[go: up one dir, main page]

Next Issue
Volume 15, March-2
Previous Issue
Volume 15, February-2
 
 
applsci-logo

Journal Browser

Journal Browser

Appl. Sci., Volume 15, Issue 5 (March-1 2025) – 623 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
21 pages, 7184 KiB  
Article
Susceptibility and Remanent Magnetization Estimates from Orientation Tools in Borehole Imaging Logs
by Julio Cesar S. O. Lyrio, Ana Patrícia C. C. Laier, Jorge Campos Junior, Ana Natalia G. Rodrigues and Luciano dos Santos Martins
Appl. Sci. 2025, 15(5), 2873; https://doi.org/10.3390/app15052873 - 6 Mar 2025
Viewed by 157
Abstract
Orientation tools in borehole imaging logs acquire magnetic information that is currently used for spatial and geographical orientation of the images. We propose to use this magnetic field information to estimate both magnetic susceptibility and remanent magnetization of rocks inside wells. Measurements of [...] Read more.
Orientation tools in borehole imaging logs acquire magnetic information that is currently used for spatial and geographical orientation of the images. We propose to use this magnetic field information to estimate both magnetic susceptibility and remanent magnetization of rocks inside wells. Measurements of these magnetic parameters are not often available in hydrocarbon exploration to support forward modeling of magnetic data, an interpretation tool that has played important role in the exploration risk reduction in the Pre-Salt prospects of Campos Basin, Brazil. The acquired magnetic data requires corrections for tool rotation and diurnal variation of the Earth’s magnetic field before calculation. Then, using a set of simple equations and reasonable assumptions we were able to estimate the magnetic susceptibility of carbonates and basalts, as well as the remanent magnetization of the basalts, from a Pre-Salt well in Campos Basin. When compared to susceptibility values measured in laboratory for the same rock interval, our results show a significant match. This promising result shows the importance of our methodology in providing reliable information that can minimize uncertainties in forward modeling of magnetic data, which contributes to reduction of hydrocarbon exploration risks. Given that direct susceptibility and remanence measurements require oriented samples, a complex and expensive operation in wells, our results offer this rock information without any extra costs since imaging logs are commonly acquired in exploration wells. Besides its use in hydrocarbon exploration, our methodology can be applied to mineral exploration where magnetic susceptibility is an important property for rock identification. Full article
(This article belongs to the Special Issue Advances in Geophysical Exploration)
Show Figures

Figure 1

Figure 1
<p>Forward modeling example of Brazilian Pre-Salt exploration. The upper panels show the magnetic profiles. The models are shown in the lower panels where the blue regions are the non-magnetic rocks while the pink regions represent the igneous rocks. The green lines are the interface between layers as interpreted from seismic data. (<b>a</b>) The initial model with a thicker igneous package. (<b>b</b>) The final model suggesting less igneous rocks, which was confirmed by drilling (modified from [<a href="#B2-applsci-15-02873" class="html-bibr">2</a>]).</p>
Full article ">Figure 2
<p>Graphic illustration of some important definitions. (<b>a</b>) Spatial relationship between the components, <math display="inline"><semantics> <msub> <mi>F</mi> <mi>x</mi> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mi>F</mi> <mi>y</mi> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>F</mi> <mi>z</mi> </msub> </semantics></math>, of the magnetic field described in terms of three parameters: magnitude <span class="html-italic">F</span>, inclination <span class="html-italic">I</span> and declination <span class="html-italic">D</span>. The sign convention for field and its components is: x positive to north, y positive to east and z positive downward. (<b>b</b>) Representation of the meaning of four tool angles, SDEV, HAZI, RB and P1NO, which describes tool’s orientation in the geographical coordinate system (modified from [<a href="#B20-applsci-15-02873" class="html-bibr">20</a>]).</p>
Full article ">Figure 3
<p>Example of the amplitude fluctuation caused by tool’s rotation in a typical well. The strong amplitude fluctuations occurring in the horizontal components shown in (<b>a</b>) were greatly reduced after correction, as exhibit in (<b>b</b>).</p>
Full article ">Figure 4
<p>Geographic location of well 1-RJS-755-RJ at 2950 m water depth in the Campos Basin, Brazil. Contour lines represent the bathymetry (modified from [<a href="#B22-applsci-15-02873" class="html-bibr">22</a>]).</p>
Full article ">Figure 5
<p>Schematic dip-oriented geological section in the Campos showing the tectonostratigraphic mega-sequences (modified from [<a href="#B23-applsci-15-02873" class="html-bibr">23</a>]).</p>
Full article ">Figure 6
<p>Structural section through central Campos Basin showing the dominant detached structural style (modified from [<a href="#B24-applsci-15-02873" class="html-bibr">24</a>]).</p>
Full article ">Figure 7
<p>Simplified stratigraphic and tectonic framework of Campos Basin. (<b>a</b>) The main unconformities are: BSU (Base-Salt Unconformity), PRU (Post-Rift Unconformity), tRift (top Rift), tI/A (top Itabapoana/Atafona fms.), tBas (top basement), modified from [<a href="#B28-applsci-15-02873" class="html-bibr">28</a>]. (<b>b</b>) Geomagnetic polarity time scale for Cretaceous, modified from Concise Geologic Time Scale [<a href="#B29-applsci-15-02873" class="html-bibr">29</a>].</p>
Full article ">Figure 8
<p>The MFK1-FA instrument used to measure the magnetic susceptibility in 58 core samples collected in well 1-RJS-755-RJ (<a href="https://www.agico.cz/text/products/olddev/olddev.php" target="_blank">https://www.agico.cz/text/products/olddev/olddev.php</a>, (accessed on 31 January 2025)).</p>
Full article ">Figure 9
<p>Magnetic field and its components as acquired in well 1-RJS-755-RJ before (<b>a</b>) and after amplitude correction (<b>b</b>). Notice the significant change in the magnitude of the horizontal components after correction of the disturbance caused by tool rotation. The lithologic log is included for illustration.</p>
Full article ">Figure 10
<p>Diurnal variation of Earth’s magnetic field and its components on 10 February 2021 according to Vassouras Magnetic Observatory (VSS) in Rio de Janeiro, Brazil. The logging operation was from 02:26 to 7:58 AM, a period of relatively small variations.</p>
Full article ">Figure 11
<p>Measured magnetic field <span class="html-italic">F</span> after corrections. The field components were omitted to allow better visualization of the variation caused by the presence of igneous rocks. The lithologic log is included for illustration.</p>
Full article ">Figure 12
<p>(<b>a</b>) The Earth’s magnetic field in depth at position of well 1-RJS-755-RJ according to the EMM2017 model. (<b>b</b>) Differences in depth between the field measured in well 1-RJS-755-RJ and Earth’s magnetic field model. These small differences in amplitude are caused by the local geologic variation in depth. The lithologic log is included for illustration.</p>
Full article ">Figure 13
<p>Ranges and mean values of the magnetic susceptibility of the most common rock types (modified from [<a href="#B31-applsci-15-02873" class="html-bibr">31</a>]). For comparison, susceptibility estimates from our methodology are plotted as yellow circles (igneous rocks) and red circle (carbonates).</p>
Full article ">Figure 14
<p>Magnetic susceptibility estimates for well 1-RJS-755-RJ and the result of 58 susceptibility laboratory measurements made in rock samples. The lithologic log along the well is exhibited in the base of the chart for illustration.</p>
Full article ">
23 pages, 2578 KiB  
Article
The Significance of the Sorption Isotherm on the Simulated Performance of Grain Driers
by Graham R. Thorpe
Appl. Sci. 2025, 15(5), 2871; https://doi.org/10.3390/app15052871 - 6 Mar 2025
Viewed by 151
Abstract
Sorption isotherms enable postharvest technologists to estimate the degree and rate of drying of agricultural produce. They are also useful in the design and operation of desiccant systems that are used to condition air. However, the published data on sorption isotherms contain several [...] Read more.
Sorption isotherms enable postharvest technologists to estimate the degree and rate of drying of agricultural produce. They are also useful in the design and operation of desiccant systems that are used to condition air. However, the published data on sorption isotherms contain several inconsistencies. For example, under the conditions considered in this work, it is shown that the widely cited Chung–Pfost isotherm predicts moisture contents of canola that are less than zero as the relative humidity tends to zero. Furthermore, it is shown that a long-established form of empirical expression appears to grossly overestimate the differential heat of wetting, hence the integral heat of wetting of canola. In this work, algebraic expressions are derived that enable the relationship between the forms of isotherm equations on the speed of drying to be calculated. Prima facie, it is anticipated the heat of adsorption will augment the speed of temperature waves through beds of drying canola. However, it is found that this may not be the case. Anomalies in published isotherms for agricultural produce reinforce the need for accurate psychometric data to be measured over a wide range of temperatures and relative humidities. Full article
(This article belongs to the Section Agricultural Science and Technology)
Show Figures

Figure 1

Figure 1
<p>Velocities of the drying, AP, and temperature, PB, fronts through a bed of canola. State A represents the system in equilibrium with the incoming air, and B is the system at its initial state prior to the initiation of drying. The drying fronts are separated by the plateau state, P.</p>
Full article ">Figure 2
<p>The states of the air and grain in the system portrayed on a psychrometric chart. As indicated in <a href="#applsci-15-02871-f001" class="html-fig">Figure 1</a>, states A and B are, respectively, those of the air at the entrance to the drier and at the initial conditions. The plateau state is denoted by P. The dotted lines between AP and PB indicate the discontinuities across the drying and heating fronts, respectively. The grain moistures are depicted in the range of 0.02 to 0.11.</p>
Full article ">Figure 3
<p>Air that enters an element of length <math display="inline"><semantics> <mrow> <mo>∆</mo> <mi>x</mi> </mrow> </semantics></math>, has a mean intergranular velocity <math display="inline"><semantics> <mrow> <mi>v</mi> </mrow> </semantics></math>, density <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>ρ</mi> </mrow> <mrow> <mi>a</mi> </mrow> </msub> </mrow> </semantics></math>, and humidity <math display="inline"><semantics> <mrow> <mi>w</mi> </mrow> </semantics></math>. It leaves with a velocity <math display="inline"><semantics> <mrow> <mi>v</mi> <mo>+</mo> <mo>∆</mo> <mi>v</mi> </mrow> </semantics></math>, density <math display="inline"><semantics> <mrow> <mo> </mo> <msub> <mrow> <mi>ρ</mi> </mrow> <mrow> <mi>a</mi> </mrow> </msub> <mo>+</mo> <mo>∆</mo> <msub> <mrow> <mi>ρ</mi> </mrow> <mrow> <mi>a</mi> </mrow> </msub> </mrow> </semantics></math>, and humidity <math display="inline"><semantics> <mrow> <mi>w</mi> <mo>+</mo> <mo>∆</mo> <mi>w</mi> </mrow> </semantics></math>. Initially, the moisture content of canola is in equilibrium with the air in the latter state, i.e., <math display="inline"><semantics> <mrow> <mi>W</mi> <mo>+</mo> <mo>∆</mo> <mi>W</mi> </mrow> </semantics></math>. After a time <math display="inline"><semantics> <mrow> <mo>∆</mo> <mi>t</mi> </mrow> </semantics></math>, all of the canola is in equilibrium with the incoming air, and it assumes a moisture content <math display="inline"><semantics> <mrow> <mi>W</mi> </mrow> </semantics></math>. The void fraction of the porous medium, canola, is <math display="inline"><semantics> <mrow> <mi>ε</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>The Chung–Pfost (C-P), Henderson (HEN-GAZ), Hunter, Halsey, and Oswin isotherms are fitted to the experimental data presented by Gazor [<a href="#B8-applsci-15-02871" class="html-bibr">8</a>], whilst the remaining Henderson isotherm (HEN-SOK) is fitted to data presented by Sokhansanj et al. [<a href="#B18-applsci-15-02871" class="html-bibr">18</a>]. The Hunter and Oswin isotherms are almost coincident in the range of relative humidities depicted in the figure. Note that relative humidity is expressed on a fractional basis, hence <span class="html-italic">r</span> = 0.1 is equivalent to <span class="html-italic">rh</span> = 10% on a percentage basis.</p>
Full article ">Figure 5
<p>The isotherms predicted by the equations proposed by Henderson, using Sokansanj et al.’s [<a href="#B18-applsci-15-02871" class="html-bibr">18</a>] parameters, Hunter, Halsey, and Oswin. Note that the Henderson and Chung–Pfost equations based on Gazor’s [<a href="#B8-applsci-15-02871" class="html-bibr">8</a>] data are omitted because they are almost indistinguishable from the Henderson isotherm fitted to Sokhansanj et al.’s [<a href="#B18-applsci-15-02871" class="html-bibr">18</a>] data.</p>
Full article ">Figure 6
<p>The contrast between values of <math display="inline"><semantics> <mrow> <mrow> <mrow> <msub> <mrow> <mi>h</mi> </mrow> <mrow> <mi>s</mi> </mrow> </msub> </mrow> <mo>/</mo> <mrow> <msub> <mrow> <mi>h</mi> </mrow> <mrow> <mi>v</mi> </mrow> </msub> </mrow> </mrow> </mrow> </semantics></math> predicted by the equation employed by Cenkowski [<a href="#B14-applsci-15-02871" class="html-bibr">14</a>], Equation (29), and the Henderson isotherm based on Sokhansanj et al.’s (1986) [<a href="#B18-applsci-15-02871" class="html-bibr">18</a>] data.</p>
Full article ">Figure 7
<p>Values of <math display="inline"><semantics> <mrow> <mrow> <mrow> <msub> <mrow> <mi>h</mi> </mrow> <mrow> <mi>s</mi> </mrow> </msub> </mrow> <mo>/</mo> <mrow> <msub> <mrow> <mi>h</mi> </mrow> <mrow> <mi>v</mi> </mrow> </msub> </mrow> </mrow> </mrow> </semantics></math> calculated using the Clausius–Clapeyron equation using Henderson isotherm using Sokhansanj et al.’s [<a href="#B18-applsci-15-02871" class="html-bibr">18</a>] (HEN-SOK) and Gazor’s [<a href="#B8-applsci-15-02871" class="html-bibr">8</a>] (HEN-GAZ) data; Hunter’s and Halsey’s isotherms predict that <math display="inline"><semantics> <mrow> <mrow> <mrow> <msub> <mrow> <mi>h</mi> </mrow> <mrow> <mi>s</mi> </mrow> </msub> </mrow> <mo>/</mo> <mrow> <msub> <mrow> <mi>h</mi> </mrow> <mrow> <mi>v</mi> </mrow> </msub> <mo>→</mo> <mo>∞</mo> </mrow> </mrow> </mrow> </semantics></math> as <math display="inline"><semantics> <mrow> <mi>W</mi> <mo>→</mo> <mn>0</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 8
<p>The integral <math display="inline"><semantics> <mrow> <mi>I</mi> </mrow> </semantics></math>, defined as <math display="inline"><semantics> <mrow> <mi>I</mi> <mo>=</mo> <mrow> <mrow> <msub> <mrow> <mi>H</mi> </mrow> <mrow> <mi>W</mi> </mrow> </msub> </mrow> <mo>/</mo> <mrow> <msub> <mrow> <mi>h</mi> </mrow> <mrow> <mi>v</mi> </mrow> </msub> </mrow> </mrow> </mrow> </semantics></math>, as a function of grain moisture content, <math display="inline"><semantics> <mrow> <mi>W</mi> </mrow> </semantics></math>. It is observed that the empirically based method, Equation (31), produces lower values than Equation (34), which arises when the Clausius–Clapeyron equation is applied with the Henderson isotherm which embodies the empirical constants proposed by Sokhansanj et al. [<a href="#B18-applsci-15-02871" class="html-bibr">18</a>].</p>
Full article ">Figure 9
<p>The integral <math display="inline"><semantics> <mrow> <mi>I</mi> </mrow> </semantics></math> as a function of grain moisture content when the temperature is 30 °C. The values are consistent with integrating <math display="inline"><semantics> <mrow> <mn>1</mn> <mo>−</mo> <mrow> <mrow> <msub> <mrow> <mi>h</mi> </mrow> <mrow> <mi>s</mi> </mrow> </msub> </mrow> <mo>/</mo> <mrow> <msub> <mrow> <mi>h</mi> </mrow> <mrow> <mi>v</mi> </mrow> </msub> </mrow> </mrow> </mrow> </semantics></math>, as may be gleaned by observing the results given in <a href="#applsci-15-02871-f007" class="html-fig">Figure 7</a>. Halsey’s equation does not yield a finite solution.</p>
Full article ">Figure 10
<p>The passage of temperature, moisture content, and humidity fronts through a bed of canola ventilated with an air flow rate, <math display="inline"><semantics> <mrow> <mi>G</mi> </mrow> </semantics></math>, of 1 kg/(s.m<sup>2</sup>). Henderson’s isotherm is invoked using the parameters given by Sokhansanj et al. [<a href="#B18-applsci-15-02871" class="html-bibr">18</a>]. When the empirical expression, Equation (29) HEN-EQN (29), is used to predict <math display="inline"><semantics> <mrow> <mrow> <mrow> <msub> <mrow> <mi>h</mi> </mrow> <mrow> <mi>s</mi> </mrow> </msub> </mrow> <mo>/</mo> <mrow> <msub> <mrow> <mi>h</mi> </mrow> <mrow> <mi>v</mi> </mrow> </msub> </mrow> </mrow> </mrow> </semantics></math>, the velocity of the drying wave is lower than when the Clausius–Clapeyron equation, Equation (12) HEN-C-C, is employed.</p>
Full article ">Figure 11
<p>The flows of enthalpy through an element of length <math display="inline"><semantics> <mrow> <mo>∆</mo> <mi>x</mi> </mrow> </semantics></math>. Initially, the grains are in equilibrium with the air leaving the element, but after a time <math display="inline"><semantics> <mrow> <mo>∆</mo> <mi>t</mi> </mrow> </semantics></math>, the initial sensible and latent heat contents of the solids are in equilibrium with the entering air. The above system enables us to observe how the sorption isotherms determine the velocities of the drying and heating waves.</p>
Full article ">Figure 12
<p>Air in state A enters a bed of canola initially in state B. When Equation (12) is used to calculate the plateau state, P, Equation (29) results in lower values of the temperature and humidity of the air than when the Clausius–Clapeyron Equation (12) is invoked. Grain moisture contents of 0.02, 0.05, 0.08, and 0.11 are shown on the psychrometric chart.</p>
Full article ">
24 pages, 4247 KiB  
Article
Energy-Based Optimization of Seismic Isolation Parameters in RC Buildings Under Earthquake Action Using GWO
by Ali Erdem Çerçevik and Nihan Kazak Çerçevik
Appl. Sci. 2025, 15(5), 2870; https://doi.org/10.3390/app15052870 - 6 Mar 2025
Viewed by 113
Abstract
Modeling seismic isolators, one of the most effective installations in the design of earthquake-resistant buildings, is a very important challenge. In this study, we propose a new energy-based approach for the optimization of seismic isolation parameters. The hysteretic energy represents the dissipation of [...] Read more.
Modeling seismic isolators, one of the most effective installations in the design of earthquake-resistant buildings, is a very important challenge. In this study, we propose a new energy-based approach for the optimization of seismic isolation parameters. The hysteretic energy represents the dissipation of isolated structures in the isolation system. The minimization of input energy ensures that structural components are exposed to reduced seismic energy. For these reasons, this study aims to minimize the input energy and maximize the hysteretic energy. Additionally, an objective function is also generated with the energy ratio obtained from the input and hysteretic energy. The gray wolf optimizer (GWO) was applied to the optimization process. A four-story, 3D, and reinforced concrete superstructure was prepared and lead rubber bearings were placed under the base story. The isolation system is modeled nonlinearly, which requires two parameters: isolation period and characteristic strength. The inter-story drift ratio was selected as the structure constraint, while the isolator displacement and effective damping ratio were selected as the isolator constraints in the optimization process. The prepared base-isolated structure was optimized using 11 scaled ground motions. Nonlinear time history analyses were run in ETABS finite element software. Firstly, the optimum isolation parameters were obtained using peak roof story acceleration (PRA), in accordance with the methodology in previous studies. The outcomes generated by the PRA and energy components are compared considering the isolation parameters and structural responses. The energy ratio produced better results in terms of inter-story drift ratio than the other energy components. Secondly, the energy ratio was re-optimized with different constraints and its effectiveness was examined. Full article
Show Figures

