[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (208)

Search Parameters:
Keywords = danger theory

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
42 pages, 4769 KiB  
Review
A Comprehensive Analysis of Characteristics of Hydrogen Operation as a Preparation for Retrofitting a Compression Ignition Engine to a Hydrogen Engine
by Máté Zöldy, Márton Virt, Kristóf Lukács and György Szabados
Processes 2025, 13(3), 718; https://doi.org/10.3390/pr13030718 - 2 Mar 2025
Viewed by 270
Abstract
Hydrogen is a carbon-neutral fuel, so in theory it holds enormous potential. The use of hydrogen as a fuel for traditional internal combustion engines is becoming increasingly prominent. The authors now have the opportunity to retrofit a single-cylinder diesel research engine to an [...] Read more.
Hydrogen is a carbon-neutral fuel, so in theory it holds enormous potential. The use of hydrogen as a fuel for traditional internal combustion engines is becoming increasingly prominent. The authors now have the opportunity to retrofit a single-cylinder diesel research engine to an engine with hydrogen operation. For this reason, before that conversion, they prepared a comprehensive review study regarding hydrogen. Firstly, the study analyzes the most essential properties of hydrogen in terms of mixture formation and combustion compared to diesel. After that, it deals with indirect and direct injection, and what kind of combustion processes can occur. Since there is a possibility of pre-ignition, backfire, and knocking, the process can be dangerous in the case of indirect mixture formation, and so a short subsection is devoted to these uncontrolled combustion phenomena. The next subsection shows how important, in many ways, a special spark plug and ignition system are for hydrogen operation. The next part of the study provides a detailed presentation of the possible combustion chamber design for operation with hydrogen fuel. The last section reveals how many parameters can be focused on analyzing the hydrogen’s combustion process. The authors conclude that intake manifold injection and a Heron-like combustion chamber design, with a special spark plug with an ignition system, would be an appropriate solution. Full article
(This article belongs to the Section Environmental and Green Processes)
Show Figures

Figure 1

Figure 1
<p>Main characteristics of compared fuels (on the basis of [<a href="#B26-processes-13-00718" class="html-bibr">26</a>]) ((1) at pressure 1.013 bar; (2) at temperature 0 °C; (3) at temperature 25 °C; (4) at λ = 1; (5) in air; (6) at pressure 250 bar and at temperature 280 K).</p>
Full article ">Figure 2
<p>Combustion processes can be implemented with hydrogen (on the basis of [<a href="#B38-processes-13-00718" class="html-bibr">38</a>]) (HCCI stands for homogenaous charge compression ignition).</p>
Full article ">Figure 3
<p>A typical pressure function during the pre-ignition process [<a href="#B41-processes-13-00718" class="html-bibr">41</a>] (black line—backfire, dash line—normal process) (reproduced with permission from Verhelst, S., and Wallner, T., Progress in Energy and Combustion Science, Elsevier, 2009).</p>
Full article ">Figure 4
<p>Pressure functions over the crankshaft angle in the cylinder and in the intake manifold in case of a backfire (black line—backfire, dash line—normal process) [<a href="#B41-processes-13-00718" class="html-bibr">41</a>] (reproduced with permission from Verhelst, S., and Wallner, T., Progress in Energy and Combustion Science, Elsevier, 2009).</p>
Full article ">Figure 5
<p>Frequency curves of low- and high-intensity knocking [<a href="#B59-processes-13-00718" class="html-bibr">59</a>] (reproduced with permission from Luo, Q. H., and Sun, B. G., International Journal of Hydrogen Energy, Elsevier, 2016).</p>
Full article ">Figure 6
<p>Drawing of a spark plug registered at the Deutsches Patent und Markenamt (Patent number: DE 10 2006 041 161 A1) [<a href="#B65-processes-13-00718" class="html-bibr">65</a>].</p>
Full article ">Figure 7
<p>Combustion chambers of the Erren hydrogen engine (<b>left</b>) and the MAN small-series hydrogen engine (<b>right</b>) (on the basis of [<a href="#B26-processes-13-00718" class="html-bibr">26</a>]).</p>
Full article ">Figure 8
<p>Cross-section of a hydrogen-fuelled research engine [<a href="#B74-processes-13-00718" class="html-bibr">74</a>].</p>
Full article ">Figure 9
<p>Meshed model of the combustion chamber [<a href="#B76-processes-13-00718" class="html-bibr">76</a>] (Blue color lines form the mesh) (reproduced with permission from Yuan, C. et al., International Journal of Hydrogen Energy, Elsevier, 2016).</p>
