20</a>) and (<a href="#FD21-axioms-14-00161" class="html-disp-formula">21</a>) are not synchronized.</p>
Full article ">Figure 4
<p>Flowchart of image encryption and decryption.</p>
Full article ">Figure 5
<p>The results of encrypting and decrypting for the color digital image “Parrot”. (<b>a</b>) The original image; (<b>b</b>) the ciphertext image; (<b>c</b>) the decrypted image.</p>
Full article ">Figure 6
<p>Histogram of image “Parrot” in three channels before and after encryption. (<b>a</b>) Histogram of R component before encryption; (<b>b</b>) histogram of encrypted R component; (<b>c</b>) histogram of G component before encryption; (<b>d</b>) histogram of encrypted G component; (<b>e</b>) histogram of B component before encryption; (<b>f</b>) histogram of encrypted B component.</p>
Full article ">Figure 7
<p>Correlation between adjacent pixel values of images before and after encryption. (<b>a</b>) Correlation between horizontally adjacent pixels in the original image; (<b>b</b>) correlation between horizontally adjacent pixels in the ciphertext image; (<b>c</b>) correlation between vertically adjacent pixels in the original image; (<b>d</b>) correlation between vertically adjacent pixels in the ciphertext image; (<b>e</b>) correlation between adjacent pixels in the diagonal direction of the original image; (<b>f</b>) correlation between adjacent pixels in the diagonal direction of the ciphertext image.</p>
Full article ">
20 pages, 6751 KiB  
Article
Altered Directed-Connectivity Network in Temporal Lobe Epilepsy: A MEG Study
by Chen Zhang, Wenhan Hu, Yutong Wu, Guangfei Li, Chunlan Yang and Ting Wu
Sensors 2025, 25(5), 1356; https://doi.org/10.3390/s25051356 - 22 Feb 2025
Abstract
Temporal lobe epilepsy (TLE) is considered a network disorder rather than a localized lesion, making it essential to study the network mechanisms underlying TLE. In this study, we constructed directed brain networks based on clinical MEG data using the Granger Causality Analysis (GCA) [...] Read more.
Temporal lobe epilepsy (TLE) is considered a network disorder rather than a localized lesion, making it essential to study the network mechanisms underlying TLE. In this study, we constructed directed brain networks based on clinical MEG data using the Granger Causality Analysis (GCA) method, aiming to provide new insights into the network mechanisms of TLE. MEG data from 13 lTLE and 21 rTLE patients and 14 healthy controls (HCs) were analyzed. The preprocessed MEG data were used to construct directed brain networks using the GCA method and undirected brain networks using the Pearson Correlation Coefficient (PCC) method. Graph theoretical analysis extracted global and local topologies from the binary matrix, and SVM classified topologies with significant differences (p < 0.05). Comparative studies were performed on connectivity strengths, graph theory metrics, and SVM classifications between GCA and PCC, with an additional analysis of GCA-weighted network connectivity. The results show that TLE patients showed significantly increased functional connectivity based on GCA compared to the control group; similarities of the hub brain regions between lTLE and rTLE patients and the cortical–limbic–thalamic–cortical loop were identified; TLE patients exhibited a significant increase in GCA-based Global Clustering Coefficient (GCC) and Global Local Efficiency (GLE); most brain regions with abnormal local topological properties in TLE patients overlapped with their hub regions. The directionality of brain connectivity has played a significantly more pivotal role in research on TLE. GCA may be a potential tool in MEG analysis to distinguish TLE patients and HC effectively. Full article
(This article belongs to the Section Biomedical Sensors)
Show Figures