Figure 1

Figure 1
<p>Advantage of seismic isolation based on the elongation of supplemental damping and fundamental vibration period [<a href="#B6-applsci-15-02870" class="html-bibr">6</a>].</p>
Full article ">Figure 2
<p>(<b>a</b>) Nonlinear hysteretic behavior, (<b>b</b>) 225% shear-strained LRB [<a href="#B8-applsci-15-02870" class="html-bibr">8</a>], (<b>c</b>) idealized force-displacement curve [<a href="#B9-applsci-15-02870" class="html-bibr">9</a>], (<b>d</b>) components [<a href="#B8-applsci-15-02870" class="html-bibr">8</a>].</p>
Full article ">Figure 3
<p>A general flowchart of the optimization algorithm developed with the GWO.</p>
Full article ">Figure 4
<p>Models views and axes (1–5, A–E): plan (<b>a</b>) and 3D view (<b>b</b>) of the isolated model.</p>
Full article ">Figure 5
<p>The spectra of the scaled records for 5% damping [<a href="#B9-applsci-15-02870" class="html-bibr">9</a>,<a href="#B55-applsci-15-02870" class="html-bibr">55</a>].</p>
Full article ">Figure 6
<p>The convergence curves for best run of cases ((<b>a</b>) Hys_En, (<b>b</b>) Inp_En, (<b>c</b>) R_En, and (<b>d</b>) PRA/PGA).</p>
Full article ">Figure 7
<p>PRA/PGA (<b>a</b>), displacement (<b>b</b>), effective damping (<b>c</b>), input energy (<b>d</b>), hysteretic energy (<b>e</b>), and energy ratio (<b>f</b>) ground motion graphs obtained optimum isolation parameters by objective functions found.</p>
Full article ">Figure 8
<p>(<b>a</b>) Story accelerations and (<b>b</b>) inter-story drift ratio <math display="inline"><semantics> <mrow> <mfenced> <mrow> <mi>ISDR</mi> </mrow> </mfenced> </mrow> </semantics></math> graphs for optimum isolation parameters of cases.</p>
Full article ">Figure 9
<p>The variations of energy components by time during critical ground motions in cases.</p>
Full article ">Figure 10
<p>The convergence curves for the best run of R_En: R_En_50_30, R_En_45_40, and R_En_40_50.</p>
Full article ">Figure 11
<p>(<b>a</b>) Story accelerations and (<b>b</b>) inter-story drift ratio <math display="inline"><semantics> <mrow> <mfenced> <mrow> <mi>I</mi> <mi>S</mi> <mi>D</mi> <mi>R</mi> </mrow> </mfenced> </mrow> </semantics></math> graphs for optimum isolation parameters of R_En cases.</p>
Full article ">
18 pages, 2439 KiB  
Article
Reliability Assessment of a Series System with Weibull-Distributed Components Based on Zero-Failure Data
by Ziang Li, Huimin Fu and Jianchao Guo
Appl. Sci. 2025, 15(5), 2869; https://doi.org/10.3390/app15052869 - 6 Mar 2025
Viewed by 120
Abstract
This study focuses on the reliability assessment of a series system composed of Weibull-distributed components. Because high-reliability components rarely fail during life testing or actual operation, conventional system reliability analysis methods based on failure time data do not work well. This paper presents [...] Read more.
This study focuses on the reliability assessment of a series system composed of Weibull-distributed components. Because high-reliability components rarely fail during life testing or actual operation, conventional system reliability analysis methods based on failure time data do not work well. This paper presents a practical approach to address this issue, with a major interest in inferring the lower confidence limits of system reliability and reliable life. The proposed system reliability assessment method utilizes the minimum lifetime distribution theory to derive the closed-form confidence limits for system reliability indexes from Weibull zero-failure data. Furthermore, a system reliability update procedure is introduced, integrating life data at both the component and system levels. Monte Carlo simulations demonstrate that the proposed approach is more accurate than conventional methods. Finally, an engineering example of reliability assessment and life prediction for a satellite infrared Earth sensor is presented to illustrate the advantages and applications of the proposed method. Full article
(This article belongs to the Section Aerospace Science and Engineering)
Show Figures

Figure 1

Figure 1
<p>Equivalence of LCL curves for reliability and reliable life.</p>
Full article ">Figure 2
<p>Simplification of system reliability model when identical components are present.</p>
Full article ">Figure 3
<p>Framework of the system reliability assessment and update algorithm.</p>
Full article ">Figure 4
<p>Simulation comparison results in the two scenarios.</p>
Full article ">Figure 5
<p>Reliability block diagram of IES.</p>
Full article ">Figure 6
<p>Flowchart for determining the acceleration factor.</p>
Full article ">Figure 7
<p>Reliable life update results for IES.</p>
Full article ">
19 pages, 6174 KiB  
Article
Sub-Pixel Displacement Measurement with Swin Transformer: A Three-Level Classification Approach
by Yongxing Lin, Xiaoyan Xu and Zhixin Tie
Appl. Sci. 2025, 15(5), 2868; https://doi.org/10.3390/app15052868 - 6 Mar 2025
Viewed by 112
Abstract
In order to avoid the dependence of traditional sub-pixel displacement methods on interpolation method calculation, image gradient calculation, initial value estimation and iterative calculation, a Swin Transformer-based sub-pixel displacement measurement method (ST-SDM) is proposed, and a square dataset expansion method is also proposed [...] Read more.
In order to avoid the dependence of traditional sub-pixel displacement methods on interpolation method calculation, image gradient calculation, initial value estimation and iterative calculation, a Swin Transformer-based sub-pixel displacement measurement method (ST-SDM) is proposed, and a square dataset expansion method is also proposed to rapidly expand the training dataset. The ST-SDM computes sub-pixel displacement values of different scales through three-level classification tasks, and solves the problem of positive and negative displacement with the rotation relative tag value method. The accuracy of the ST-SDM is verified by simulation experiments, and its robustness is verified by real rigid body experiments. The experimental results show that the ST-SDM model has higher accuracy and higher efficiency than the comparison algorithm. Full article
Show Figures

Figure 1

Figure 1
<p>Sub-pixel search correlation principle of DSCM. (<b>a</b>) Speckle image before deformation; (<b>b</b>) speckle image after deformation.</p>
Full article ">Figure 2
<p>The structure of the Swin Transformer.</p>
Full article ">Figure 3
<p>Architecture of the proposed ST-SDM. “Ref” means reference images, “F-ST” means the first-level classification, “S-ST” means the second-level classification, “T-ST” means the third-level classification, and “Tar”, “Tar2”, and “Tar3” represent the input target images for the three levels of classification, respectively.</p>
Full article ">Figure 4
<p>Rotation-relative labeled value method.</p>
Full article ">Figure 5
<p>Simulated speckle image.</p>
Full article ">Figure 6
<p>The variation in accuracy of the first level classification task.</p>
Full article ">Figure 7
<p>The variation in accuracy of the second level classification task.</p>
Full article ">Figure 8
<p>The variation in accuracy of the third level classification task.</p>
Full article ">Figure 9
<p>The AVME and relative error in the u direction of the two models.</p>
Full article ">Figure 10
<p>Experimental system.</p>
Full article ">Figure 11
<p>Real speckle image.</p>
Full article ">Figure 12
<p>The AVME and relative error of two models each with a 0.1 mm shift.</p>
Full article ">
23 pages, 4074 KiB  
Article
A Method of Discriminating Between Power Swings and Faults Based on Principal Component Analysis
by Hao Wang, Qi Yang, Xiaopeng Li and Wenyue Zhou
Appl. Sci. 2025, 15(5), 2867; https://doi.org/10.3390/app15052867 - 6 Mar 2025
Viewed by 109
Abstract
Distance protection is widely applied in AC transmission systems. It may operate incorrectly under power swings, so a power swing blocking unit (PSBU) is needed to work with the distance protection relay. Such a unit should not only block the protection relay in [...] Read more.
Distance protection is widely applied in AC transmission systems. It may operate incorrectly under power swings, so a power swing blocking unit (PSBU) is needed to work with the distance protection relay. Such a unit should not only block the protection relay in time when a power swing occurs, but also deblock the protection relay after detecting a fault during the power swing. In this paper, a method that satisfies these requirements is proposed. To discriminate between power swings and faults, the characteristics of three-phase voltage under a power swing and fault situation are used. Principal Component Analysis (PCA) is applied to extract and quantify the characteristics. To detect faults during power swings, an index is proposed, and the change rate of the index is used to form the criterion. Simulations for different kinds of power swing and fault situations are conducted based on a two-end system and a nine-bus system in PSCAD/EMTDC. The simulation test results indicate that the proposed method can block the protection relay reliably under a power swing and deblock the relay quickly after detecting a fault during the power swing. Moreover, the proposed method is compared with other methods. The comparison results show that the proposed method has an advantage in terms of response speed and is less affected by measurement noise. Full article
Show Figures

Figure 1

Figure 1
<p>Schematic diagram of PCA processing results.</p>
Full article ">Figure 2
<p>Projection trajectories under different disturbances. (<b>a</b>) Three-phase shorting fault; (<b>b</b>) power swing.</p>
Full article ">Figure 3
<p>The value of <span class="html-italic">C</span>.</p>
Full article ">Figure 4
<p>Flow chart of blocking protection relay.</p>
Full article ">Figure 5
<p>Flow chart of deblocking the protection relay.</p>
Full article ">Figure 6
<p>Sketch of simulation system.</p>
Full article ">Figure 7
<p>Trajectory of measured impedance during power swing.</p>
Full article ">Figure 8
<p>The waveform of the three-phase voltage under a power swing of 2 Hz.</p>
Full article ">Figure 9
<p>The value of <span class="html-italic">C</span> under a power swing of 2 Hz.</p>
Full article ">Figure 10
<p>Sketch of 400 kV system.</p>
Full article ">Figure 11
<p>The waveform of the three-phase voltage under a fault.</p>
Full article ">Figure 12
<p>The value of <span class="html-italic">C</span> under a fault.</p>
Full article ">Figure 13
<p>Waveforms of voltage and current.</p>
Full article ">Figure 14
<p>ΔP under different sampling frequencies of power swings.</p>
Full article ">Figure 15
<p>ΔP under different sampling frequencies for faults.</p>
Full article ">
22 pages, 4450 KiB  
Article
A Data-Driven Method for Determining DRASTIC Weights to Assess Groundwater Vulnerability to Nitrate: Application in the Lake Baiyangdian Watershed, North China Plain
by Xianglong Hou, Liqin Peng, Yuan Zhang, Yan Zhang, Yunxia Wang, Wenzhao Feng and Hui Yang
Appl. Sci. 2025, 15(5), 2866; https://doi.org/10.3390/app15052866 - 6 Mar 2025
Viewed by 99
Abstract
Nitrate pollution due to agricultural activities challenges the management of groundwater resources. The most popular technique used for groundwater vulnerability assessments is the DRASTIC. The subjectivity introduced by the DRASTIC has always been questioned. Therefore, the determination of rating scores and weights of [...] Read more.
Nitrate pollution due to agricultural activities challenges the management of groundwater resources. The most popular technique used for groundwater vulnerability assessments is the DRASTIC. The subjectivity introduced by the DRASTIC has always been questioned. Therefore, the determination of rating scores and weights of parameters has become the main difficulty in DRASTIC applications. In this paper, a new data-driven weighting method based on Monte Carlo or genetic algorithm was developed. The new method considers both single factors and the relationship among factors, overcomes the subjectivity of weight determination, and is theoretically applicable to various hydrogeological environments and as a general weight determination method. In addition, a new method for the verification of the evaluation results on a temporal scale was established, which is based on changes in the nitrate concentration over the past 20 years. To verify and test these methods, they were used for the evaluation of groundwater vulnerability to nitrate in the plain area of the Baiyangdian watershed in the North China Plain and compared with other commonly used methods. The Pearson correlation coefficient increased by 15%. From a time perspective, the changes in nitrate concentration confirmed that the correctness of the assessment is 88%. In this study, the effect of the revision of the rating ranges on the improvement of the evaluation results is very obvious. Therefore, the focus of future work should be on determining the rating ranges and their rating scores, and whether the corresponding weights based on the data-driven method will yield more reliable results. Full article
Show Figures