Full article ">Figure 10
<p>Combustion chamber of the VW hydrogen engine (on the basis of [<a href="#B30-processes-13-00718" class="html-bibr">30</a>]).</p>
Full article ">Figure 11
<p>Counter drawing of the main combustion chamber (on the basis of [<a href="#B78-processes-13-00718" class="html-bibr">78</a>]).</p>
Full article ">Figure 12
<p>CAD model of engine combustion chamber including intake and exhaust ducts, valves and spark plug [<a href="#B84-processes-13-00718" class="html-bibr">84</a>].</p>
Full article ">Figure 13
<p>The Heron combustion chamber of Volvo 900/700 [<a href="#B87-processes-13-00718" class="html-bibr">87</a>] (yellow—combustion chamber; blue—other engine parts).</p>
Full article ">Figure 14
<p>Chamber geometries: simple design (<b>top left</b>), Heron-type geometry (<b>top right</b>), MR-type geometry (<b>bottom left</b>), plate-type geometry (<b>bottom right</b>) [<a href="#B88-processes-13-00718" class="html-bibr">88</a>].</p>
Full article ">Figure 15
<p>Engine model in GT-Power (<b>left side</b>) and cylinder pressure functions at different hydrogen mixing ratios (<b>right side</b>) [<a href="#B95-processes-13-00718" class="html-bibr">95</a>] (explanation of model color marking: blue arrows—fluid flow between engine components; yellow—yellow—physical spaces, spatial connections; green—model inputs and outputs; red—notation of the author of the original article about each component) (reproduced with permission from Cho, J., and Song, S., Applied Thermal Engineering, Elsevier, 2020).</p>
Full article ">
37 pages, 31679 KiB  
Article
Mooring Failure Analysis of Semisubmersible Floating Offshore Wind Turbines Considering Mooring Redundancy at Each Azimuth Angle
by Shuai Hao, Xuning Zhang, Yang Yu, Bin Wang and Xingdao Bo
J. Mar. Sci. Eng. 2025, 13(2), 360; https://doi.org/10.3390/jmse13020360 - 15 Feb 2025
Viewed by 375
Abstract
Semisubmersible floating structures are becoming the predominant understructure type for floating offshore wind turbines (FOWTs) worldwide. As FOWTs are erected far away from land and in deep seas, they inevitably suffer violent and complicated sea conditions, including extreme waves and winds. Mooring lines [...] Read more.
Semisubmersible floating structures are becoming the predominant understructure type for floating offshore wind turbines (FOWTs) worldwide. As FOWTs are erected far away from land and in deep seas, they inevitably suffer violent and complicated sea conditions, including extreme waves and winds. Mooring lines are the representative flexible members of the whole structure and are likely to incur damage due to years of impact, corrosion, or fatigue. To improve mooring redundancy at each azimuth angle around a wind turbine, a group of mooring lines are configured in the same direction instead of just one mooring line. This study focuses on the mooring failure problems that would probably occur in a realistic redundant mooring system of a semisubmersible FOWT, and the worst residual mooring layout is considered. An FOWT numerical model with a 3 × 3 mooring system is established in terms of 3D potential flow and BEM (blade element momentum) theories, and aero-hydro floating-body mooring coupled analyses are performed to discuss the subsequent time histories of dynamic responses after different types of mooring failure. As under extreme failure conditions, the final horizontal offsets of the structure and the layout of the residual mooring system are evaluated under still water, design, and extreme environmental conditions. The results show that the transient tension in up-wave mooring lines can reach more than 12,000 kN under extreme environmental conditions, inducing further failure of the whole chain group. Then, a deflection angle of 60° may occur on the residual laid chain, which may bring about dangerous anchor dragging. Full article
(This article belongs to the Section Coastal Engineering)
Show Figures

Figure 1

Figure 1
<p>Redundant mooring lines of FOWTs in each azimuth angle.</p>
Full article ">Figure 2
<p>The target semisubmersible deep-sea FOWT.</p>
Full article ">Figure 3
<p>Lateral view of the target FOWT (observed from the positive <span class="html-italic">y</span>-axis).</p>
Full article ">Figure 4
<p>Front view of the target FOWT (observed from the negative <span class="html-italic">x</span>-axis—the direction which the design wind comes from).</p>
Full article ">Figure 5
<p>Vertical view of the target FOWT and its mooring layout (observed from the positive <span class="html-italic">z</span>-axis).</p>
Full article ">Figure 6
<p>Numerical model of the FOWT.</p>
Full article ">Figure 6 Cont.