Figure 1

Figure 1
<p>Overview of the experimental workflow. (<b>A</b>) Data Preprocessing: This phase includes the preprocessing of MEG data, the construction of head and source models using T1-weighted MRI, and source reconstruction with the beamformer algorithm to derive regional brain signals. Brain regions are then parcellated according to the AAL116 atlas, and representative signals are extracted based on the maximum power values. (<b>B</b>) Brain Network Construction and Analysis: This section includes brain network construction, brain network binarization, and weighted network analysis. Directed brain networks are established through Granger Causality Analysis (GCA), while undirected networks are formed using the Pearson Correlation Coefficient (PCC). Both networks are binarized using a Global Cost Efficiency (GCE) approach. Weighted network analysis includes comparing connection strengths, evaluating directed connectivity and out-degree metrics, and identifying hub regions. (<b>C</b>) Graph Theoretical Analysis: The analysis focuses on extracting four global topologies: Global Clustering Coefficient (GCC), Global Characteristic Path Length (GCLP), Global Efficiency (GE), and Global Local Efficiency (GLE); and four local topologies: Node Clustering Coefficient (NCC), Node Efficiency (NE), Node Local Efficiency (NLE), and Node Degree Centrality (NDC) from the binarized brain networks. (<b>D</b>) Machine Learning Application: Support Vector Machine (SVM) is utilized to classify topologies with differences of <span class="html-italic">p</span> &lt; 0.05, highlighting differences between the two methodologies.</p>
Full article ">Figure 2
<p>Average connection strengths based on PCC and GCA methods. Blue boxplots represent average connection strengths using the Pearson Correlation Coefficient (PCC) method for healthy controls (HCs), left temporal lobe epilepsy (lTLE) patients, and right TLE (rTLE) patients. Red boxplots represent average connection strengths using the Granger Causality Analysis (GCA) method for HC, lTLE, and rTLE. Abbreviations: PCC HC, PCC lTLE, and PCC rTLE denote HC, lTLE, and rTLE using the PCC method, respectively. Similarly, GCA HC, GCA lTLE, and GCA rTLE denote HC, lTLE, and rTLE using the GCA method. (*) indicates statistical significance between HC and lTLE, as well as between HC and rTLE, assessed using a <span class="html-italic">t</span>-test. * <span class="html-italic">p</span> &lt; 0.05, ** <span class="html-italic">p</span> &lt; 0.01, *** <span class="html-italic">p</span> &lt; 0.001.</p>
Full article ">Figure 3
<p>Different connectivity analysis based on GCA. This figure presents a comparative analysis of brain network connectivity between left temporal lobe epilepsy (lTLE), right temporal lobe epilepsy (rTLE), and healthy controls (HCs). The four sections (<b>A</b>–<b>D</b>) represent different network connectivity features. (<b>A</b>) Top 20 LCS: The top 20 strongest connections in each group, ranked by connection strength. (<b>B</b>) Top 20 GDC: The top 20 connections with the greatest dissimilarity for lTLE and rTLE compared to HC. (<b>C</b>) Top 5 HODR: The top 5 brain regions with the highest out-degree in each group. (<b>D</b>) Top 5 GDR: The top 5 brain regions with the greatest dissimilarity for lTLE and rTLE compared to HC. The color legend indicates the brain regions involved, with each color corresponding to a specific brain region.</p>
Full article ">Figure 4
<p>Hub regions in TLE. This figure illustrates the hub regions of brain networks in patients with lTLE and rTLE. The hubs are identified based on their frequency of appearance in different analyses. (<b>A</b>) lTLE hub regions: hub regions in patients with lTLE. (<b>B</b>) rTLE hub regions: hub regions in patients with rTLE. Arrows indicate the increasing frequency of hub regions from bottom to top in each section. Each brain slice shows the anatomical location of these regions and is visualized using axial, sagittal, and coronal brain slices.</p>
Full article ">Figure 5
<p>Global topological parameters of brain functional networks in lTLE patients, rTLE patients, and HC. In the bar graph, black lines indicate data ranges and bars depict means. (*) indicates: <span class="html-italic">p</span> &lt; 0.05, as determined by the Mann–Whitney U non-parametric test.</p>
Full article ">Figure 6
<p>AUC of SVM classification of TLE and HC based on PCC and GCA methods.</p>
Full article ">Figure 7
<p>Classification effect of GCA under different model orders.</p>
Full article ">
29 pages, 12501 KiB  
Article
Profit-Efficient Elastic Allocation of Cloud Resources Using Two-Stage Adaptive Workload Prediction
by Lei Li and Xue Gao
Appl. Sci. 2025, 15(5), 2347; https://doi.org/10.3390/app15052347 - 22 Feb 2025
Abstract
Internet services are increasingly being deployed using cloud computing. However, the workload of an Internet service is not constant; therefore, the required cloud computing resources need to be allocated elastically to minimize the associated costs. Thus, this study proposes a proactive cloud resource [...] Read more.
Internet services are increasingly being deployed using cloud computing. However, the workload of an Internet service is not constant; therefore, the required cloud computing resources need to be allocated elastically to minimize the associated costs. Thus, this study proposes a proactive cloud resource scheduling framework. First, we propose a new workload prediction method—named the adaptive two-stage multi-neural network based on long short-term memory (LSTM)—which can adaptively route prediction tasks to the corresponding LSTM sub-model according to the workload change trend (i.e., uphill and downhill categories), in order to improve the predictive accuracy. To avoid the cost associated with manual labeling of the training data, the first-order gradient feature is used with the k-means algorithm to cluster and label the original training data set automatically into uphill and downhill training data sets. Then, based on stochastic queueing theory and the proposed prediction method, a maximum cloud service profit resource search algorithm based on the network workload prediction algorithm is proposed to identify a suitable number of virtual machines (VMs) in order to avoid delays in resource adjustment and increase the service profit. The experimental results demonstrate that the proposed proactive adaptive elastic resource scheduling framework can improve the workload prediction accuracy (MAPE: 0.0276, RMSE: 3.7085, R2: 0.9522) and effectively allocate cloud resources. Full article
Show Figures