Figure 1

Figure 1
<p>Location of the study area and distribution of the groundwater samples. The nitrate data are cited from the work of Feng et al. [<a href="#B33-applsci-15-02866" class="html-bibr">33</a>].</p>
Full article ">Figure 2
<p>Nitrate concentration and vulnerability maps for: comparison of nitrate concentration distribution and vulnerability index of (<b>a</b>) Aller’s common DRASTIC; (<b>b</b>) pesticide DRASTIC; (<b>c</b>) Monte Carlo DRASTIC; and (<b>d</b>) Genetic Algorithm DRASTIC.</p>
Full article ">Figure 3
<p>Nitrate concentration changes from 1998 to 2018 and level difference maps for: (<b>a</b>) nitrate concentration changes; (<b>b</b>) level difference.</p>
Full article ">
15 pages, 5379 KiB  
Article
Virtual Synchronous Generator Control of Grid Connected Modular Multilevel Converters with an Improved Capacitor Voltage Balancing Method
by Haroun Bensiali, Farid Khoucha, Abdeldjabar Benrabah, Lakhdar Benhamimid and Mohamed Benbouzid
Appl. Sci. 2025, 15(5), 2865; https://doi.org/10.3390/app15052865 - 6 Mar 2025
Viewed by 173
Abstract
Modular multilevel converters have emerged as a common solution in high-voltage and medium-voltage applications due to their scalability and modularity. However, these advantages come at the cost of increased control complexity, particularly when compared to other multilevel converter topologies. This paper proposes a [...] Read more.
Modular multilevel converters have emerged as a common solution in high-voltage and medium-voltage applications due to their scalability and modularity. However, these advantages come at the cost of increased control complexity, particularly when compared to other multilevel converter topologies. This paper proposes a new combined control strategy based on virtual synchronous generator (VSG) control and capacitor voltage balancing (CVB) method. The VSG control is applied for power sharing and inertia emulation to increase the dynamic response and improve system stability while the CVB method is used to redistribute the energy stored in the capacitors of the submodules (SMs) in order to ensure uniform voltage levels and equalize the voltage across the capacitors. The simulation results as well as experimental ones confirm the feasibility and effectiveness of the proposed method, enhancing the performance of the energy conversion system. Full article
(This article belongs to the Section Electrical, Electronics and Communications Engineering)
Show Figures

Figure 1

Figure 1
<p>Multilevel converter topology: (<b>a</b>) MMC; (<b>b</b>) half-bridge and full-bridge SM.</p>
Full article ">Figure 2
<p>Block diagram of the proposed CVB-VSG control.</p>
Full article ">Figure 3
<p>VSG based control scheme.</p>
Full article ">Figure 4
<p>Flowchart of the CVB algorithm.</p>
Full article ">Figure 5
<p>Simulation results of applying CVB−VSG control and CVB−PQ control to the MMC. (<b>a</b>) Three−phase voltages and currents of the MMC. (<b>b</b>) Three−phase voltages and currents of the grid. (<b>c</b>) Estimation of the voltages of the SM capacitor of phase A by the CVB−PQ control. (<b>d</b>) Estimation of the voltages of the SM capacitor of phase A by the CVB-VSG control. (<b>e</b>) Estimation and measurement of phase A SM capacitor voltages for both commands. (<b>f</b>) Phase A circulating current. (<b>g</b>) Average value of DC current. (<b>h</b>) DC current. (<b>i</b>) Active and reactive power.</p>
Full article ">Figure 5 Cont.
<p>Simulation results of applying CVB−VSG control and CVB−PQ control to the MMC. (<b>a</b>) Three−phase voltages and currents of the MMC. (<b>b</b>) Three−phase voltages and currents of the grid. (<b>c</b>) Estimation of the voltages of the SM capacitor of phase A by the CVB−PQ control. (<b>d</b>) Estimation of the voltages of the SM capacitor of phase A by the CVB-VSG control. (<b>e</b>) Estimation and measurement of phase A SM capacitor voltages for both commands. (<b>f</b>) Phase A circulating current. (<b>g</b>) Average value of DC current. (<b>h</b>) DC current. (<b>i</b>) Active and reactive power.</p>
Full article ">Figure 6
<p>Total harmonic distortion of grid current.</p>
Full article ">Figure 7
<p>Experimental platform of the three-phase MMC.</p>
Full article ">Figure 8
<p>Experimental results of applying VSG and PQ control to the MMC. (<b>a</b>) Three-phase voltages of the MMC. (<b>b</b>) Three-phase voltages and currents of the grid. (<b>c</b>) Voltages of SM capacitors in phase B. (<b>d</b>) Phase A circulating current. (<b>e</b>) DC current. (<b>f</b>) Active and reactive power.</p>
Full article ">Figure 8 Cont.
<p>Experimental results of applying VSG and PQ control to the MMC. (<b>a</b>) Three-phase voltages of the MMC. (<b>b</b>) Three-phase voltages and currents of the grid. (<b>c</b>) Voltages of SM capacitors in phase B. (<b>d</b>) Phase A circulating current. (<b>e</b>) DC current. (<b>f</b>) Active and reactive power.</p>
Full article ">Figure 9
<p>Experimental results of applying CVB−VSG and CVB−PQ control to the MMC. (<b>a</b>) Three-phase voltages of the MMC. (<b>b</b>) Three-phase voltages and currents of the grid. (<b>c</b>) Voltages of SM capacitors in phase B. (<b>d</b>) Phase A circulating current. (<b>e</b>) DC current. (<b>f</b>) Active and reactive power.</p>
Full article ">
27 pages, 729 KiB  
Article
Privacy Illusion: Subliminal Channels in Schnorr-like Blind-Signature Schemes
by Mirosław Kutyłowski and Oliwer Sobolewski
Appl. Sci. 2025, 15(5), 2864; https://doi.org/10.3390/app15052864 - 6 Mar 2025
Viewed by 179
Abstract
Blind signatures are one of the key techniques of Privacy-Enhancing Technologies (PETs). They appear as a component of many schemes, including, in particular, the Privacy Pass technology. Blind-signature schemes provide provable privacy: the signer cannot derive any information about a message signed at [...] Read more.
Blind signatures are one of the key techniques of Privacy-Enhancing Technologies (PETs). They appear as a component of many schemes, including, in particular, the Privacy Pass technology. Blind-signature schemes provide provable privacy: the signer cannot derive any information about a message signed at user’s request. Unfortunately, in practice, this might be just an illusion. We consider a novel but realistic threat model where the user does not participate in the protocol directly but instead uses a provided black-box device. We then show that the black-box device may be implemented in such a way that, despite a provably secure unblinding procedure, a malicious signer can link the signing protocol transcript with a resulting unblinded signature. Additionally, we show how to transmit any short covert message between the black-box device and the signer. We prove the stealthiness of these attacks in anamorphic cryptography model, where the attack cannot be detected even if all private keys are given to an auditor. At the same time, an auditor will not detect any irregular behavior even if the secret keys of the signer and the device are revealed for audit purposes (anamorphic cryptography model). We analyze the following schemes: (1) Schnorr blind signatures, (2) Tessaro–Zhu blind signatures, and their extensions. We provide a watchdog countermeasure and conclude that similar solutions are necessary in practical implementations to defer most of the threats. Full article
Show Figures

Figure 1

Figure 1
<p>User authentication before the creation of a blind signature.</p>
Full article ">Figure 2
<p>Blind signing process.</p>
Full article ">Figure 3
<p>Signature verification.</p>
Full article ">Figure 4
<p>Auditor inspecting <math display="inline"><semantics> <mi mathvariant="script">S</mi> </semantics></math> and <math display="inline"><semantics> <mi mathvariant="script">D</mi> </semantics></math>. Boxes with “???” represent unknown algorithms that the parties might run.</p>
Full article ">Figure 5
<p>Blind Schnorr signature-creation procedure <math display="inline"><semantics> <mrow> <mo>〈</mo> <mi mathvariant="sans-serif">SignS</mi> <mo>,</mo> <mi mathvariant="sans-serif">SignU</mi> <mo>〉</mo> </mrow> </semantics></math> and verification procedure <math display="inline"><semantics> <mi mathvariant="sans-serif">Verify</mi> </semantics></math>.</p>
Full article ">Figure 6
<p>Protocol transmitting an ephemeral share <span class="html-italic">R</span> for DH key exchange from <math display="inline"><semantics> <mi mathvariant="script">S</mi> </semantics></math> to <math display="inline"><semantics> <mi mathvariant="script">D</mi> </semantics></math>.</p>
Full article ">Figure 7
<p>Protocol transmitting an ephemeral share <span class="html-italic">Y</span> for DH key exchange from <math display="inline"><semantics> <mi mathvariant="script">D</mi> </semantics></math> to <math display="inline"><semantics> <mi mathvariant="script">S</mi> </semantics></math>.</p>
Full article ">Figure 8
<p>Protocol for creating a linkable signature and unblinding it.</p>
Full article ">Figure 9
<p>Unblinding the message signed during blind-signature creation.</p>
Full article ">Figure 10
<p>Protocol for creating a linkable signature based on hidden public key <math display="inline"><semantics> <msub> <mi>R</mi> <mn>0</mn> </msub> </semantics></math>, In lines 3 and 4, the operation <math display="inline"><semantics> <mi mathvariant="sans-serif">encode</mi> </semantics></math> maps the elements of the group to <math display="inline"><semantics> <msub> <mi mathvariant="double-struck">Z</mi> <mi>q</mi> </msub> </semantics></math>.</p>
Full article ">Figure 11
<p>Linking a signature <math display="inline"><semantics> <mrow> <mo>(</mo> <msup> <mi>c</mi> <mo>′</mo> </msup> <mo>,</mo> <msup> <mi>s</mi> <mo>′</mo> </msup> <mo>)</mo> </mrow> </semantics></math> with a transcript <math display="inline"><semantics> <mrow> <mo>(</mo> <mi>R</mi> <mo>,</mo> <mi>c</mi> <mo>,</mo> <mi>s</mi> <mo>)</mo> </mrow> </semantics></math> in case of the algorithm based on the public key <math display="inline"><semantics> <msub> <mi>R</mi> <mn>0</mn> </msub> </semantics></math>. <math display="inline"><semantics> <msub> <mi mathvariant="sans-serif">Dec</mi> <msub> <mi>r</mi> <mn>0</mn> </msub> </msub> </semantics></math> denotes ElGamal decryption with private key <math display="inline"><semantics> <msub> <mi>r</mi> <mn>0</mn> </msub> </semantics></math>.</p>
Full article ">Figure 12
<p>Schnorr blind-signature creation procedure with a watchdog <math display="inline"><semantics> <mrow> <mo>〈</mo> <mi mathvariant="sans-serif">SignS</mi> <mo>,</mo> <mi mathvariant="sans-serif">Watch</mi> <mo>,</mo> <mi mathvariant="sans-serif">SignU</mi> <mo>〉</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 13
<p>Partial identity disclosure with rejection sampling: <math display="inline"><semantics> <msub> <mi>I</mi> <mi mathvariant="script">D</mi> </msub> </semantics></math> is a <span class="html-italic">k</span>-bit identifier of <math display="inline"><semantics> <mi mathvariant="script">D</mi> </semantics></math>, <math display="inline"><semantics> <msub> <mi>K</mi> <mi>A</mi> </msub> </semantics></math> is a secret key shared with an adversary, <span class="html-italic">k</span> is a (very) small integer.</p>
Full article ">Figure 14
<p>Tessaro–Zhu scheme BS1 from [<a href="#B19-applsci-15-02864" class="html-bibr">19</a>]: signature creation procedure <math display="inline"><semantics> <mrow> <mo>〈</mo> <mi mathvariant="sans-serif">SignS</mi> <mo>,</mo> <mi mathvariant="sans-serif">SignU</mi> <mo>〉</mo> </mrow> </semantics></math> and verification procedure <math display="inline"><semantics> <mi mathvariant="sans-serif">Verify</mi> </semantics></math>.</p>
Full article ">Figure 15
<p>Tessaro–Zhu blind-signature creation procedure (BS1 from [<a href="#B19-applsci-15-02864" class="html-bibr">19</a>]) with a watchdog <math display="inline"><semantics> <mrow> <mo>〈</mo> <mi mathvariant="sans-serif">SignS</mi> <mo>,</mo> <mi mathvariant="sans-serif">Watch</mi> <mo>,</mo> <mi mathvariant="sans-serif">SignU</mi> <mo>〉</mo> </mrow> </semantics></math>.</p>
Full article ">
31 pages, 6391 KiB  
Review
Sphingolipidoses and Retinal Involvement: A Comprehensive Review
by Chiara Carrozzi, Daniele Fumi, Davide Fasciolo, Federico Di Tizio, Serena Fragiotta, Mariachiara Di Pippo and Solmaz Abdolrahimzadeh
Appl. Sci. 2025, 15(5), 2863; https://doi.org/10.3390/app15052863 - 6 Mar 2025
Viewed by 219
Abstract
Sphingolipidoses are a class of inherited lysosomal storage diseases, characterized by enzymatic deficiencies that impair sphingolipid degradation. This enzymatic malfunction results in the pathological accumulation of sphingolipids within lysosomes, leading to tissue damage across multiple organ systems. Among the various organs involved, the [...] Read more.
Sphingolipidoses are a class of inherited lysosomal storage diseases, characterized by enzymatic deficiencies that impair sphingolipid degradation. This enzymatic malfunction results in the pathological accumulation of sphingolipids within lysosomes, leading to tissue damage across multiple organ systems. Among the various organs involved, the eye and particularly the retina, can be affected and this will be the primary focus of this study. This article will explore the various subtypes of sphingolipidoses, detailing their associated retinal abnormalities, with an emphasis on multimodal imaging findings and clinical recognition of these rare disorders. Full article
(This article belongs to the Section Chemical and Molecular Sciences)
Show Figures