<p>Numerical model of the FOWT.</p>
Full article ">Figure 7
<p>Sketch diagram of the analysis procedure.</p>
Full article ">Figure 8
<p>Definitions of inflow angle, attack angle, blade pitch angle, and twist angle.</p>
Full article ">Figure 9
<p>Steady-state response curves to different wind speeds.</p>
Full article ">Figure 10
<p>Nacelle yaw to wind directions, and blade pitch angle in design production condition.</p>
Full article ">Figure 11
<p>Different rotor states of pitch angle and azimuth.</p>
Full article ">Figure 12
<p>Lateral view of the FOWT in design production and extreme survival conditions.</p>
Full article ">Figure 13
<p>The restoring force–offset curves.</p>
Full article ">Figure 14
<p>Free decay curves of the FOWT motion in the X, Y, and Z directions.</p>
Full article ">Figure 15
<p>Free decay curves of the FOWT motion in the RX, RY, and RZ directions.</p>
Full article ">Figure 16
<p>Generator power and rotor speed curves when starting in steady wind.</p>
Full article ">Figure 17
<p>Generator power and rotor speed curves under design wind turbulence.</p>
Full article ">Figure 18
<p>Speed and direction fluctuations under design and extreme wind turbulence.</p>
Full article ">Figure 19
<p>Force and roll moment fluctuations at tower base under design wind turbulence.</p>
Full article ">Figure 20
<p>Force and roll moment fluctuations at tower base under extreme wind turbulence.</p>
Full article ">Figure 21
<p>Translational displacements under C123 mooring failures in still water.</p>
Full article ">Figure 22
<p>Rotational displacements under C123 mooring failures in still water.</p>
Full article ">Figure 23
<p>Anchor chain tensions under C123 mooring failures in still water.</p>
Full article ">Figure 24
<p>The final situation of the full mooring failure in still water. (<b>a</b>) C123 failure; (<b>b</b>) C456 failure.</p>
Full article ">Figure 25
<p>Anchor chain tensions under C123 mooring failures in 0° design wind and wave. (<b>a</b>) HM; (<b>b</b>) C1; (<b>c</b>) C1 → C2; (<b>d</b>) C1 → C2 → C3.</p>
Full article ">Figure 26
<p>The final situation of the full mooring failure in design wind and wave. (<b>a</b>) C123, 0° wind and wave; (<b>b</b>) C456, 180° wind and wave.</p>
Full article ">Figure 27
<p>Anchor chain tensions under C456 mooring failures in 180° design wind and wave. (<b>a</b>) HM; (<b>b</b>) C4; (<b>c</b>) C4 → C5; (<b>d</b>) C4 → C5 → C6.</p>
Full article ">Figure 28
<p>Anchor chain tensions under C123 mooring failures in 0° extreme wind and wave. (<b>a</b>) HM; (<b>b</b>) C1; (<b>c</b>) C1 → C2; (<b>d</b>) C1 → C2 → C3.</p>
Full article ">Figure 29
<p>The final situation of the full C123 mooring failure in 0° extreme wind and wave. (<b>a</b>) Time point of breakage; (<b>b</b>) 1800 s; (<b>c</b>) 2100 s; (<b>d</b>) 2400 s; (<b>e</b>) 2700 s; (<b>f</b>) 3000 s.</p>
Full article ">Figure 29 Cont.