Figure 1

Figure 1
<p>Situations of resource under- and over-provision. VMs, virtual machines.</p>
Full article ">Figure 2
<p>The resource management architecture in cloud computing. IaaS, infrastructure-as-a-service. VMs, virtual machines.</p>
Full article ">Figure 3
<p>Architecture of a long short-term memory unit.</p>
Full article ">Figure 4
<p>Architecture of a long short-term memory (LSTM) prediction model.</p>
Full article ">Figure 5
<p>Task arrival workload of the Wikimedia service.</p>
Full article ">Figure 6
<p>Classification of the task arrival workload for the Wikimedia service.</p>
Full article ">Figure 7
<p>Architecture of the proposed adaptive two-stage multi-neural network model based on long short-term memory (ATSMNN-LSTM) method.</p>
Full article ">Figure 8
<p>Euclidean distances of three workload data groups.</p>
Full article ">Figure 9
<p>First-order gradient features of three workload data groups.</p>
Full article ">Figure 10
<p>Architecture of the binary classification neural network model.</p>
Full article ">Figure 11
<p>Training process of the proposed prediction model. LSTM, long short-term memory; NN, neural network.</p>
Full article ">Figure 12
<p>Workflow of the proposed workload prediction method. LSTM, long short-term memory; NN, neural network.</p>
Full article ">Figure 13
<p>Structure of the task processing queueing model in virtual machines (VMs).</p>
Full article ">Figure 14
<p>Cloud service costs with a high task profit. VM, virtual machine.</p>
Full article ">Figure 15
<p>Cloud service costs with a low task profit. VM, virtual machine.</p>
Full article ">Figure 16
<p>Cloud service costs with a medium task profit. VM, virtual machine.</p>
Full article ">Figure 17
<p>Comparison of the prediction results for 30 time points.</p>
Full article ">Figure 18
<p>Comparison of the relative error (RE).</p>
Full article ">Figure 19
<p>Comparison of the absolute error (AE).</p>
Full article ">Figure 20
<p>Cumulative distribution percentage error for different models. ET, error threshold; PBET, error threshold percentage.</p>
Full article ">Figure 21
<p>Heatmap of the Diebold–Mariano (DM) test statistics.</p>
Full article ">Figure 22
<p>Binary classification neural network outputs with the first-order gradient feature.</p>
Full article ">Figure 23
<p>Binary classification neural network outputs with the original data.</p>
Full article ">Figure 24
<p>Cloud service loss (S.Loss) of the MaxCSPR and QoS-G algorithms.</p>
Full article ">Figure 25
<p>Virtual machine system load (S.Load) of the MaxCSPR and QoS-G algorithms.</p>
Full article ">Figure 26
<p>Average task delay (S.Delay) of the MaxCSPR and QoS-G algorithms.</p>
Full article ">Figure 27
<p>Virtual machine (VM) number allocation using the MaxCSPR algorithm.</p>
Full article ">Figure 28
<p>Average task delay (AT.Delay) and virtual machine (VM) system load (VS.Load) in CloudSim simulation.</p>
Full article ">
37 pages, 8149 KiB  
Article
Dynamic Evolution and Chaos Management in the Integration of Informatization and Industrialization
by Jianhua Zhu, Bo Sun and Fang Zhang
Systems 2025, 13(3), 148; https://doi.org/10.3390/systems13030148 - 21 Feb 2025
Abstract
The accelerating digital transformation necessitates a paradigm shift in manufacturing, requiring a structured transition from traditional to smart manufacturing. To address the challenges of fragmented integration, this study proposes an evolutionary model known as the integration of informatization and industrialization (TIOII) that systematically [...] Read more.
The accelerating digital transformation necessitates a paradigm shift in manufacturing, requiring a structured transition from traditional to smart manufacturing. To address the challenges of fragmented integration, this study proposes an evolutionary model known as the integration of informatization and industrialization (TIOII) that systematically analyzes the dynamic interactions among product, technique, and business integration using a back-propagation neural network approach. A significant research gap exists in understanding how the chaotic and nonlinear interactions between these dimensions influence enterprise stability and adaptability. Prior studies have primarily focused on static models, failing to capture the evolutionary and dynamic nature of TIOII. To address this gap, this study employs stability theory and chaos theory to uncover the mechanisms through which TIOII disrupts pre-existing equilibrium states, leading to chaotic fluctuations before stabilizing into new structural configurations. This research also incorporates robust control theory to formulate strategies for enterprises to effectively manage instability and uncertainty throughout this transformation process. The findings reveal that TIOII is not a linear progression but an iterative process marked by instability and self-organized restructuring. The proposed model successfully explains the intricate, nonlinear interactions and evolutionary trajectories of TIOII dimensions, demonstrating that enterprise transformation follows a chaotic yet structured pattern. Moreover, the robust control methodology proves effective in mitigating uncontrolled instability, offering enterprises practical guidelines for refining investment strategies and adapting business operations amidst disruptive changes. This study enhances the theoretical understanding of industrial transformation by revealing the pivotal role of chaos in transitioning from stability to new stability, contributing to research on complex adaptive systems in enterprise management. The findings highlight the necessity of proactive strategic reconfiguration in technology, management, and product development, enabling enterprises to restructure investment strategies, refine business models, and achieve resilient, innovation-driven growth. Full article
Show Figures

Figure 1

Figure 1
<p>Content framework of TIOII.</p>
Full article ">Figure 2
<p>The dynamic process of TIOII under the influence of internal and external factors.</p>
Full article ">Figure 3
<p>The logically evolutionary relations of TIOII.</p>
Full article ">Figure 4
<p>A three-layer BP neural network.</p>
Full article ">Figure 5
<p>Identification model based on three-layer BP neural network.</p>
Full article ">Figure 6
<p>The flow chart to determine and identify the system parameter.</p>
Full article ">Figure 7
<p>The integration process of manufacturing enterprises.</p>
Full article ">Figure 8
<p>Enterprise structure change process.</p>
Full article ">Figure 9
<p>The internal mechanism of TIOII.</p>
Full article ">Figure 10
<p>Loss of deep learning neural network model.</p>
Full article ">Figure 11
<p>Manufacturing enterprise’s evolution trajectory.</p>
Full article ">Figure 12
<p>Maximum Lyapunov exponent of TIOII.</p>
Full article ">Figure 13
<p>Initial value sensitivity test.</p>
Full article ">Figure 14
<p>Time domain diagram of dynamic system.</p>
Full article ">Figure 15
<p>Maximum Lyapunov exponent of the dynamic system after applying control.</p>
Full article ">Figure 16
<p>Phase diagram of dynamic system after applying control.</p>
Full article ">Figure 17
<p>Structural changes during TIOII in manufacturing enterprises.</p>
Full article ">Figure A1
<p>Time domain diagram of dynamic system (a = −1.4118, b = −5.844, time domain of system (A18) on the left and time domain of system (A19) on the right).</p>
Full article ">Figure A2
<p>Time domain diagram of dynamic system (a = −0.62816, b = −9.9099, time domain of system (A18) on the left and time domain of system (A19) on the right).</p>
Full article ">Figure A3
<p>Time domain diagram of dynamic system (a = −0.32882, b = −8.4133, time domain of system (A18) on the left and time domain of system (A19) on the right).</p>
Full article ">
35 pages, 1515 KiB  
Article
AI Product Factors and Pro-Environmental Behavior: An Integrated Model with Hybrid Analytical Approaches
by Chi-Horng Liao
Systems 2025, 13(3), 144; https://doi.org/10.3390/systems13030144 - 21 Feb 2025
Abstract
Based on three theories—the Technology Acceptance Model (TAM), the Unified Theory of Acceptance and Use of Technology (UTAUT), and Responsible Environmental Behavior (REB)—the present study proposes a model of AI product factors and pro-environmental behavior. This study aims to investigate AI product factors [...] Read more.
Based on three theories—the Technology Acceptance Model (TAM), the Unified Theory of Acceptance and Use of Technology (UTAUT), and Responsible Environmental Behavior (REB)—the present study proposes a model of AI product factors and pro-environmental behavior. This study aims to investigate AI product factors that promote pro-environmental behavior by examining behavioral intentions to use AI technology. Unlike previous research, which predominantly focused on external variables such as social norms, cost, and inconvenience, or individual variables like demographic and psychological factors, this study emphasizes the underexplored role of technological factors. It integrates the Fuzzy Decision-Making Trial and Evaluation Laboratory (F-DEMATEL), Structural Equation Modeling (SEM), and Artificial Neural Network (ANN) approaches to assess the relationships among constructs. For the F-DEMATEL, opinions were collected from 20 experts in the environmental field, while SEM and ANN data were gathered from 1726 participants in Taiwan. F-DEMATEL results demonstrated causal relationships between external factors (perceived trust, self-efficacy, and perceived awareness) and the main variables of the TAM. Likewise, SEM results revealed that perceived trust (PT), self-efficacy (SE), and perceived awareness (PA) influence the main variables of TAM. However, the direct relationships between PT and behavioral intention (BI) and PA and BI were not significant. PT and PA indirectly influence BI through perceived usefulness (PU) and perceived ease of use (PEOU). The results also established that BI positively influences pro-environmental behavior. The author has also outlined how stakeholders aiming to encourage sustainable environmental behaviors can utilize the study’s findings to protect the environment. Full article
Show Figures