Figure 1

Figure 1
<p>Illustration of a cherry-red spot in the macula. (<b>a</b>) Fundus image indicating cherry red macular spot (central white box); (<b>b</b>) magnified image of cherry-red spot encircled by an area of retinal opacification; (<b>c</b>) spectral domain optical coherence tomography cross-sectional illustration where the arrow shows accumulation of hyperreflective material, indicating lipid deposits in the ganglion cell layer (graphics courtesy of Francesco Pandolfo).</p>
Full article ">Figure 2
<p>The illustration depicts hyperreflective pre-retinal deposits situated at the interface between the internal limiting membrane and the vitreous, likely contributing to the induction of posterior vitreous detachment (PVD). Furthermore, some of these deposits are illustrated within the vitreous, mimicking the appearance of vitreitis. (Graphics courtesy of Dariush Rahimi).</p>
Full article ">Figure 3
<p>The illustration depicts a yellow ring outlining the contour of the FAZ. In patients with FD, the FAZ extends from the inner yellow ring to the outer yellow ring in the area indicated by the arrows due to structural changes in retinal vessels. (Graphics courtesy of Dariush Rahimi).</p>
Full article ">Figure 4
<p>The illustration depicts hyperreflective foci situated within the inner retinal layers in Fabry Disease. (graphics courtesy of Dariush Rahimi).</p>
Full article ">
17 pages, 1257 KiB  
Article
Enhanced Emotion Recognition Through Dynamic Restrained Adaptive Loss and Extended Multimodal Bottleneck Transformer
by Dang-Khanh Nguyen, Eunchae Lim, Soo-Hyung Kim, Hyung-Jeong Yang and Seungwon Kim
Appl. Sci. 2025, 15(5), 2862; https://doi.org/10.3390/app15052862 - 6 Mar 2025
Viewed by 218
Abstract
Emotion recognition in video aims to estimate human emotions using acoustic, visual, and linguistic information. This problem is considered multimodal and requires learning different modalities, such as visual, verbal, and vocal cues. Although previous studies have focused on developing sophisticated deep learning models, [...] Read more.
Emotion recognition in video aims to estimate human emotions using acoustic, visual, and linguistic information. This problem is considered multimodal and requires learning different modalities, such as visual, verbal, and vocal cues. Although previous studies have focused on developing sophisticated deep learning models, this work proposes a different approach using dynamic restrained adaptive loss inspired by multitask learning to understand multimodal inputs jointly. This training strategy allows predictions from one modality to enhance the accuracy of predictions from other modalities, mirroring the concept of multitask learning, where the results of one task can improve the performance of related tasks. Furthermore, this work introduces the extended multimodal bottleneck transformer, an efficient and effective mid-fusion method designed for problems involving more than two modalities to enhance the performance of emotion recognition systems. The proposed method significantly improves results compared to other end-to-end multimodal fusion techniques on three multimodal benchmarks—Interactive Emotional Dyadic Motion Capture (IEMOCAP), Carnegie Mellon University Multimodal Opinion Sentiment and Emotion Intensity (CMU-MOSEI), and the Chinese Multimodal Sentiment Analysis dataset with independent unimodal annotations (CH-SIMS). Full article
Show Figures

Figure 1

Figure 1
<p>Proposed multimodal learning framework (<b>a</b>) developed from traditional multimodal learning (<b>b</b>) and inspired by multitask learning (<b>c</b>).</p>
Full article ">Figure 2
<p>Block diagram of the proposed framework.</p>
Full article ">Figure 3
<p>Illustration of proposed XMBT.</p>
Full article ">Figure 4
<p>CMU-MOSEI and IEMOCAP test results for XMBT by training strategy.</p>
Full article ">Figure 5
<p>Evaluation metrics of IEMOCAP.</p>
Full article ">Figure 6
<p>CMU-MOSEI test results of XMBT and open-ended MBT variants.</p>
Full article ">Figure 7
<p>CMU-MOSEI test results of XMBT by temperature and number of bottleneck layers.</p>
Full article ">Figure 8
<p>T-SNE visualization of modal-specific representations of IEMOCAP samples using (<b>upper</b>) conventional loss function and (<b>lower</b>) DRA loss function.</p>
Full article ">
18 pages, 3789 KiB  
Article
Multivariate Time Series Anomaly Detection Using Working Memory Connections in Bi-Directional Long Short-Term Memory Autoencoder Network
by Xianghua Ding, Jingnan Wang, Yiqi Liu and Uk Jung
Appl. Sci. 2025, 15(5), 2861; https://doi.org/10.3390/app15052861 - 6 Mar 2025
Viewed by 217
Abstract
“Normal” events are characterized as data patterns or behaviors that align with expected operational conditions, while “anomalies” are defined as deviations from these patterns, potentially signaling faults, errors, or unexpected system behaviors. The timely and accurate detection of anomalies plays a critical role [...] Read more.
“Normal” events are characterized as data patterns or behaviors that align with expected operational conditions, while “anomalies” are defined as deviations from these patterns, potentially signaling faults, errors, or unexpected system behaviors. The timely and accurate detection of anomalies plays a critical role in domains such as industrial manufacturing, financial transactions, and other related domains. In the context of Industry 4.0, the proliferation of sensors has resulted in a massive influx of time series data, making the anomaly detection of such multivariate time series data a popular research area. Long Short-Term Memory (LSTM) has been extensively recognized as an effective framework for modeling and processing time series data. Previous studies have combined Bi-directional Long Short-Term Memory (Bi-LSTM) architecture with Autoencoder (AE) for multivariate time series anomaly detection. However, due to the inherent limitations of LSTM, Bi-LSTM-AE still cannot overcome these drawbacks. Our study replaces the LSTM units within the Bi-LSTM-AE architecture of existing research with Working Memory Connections for LSTM units and demonstrates that this architecture performs better in the field of multivariate time series anomaly detection compared to using standard LSTM units. The model we proposed not only outperforms the baseline models but also demonstrates greater robustness across various scenarios. Full article
Show Figures

Figure 1

Figure 1
<p>A simple Autoencoder architecture.</p>
Full article ">Figure 2
<p>A working memory connection for LSTM structure.</p>
Full article ">Figure 3
<p>Example of data pre-processing divided into time windows. The red squares indicate the sliding windows applied during the preprocessing step.</p>
Full article ">Figure 4
<p>Overall process of the proposed approach.</p>
Full article ">Figure 5
<p>Detail of the Bi-LSTM-WMCs block.</p>
Full article ">Figure 6
<p>Visualization of a portion of the training data and one of the test datasets.</p>
Full article ">Figure 7
<p>Visualization of a subset of variables from the SMAP dataset (D-1).</p>
Full article ">Figure 8
<p>Visualization of a subset of variables from the MSL dataset (F-5).</p>
Full article ">Figure 9
<p>F1-score comparison for different window size (t) values and <math display="inline"><semantics> <mi>α</mi> </semantics></math>. (<b>a</b>)–(<b>c</b>) represent window size (t) = 5 for 3 test datasets, (<b>d</b>)–(<b>f</b>) represent window size (t) = 25 and (<b>g</b>)–(<b>i</b>) represent window size (t) = 40.</p>
Full article ">Figure 10
<p>Comparison of training times across multiple models and datasets.</p>
Full article ">Figure 11
<p>Comparison of anomaly detection times across multiple models and datasets.</p>
Full article ">
71 pages, 32082 KiB  
Article
Developing New Design Procedure for Bridge Construction Equipment Based on Advanced Structural Analysis
by Shaoxiong Jiang and Faham Tahmasebinia
Appl. Sci. 2025, 15(5), 2860; https://doi.org/10.3390/app15052860 - 6 Mar 2025
Viewed by 204
Abstract
Bridge construction equipment (BCE) is crucial for efficiently executing large-scale infrastructure projects, particularly those involving continuous long-span bridges. Current BCE technologies, like the Overhead Movable Scaffolding System (OMSS), are often chosen for their high efficiency and cost-effective reusability. However, the lack of a [...] Read more.
Bridge construction equipment (BCE) is crucial for efficiently executing large-scale infrastructure projects, particularly those involving continuous long-span bridges. Current BCE technologies, like the Overhead Movable Scaffolding System (OMSS), are often chosen for their high efficiency and cost-effective reusability. However, the lack of a standardised design framework tailored to Australian conditions complicates the design process, potentially leading to increased inefficiencies and safety concerns. This research project seeks to establish a novel design procedure for BCE, using the OMSS in Australia as a case study. The project adopts parametric design techniques using Rhinoceros (Rhino) 3D and Grasshopper to create a three-dimensional linear model. This model undergoes initial structural optimisation with Karamba3D. Subsequent advanced analyses include linear static design assessments performed in Strand7, a sophisticated finite element analysis software. The evaluation primarily utilises Australian standards to assess performance against various load types and combinations, such as permanent (dead), imposed (live), and wind loads. The structural integrity, including maximum displacement, axial forces, and bending moments, is manually verified against the analysis outcomes. The results confirm that the OMSS model adheres to ultimate and serviceability limit state requirements, affirming the effectiveness of the proposed design procedure for BCE. The research culminates in a design procedure flowchart and further suggests future research directions to refine BCE design methodologies for complex bridge construction scenarios. Full article
Show Figures

Figure 1

Figure 1
<p>Assumed post-tensioned bridge deck design: (<b>a</b>) section; (<b>b</b>) elevation.</p>
Full article ">Figure 2
<p>Modelling logic for parametric design in Rhino 8 Grasshopper.</p>
Full article ">Figure 3
<p>Modelling sequence.</p>
Full article ">Figure 4
<p>Grasshopper scripts for basic parameter setup. The main arch height and sub-arch height are the main variables in this study and are colored in red.</p>
Full article ">Figure 5
<p>Main girder: (<b>a</b>) subdivided components; (<b>b</b>) model view.</p>
Full article ">Figure 6
<p>Body part of main girder truss: (<b>a</b>) Grasshopper scripts; (<b>b</b>) model view. The red coloured component is the Body part of main girder truss.</p>
Full article ">Figure 7
<p>Back nose part of main girder truss: (<b>a</b>) Grasshopper scripts; (<b>b</b>) model view. The red coloured component is the back nose part of main girder truss.</p>
Full article ">Figure 8
<p>Front nose part of main girder truss: (<b>a</b>) Grasshopper scripts; (<b>b</b>) model view. The red coloured component is the back nose part of main girder truss.</p>
Full article ">Figure 9
<p>Main girder transverse bracing: (<b>a</b>) Grasshopper scripts; (<b>b</b>) model view. The red coloured component is the back nose part of main girder truss.</p>
Full article ">Figure 10
<p>Sub-girder: (<b>a</b>) subdivided components; (<b>b</b>) model view. The red coloured component is the back nose part of main girder truss.</p>
Full article ">Figure 11
<p>Sub-girder truss: (<b>a</b>) Grasshopper scripts; (<b>b</b>) model view. The red coloured component is the back nose part of main girder truss.</p>
Full article ">Figure 12
<p>Sub-girder transverse bracing: (<b>a</b>) Grasshopper scripts; (<b>b</b>) model view. The red coloured component is the back nose part of main girder truss.</p>
Full article ">Figure 13
<p>Wing: (<b>a</b>) cluster package; (<b>b</b>) model view; (<b>c</b>) Grasshopper scripts. The red coloured component is the back nose part of main girder truss.</p>
Full article ">Figure 14
<p>Substructure: (<b>a</b>) subdivided components; (<b>b</b>) model view. The red coloured component is the back nose part of main girder truss.</p>
Full article ">Figure 15
<p>Substructure hanger: (<b>a</b>) Grasshopper scripts; (<b>b</b>) model view. The red coloured component is the back nose part of main girder truss.</p>
Full article ">Figure 16
<p>Substructure platform: (<b>a</b>) Grasshopper scripts; (<b>b</b>) model view. The red coloured component is the back nose part of main girder truss.</p>
Full article ">Figure 17
<p>Main arch: (<b>a</b>) subdivided components; (<b>b</b>) model view. The red coloured component is the back nose part of main girder truss.</p>
Full article ">Figure 18
<p>Main arch truss: (<b>a</b>) Grasshopper scripts; (<b>b</b>) model view. The red coloured component is the back nose part of main girder truss.</p>
Full article ">Figure 19
<p>Main arch transverse bracing: (<b>a</b>) Grasshopper scripts; (<b>b</b>) model view. The red coloured component is the back nose part of main girder truss.</p>
Full article ">Figure 20
<p>Sub-arch: (<b>a</b>) subdivided components; (<b>b</b>) model view. The red coloured component is the back nose part of main girder truss.</p>
Full article ">Figure 21
<p>Sub-arch truss: (<b>a</b>) Grasshopper scripts; (<b>b</b>) model view. The red coloured component is the back nose part of main girder truss.</p>
Full article ">Figure 22
<p>Sub-arch transverse bracing: (<b>a</b>) Grasshopper scripts; (<b>b</b>) model view. The red coloured component is the back nose part of main girder truss.</p>
Full article ">Figure 23
<p>Girder truss adjustments: (<b>a</b>) cluster package; (<b>b</b>) model view; (<b>c</b>) Grasshopper scripts. The red coloured component is the back nose part of main girder truss.</p>
Full article ">Figure 24
<p>Original primary load-bearing structure.</p>
Full article ">Figure 25
<p>Primary structure optimisation process using Karamba3D components.</p>
Full article ">Figure 26
<p>Support and applied load positions on the primary structure.</p>
Full article ">Figure 27
<p>“Galapagos” component editor setup.</p>
Full article ">Figure 28
<p>Results of optimisation using Galapagos.</p>
Full article ">Figure 29
<p>Optimised primary load-bearing structure.</p>
Full article ">Figure 30
<p>Comparison of the maximum displacement of the primary structures analysed in Strand7: (<b>a</b>) original; (<b>b</b>) optimised.</p>
Full article ">Figure 31
<p>Overhead MSS line model output for Strand7 analysis: (<b>a</b>) perspective view; (<b>b</b>) longitudinal elevation; (<b>c</b>) transverse elevation.</p>
Full article ">Figure 32
<p>Customised component for mirroring symmetrical elements: (<b>a</b>) cluster package; (<b>b</b>) Grasshopper scripts.</p>
Full article ">Figure 33
<p>Output main arch line model for Strand7 analysis: (<b>a</b>) Grasshopper scripts; (<b>b</b>) model view. The red coloured component is the main arch.</p>
Full article ">Figure 34
<p>C# scripts for colour code conversion from hexadecimal format to RGB triplet.</p>
Full article ">Figure 35
<p>Grasshopper scripts for output line models of other structural components for Strand7 analysis.</p>
Full article ">Figure 36
<p>Line model and layers baked from Grasshopper.</p>
Full article ">Figure 37
<p>Strand7 model import settings: (<b>a</b>) Strand7 button menu; (<b>b</b>) model import window.</p>
Full article ">Figure 38
<p>Rhino file properties read by Strand7: (<b>a</b>) Rhino colours to Strand7 beam properties; (<b>b</b>) Rhino layers to Strnad7 groups.</p>
Full article ">Figure 39
<p>Data input page of Excel spreadsheet for calculating member capacity.</p>
Full article ">Figure 40
<p>Excel spreadsheet for calculating member capacity under axial tensile forces complying with AS 4100: 2020.</p>
Full article ">Figure 41
<p>Excel spreadsheet for calculating member capacity under axial compressive forces complying with AS 4100: 2020: (<b>a</b>) steel section properties; (<b>b</b>) calculation process.</p>
Full article ">Figure 42
<p>Excel spreadsheet for calculating member capacity under bending moments complying with AS 4100: 2020: (<b>a</b>) steel section properties; (<b>b</b>) calculation process.</p>
Full article ">Figure 43
<p>Excel spreadsheet for calculating member capacity under tensile combined actions complying with AS 4100: 2020: (<b>a</b>) steel section properties; (<b>b</b>) calculation process.</p>
Full article ">Figure 44
<p>Excel spreadsheet for calculating member capacity under compressive combined actions complying with AS 4100: 2020: (<b>a</b>) steel section properties; (<b>b</b>) calculation process.</p>
Full article ">Figure 45
<p>Strand7 model with initial member setup.</p>
Full article ">Figure 46
<p>Step-by-step working cycle of cast-in-place overhead movable scaffolding system.</p>
Full article ">Figure 47
<p>Wind load directions.</p>
Full article ">Figure 48
<p>Deflections of the substructure platform component under three SLS load cases: (<b>a</b>) orthogonal; (<b>b</b>) 45 degrees upward; (<b>c</b>) 45 degrees downward.</p>
Full article ">Figure 49
<p>Deflections of the OMSS under three SLS load cases: (<b>a</b>) orthogonal; (<b>b</b>) 45 degrees upward; (<b>c</b>) 45 degrees downward.</p>
Full article ">Figure 50
<p>Proposed new design procedure of bridge construction equipment. Where the red block shows the possible future research.</p>
Full article ">
34 pages, 12341 KiB  
Article
Development and Validation of Digital Twin Behavioural Model for Virtual Commissioning of Cyber-Physical System
by Roman Ruzarovsky, Tibor Horak, Roman Zelník, Richard Skypala, Martin Csekei, Ján Šido, Eduard Nemlaha and Michal Kopcek
Appl. Sci. 2025, 15(5), 2859; https://doi.org/10.3390/app15052859 - 6 Mar 2025
Viewed by 289
Abstract
Modern manufacturing systems are influenced by the growing complexity of mechatronics, control systems, IIoT, and communication technologies integrated into cyber-physical systems. These systems demand flexibility, modularity, and rapid project execution, making digital tools critical for their design. Virtual commissioning, based on digital twins, [...] Read more.
Modern manufacturing systems are influenced by the growing complexity of mechatronics, control systems, IIoT, and communication technologies integrated into cyber-physical systems. These systems demand flexibility, modularity, and rapid project execution, making digital tools critical for their design. Virtual commissioning, based on digital twins, enables the testing and validation of control systems and designs in virtual environments, reducing risks and accelerating time-to-market. This research explores the development of digital twin models to bridge the gap between simulation and real-world validation. The models identify design flaws, validate the PLC control code, and ensure interoperability across software platforms. A case study involving a modular Festo manufacturing system modelled in Tecnomatix Process Simulate demonstrates the ability of digital twins to detect inefficiencies, such as collision risks, and to validate automation systems virtually. This study highlights the advantages of virtual commissioning for optimizing manufacturing systems. Communication testing showed compatibility across platforms but revealed limitations with certain data types due to software constraints. This research provides practical insights into creating robust digital twin models, improving the flexibility, efficiency, and quality of manufacturing system design. It also offers recommendations to address current challenges in interoperability and system performance. Full article
Show Figures

Figure 1

Figure 1
<p>Comparison of traditional and virtual commissioning processes, illustrating how integrating virtual commissioning reduces testing time and accelerates system deployment.</p>
Full article ">Figure 2
<p>Classification of commissioning approaches, illustrating actual, mixed virtual, hybrid, and constructive virtual commissioning, based on the combination of real and simulated assembly and control systems.</p>
Full article ">Figure 3
<p>Physical setup of the MPS<sup>®</sup> 203 I4.0 automated assembly system as CPS. The system consists of three main stations: Distribution Station (input), Joining Station (material flow), and Sorting Station (output). MES is integrated for production control and monitoring.</p>
Full article ">Figure 4
<p>The first phase of digital twin design: integration of the physical 3D model (geometry and kinematics) with the logical behaviour model to generate a virtual model.</p>
Full article ">Figure 5
<p>Diagram illustrates the systematic methodology for digital twin development, control system integration, and virtual commissioning in industrial automation.</p>
Full article ">Figure 6
<p>Three-dimensional digital twin model of the MPS<sup>®</sup> 203 I4.0 assembly system, prepared for integration into the simulation environment.</p>
Full article ">Figure 7
<p>Pneumatic cylinder DSNU-8-100-PPV-A (19182), Festo AG &amp; Co. KG, Esslingen, Germany and the generated pneumatic cylinder model and subsequent export in the Festo Design Tool 3D environment.</p>
Full article ">Figure 8
<p>Insertion of the pneumatic cylinder as a production resource into the project database and creation of its kinematic model with defined joint properties.</p>
Full article ">Figure 9
<p>Kinematic modelling of the pneumatic cylinder in the MPS “Distribution” station. The model was converted to JT format and imported into the project database, where kinematics was assigned. Actuating the pneumatic cylinder extends the feeding mechanism, releasing the cylinder into the working position.</p>
Full article ">Figure 10
<p>Definition of device operations in Process Simulate. “Object Flow Operation” enables movement within the simulation, while “Device Operation” follows predefined kinematics. Two operations were created: extension and retraction of the feeding mechanism.</p>
Full article ">Figure 11
<p>Generation and visualization of input and output signals for the feeding mechanism in the Signal Viewer window.</p>
Full article ">Figure 12
<p>Definition of attributes for the proposed position sensor for the feeding mechanism.</p>
Full article ">Figure 13
<p>Insertion of the sensor model as a light sensor for detecting yellow-coloured objects within the feeding mechanism. The sensor is integrated into a virtual model to enable object detection and interaction within the simulation environment.</p>
Full article ">Figure 14
<p>Table of generated signals for controlling the feeding mechanism. The signals are paired based on their signal names rather than addresses, ensuring proper communication and synchronization within the simulation environment.</p>
Full article ">Figure 15
<p>Schematic representation of the connection between the PLC and the simulation system via OPC communication, utilizing an OPC DA Server and OPC DA Client for data exchange.</p>
Full article ">Figure 16
<p>Table of signals with assigned addresses and connections to the PLC, including external OPC DA communication links for data exchange between the simulation model and the control system.</p>
Full article ">Figure 17
<p>Electropneumatic schematic of the pneumatic feeding mechanism, illustrating the connection between the PLC, sensors, actuators, and control components.</p>
Full article ">Figure 18
<p>Simulation panel for monitoring and controlling individual signals. In the Simulation Panel, green (1) indicates an active signal, while red (0) represents an inactive signal, showing the current state of inputs or outputs in the simulation. The square represents the inputs and the circle the outputs.</p>
Full article ">Figure 19
<p>MPS process flow, illustrating MES process planning, material flow, data handling, assembly, quality control, and final product expedition. The process serves as the basis for the PLC operational program, ensuring automation and synchronization of production tasks.</p>
Full article ">Figure 20
<p>Definition of new parts, their movement operations, and generation of virtual signals for motion.</p>
Full article ">Figure 21
<p>Generated material flow of individual assembled parts. The diagram illustrates the flow of silver, black, and red cylinders through the feeding and extraction operations.</p>
Full article ">Figure 22
<p>Created virtual model of the automated assembly system in Process Simulate. The system is shown with its components, including the control sequence editor for operation management and sequence visualization.</p>
Full article ">Figure 23
<p>The virtual commissioning project of the assembly system was implemented using an SiL approach, where the digital twin model and the simulated control system operated simultaneously on separate monitors. One monitor displayed the simulation model representing the digital twin, while the second monitor ran the control program, allowing real-time testing and verification. This setup enabled direct interaction between the control logic and the simulated system, ensuring accurate evaluation of system behaviour and response within the virtual commissioning environment.</p>
Full article ">Figure 24
<p>Overview of the symbol table in Process Simulate, displaying variable names, data types, IEC format addresses, PLC connection methods, and comments, facilitating efficient signal mapping and integration between the virtual model and external control systems; the red colour indicates both true and false states, depending on the context, as seen online.</p>
Full article ">Figure 25
<p>Testing and verification of the PLC control program on the digital twin model of the assembly system.</p>
Full article ">
20 pages, 8921 KiB  
Article
A Survey of IEEE 802.11ax WLAN Temporal Duty Cycle for the Assessment of RF Electromagnetic Exposure
by Yizhen Yang, Günter Vermeeren, Leen Verloock, Mònica Guxens and Wout Joseph
Appl. Sci. 2025, 15(5), 2858; https://doi.org/10.3390/app15052858 - 6 Mar 2025
Viewed by 121
Abstract
The increasing deployment of IEEE 802.11ax (Wi-Fi 6) networks necessitates an accurate assessment of radiofrequency electromagnetic field (RF-EMF) exposure under realistic usage scenarios. This study investigates the duty cycle (DC) and corresponding exposure levels of Wi-Fi 6 in controlled laboratory conditions, focusing on [...] Read more.
The increasing deployment of IEEE 802.11ax (Wi-Fi 6) networks necessitates an accurate assessment of radiofrequency electromagnetic field (RF-EMF) exposure under realistic usage scenarios. This study investigates the duty cycle (DC) and corresponding exposure levels of Wi-Fi 6 in controlled laboratory conditions, focusing on bandwidth variations, multi-user scenarios, and application types. DC measurements reveal significant variability across internet services, with FTP upload exhibiting the highest mean DC (94.3%) under 20 MHz bandwidth, while YouTube 4K video streaming showed bursts with a maximum DC of 89.2%. Under poor radio conditions, DC increased by up to 5× for certain applications, emphasizing the influence of degraded signal-to-noise ratio (SNR) on retransmissions and modulation. Weighted exposure results indicate a reduction in average electric-field strength by up to 10× when incorporating DC, with maximum weighted exposure at 4.2 V/m (6.9% of ICNIRP limits) during multi-user scenarios. These findings highlight the critical role of realistic DC assessments in refining exposure evaluations, ensuring regulatory compliance, and advancing the understanding of Wi-Fi 6’s EMF exposure implications. Full article
(This article belongs to the Special Issue Electromagnetic Radiation and Human Environment)
Show Figures

Figure 1

Figure 1
<p>The measurement setup and layout for the single-user scenario. (<b>a</b>) Three-axis antenna was placed at the UD side. (<b>b</b>) Three-axis antenna was placed at the AP side. (<b>c</b>) The overall layout of the measurement setup, and the three-axis antenna was placed at the center.</p>
Full article ">Figure 2
<p>Wi-Fi 6 signal recorded using the SA’s zero-span mode.</p>
Full article ">Figure 3
<p>The setup for Wi-Fi 6 DC measurements under poor radio conditions, where UD is a laptop.</p>
Full article ">Figure 4
<p>Layout of UDs (including a laptop, a mobile phone, a tablet and a laptop with UWiA installed), measurement points (center) and the AP for assessing the exposure level of Wi-Fi 6 in a multi-user scenario (The brown boxes show tables where devices were placed).</p>
Full article ">Figure 5
<p>Wi-Fi DC versus time for different activities under 80 MHz bandwidth (YouTube 4K video, FTP download, WhatsApp video call, and web browsing).</p>
Full article ">Figure 6
<p>One-second-averaged DCs as a function of Internet application per bandwidth: (<b>a</b>) 20 MHz, (<b>b</b>) 40 MHz, (<b>c</b>) 80 MHz, and (<b>d</b>) 160 MHz. The mean DC for each application over 6 min (marked with a star in the box plot) is labeled above each box.</p>
Full article ">Figure 6 Cont.
<p>One-second-averaged DCs as a function of Internet application per bandwidth: (<b>a</b>) 20 MHz, (<b>b</b>) 40 MHz, (<b>c</b>) 80 MHz, and (<b>d</b>) 160 MHz. The mean DC for each application over 6 min (marked with a star in the box plot) is labeled above each box.</p>
Full article ">Figure 7
<p>The comparison of Wi-Fi 6 DCs for different Internet applications under good and poor radio conditions (DC mean values are marked as green triangles).</p>
Full article ">Figure 8
<p>DC as a function of the number of UDs for four different Wi-Fi 6 network applications, including 4K video streaming, FTP downloads, web browsing, and video calls (DC mean values are marked as green triangles).</p>
Full article ">Figure 9
<p>DC variation over time for 4K video streaming in single-user and four UDs scenarios.</p>
Full article ">Figure 10
<p>Comparison of DC distributions for four UDs using different applications simultaneously (“All applications”) versus the same application (DC mean values are marked as green triangles).</p>
Full article ">Figure 11
<p>Measured exposure levels (weighted with different DC: <math display="inline"><semantics> <msub> <mi mathvariant="normal">DC</mi> <mrow> <mi>m</mi> <mi>i</mi> <mi>n</mi> </mrow> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mi mathvariant="normal">DC</mi> <mrow> <mi>m</mi> <mi>a</mi> <mi>x</mi> </mrow> </msub> </semantics></math>, video call, and DC = 100%) at the AP side, UD side, and the center location under varying bandwidths (20 MHz, 40 MHz, 80 MHz, and 160 MHz).</p>
Full article ">Figure 12
<p>Measured exposure levels (weighted with different DC: <math display="inline"><semantics> <msub> <mi mathvariant="normal">DC</mi> <mrow> <mi>m</mi> <mi>i</mi> <mi>n</mi> </mrow> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mi mathvariant="normal">DC</mi> <mrow> <mi>m</mi> <mi>a</mi> <mi>x</mi> </mrow> </msub> </semantics></math>, video call and DC = 100%) for different types of UD (laptop, mobile phone, tablet and UWiA) under a bandwidth of 80 MHz.</p>
Full article ">Figure 13
<p>Exposure levels at different UDs (laptop, mobile phone, tablet, and UWiA), center, and AP measured in the multi-user scenario for different DCs (all 4 UD-scenario DCs).</p>
Full article ">
20 pages, 3601 KiB  
Article
Full-Scale Piano Score Recognition
by Xiang-Yi Zhang and Jia-Lien Hsu
Appl. Sci. 2025, 15(5), 2857; https://doi.org/10.3390/app15052857 - 6 Mar 2025
Viewed by 86
Abstract
Sheet music is one of the most efficient methods for storing music. Meanwhile, a large amount of sheet music-image data is stored in paper form, but not in a computer-readable format. Therefore, digitizing sheet music is an essential task, such that the encoded [...] Read more.
Sheet music is one of the most efficient methods for storing music. Meanwhile, a large amount of sheet music-image data is stored in paper form, but not in a computer-readable format. Therefore, digitizing sheet music is an essential task, such that the encoded music object could be effectively utilized for tasks such as editing or playback. Although there have been a few studies focused on recognizing sheet music images with simpler structures—such as monophonic scores or more modern scores with relatively simple structures, only containing clefs, time signatures, key signatures, and notes—in this paper we focus on the issue of classical sheet music containing dynamics symbols and articulation signs, more than only clefs, time signatures, key signatures, and notes. Therefore, this study augments the data from the GrandStaff dataset by concatenating single-line scores into multi-line scores and adding various classical music dynamics symbols not included in the original GrandStaff dataset. Given a full-scale piano score in pages, our approach first applies three YOLOv8 models to perform the three tasks: 1. Converting a full page of sheet music into multiple single-line scores; 2. Recognizing the classes and absolute positions of dynamics symbols in the score; and 3. Finding the relative positions of dynamics symbols in the score. Then, the identified dynamics symbols are removed from the original score, and the remaining score serves as the input into a Convolutional Recurrent Neural Network (CRNN) for the following steps. The CRNN outputs KERN notation (KERN, a core pitch/duration representation for common practice music notation) without dynamics symbols. By combining the CRNN output with the relative and absolute position information of the dynamics symbols, the final output is obtained. The results show that with the assistance of YOLOv8, there is a significant improvement in accuracy. Full article
(This article belongs to the Special Issue Integration of AI in Signal and Image Processing)
Show Figures