Figure 1

Figure 1
<p>Conceptual framework.</p>
Full article ">Figure 2
<p>The cause-and-effect digraph. Note: PT = perceived trust; SE= self-efficacy; PA= perceived awareness; FC = facilitating condition; PB = perceived benefit; PU= perceived usefulness; PEOU = perceived ease of use; SI = social influence.</p>
Full article ">Figure 3
<p>PLS-SEM path analysis for inner model.</p>
Full article ">Figure 4
<p>ANN model for PU output (model A), where PU = perceived usefulness; PT = perceived trust; SE = self-efficacy; PA = perceived awareness.</p>
Full article ">
18 pages, 522 KiB  
Article
Preserving Privacy of Internet of Things Network with Certificateless Ring Signature
by Yang Zhang, Pengxiao Duan, Chaoyang Li, Hua Zhang and Haseeb Ahmad
Sensors 2025, 25(5), 1321; https://doi.org/10.3390/s25051321 - 21 Feb 2025
Abstract
With the rapid development of quantum computers and quantum computing, Internet of Things (IoT) networks equipped with traditional cryptographic algorithms have become very weak against quantum attacks. This paper focuses on the privacy-preserving problem in IoT networks and proposes a certificateless ring signature [...] Read more.
With the rapid development of quantum computers and quantum computing, Internet of Things (IoT) networks equipped with traditional cryptographic algorithms have become very weak against quantum attacks. This paper focuses on the privacy-preserving problem in IoT networks and proposes a certificateless ring signature (CLRS) scheme. This CLRS is constructed with lattice theories, which show promising advantages in resisting quantum attacks. Meanwhile, the certificateless mechanism reduces the key control ability of the key generation center (KGC) by adding personal secret keys to the private key generated by the system. Meanwhile, the ring signature mechanism protects users’ privacy information through a non-central control mechanism. Next, the security proof in a random oracle model is given, which shows that this CLRS scheme can obtain unforgeability and ensure the signer’s anonymity. Its security properties include non-repudiation, traceability, and post-quantum security. Then, the efficiency comparison and performance results show that this CLRS scheme is more efficient and practical than similar schemes. Moreover, this work presents an exploration of the post-quantum cryptographic algorithm and its application in IoT networks. Full article
(This article belongs to the Special Issue IoT Network Security (Second Edition))
Show Figures

Figure 1

Figure 1
<p>Key size comparison.</p>
Full article ">Figure 2
<p>Signature size comparison.</p>
Full article ">Figure 3
<p>Time consumption.</p>
Full article ">Figure 4
<p>Example application in BCCLS.</p>
Full article ">Figure 5
<p>Transaction throughput comparison.</p>
Full article ">Figure 6
<p>Transaction latency comparison.</p>
Full article ">
35 pages, 9453 KiB  
Article
A Two-Layer Causal Knowledge Network Construction Method Based on Quality Problem-Solving Data
by Yubin Wang, Shirong Qiang, Xin Yue, Tao Li and Keyong Zhang
Systems 2025, 13(3), 142; https://doi.org/10.3390/systems13030142 - 20 Feb 2025
Abstract
“Cause analysis” constitutes an indispensable component in quality management systems, serving to systematically identify the causes of quality defects, thereby enabling the development of targeted improvement strategies that concurrently address surface-level manifestations and fundamental drivers. However, relying solely on personal experience makes it [...] Read more.
“Cause analysis” constitutes an indispensable component in quality management systems, serving to systematically identify the causes of quality defects, thereby enabling the development of targeted improvement strategies that concurrently address surface-level manifestations and fundamental drivers. However, relying solely on personal experience makes it challenging to conduct a comprehensive and in-depth analysis of quality problems. The reason is that, when analyzing the causes of quality problems, it is essential not only to consider the specific context in which the problems occur. This enables “specific problems” to be “specifically analyzed” for the formulation of temporary containment measures. Additionally, the context of the problem needs to be stripped. This allows for a general and in-depth analysis of the “class problem” or the causal linkages underlying the problem, thereby determining the root cause of the problem and formulating a corresponding long-term program. The analysis of the causes of quality problems exhibits “duality” characteristics. Based on this, this study proposes and constructs a two-layer causal knowledge network by leveraging the causal knowledge generated and applied in the process of quality problem solving to address the “duality” characteristic of the cause analysis of quality problems. The proposed network can assist front-line employees in analyzing the quality problems of products from diverse perspectives and overcome the challenge of relying solely on personal experience to comprehensively and profoundly analyze the causal relationships of quality problems. Our method not only contributes to enhancing the efficiency of quality problem solving but also makes a valuable contribution to the advancement of theories and methods related to quality management and knowledge management. Full article
(This article belongs to the Special Issue Data-Driven Methods in Business Process Management)
Show Figures

Figure 1

Figure 1
<p>Research design.</p>
Full article ">Figure 2
<p>Diagram of causal knowledge group.</p>
Full article ">Figure 3
<p>Schematic of DL-CKN.</p>
Full article ">Figure 4
<p>Domain vocabulary construction process.</p>
Full article ">Figure 5
<p>Causal knowledge sets containing multiple causal and contextual elements.</p>
Full article ">Figure 6
<p>Abstract causal knowledge network.</p>
Full article ">Figure 7
<p>Abstract causal knowledge network for the necking problem.</p>
Full article ">Figure 8
<p>Concrete causal knowledge network.</p>
Full article ">Figure 9
<p>Concrete causal knowledge network for the necking problem.</p>
Full article ">Figure 10
<p>DL-CKN.</p>
Full article ">Figure A1
<p>Schematic diagram of one cause with multiple effects.</p>
Full article ">Figure A2
<p>Schematic diagram of multiple causes and one result.</p>
Full article ">Figure A3
<p>Schematic diagram of multiple causes and multiple results.</p>
Full article ">Figure A4
<p>Schematic diagram of the splitting method of the “or” relationship in one cause and multiple results.</p>
Full article ">Figure A5
<p>Schematic diagram of the splitting method of the “or” relationship in multiple causes and one result.</p>
Full article ">Figure A6
<p>Schematic diagram of the splitting method of the “or” relationship in multiple causes and multiple results.</p>
Full article ">Figure A7
<p>Schematic diagram of multiple causal relationships after splitting.</p>
Full article ">Figure A8
<p>Schematic diagram of the combination method of the “and” relationship in one cause and multiple results.</p>
Full article ">Figure A9
<p>Schematic diagram of the combination method of the “and” relationship in multiple causes and one result.</p>
Full article ">Figure A10
<p>Schematic diagram of the combination method of the “and” relationship in multiple causes and multiple results.</p>
Full article ">Figure A11
<p>Causal knowledge groups in the form of “one cause and one result”.</p>
Full article ">
17 pages, 2936 KiB  
Article
Influence of Cover Crop Root Functional Traits on Sweet Potato Yield and Soil Microbial Communities
by Xinyi Chen, Jie Zhang, Wangbiao Xia, Yangyang Shao, Zhirong Liu, Jian Guo, Wenjing Qin, Li Wan, Jia Liu, Ying Liu and Juntong Zhang
Microorganisms 2025, 13(3), 471; https://doi.org/10.3390/microorganisms13030471 - 20 Feb 2025
Abstract
The symbiotic relationship between cover crops and soil microorganisms is closely linked to nutrient cycling and crop growth within agroecosystems. However, how cover crops with different root functional traits influence soil microbial communities, soil properties, and crop yields has remained understudied. This study [...] Read more.
The symbiotic relationship between cover crops and soil microorganisms is closely linked to nutrient cycling and crop growth within agroecosystems. However, how cover crops with different root functional traits influence soil microbial communities, soil properties, and crop yields has remained understudied. This study assessed the root traits of hairy vetch (HV) and rapeseed (RP), along with soil properties, sweet potato yield, and microbial enzyme activity under red soil dryland conditions. High-throughput sequencing was also employed to characterize the diversity, composition, and network structure of soil bacterial and fungal communities. According to the plant economic spectrum theory and our research results on plant root traits, HV can be identified as a resource-acquisitive cover crop, and RP treatment can be identified as a resource-conservative cover crop. Although RP treatment did not significantly increase the sweet potato yield, the increase rate reached 8.49%. Resource-conservative cover crops were associated with increased pH, SOC, and TP, which enhanced bacterial species diversity and boosted the populations of Chloroflexi and Alphaproteobacteria. In contrast, resource-acquisitive cover crops promoted the proliferation of Gammaproteobacteria. Network analysis indicated that resource-conservative cover crops facilitated network complexity through intensified intra-community competition. Resource-acquisitive cover crops enhanced the stability of microbial communities. Collectively, these findings underscore the distinct advantages of cover crops with varying root functional traits in shaping soil microbial communities. Appropriate cover crop rotations can effectively regulate microbial communities and hold the potential to enhance crop yield. Full article
Show Figures