Figure 1

Figure 1
<p>An illustrated example of KERN-encoded pianoform music.</p>
Full article ">Figure 2
<p>The structure of the proposed model.</p>
Full article ">Figure 3
<p>The structure of the OMR Processing Block.</p>
Full article ">Figure 4
<p>Examples of <span class="html-italic">crescendo</span> and <span class="html-italic">decrescendo</span> symbols are presented as follows: (<b>Top left</b>) Crescendo symbol. (<b>Top right</b>) Decrescendo symbol. (<b>Bottom left</b>) Crescendo symbol represented in textual form. (<b>Bottom right</b>) Decrescendo symbol represented in textual form.</p>
Full article ">Figure 5
<p>An example of image column bounding box.</p>
Full article ">Figure 6
<p>(<b>Left</b>) Chord with a second interval. (<b>Right</b>) Chord without a second interval.</p>
Full article ">Figure 7
<p>The architecture of CRNN.</p>
Full article ">Figure 8
<p>The input image is first transformed into a feature map using the CNN. The feature map is subsequently divided into multiple sub-images of equal width but varying heights, which are then concatenated to form a single sequential representation.</p>
Full article ">Figure 9
<p>An example of a full-page music score image created by concatenating four single-line score images is shown. In the image, green bounding boxes highlight objects classified as “words”, while blue bounding boxes denote objects classified as “staff”.</p>
Full article ">Figure 10
<p>An illustration of erosion and dilation applied to the GrandStaff_dynam dataset alongside the original image is shown. The top row presents the original image, the middle row displays the eroded image, and the bottom row shows the dilated image.</p>
Full article ">Figure 11
<p>Confusion matrix for YOLOv8’s accuracy in recognizing dynamics symbols on original images. The horizontal axis represents the ground truth classification, while the vertical axis represents the predicted classification.</p>
Full article ">Figure 12
<p>Confusion matrix for YOLOv8’s accuracy in recognizing dynamics symbols on erosion or dilation images. The horizontal axis represents the ground truth classification, while the vertical axis represents the predicted classification.</p>
Full article ">Figure 13
<p>Examples of dynamics symbols detected by the YOLO model.</p>
Full article ">Figure 14
<p>CRNN for the recognition of score images without dynamics symbols. (<b>Top</b>) Ground truth. (<b>Bottom</b>) Images predicted by CRNN. These images are rendered through Verovio from KERN files, not the original output of CRNN.</p>
Full article ">Figure 15
<p>CRNN for the recognition of score images with dynamics symbols. (<b>Top</b>) Ground truth. (<b>Bottom</b>) Images predicted by CRNN. These images are rendered through Verovio from KERN files, not the original output of CRNN.</p>
Full article ">Figure 16
<p>CRNN and YOLOv8 for the recognition of score images with dynamics symbols. (<b>Top</b>) Ground truth. (<b>Bottom</b>) Images predicted by CRNN. These images are rendered through Verovio from KERN files, not the original output of CRNN.</p>
Full article ">Figure 17
<p>KERN encoding generated by CRNN without dynamics symbols. (<b>Left</b>) KERN encoding produced by CRNN. (<b>Right</b>) Ground truth, with incorrectly predicted symbols displayed in red font on the left side.</p>
Full article ">Figure 18
<p>(<b>Left</b>) The generated image using recognized KERN encoding and rendered with Verovio. Symbols highlighted in red indicate recognition errors. (<b>Right</b>) The actual image serving as the ground truth.</p>
Full article ">
21 pages, 1860 KiB  
Article
Nonparametric Comparative Analysis of Driver Behaviors in Signalized and Non-Signalized Roundabouts: A Study on Road Safety in Qatar
by Mohammed Abul Fahed, Pilsung Choe and Al-Harith Umlai
Appl. Sci. 2025, 15(5), 2856; https://doi.org/10.3390/app15052856 - 6 Mar 2025
Viewed by 110
Abstract
This study investigated and compared driver behaviors at signalized and non-signalized roundabouts in Qatar, focusing on turn signal usage, lane change behavior, and correct lane usage. The primary objectives were to determine the frequency of turn signal usage, assess correct lane usage, analyze [...] Read more.
This study investigated and compared driver behaviors at signalized and non-signalized roundabouts in Qatar, focusing on turn signal usage, lane change behavior, and correct lane usage. The primary objectives were to determine the frequency of turn signal usage, assess correct lane usage, analyze lane change behavior, and compare these behaviors between the two types of roundabouts. Data were collected through a field study at selected roundabouts, where driver behaviors were observed and analyzed. The results revealed significant differences between signalized and non-signalized roundabouts. Turn signal compliance was higher in signalized roundabouts (up to 45%) compared to non-signalized roundabouts (20%). The rate of lane change in signalized roundabouts was observed to be 31%, whereas it was 14% in non-signalized roundabouts, and correct lane usage compliance was higher in signalized roundabouts (60%) compared to non-signalized roundabouts (35%). These findings suggest that traffic signals contribute to safer and more predictable driver behavior, although congestion and long waiting times in signalized roundabouts present challenges. The study recommends improving signage visibility, optimizing signal timings, enhancing road markings, and enforcing traffic regulations to address these issues. The findings can inform traffic engineers and policymakers in enhancing the safety and efficiency of roundabouts. Full article
(This article belongs to the Special Issue Road Safety in Sustainable Urban Transport)
Show Figures

Figure 1

Figure 1
<p>Illustration of lane change by car to the second lane while traversing roundabout [<a href="#B38-applsci-15-02856" class="html-bibr">38</a>].</p>
Full article ">Figure 2
<p>Illustration of correct lane usage by arrows that indicate movements such as red with right or through turn, blue with through or left turn, and yellow with left or U-turn [<a href="#B39-applsci-15-02856" class="html-bibr">39</a>].</p>
Full article ">Figure 3
<p>Illustration of turn signal usage [<a href="#B40-applsci-15-02856" class="html-bibr">40</a>].</p>
Full article ">Figure 4
<p>(<b>a</b>) Signalized roundabout. (<b>b</b>) Non-signalized roundabout.</p>
Full article ">Figure 5
<p>A graphical illustration of the results.</p>
Full article ">
27 pages, 11370 KiB  
Article
Research on Real-Time Control Strategy for HVAC Systems in University Libraries
by Yiquan Zou, Wentao Zou, Han Chen, Xingyao Dong, Luxi Zhu and Hong Shu
Appl. Sci. 2025, 15(5), 2855; https://doi.org/10.3390/app15052855 - 6 Mar 2025
Viewed by 213
Abstract
The energy consumption of library facilities in college buildings is significant, with the HVAC system accounting for 40–60% of the total energy use. Many university libraries, particularly those constructed in earlier years, rely on manual control methods, making the real-time control of HVAC [...] Read more.
The energy consumption of library facilities in college buildings is significant, with the HVAC system accounting for 40–60% of the total energy use. Many university libraries, particularly those constructed in earlier years, rely on manual control methods, making the real-time control of HVAC systems crucial. This study explored the optimization of a building’s HVAC system control using the Levenberg–Marquardt algorithm combined with the universal global optimization algorithm to reduce energy consumption. A university library building was used as a case study to model the overall energy consumption of the HVAC equipment. The proposed strategy was then applied to optimize the energy-saving control of the building’s HVAC system. The results, based on real operational data, demonstrate that this method achieves an energy-saving rate of over 30% while also significantly improving the comfort of library users. The findings of this study provide valuable insights into the energy-saving control of HVAC systems in libraries, which can help advance building energy efficiency and sustainability in the future. Full article
Show Figures

Figure 1

Figure 1
<p>Structure of the study.</p>
Full article ">Figure 2
<p>Client HVAC structure diagram.</p>
Full article ">Figure 3
<p>Refrigeration unit end HVAC structure diagram.</p>
Full article ">Figure 4
<p>Basic steps of the strategy in <a href="#sec2dot1dot1-applsci-15-02855" class="html-sec">Section 2.1.1</a>.</p>
Full article ">Figure 5
<p>Basic steps of the strategy in <a href="#sec2dot1dot2-applsci-15-02855" class="html-sec">Section 2.1.2</a>.</p>
Full article ">Figure 6
<p>Cooling tower/cooling unit system diagram.</p>
Full article ">Figure 7
<p>Basic steps of the strategy in <a href="#sec2dot1dot3-applsci-15-02855" class="html-sec">Section 2.1.3</a>.</p>
Full article ">Figure 8
<p>Basic steps of the strategy in <a href="#sec2dot1dot4-applsci-15-02855" class="html-sec">Section 2.1.4</a>.</p>
Full article ">Figure 9
<p>Integration of algorithmic modules.</p>
Full article ">Figure 10
<p>Monitor page.</p>
Full article ">Figure 11
<p>Energy-saving policy page.</p>
Full article ">Figure 12
<p>Energy consumption query page.</p>
Full article ">Figure 13
<p>Alarm report page.</p>
Full article ">Figure 14
<p>Schematic diagram of the HVAC system composition.</p>
Full article ">Figure 15
<p>HVAC system energy consumption.</p>
Full article ">Figure 16
<p>Equipment test point location.</p>
Full article ">Figure 17
<p>Electronic breeze meter and tripod.</p>
Full article ">Figure 18
<p>Test point A.</p>
Full article ">Figure 19
<p>Test point B.</p>
Full article ">Figure 20
<p>Test point C.</p>
Full article ">Figure 21
<p>Test point D.</p>
Full article ">Figure 22
<p>Test point E.</p>
Full article ">
12 pages, 10631 KiB  
Article
Reimagining Historical Exploration: Multi-User Mixed Reality Systems for Cultural Heritage Sites
by Agapi Chrysanthakopoulou, Theofilos Chrysikopoulos, Gerasimos Arvanitis and Konstantinos Moustakas
Appl. Sci. 2025, 15(5), 2854; https://doi.org/10.3390/app15052854 - 6 Mar 2025
Viewed by 217
Abstract
This work presents a mixed reality (MR) system designed to explore inaccessible cultural heritage sites through immersive and interactive experiences. The application features two versions: an asynchronous personalized guided system offering interactions tailored to individual users’ requests and a synchronous guided system providing [...] Read more.
This work presents a mixed reality (MR) system designed to explore inaccessible cultural heritage sites through immersive and interactive experiences. The application features two versions: an asynchronous personalized guided system offering interactions tailored to individual users’ requests and a synchronous guided system providing a shared, collective navigation experience for all users. Both versions integrate innovative mechanics that allow users to explore virtual recreations of cultural sites. Multi-user functionality ensures the visibility of other users as avatars in the virtual environment, enabling collaborative exploration. The proposed application offers a GPS localization system for on-site experiences and a non-location-dependent option for remote settings. A user evaluation was conducted to assess the effectiveness and engagement of the system, providing insights into user preferences and the potential for MR technologies in preserving and promoting cultural heritage. The results highlight the application’s impact on accessibility, immersion, and multi-user interaction, paving the way for further innovation in MR cultural heritage exploration. Full article
Show Figures

Figure 1

Figure 1
<p>Demonstration of the multi-player mode from two different points of view during a synchronous guided tour in the Biblioteca Museu Víctor Balaguer. Capture from Quest 3 on the left and capture from the host PC on the right.</p>
Full article ">Figure 2
<p>Screenshot from the mobile application showcasing the portal feature. The user taps on the screen to open multiple portals, allowing them to see inside an otherwise inaccessible virtual site (Sacrification Church of Pyhämaa).</p>
Full article ">Figure 3
<p>Visualization of weather and lighting simulations in the application. The virtual environment dynamically adapts to reflect the real site’s lighting and weather conditions. Capture from Quest 3.</p>
Full article ">Figure 4
<p>The virtual guide functionality in the application. The guide offers dynamic, educational content about POIs and follows predefined paths to enhance users’ interaction and engagement in the virtual heritage environment. Capture from Quest 3 on the left; capture from Unity’s scene view on the right. (<b>a</b>) The guide provides details about a user-selected POI. (<b>b</b>) The guide navigates through predefined paths based on the user’s selection.</p>
Full article ">
20 pages, 6787 KiB  
Article
Analysis of Passenger Flow Characteristics and Origin–Destination Passenger Flow Prediction in Urban Rail Transit Based on Deep Learning
by Zhongwei Hou, Jin Han and Guang Yang
Appl. Sci. 2025, 15(5), 2853; https://doi.org/10.3390/app15052853 - 6 Mar 2025
Viewed by 117
Abstract
Traditional station passenger flow prediction can no longer meet the application needs of urban rail transit vehicle scheduling. Station passenger flow can only predict station distribution, and the passenger flow distribution in general sections is unknown. Accurate short-term travel origin and destination (OD) [...] Read more.
Traditional station passenger flow prediction can no longer meet the application needs of urban rail transit vehicle scheduling. Station passenger flow can only predict station distribution, and the passenger flow distribution in general sections is unknown. Accurate short-term travel origin and destination (OD) passenger flow prediction is the main basis for formulating urban rail transit operation organization plans. To simultaneously consider the spatiotemporal characteristics of passenger flow distribution and achieve high precision estimation of origin and destination (OD) passenger flow quickly, a predictive model based on a temporal convolutional network and a long short-term memory network (TCN–LSTM) combined with an attention mechanism was established to process passenger flow data in urban rail transit. Firstly, according to the passenger flow data of the urban rail transit section, the existing data characteristics were summarized, and the impact of external factors on section passenger flow was studied. Then, a temporal convolutional network and long short-term memory (TCN–LSTM) deep learning model based on an attention mechanism was constructed to predict interval passenger flow. The model combines some external factors such as time, date attributes, weather conditions, and air quality that affect passenger flow in the interval to improve the shortcomings of the original model in predicting origin and destination (OD) passenger flow. Taking Chongqing Rail Transit as an example, the model was validated, and the results showed that the deep learning model had significantly better prediction results than other baseline models. The applicability analysis in scenarios such as high/medium/low passenger flow could achieve stable prediction results. Full article
Show Figures

Figure 1

Figure 1
<p>Chongqing Rail Transit route map in China (research route highlighted).</p>
Full article ">Figure 2
<p>Cluster results after execution of K-Means algorithm.</p>
Full article ">Figure 3
<p>Typical OD passenger flow statistics at different times.</p>
Full article ">Figure 4
<p>Causal convolutional structure.</p>
Full article ">Figure 5
<p>Dilated convolutions.</p>
Full article ">Figure 6
<p>Dilated convolutions with residual connection.</p>
Full article ">Figure 7
<p>LSTM model structure.</p>
Full article ">Figure 8
<p>The essence of the attention mechanism.</p>
Full article ">Figure 9
<p>Attention calculation process.</p>
Full article ">Figure 10
<p>Structure diagram of TCN-LSTM model.</p>
Full article ">Figure 11
<p>Schematic diagram of combined model loss values.</p>
Full article ">Figure 12
<p>Short-term OD passenger flow prediction results.</p>
Full article ">Figure 13
<p>Comparison results of OD passenger flow prediction.</p>
Full article ">
23 pages, 673 KiB  
Article
Generative Adversarial Network Based on Self-Attention Mechanism for Automatic Page Layout Generation
by Peng Sun, Xiaomei Liu, Liguo Weng and Ziheng Liu
Appl. Sci. 2025, 15(5), 2852; https://doi.org/10.3390/app15052852 - 6 Mar 2025
Viewed by 240
Abstract
Automatic page layout generation is a challenging and promising research task, which improves the design efficiency and quality of various documents, web pages, etc. However, the current generation of layouts that are both reasonable and aesthetically pleasing still faces many difficulties, such as [...] Read more.
Automatic page layout generation is a challenging and promising research task, which improves the design efficiency and quality of various documents, web pages, etc. However, the current generation of layouts that are both reasonable and aesthetically pleasing still faces many difficulties, such as the shortcomings of existing methods in terms of structural rationality, element alignment, text and image relationship processing, and insufficient consideration of element details and mutual influence within the page. To address these issues, this article proposes a Transformer-based Generative Adversarial Network (TGAN). Generative Adversarial Networks (GANs) innovatively introduce the self-attention mechanism into the network, enabling the model to focus more on key local information that affects page layout. By introducing conditional variables in the generator and discriminator, more accurate sample generation and discrimination can be achieved. The experimental results show that the TGAN outperforms other methods in both subjective and objective ratings when generating page layouts. The generated layouts perform better in element alignment, avoiding overlap, and exhibit higher layout quality and stability, providing a more effective solution for automatic page layout generation. Full article
(This article belongs to the Special Issue Big Data Analysis and Management Based on Deep Learning: 2nd Edition)
Show Figures

Figure 1

Figure 1
<p>Schematic diagram of GAN structure.</p>
Full article ">Figure 2
<p>GAN principle diagram.</p>
Full article ">Figure 3
<p>GAN training mechanism.</p>
Full article ">Figure 4
<p>Stacked encoder and decoder structure diagram.</p>
Full article ">Figure 5
<p>TGAN model architecture diagram.</p>
Full article ">Figure 6
<p>TGAN generator model.</p>
Full article ">Figure 7
<p>TGAN discriminator model.</p>
Full article ">Figure 8
<p>Page layout abstract diagram.</p>
Full article ">Figure 9
<p>TGAN layout results.</p>
Full article ">Figure 10
<p>TGAN layout results.</p>
Full article ">
14 pages, 1657 KiB  
Article
An Efficient Method for Lung Lesions Classification Using Automatic Vascularization Evaluation on Color Doppler Ultrasound
by Roxana Rusu-Both, Adrian Satmari, Romeo-Ioan Chira, Alexandra Chira and Camelia Avram
Appl. Sci. 2025, 15(5), 2851; https://doi.org/10.3390/app15052851 - 6 Mar 2025
Viewed by 195
Abstract
Lung cancer still represents one of the main causes of cancer-related mortality, highlighting the necessity for precise, effective, and minimally intrusive diagnostic methods. This research presents an innovative approach to classifying lung lesions using Doppler ultrasound imagery combined with a feed-forward neural network [...] Read more.
Lung cancer still represents one of the main causes of cancer-related mortality, highlighting the necessity for precise, effective, and minimally intrusive diagnostic methods. This research presents an innovative approach to classifying lung lesions using Doppler ultrasound imagery combined with a feed-forward neural network (FNN). This study integrates Doppler mode ultrasound vascularization features—blood vessel area, tortuosity index, and orientation—into an FNN to classify lung lesions as benign or malignant. A dataset of 565 Doppler ultrasound pictures was extended using augmentation techniques to enhance robustness, yielding a training dataset of 3390 images. The FNN architecture was trained utilizing the Levenberg–Marquardt algorithm, achieving a classification accuracy of 98%, demonstrating its potential as a diagnostic aid. The results indicate that integrating all three vascularization factors significantly improves diagnosis accuracy compared with individual modules. This method offers a non-invasive and cost-effective complementary tool to conventional techniques such as CT scans, with the potential to improve early detection and treatment planning for lung cancer patients. Full article
(This article belongs to the Special Issue Advances in Diagnostic Radiology)
Show Figures

Figure 1

Figure 1
<p>System architecture. (<b>a1</b>,<b>b1</b>,<b>c1</b>) show input Doppler US images, while (<b>a2</b>,<b>b2</b>,<b>c2</b>) display Doppler US input images with defined regions of interest (ROI). The system extracts three vascularization parameters: blood vessel area percentage, vessel tortuosity, and vessel orientation index. These features are processed by a feed-forward neural network, which classifies the lesion as benign or malignant.</p>
Full article ">Figure 2
<p>Blood vessels tortuosity index exemplified on a curly lung vein: (<b>a</b>) approximated blood vein pixels; (<b>b</b>) approximated blood vein with a green line, first-degree equation; (<b>c</b>) computed tortuosity index as a distance (yellow) between the approximated blood vein first-degree equation (green line) and the initial blood vein (white line).</p>
Full article ">Figure 3
<p>Filters applied on the initial image: (<b>a</b>) initial Doppler ultrasound image; (<b>b</b>) Arctic filter applied on the initial image; (<b>c</b>) Burlesque filter; (<b>d</b>) Zeke filter.</p>
Full article ">Figure 4
<p>Doppler mode lung US processed: (<b>a</b>) initial lung Doppler ultrasound of a lung lesion where vascularization is present; (<b>b</b>) selected region of interest (ROI) for analysis with A<sub>mask</sub> representing the ROI area; (<b>c</b>) identified vascularity in the ROI and the computed vessels area.</p>
Full article ">Figure 5
<p>Blood vessels skeleton: (<b>a</b>) initial image of the lung Doppler ultrasound, containing lung veins and arteries; (<b>b</b>) identified blood vessels with white color; (<b>c</b>) skeleton, computed with morphological operations from figure (<b>b</b>).</p>
Full article ">
16 pages, 908 KiB  
Article
Development and Implementation of a Machine Learning Model to Identify Emotions in Children with Severe Motor and Communication Impairments
by Caryn Vowles, Kate Patterson and T. Claire Davies
Appl. Sci. 2025, 15(5), 2850; https://doi.org/10.3390/app15052850 - 6 Mar 2025
Viewed by 160
Abstract
Children with severe motor and communication impairments (SMCIs) face significant challenges in expressing emotions, often leading to unmet needs and social isolation. This study investigated the potential of machine learning to identify emotions in children with SMCIs through the analysis of physiological signals. [...] Read more.
Children with severe motor and communication impairments (SMCIs) face significant challenges in expressing emotions, often leading to unmet needs and social isolation. This study investigated the potential of machine learning to identify emotions in children with SMCIs through the analysis of physiological signals. A model was created based on the data from the DEAP online dataset to identify the emotions of typically developing (TD) participants. The DEAP model was then adapted for use by participants with SMCIs using data collected within the Building and Designing Assistive Technology Lab (BDAT). Key adaptations to the DEAP model resulted in the exclusion of respiratory signals, a reduction in wavelet levels, and the analysis of shorter-duration data segments to enhance the model’s applicability. The adapted SMCI model demonstrated an accuracy comparable to the DEAP model, performing better than chance in TD populations and showing promise for adaptation to SMCI contexts. The models were not reliable for the effective identification of emotions; however, these findings highlight the feasibility of using machine learning to bridge communication gaps for children with SMCIs, enabling better emotional understanding. Future efforts should focus on expanding the data collection of physiological signals for diverse populations and developing personalized models to account for individual differences. This study underscores the importance of collecting data from populations with SMCIs for the development of inclusive technologies to promote empathetic care and enhance the quality of life of children with communication difficulties. Full article
Show Figures

Figure 1

Figure 1
<p>Algorithm development.</p>
Full article ">Figure 2
<p>Modifications to the DEAP model when adapting for participants with SMCIs (the colours match the process steps identified in <a href="#applsci-15-02850-f001" class="html-fig">Figure 1</a>).</p>
Full article ">
22 pages, 3751 KiB  
Article
Bio-Inspired Traffic Pattern Generation for Multi-AMR Systems
by Rok Vrabič, Andreja Malus, Jure Dvoršak, Gregor Klančar and Tena Žužek
Appl. Sci. 2025, 15(5), 2849; https://doi.org/10.3390/app15052849 - 6 Mar 2025
Viewed by 154
Abstract
In intralogistics, autonomous mobile robots (AMRs) operate without predefined paths, leading to complex traffic patterns and potential conflicts that impact system efficiency. This paper proposes a bio-inspired optimization method for autonomously generating spatial movement constraints for autonomous mobile robots (AMRs). Unlike traditional multi-agent [...] Read more.
In intralogistics, autonomous mobile robots (AMRs) operate without predefined paths, leading to complex traffic patterns and potential conflicts that impact system efficiency. This paper proposes a bio-inspired optimization method for autonomously generating spatial movement constraints for autonomous mobile robots (AMRs). Unlike traditional multi-agent pathfinding (MAPF) approaches, which focus on temporal coordination, our approach proactively reduces conflicts by adapting a weighted directed grid graph to improve traffic flow. This is achieved through four mechanisms inspired by ant colony systems: (1) a movement reward that decreases the weight of traversed edges, similar to pheromone deposition, (2) a delay penalty that increases edge weights along delayed paths, (3) a collision penalty that increases weights at conflict locations, and (4) an evaporation mechanism that prevents premature convergence to suboptimal solutions. Compared to the existing approaches, the proposed approach addresses the entire intralogistic problem, including plant layout, task distribution, release and dispatching algorithms, and fleet size. Its autonomous movement rule generation and low computational complexity make it well suited for dynamic intralogistic environments. Validated through physics-based simulations in Gazebo across three scenarios, a standard MAPF benchmark, and two industrial environments, the movement constraints generated using the proposed method improved the system throughput by up to 10% compared to unconstrained navigation and up to 4% compared to expert-designed solutions while reducing the need for conflict-resolution interventions. Full article
Show Figures

Figure 1

Figure 1
<p>Illustration of the bio-inspired mechanisms. (<b>a</b>) AMR movements and the corresponding weights after applying (<b>b</b>) movement rewards (pheromone deposition), (<b>c</b>) collision handling, (<b>d</b>) delay feedback, and (<b>e</b>) pheromone evaporation.</p>
Full article ">Figure 2
<p>Solutions to the test problem: (<b>a</b>) first solution and (<b>b</b>) second solution.</p>
Full article ">Figure 3
<p>The emergence of the resulting movement patterns.</p>
Full article ">Figure 4
<p>Additional test scenarios demonstrating the impact of different parameters on the emerging movement patterns: (<b>a</b>) solution with a single AMR, (<b>b</b>) solution without collision penalty, and (<b>c</b>) solution with additional tasks.</p>
Full article ">Figure 5
<p>Sensitivity analysis of key parameters by phase.</p>
Full article ">Figure 6
<p>Comparison of algorithm performance when Phase 1 is removed, means and standard deviations.</p>
Full article ">Figure 7
<p>The solution to the rooms’ layout, obtained through the presented algorithm.</p>
Full article ">Figure 8
<p>The (<b>a</b>) expert and (<b>b</b>) algorithmic solutions for industrial scenario A. Pickups in light, intermediate buffers in medium, and dropoffs in dark blue.</p>
Full article ">Figure 9
<p>The (<b>a</b>) expert and (<b>b</b>) algorithmic solutions for industrial scenario B.</p>
Full article ">Figure 10
<p>Analysis of punctuality for industrial scenarios: (<b>a</b>) scenario A and (<b>b</b>) scenario B.</p>
Full article ">Figure 11
<p>Simulation in ROS2/Gazebo: (<b>a</b>) 3D view of the rooms’ layout, (<b>b</b>) top-down view, and (<b>c</b>) RViZ view.</p>
Full article ">Figure 12
<p>Performance comparison across scenarios. Bars show tasks completed with and without recovery actions; whiskers indicate the standard deviation of total task completions.</p>
Full article ">
28 pages, 10564 KiB  
Article
Aging-Friendly Design Research: Knowledge Graph Construction for Elderly Advantage Applications
by Xiaoying Li, Xingda Wang and Guangran Li
Appl. Sci. 2025, 15(5), 2848; https://doi.org/10.3390/app15052848 - 6 Mar 2025
Viewed by 191
Abstract
In the field of aging design, obtaining elderly advantage data is a challenge. In this study, we developed a visualization tool using knowledge graph technology to assist designers in studying elderly advantages, promoting their application in design practice. First, brainstorming sessions and workshops [...] Read more.
In the field of aging design, obtaining elderly advantage data is a challenge. In this study, we developed a visualization tool using knowledge graph technology to assist designers in studying elderly advantages, promoting their application in design practice. First, brainstorming sessions and workshops were held to analyze the challenges of applying elderly advantages in design. Based on these challenges, the concept and functional design of an elderly advantages knowledge graph were proposed. Next, the elderly advantages knowledge graph was constructed by following these steps: (1) The KJ-AHP method was used to process raw data, making them structured and quantitative. (2) The ontology of the knowledge graph was reverse-engineered based on the functional requirements of the graph, allowing the construction of the knowledge graph model layer. (3) The processed data were applied to the knowledge graph ontology through AHP-ontology mapping rules, allowing the knowledge content construction. (4) The programming language Cypher was used for the functional verification of the elderly advantages knowledge graph, and a satisfaction survey was conducted through questionnaires to assess the verification process. The elderly advantages knowledge graph constructed in this study initially fulfilled the expected functions and was met with high satisfaction. The application of knowledge graph technology provides a new reference for advantage mining in the design field. Based on the innovative combination of KJ-AHP and knowledge graph technology, this study enhances the structuring and quantification of graph data, significantly facilitating designers’ understanding of data structures, clarifying data relationships, and expanding design thinking. Full article
(This article belongs to the Special Issue Knowledge Graphs: State-of-the-Art and Applications)
Show Figures

Figure 1

Figure 1
<p>Partial meeting minutes.</p>
Full article ">Figure 2
<p>Advantage categorization based on the Fogg behavior model.</p>
Full article ">Figure 3
<p>Theoretical model of elderly advantages knowledge graph.</p>
Full article ">Figure 4
<p>Retrieval of elderly advantage features based on age attribute.</p>
Full article ">Figure 5
<p>Need-centric advantage retrieval.</p>
Full article ">Figure 6
<p>Application priority of advantages.</p>
Full article ">Figure 7
<p>Process of constructing the elderly advantages knowledge graph.</p>
Full article ">Figure 8
<p>Subway travel process for the elderly.</p>
Full article ">Figure 9
<p>User journey map, including needs and advantages.</p>
Full article ">Figure 10
<p>Ontology construction of elderly advantages knowledge graph.</p>
Full article ">Figure 11
<p>Mapping rules for data.</p>
Full article ">Figure 12
<p>Python code for knowledge extraction (partial).</p>
Full article ">Figure 13
<p>Visualization of the user-needs AHP hierarchical model.</p>
Full article ">Figure 14
<p>Visualization of the user capability advantages AHP hierarchical model.</p>
Full article ">Figure 15
<p>Visualization of the user resource advantages AHP hierarchical model.</p>
Full article ">Figure 16
<p>Functional verification of advantage feature retrieval.</p>
Full article ">Figure 17
<p>Functional verification of relevant advantage retrieval for needs.</p>
Full article ">Figure 18
<p>Functional verification of advantage application prioritization.</p>
Full article ">Figure 19
<p>Aging process diagram.</p>
Full article ">
23 pages, 5525 KiB  
Article
Automatic Identification and Segmentation of Overlapping Fog Droplets Using XGBoost and Image Segmentation
by Dongde Liao, Xiongfei Chen, Muhua Liu, Yihan Zhou, Peng Fang, Jinlong Lin, Zhaopeng Liu and Xiao Wang
Appl. Sci. 2025, 15(5), 2847; https://doi.org/10.3390/app15052847 - 6 Mar 2025
Viewed by 212
Abstract
Water-sensitive paper (WSP) has been widely used to assess the quality of pesticide sprays. However, fog droplets tend to overlap on WSP. In order to accurately measure the droplet size and grasp the droplet distribution pattern, this study proposes a method based on [...] Read more.
Water-sensitive paper (WSP) has been widely used to assess the quality of pesticide sprays. However, fog droplets tend to overlap on WSP. In order to accurately measure the droplet size and grasp the droplet distribution pattern, this study proposes a method based on the optimized XGBoost classification model combined with improved concave-point matching to achieve multi-level overlapping-droplet segmentation. For different types of overlapping droplets, the corresponding improved segmentation algorithm is used to improve the segmentation accuracy. For parallel overlapping droplets, the centre-of-mass segmentation method is used; for non-parallel overlapping droplets, the minimum-distance segmentation method is used; and for strong overlapping of a single concave point, the vertical-linkage segmentation method is used. Complex overlapping droplets were gradually segmented by loop iteration until a single droplet was obtained or no further segmentation was possible, and then ellipse fitting was used to obtain the final single-droplet profile. Up to 105 WSPs were obtained in an orchard field through drone spraying experiments, and were used to validate the effectiveness of the method. The experimental results show that the classification model proposed in this paper achieves an average accuracy of 98% in identifying overlapping-droplet types, which effectively meets the needs of subsequent segmentation. The overall segmentation accuracy of the method is 91.35%, which is significantly better than the contour-solidity and watershed-based algorithm (76.19%) and the improved-concave-point-segmentation algorithm (68.82%). In conclusion, the method proposed in this paper provides an efficient and accurate new approach for pesticide spraying quality assessment. Full article
(This article belongs to the Special Issue Advances in Image Recognition and Processing Technologies)
Show Figures