Figure 1

Figure 1
<p>(<b>a</b>) Principal component analysis (PCA) of functional traits for two distinct cover crops. The figure displays two distinct clusters representing cover crop ecological strategies. One species on the left represents the acquisitive end of the plant economic spectrum, while the other on the right represents the conservative end. The green and blue ovals represent the conservative and acquisitive strategies, respectively. HV, hairy vetch; RP, rapeseed; D, root diameter; C/N, carbon-to-nitrogen ratio; CC, carbon content; NC, nitrogen content; V, volume; SA, surface area; T, number of root tips; L, length. (<b>b</b>) Variations in sweet potato yield under different cropping treatments. The same lowercase letter above the box indicates no significant difference (<span class="html-italic">p</span> &gt; 0.05).</p>
Full article ">Figure 2
<p>CK, winter fallow; HV, hairy vetch; RP, rapeseed. AN, available nitrogen; TN, total nitrogen; SOC, soil organic carbon; AP, available phosphorus; TP, total phosphorus. Different letters within the same row indicate significant differences among the treatments (<span class="html-italic">p</span> &lt; 0.05).</p>
Full article ">Figure 3
<p>Influence of various cover crops on microbial community diversity and composition. The impact of different cover crop treatments on bacterial (<b>a</b>) and fungal (<b>b</b>) richness indices is depicted. CAP biplots display the differences in bacterial (<b>c</b>) and fungal (<b>d</b>) consortia associated with various cover crops. Cover crops accounted for 20.989% of the total variance in bacterial communities and 27.31% in fungal communities. Different lowercase letters above the boxes indicate significant difference among the treatments (<span class="html-italic">p</span> &lt; 0.05).</p>
Full article ">Figure 4
<p>Relative abundance of soil bacterial communities at the phylum (<b>a</b>) and fungal (<b>b</b>) communities at the class level under different treatments.</p>
Full article ">Figure 5
<p>Manhattan plots of ASV enrichment in the HV or RP treatments relative to the CK treatment. The plots highlight bacterial species differences between the CK and HV (<b>a</b>) and the CK and RP (<b>b</b>) treatments. The enrichment of ASVs are shown in the HV (<b>c</b>) and RP (<b>d</b>) treatments in contrast to the CK treatment at the fungal level. Each dot or triangle represents an individual ASV, with the colors indicating different phyla. The solid triangles denote the ASVs enriched in the CK treatment, whereas the empty triangles represent those enriched in the HV or RP treatments. The circles positioned below the dashed line signify noise (FDR adjusted <span class="html-italic">p</span> &lt; 0.05, Wilcoxon rank sum test). CPM, counts per million.</p>
Full article ">Figure 6
<p>Symbiotic network structures in different cover crops with diverse functional traits. (<b>a</b>) Co-occurrence network patterns of soil fungi. (<b>b</b>) Co-occurrence network patterns of soil bacteria. Distinct colors represent different ecological clusters, and circle sizes correspond to the relative abundance of ASVs. (<b>c</b>) Topological characteristics of soil bacteria co-occurrence networks, including the number of nodes, number of edges, average degree, and linkage density. Different lowercase letters above the boxes indicate significant difference among the treatments.</p>
Full article ">
20 pages, 1031 KiB  
Article
Entropies and Degree-Based Topological Indices of Coronene Fractal Structures
by Si-Ao Xu and Jia-Bao Liu
Fractal Fract. 2025, 9(3), 133; https://doi.org/10.3390/fractalfract9030133 - 20 Feb 2025
Abstract
Molecular fractals are geometric patterns that appear self-similar across all length scales and are constructed by repeating a single unit on a regular basis. Entropy, as a core thermodynamic function, is an extension based on information theory (such as Shannon entropy) and is [...] Read more.
Molecular fractals are geometric patterns that appear self-similar across all length scales and are constructed by repeating a single unit on a regular basis. Entropy, as a core thermodynamic function, is an extension based on information theory (such as Shannon entropy) and is used to describe the topological structural complexity or degree of disorder in networks. A topological index is a numeric quantity associated with a network or a graph that characterizes its whole structural properties. In this study, we focus on fractal structures formed by systematically repeating a fixed unit of coronene, a polycyclic aromatic hydrocarbon composed of six benzene rings fused in a hexagonal pattern. In this paper, three types of coronal fractal structures, namely zigzag (ZHCF), armchair (AHCF), and rectangular (RCF), are studied, and their five degree-based topological indices and corresponding entropies are calculated. Full article
(This article belongs to the Special Issue Fractal Functions: Theoretical Research and Application Analysis)
Show Figures

Figure 1

Figure 1
<p>The formation of coronene’s fractal structure.</p>
Full article ">Figure 2
<p>First three stages of zigzag coronene fractal structures.</p>
Full article ">Figure 3
<p>First three stages of armchair coronene fractal structures.</p>
Full article ">Figure 4
<p>Rectangular coronene fractal structures RCF(1,1), RCF(4,3), and RCF(8,3).</p>
Full article ">Figure 5
<p>Three graphs that are utilizable for constructing ZHCF(1), ZHCF(2), and ZHCF(3).</p>
Full article ">Figure 6
<p>Three graphs that are utilizable for constructing AHCF(1), AHCF(2), and AHCF(3).</p>
Full article ">Figure 7
<p>Three graphs that are utilizable for constructing RCF(1,1), RCF(4,3), and RCF(8,3).</p>
Full article ">Figure 8
<p>The degrees of the vertices in the coronene fractal ZHCF(1).</p>
Full article ">Figure 9
<p>Graphical representation of entropy values of <span class="html-italic">ZHCF</span>(<span class="html-italic">t</span>), <span class="html-italic">AHCF</span>(<span class="html-italic">t</span>), and <span class="html-italic">RCF</span>(<span class="html-italic">p</span>, <span class="html-italic">q</span>) for degree-based index functions.</p>
Full article ">
28 pages, 16471 KiB  
Article
An Institutional Theory Framework for Leveraging Large Language Models for Policy Analysis and Intervention Design
by J. de Curtò, I. de Zarzà, Leandro Sebastián Fervier, Victoria Sanagustín-Fons and Carlos T. Calafate
Future Internet 2025, 17(3), 96; https://doi.org/10.3390/fi17030096 - 20 Feb 2025
Abstract
This study proposes a comprehensive framework for integrating data-driven approaches into policy analysis and intervention strategies. The methodology is structured around five critical components: data collection, historical analysis, policy impact assessment, predictive modeling, and intervention design. Leveraging data-driven approaches capabilities, the line of [...] Read more.
This study proposes a comprehensive framework for integrating data-driven approaches into policy analysis and intervention strategies. The methodology is structured around five critical components: data collection, historical analysis, policy impact assessment, predictive modeling, and intervention design. Leveraging data-driven approaches capabilities, the line of work enables advanced multilingual data processing, advanced statistics in population trends, evaluation of policy outcomes, and the development of evidence-based interventions. A key focus is on the theoretical integration of social order mechanisms, including communication modes as institutional structures, token optimization as an efficiency mechanism, and institutional memory adaptation. A mixed methods approach was used that included sophisticated visualization techniques and use cases in the hospitality sector, in global food security, and in educational development. The framework demonstrates its capacity to inform government and industry policies by leveraging statistics, visualization, and AI-driven decision support. We introduce the concept of “institutional intelligence”—the synergistic integration of human expertise, AI capabilities, and institutional theory—to create adaptive yet stable policy-making systems. This research highlights the transformative potential of data-driven approaches combined with large language models in supporting sustainable and inclusive policy-making processes. Full article
(This article belongs to the Special Issue Generative Artificial Intelligence in Smart Societies)
Show Figures

Figure 1

Figure 1
<p><b>High-level framework for policy analysis and intervention design.</b> This diagram shows the core progression through the five main stages of the framework.</p>
Full article ">Figure 2
<p><b>Detailed components of the framework stages.</b> This diagram details the specific elements and interconnections within each framework stage.</p>
Full article ">Figure 3
<p><b>High-level communication structure.</b> This diagram presents an overview of how communication structure integrates determination, efficiency, and interaction layers, leading to output formation and social order impact.</p>
Full article ">Figure 4
<p><b>Detailed layer components of communication structure.</b> This diagram expands on the three primary layers—determination, efficiency, and interaction—detailing their internal components and interconnections.</p>
Full article ">Figure 5
<p><b>Interconnected insights into the hospitality market.</b> These visualizations collectively offer a comprehensive view of the spatial, typological, and temporal dimensions of the hospitality industry. Interactive version available at: <a href="https://public.flourish.studio/story/2733675/" target="_blank">https://public.flourish.studio/story/2733675/</a>, accessed on 1 January 2025.</p>
Full article ">Figure 6
<p><b>Visualization story with five acts developed in Tableau.</b> This multi-layered narrative explores temporal, regional, and demographic aspects of cancellations in the hospitality sector. Interactive version available at: <a href="https://public.tableau.com/app/profile/decurto/viz/Tendnciesdereservesdhotelsilescancellacions/Story1" target="_blank">https://public.tableau.com/app/profile/decurto/viz/Tendnciesdereservesdhotelsilescancellacions/Story1</a>, accessed on 1 January 2025.</p>
Full article ">Figure 7
<p><b>Interactive sunburst plot developed in D3.js of hotel reservation cancellations.</b> Interactive version available at: <a href="https://decurto01.netlify.app/" target="_blank">https://decurto01.netlify.app/</a>, accessed on accessed on 1 January 2025.</p>
Full article ">Figure 8
<p><b>Training dynamics across five-fold cross-validation of the GNN model.</b> Interactive visualization: <a href="https://api.wandb.ai/links/decurto-universidad-pontificia-comillas/kvhl87um" target="_blank">https://api.wandb.ai/links/decurto-universidad-pontificia-comillas/kvhl87um</a>, accessed on 1 January 2025.</p>
Full article ">Figure 9
<p><b>Left</b>: <b>Global food security choropleth map showing worldwide distribution of security metrics.</b> Interactive version available at: <a href="https://public.tableau.com/app/profile/decurto/viz/GlobalFoodSecurityComparingKeyIndicatorsAcrossCountries/Sheet1" target="_blank">https://public.tableau.com/app/profile/decurto/viz/GlobalFoodSecurityComparingKeyIndicatorsAcrossCountries/Sheet1</a>, accessed on 1 January 2025. <b>Right</b>: <b>Adult literacy rates visualization, focusing on sub-Saharan Africa.</b> Interactive version available at: <a href="https://public.tableau.com/app/profile/dezarza/viz/AdultLiteracyRatesinSub-SaharanAfrica/Sheet1" target="_blank">https://public.tableau.com/app/profile/dezarza/viz/AdultLiteracyRatesinSub-SaharanAfrica/Sheet1</a>, accessed on 1 January 2025.</p>
Full article ">Figure 10
<p><b>Visualization dashboard of global food security showing comparative metrics across countries.</b> Interactive version available at: <a href="https://foodsecurity-decurto.streamlit.app/" target="_blank">https://foodsecurity-decurto.streamlit.app/</a>, accessed on 1 January 2025.</p>
Full article ">Figure 11
<p><b>Dashboard of educational development tracking, focusing on literacy rates.</b> Interactive version available at: <a href="https://globaleducation-dezarza.streamlit.app/" target="_blank">https://globaleducation-dezarza.streamlit.app/</a>, accessed on 1 January 2025.</p>
Full article ">
23 pages, 676 KiB  
Review
Game Theory and Robust Predictive Control for Peer-to-Peer Energy Management: A Pathway to a Low-Carbon Economy
by Félix González, Paul Arévalo and Luis Ramirez
Sustainability 2025, 17(5), 1780; https://doi.org/10.3390/su17051780 - 20 Feb 2025
Abstract
The shift towards decentralized energy systems demands innovative strategies to manage renewable energy integration, optimize resource allocation, and ensure grid stability. This review investigates the application of game theory and robust predictive control as essential tools for decentralized and peer-to-peer energy management. Game [...] Read more.
The shift towards decentralized energy systems demands innovative strategies to manage renewable energy integration, optimize resource allocation, and ensure grid stability. This review investigates the application of game theory and robust predictive control as essential tools for decentralized and peer-to-peer energy management. Game theory facilitates strategic decision-making and cooperation among prosumers, distributors, and consumers, enabling efficient energy trading and dynamic resource distribution. Robust predictive control complements this by addressing uncertainties in renewable energy generation and demand, ensuring system stability through adaptive and real-time optimization. By examining recent advancements, this study highlights key methodologies, challenges, and emerging technologies such as blockchain, artificial intelligence, and digital twins, which enhance these approaches. The review also explores their alignment with global sustainability objectives, emphasizing their role in promoting affordable clean energy, reducing emissions, and fostering resilient urban energy infrastructures. A systematic review methodology was employed, analyzing 153 selected articles published in the last five years, filtered from an initial dataset of over 200 results retrieved from ScienceDirect and IEEE Xplore. Practical insights and future directions are provided to guide the implementation of these innovative methodologies in decentralized energy networks. Full article
(This article belongs to the Special Issue Sustainable Energy: The Path to a Low-Carbon Economy)
Show Figures