Figure 1

Figure 1
<p>Overall flow chart.</p>
Full article ">Figure 2
<p>Test sample collection. The UAV was operated at a flight speed of 3–5 m/s and at a flight height of 1.5–3 m above the crop canopy. WSPs were placed on the leaves, and WSPs were placed on the sampling plane facing the direction of the UAV spray at each point.</p>
Full article ">Figure 3
<p>WSP image preprocessing: (<b>a</b>) was the original WSP’s image captured from the orchard and (<b>b</b>) was the denoising, binarisation, and filling of the original WSP’s image.</p>
Full article ">Figure 4
<p>Schematic diagram of droplet overlapping types. (<b>a</b>) shows a single concave strongly overlapping droplet (SC), (<b>b</b>) shows a parallel overlapping droplet (PA), and (<b>c</b>) shows a non-parallel overlapping droplet (NP).</p>
Full article ">Figure 5
<p>Overlapping-droplet-splitting flow chart.</p>
Full article ">Figure 6
<p>Pre-segmentation of overlapping images.</p>
Full article ">Figure 7
<p>Segmentation of strongly overlapping droplets in a single concave point. Where (<b>a</b>) is Binary Image Extraction; (<b>b</b>) shows Concave Defect Detection&amp; Key Points Localization; (<b>c</b>) shows Key Points Connection &amp; Slope Calculation; (<b>d</b>) shows Baseline L Generation &amp; Intersection Detection; (<b>e</b>) is Perpendicular Segmentation Line AD Identification.</p>
Full article ">Figure 8
<p>Segmentation process for non-parallel overlapping droplet. Where (<b>a</b>) is Binary Image Extraction; (<b>b</b>) shows Convex Hull Construction; (<b>c</b>) shows Concave Points Filtering &amp; Candidate Selection; (<b>d</b>) shows Non-Parallel Segmentation Line Generation.</p>
Full article ">Figure 9
<p>Segmentation process for parallel overlapping droplets. Where (<b>a</b>) is Binary Image Extraction; (<b>b</b>) shows Convex Hull Construction; (<b>c</b>) shows Concave Points Detection; (<b>d</b>) shows Centre of mass calculation; (<b>e</b>) is Parallel Segmentation Line Generation.</p>
Full article ">Figure 10
<p>Feature Analysis and Optimization Algorithm Performance Evaluation. (<b>a</b>) Feature Importance Ranking (XGBoost-based); (<b>b</b>) Bayesian Iterative Optimization Process.</p>
Full article ">Figure 11
<p>Confusion matrix based on improved XGBoost experimental results.</p>
Full article ">Figure 12
<p>Changes in performance metrics of XGBoost model before and after optimisation.</p>
Full article ">Figure 13
<p>Segmentation effect of different types of overlapping droplets. Where (<b>a</b>) is the original overlapping droplet on WSP; (<b>b</b>) shows the segmentation results of the proposed method in this paper; (<b>c</b>) presents the result of segmentation based on contour solidity and watershed algorithm; and (<b>d</b>) shows the segmentation results using the classic concave-point-matching algorithm.</p>
Full article ">Figure 14
<p>Single WSP overlapping-droplet segmentation results. Where (<b>a</b>) is the original overlapping-droplet layer extracted from the sample and (<b>b</b>) shows the segmentation results of the manual calibration.</p>
Full article ">
15 pages, 3059 KiB  
Article
Underwater Ionic Current Signal Sensing and Information Transmission by Contact-Induced Charge Transfer
by Boru Su, Junyan Zhang, Yunfei Deng and Lin Chi
Appl. Sci. 2025, 15(5), 2846; https://doi.org/10.3390/app15052846 - 6 Mar 2025
Viewed by 234
Abstract
Underwater ionic current signal sensing shows great potential for electric-field-sensing-based target detection, information transmission and communication. Nevertheless, it is still a challenging task. Herein, a self-powered underwater ionic current signal sensing system using contact-induced charge transfer is presented. The system mainly consists of [...] Read more.
Underwater ionic current signal sensing shows great potential for electric-field-sensing-based target detection, information transmission and communication. Nevertheless, it is still a challenging task. Herein, a self-powered underwater ionic current signal sensing system using contact-induced charge transfer is presented. The system mainly consists of a working electrode, a metal sheet and a sensing electrode that is immersed in electrolyte solution. Upon touching the working electrode with a metal sheet with a different work function, charge transfer occurs on the interface, and a corresponding ionic current is induced. The generated ionic current can be detected with the sensing electrode far away from the working electrode. It was found that the magnitude and direction of the generated ionic current are determined by the contact potential difference (CPD) between the working electrode and the contacting metal sheet. Additionally, the effects of water temperature, the ionic concentration of the electrolyte solution, electrode surface area and hydrostatic pressure are systematically investigated. The detected signal magnitude decreased with an increase in the distance between the working electrode and the sensing electrode. A proof-of-concept demonstration of underwater information transmission via Morse code with this method was successfully achieved. Full article
(This article belongs to the Section Surface Sciences and Technology)
Show Figures

Figure 1

Figure 1
<p>Mechanism of contact-induced ionic current sensing.</p>
Full article ">Figure 2
<p>Ionic current signals generated by contacting different metal sheets placed in DI water with the copper working electrode.</p>
Full article ">Figure 3
<p>Comparison of the ionic current generated by contacting the metal sheets in air or in DI water.</p>
Full article ">Figure 4
<p>Effect of ionic concentration on the ionic current signals.</p>
Full article ">Figure 5
<p>Dependence of the ionic current signals on water temperature.</p>
Full article ">Figure 6
<p>Effect of the distance between the working electrode and the sensing electrode on ionic current.</p>
Full article ">Figure 7
<p>Effects of (<b>a</b>) working electrode surface area and (<b>b</b>) sensing electrode surface area on ionic current.</p>
Full article ">Figure 8
<p>Effect of hydrostatic pressure on ionic current.</p>
Full article ">Figure 9
<p>(<b>a</b>) Schematic diagram of silent information transmission in underwater conditions; (<b>b</b>) definition of English letters using “dot” and “dash” in Morse code; (<b>c</b>) definition of “dot” and “dash” signals using the ionic current signals; (<b>d</b>) demonstration of messages such as “SOS” and “UP” via Morse code; (<b>e</b>) display of instant messages on the screen of the decoder when translating the ionic current signals into intelligible English letters.</p>
Full article ">Figure 9 Cont.
<p>(<b>a</b>) Schematic diagram of silent information transmission in underwater conditions; (<b>b</b>) definition of English letters using “dot” and “dash” in Morse code; (<b>c</b>) definition of “dot” and “dash” signals using the ionic current signals; (<b>d</b>) demonstration of messages such as “SOS” and “UP” via Morse code; (<b>e</b>) display of instant messages on the screen of the decoder when translating the ionic current signals into intelligible English letters.</p>
Full article ">
24 pages, 6438 KiB  
Article
Establishing Two-Dimensional Dependencies for Multi-Label Image Classification
by Jiuhang Wang, Yuewen Zhang, Tengjing Wang, Hongying Tang and Baoqing Li
Appl. Sci. 2025, 15(5), 2845; https://doi.org/10.3390/app15052845 - 6 Mar 2025
Viewed by 135
Abstract
As a fundamental upstream task, multi-label image classification (MLIC) work has made a great deal of progress in recent years. Establishing dependencies between targets is crucial for MLIC as targets in the real world always co-occur simultaneously. However, due to the complex spatial [...] Read more.
As a fundamental upstream task, multi-label image classification (MLIC) work has made a great deal of progress in recent years. Establishing dependencies between targets is crucial for MLIC as targets in the real world always co-occur simultaneously. However, due to the complex spatial relationships and semantic relationships among targets, existing methods fail to effectively establish the dependencies between targets. In this paper, we propose a Two-Dimensional Dependency Model (TDDM) for MLIC. The network consists of an Spatial Feature Dependency Module (SFDM) and a Label Semantic Dependency Module (LSDM), which establish effective dependencies in the dimensions of image spatial features and label semantics, respectively. Our method was tested on three publicly available multi-label image datasets, PASCAL VOC 2007, PASCAL VOC 2012, and MS-COCO, and it produced superior results compared to existing state-of-the-art methods, as demonstrated in our experiments. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

Figure 1
<p>The overall framework of our proposed Two-Dimensional Dependency Model (TDDM), which consists of two branches: the Spatial Feature Dependency Module (SFDM) for modeling image spatial dependencies, and the Label Semantic Dependency Module (LSDM) for modeling the global semantic relationships among labels. In this framework, we also included the Feature Fusion Module (FFM) for feature integration, the Feature Enhancement Module (FEM) for enhancing features, and the Global Relationship Enhancement Module (GREM) for expanding the receptive field of label relationships.</p>
Full article ">Figure 2
<p>Schematic diagram of FFM. The tensor <math display="inline"><semantics> <mi mathvariant="bold-italic">u</mi> </semantics></math> represents the output of the <math display="inline"><semantics> <msub> <mi>X</mi> <mn>3</mn> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>X</mi> <mn>4</mn> </msub> </semantics></math> convolutions; <math display="inline"><semantics> <msup> <mi mathvariant="bold-italic">u</mi> <mo>′</mo> </msup> </semantics></math> denotes the tensor obtained by interpolating and unifying the dimensions of <math display="inline"><semantics> <mi mathvariant="bold-italic">u</mi> </semantics></math>; <math display="inline"><semantics> <msub> <mi>B</mi> <mi>f</mi> </msub> </semantics></math> represents the feature fusion factor; <math display="inline"><semantics> <msub> <mi>C</mi> <mi>f</mi> </msub> </semantics></math> represents the compensation factor; and <math display="inline"><semantics> <mi mathvariant="bold-italic">U</mi> </semantics></math> represents the tensor that undergoes feature fusion and is restored to its original dimensions.</p>
Full article ">Figure 3
<p>Schematic diagram of the GREM. Each head provides <math display="inline"><semantics> <mrow> <mi>Q</mi> <mi>u</mi> <mi>e</mi> <mi>r</mi> <mi>y</mi> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>K</mi> <mi>e</mi> <mi>y</mi> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>V</mi> <mi>a</mi> <mi>l</mi> <mi>u</mi> <mi>e</mi> </mrow> </semantics></math> vectors to achieve maximum attention enhancement, thereby accomplishing global relationship enhancement among labels.</p>
Full article ">Figure 4
<p>Impact of the scaling control coefficients <math display="inline"><semantics> <mi>α</mi> </semantics></math> and <math display="inline"><semantics> <mi>β</mi> </semantics></math> on model performance: accuracy comparisons on the VOC2007 dataset.</p>
Full article ">Figure 5
<p>Impact of threshold <math display="inline"><semantics> <mi>τ</mi> </semantics></math> and weight distribution coefficient <span class="html-italic">p</span> on model performance: accuracy comparisons on the VOC2007 dataset.</p>
Full article ">Figure 6
<p>CAM visualization results. We compared the visualization results between ResNet-101, MobileNet, and our proposed model. The visualizations demonstrate that our model is capable of providing more precise regions of interest.</p>
Full article ">
24 pages, 1304 KiB  
Article
Impact of Augmented Reality and Game-Based Learning for Science Teaching: Lessons from Pre-Service Teachers
by Valerie Czok and Holger Weitzel
Appl. Sci. 2025, 15(5), 2844; https://doi.org/10.3390/app15052844 - 6 Mar 2025
Viewed by 138
Abstract
Technological advancement and growing interest in digitalizing education increased Augmented Reality (AR) use in education. However, previous research findings on AR’s potential for knowledge acquisition are inconclusive. Furthermore, computer self-efficacy has seldom been evaluated. AR is frequently combined with game-based approaches (GAME), yet [...] Read more.
Technological advancement and growing interest in digitalizing education increased Augmented Reality (AR) use in education. However, previous research findings on AR’s potential for knowledge acquisition are inconclusive. Furthermore, computer self-efficacy has seldom been evaluated. AR is frequently combined with game-based approaches (GAME), yet the specific impact of each feature, “AR” and “GAME”, is often not differentiated in the research design. This work analyzed an AR game-based learning environment for science teaching. It was conducted with German pre-service teachers, assessing “Knowledge” and “Computer Self-Efficacy”. These measures were used to analyze the effect of AR and GAME in four intervention groups. The results showed a significant time effect for all groups in both variables, indicating all intervention designs led to knowledge and self-efficacy gains. However, no interaction effect was found, indicating the groups did not significantly differ in their knowledge and self-efficacy gains over time. The results further indicate no clear advantage of either AR or GAME for the design of science teaching. However, AR and GAME also did not hinder learning and both led to successful knowledge and self-efficacy gains. This indicates that AR and game-based learning support the learning process and strengthen learners’ computer self-efficacy. Combining both features aids in easing the transition toward technology-enhanced learning by providing a playful learning experience, using digital as well as analog components. Full article
Show Figures

Figure 1

Figure 1
<p>Research design with 4 intervention groups. K and CSE were assessed before and after lesson.</p>
Full article ">Figure 2
<p>A line graph for the first model with a moderating effect, showing a stronger moderating effect for the non-AR interventions amongst all groups. The lines illustrate the CSE pre–post relationship of the intervention groups with/without AR.</p>
Full article ">Figure 3
<p>A line graph for the second model with a moderating effect, showing a stronger moderating effect for the non-AR intervention amongst both non-GAME groups. The lines illustrate the CSE pre–post relationship of the intervention groups with/without AR.</p>
Full article ">Figure 4
<p>A line graph for the third model with a moderating effect, showing a stronger moderating effect for the non-GAME intervention amongst both AR groups. The lines illustrate the K pre–post relationship of the intervention groups with/without GAME.</p>
Full article ">
24 pages, 7005 KiB  
Article
Electricity Demand Forecasting Using Deep Polynomial Neural Networks and Gene Expression Programming During COVID-19 Pandemic
by Cagatay Cebeci and Kasım Zor
Appl. Sci. 2025, 15(5), 2843; https://doi.org/10.3390/app15052843 - 6 Mar 2025
Viewed by 147
Abstract
The power-generation mix of future grids will be quite diversified with the ever-increasing share of renewable energy technologies. Therefore, the prediction of electricity demand will become crucial for resource optimization and grid stability. Machine learning- and artificial intelligence-based methods are widely studied by [...] Read more.
The power-generation mix of future grids will be quite diversified with the ever-increasing share of renewable energy technologies. Therefore, the prediction of electricity demand will become crucial for resource optimization and grid stability. Machine learning- and artificial intelligence-based methods are widely studied by researchers to tackle the demand forecasting problem. However, since the COVID-19 pandemic broke out, new challenges have surfaced for forecasting research. In such a short amount of time, significant shifts have emerged in electricity demand trends, making it apparent that the pandemic and the possibility of similar crises in the future have escalated the complexity of energy management problems. Motivated by the circumstances, this research presents an hour-ahead and day-ahead electricity demand forecasting benchmark using Deep Polynomial Neural Networks (DNN) and Gene Expression Programming (GEP) methods. The DNN and GEP algorithms utilize on-site electricity consumption data collected from a university hospital for over two years with a temporal granularity of 15-minute intervals. Quarter-hourly meteorological, calendar, and daily COVID-19 data, including new cases and cumulative cases divided by four restriction levels, were also considered. These datasets are used not only to predict the electricity demand but also to investigate the impact of the COVID-19 pandemic on the electricity consumption of the hospital. The hour-ahead and day-ahead nRMSE results show that the DNN outperforms the GEP by 8.27% and 14.32%, respectively. For the computational times, the DNN appears to be much faster than the GEP by 82.83% and 78.56% in the hour-ahead and day-ahead forecasting, respectively. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

Figure 1
<p>Sources of electrical, calendar, COVID-19, and meteorological data [<a href="#B43-applsci-15-02843" class="html-bibr">43</a>,<a href="#B44-applsci-15-02843" class="html-bibr">44</a>,<a href="#B45-applsci-15-02843" class="html-bibr">45</a>,<a href="#B46-applsci-15-02843" class="html-bibr">46</a>].</p>
Full article ">Figure 2
<p>COVID-19 daily new cases, restriction status, and electricity consumption versus time plot between 1 March 2020 and 1 June 2022.</p>
Full article ">Figure 3
<p>Correlation map according to Pearson’s correlation.</p>
Full article ">Figure 4
<p>An illustration of DNN [<a href="#B57-applsci-15-02843" class="html-bibr">57</a>].</p>
Full article ">Figure 5
<p>Visualization of a basic expression tree.</p>
Full article ">Figure 6
<p>The flowchart of GEP algorithm [<a href="#B43-applsci-15-02843" class="html-bibr">43</a>].</p>
Full article ">Figure 7
<p>Expression tree of the best GEP model for an hour-ahead electricity demand forecasting.</p>
Full article ">Figure 8
<p>Expression tree of the best GEP model for day-ahead electricity demand forecasting.</p>
Full article ">Figure 9
<p>Illustration of the seasonal error metrics comparison of DNN and GEP.</p>
Full article ">Figure 10
<p>Illustration of DNN and GEP hour- and day-ahead forecast comparison for peak power.</p>
Full article ">
Previous Issue
Next Issue
Back to TopTop