Figure 1

Figure 1
<p>Systematic literature selection process.</p>
Full article ">
28 pages, 4151 KiB  
Article
Development of Deep Learning Simulation and Density Functional Theory Framework for Electrocatalyst Layers for PEM Electrolyzers
by Jaydev Zaveri, Shankar Raman Dhanushkodi, Michael W. Fowler, Brant A. Peppley, Dawid Taler, Tomasz Sobota and Jan Taler
Energies 2025, 18(5), 1022; https://doi.org/10.3390/en18051022 - 20 Feb 2025
Abstract
The electrocatalyst layers (ECLs) in polymer electrolyte membrane (PEM) electrolyzers are fundamentally comprised of IrOx catalysts, support material, and an ionomer. Their stability is critically dependent on structure and composition, necessitating a thorough understanding of ionization potential and work function. We employ Density [...] Read more.
The electrocatalyst layers (ECLs) in polymer electrolyte membrane (PEM) electrolyzers are fundamentally comprised of IrOx catalysts, support material, and an ionomer. Their stability is critically dependent on structure and composition, necessitating a thorough understanding of ionization potential and work function. We employ Density Functional Theory (DFT) to determine the ionization states of ECLs and to optimize their electronic properties. Furthermore, advanced deep learning simulations (DLSs) significantly enhance the kinetic and transport behaviors of these layers. This work integrates DFT and DLS to elucidate the characteristics of ECLs within PEM electrolyzer cells. We strategically utilize DFT to refine catalyst molecules and assess their electronic properties, while DLS is employed to predict the potential energy of support molecules in the catalyst layers. We establish a clear relationship between the energy and geometry of IrOx molecules. The DFT-DLS framework robustly calculates potential energy and reaction coordinates, effectively bridging theoretical computations with the dynamic behavior of molecules in catalyst layers. We validate our model by comparing it with the experimental polarization curve of the IrOx-based anode catalyst layer in a functioning electrolyzer. The observed Tafel slope and exchange current density unequivocally confirm that the oxygen evolution reaction (OER) occurs through a well-defined electrochemical pathway, with oxygen generation proceeding according to the charge transfer mechanism predicted by the DFT-DLS framework. Full article
(This article belongs to the Special Issue Nanomaterials and Their Applications in Energy Storage and Conversion)
Show Figures

Figure 1

Figure 1
<p>Schematics of the PEM electrolyzer.</p>
Full article ">Figure 2
<p>DFT calculation methodology.</p>
Full article ">Figure 3
<p>DLS methodology and architecture.</p>
Full article ">Figure 4
<p>(<b>a</b>) The packed structure of iridium oxide is shown. (<b>b</b>) Unoptimized iridium oxide structure used for PES calculations.</p>
Full article ">Figure 5
<p>The HOMO-LUMO molecular orbitals obtained from the literature [<a href="#B75-energies-18-01022" class="html-bibr">75</a>,<a href="#B76-energies-18-01022" class="html-bibr">76</a>,<a href="#B77-energies-18-01022" class="html-bibr">77</a>] (<b>a</b>,<b>b</b>) and those obtained from this study.</p>
Full article ">Figure 6
<p>PES plot.</p>
Full article ">Figure 7
<p>Anode, cathode, and cell polarization curve at 40 <b>°</b>C, 60 <b>°</b>C, and 80 <b>°</b>C.</p>
Full article ">Figure 8
<p>Feature importance plot.</p>
Full article ">Figure 9
<p>t-SNE plot for our dataset.</p>
Full article ">Figure 10
<p>The graph of epoch vs. loss and parity plot for the 12-block model.</p>
Full article ">
35 pages, 4135 KiB  
Article
Application of Systems Analysis Methods to Construct a Virtual Model of the Field
by Yury Ilyushin, Victoria Nosova and Andrei Krauze
Energies 2025, 18(4), 1012; https://doi.org/10.3390/en18041012 - 19 Feb 2025
Abstract
Recently, the rate of offshore oil production has increased, which creates a need to develop technical solutions for the implementation of more efficient processes on offshore platforms. A relevant solution is the development and application of digital twins. Offshore production platforms are specially [...] Read more.
Recently, the rate of offshore oil production has increased, which creates a need to develop technical solutions for the implementation of more efficient processes on offshore platforms. A relevant solution is the development and application of digital twins. Offshore production platforms are specially protected objects due to the high risk of environmental pollution. Therefore, such objects are especially distinguished for the implementation of advanced technological solutions. In this study, the authors conduct a study of the input, output, and resulting parameters that affect the production process. Using the theory of systems analysis, they determine the list of critical factors and build a conceptual and then a mathematical model of the field. It differs from existing analogues by the introduction of additional parameters that provide higher modeling accuracy. Based on the resulting mathematical model, a neural network is trained to identify the optimal operating mode. An assessment of the economic feasibility of the provided development is carried out. Full article
(This article belongs to the Section K: State-of-the-Art Energy Related Technologies)
Show Figures

Figure 1

Figure 1
<p>The most important parameters affecting the efficiency of oil production.</p>
Full article ">Figure 2
<p>Display of a list of names the wells in operation [compiled by the authors].</p>
Full article ">Figure 3
<p>Graphs of the oil production volume of each well by year [compiled by the authors].</p>
Full article ">Figure 4
<p>The correlation map between all parameters [compiled by the authors].</p>
Full article ">Figure 5
<p>Data distribution [compiled by the authors].</p>
Full article ">Figure 6
<p>Graph of the accuracy of the prediction model [compiled by the authors]. On the graph, the line is the average value of the calculation results. The point is the calculation result.</p>
Full article ">Figure 7
<p>Data distribution after adding new parameters [compiled by the authors].</p>
Full article ">Figure 8
<p>Correlation map and added data parameters [compiled by the authors].</p>
Full article ">Figure 9
<p>A graph of the accuracy of the prediction model [compiled by the authors].</p>
Full article ">Figure 10
<p>Prediction based on the test data for well 15/9-F-11 [compiled by the authors].</p>
Full article ">Figure 11
<p>Prediction based on the test data for well 15/9-F-12 [compiled by the authors].</p>
Full article ">Figure 12
<p>Prediction based on the test data for well 15/9-F-15 D [compiled by the authors].</p>
Full article ">
Back to TopTop