<p>The final situation of the full C123 mooring failure in 0° extreme wind and wave. (<b>a</b>) Time point of breakage; (<b>b</b>) 1800 s; (<b>c</b>) 2100 s; (<b>d</b>) 2400 s; (<b>e</b>) 2700 s; (<b>f</b>) 3000 s.</p>
Full article ">Figure 30
<p>Anchor chain tensions under C456 mooring failures in 180° extreme wind and wave. (<b>a</b>) HM; (<b>b</b>) C4; (<b>c</b>) C4 → C5; (<b>d</b>) C4 → C5 → C6.</p>
Full article ">Figure 31
<p>The final situation of the full C456 mooring failure in 180° extreme wind and wave. (<b>a</b>) 2100 s; (<b>b</b>) 2400 s; (<b>c</b>) 2700 s; (<b>d</b>) 3000 s.</p>
Full article ">
112 pages, 965 KiB  
Review
Something Anomalies Can Tell About Standard Model and Gravity
by Loriano Bonora and Stefano Gregorio Giaccari
Symmetry 2025, 17(2), 273; https://doi.org/10.3390/sym17020273 - 10 Feb 2025
Viewed by 407
Abstract
This is a review/research paper on anomalies applied in a bottom–up approach to standard model and gravity. It is divided into two parts. The first consists of a proper review of anomalies in quantum field theories. Anomalies are analyzed according to three different [...] Read more.
This is a review/research paper on anomalies applied in a bottom–up approach to standard model and gravity. It is divided into two parts. The first consists of a proper review of anomalies in quantum field theories. Anomalies are analyzed according to three different methods: a perturbative one based on a Feynman diagram, a non-perturbative one relying on the Schwinger–DeWitt approach, and, third, one hinging on the Atiyah–Singer family’s index theorem. The three methods are applied both to chiral gauge anomalies and trace anomalies. The fundamental distinction, which our presentation leads to, is between obstructive (O) and non-obstructive (NO) anomalies. The former is tied to the non-existence of fermion propagators, which fatally maim the corresponding theory. In the second part, we apply this analysis to the SM and a variety of its extensions, which are immersed in a gravitational background, and we find that they are all plagued by a residual chiral trace anomaly. To completely eliminate all kinds of dangerous anomalies in SM-like theories, we propose a somewhat unconventional scheme and exemplify it by means of an explicit model. The latter is a left–right symmetric model. We embed it in a Weyl geometry to render it a conformal invariant. We then deal with some of its quantum aspects, particularly its even (NO) trace anomalies and the means to preserve its conformal invariance at the quantum level. We briefly review renormalization and unitarity in the framework of similar models discussed in the existing literature. Finally, we present a possible (conjectural) application of the model to describe the junction between cosmology and quantum field theory. Full article
(This article belongs to the Special Issue Generalized Symmetries and Fractons in Gauge Theories)
21 pages, 8866 KiB  
Article
Experimental Study on Fatigue Characteristics and Life Prediction of Rotating Restricted Short Suspender in Suspension Bridge
by Lei Zhao, Zhili Yang, Xianneng Tong, Yang Zhang and Ruifeng Nie
Buildings 2025, 15(2), 254; https://doi.org/10.3390/buildings15020254 - 16 Jan 2025
Viewed by 585
Abstract
The corrosion of the rotating axis pins of the short suspender will lead to the rotating restriction of its end, which will lead to the corrosion of the parallel wires and affect the performance of the short suspender. In this study, the technical [...] Read more.
The corrosion of the rotating axis pins of the short suspender will lead to the rotating restriction of its end, which will lead to the corrosion of the parallel wires and affect the performance of the short suspender. In this study, the technical condition of the rotating restricted short suspender unfixed from the suspension bridge was carefully detected. An axial tensile performance test was carried out on these short suspenders, and the subsequent availability of the rotating restricted suspender was evaluated based on the size of the fracture gap. The rotationally limited working conditions of these short suspenders were skillfully simulated by the specially designed tooling, and the fatigue performance test of the rotating restricted short suspender was carried out. A simplified simulation method was proposed based on the random traffic theory. By introducing traffic data obtained from the WIM system, the stress response of the short suspenders caused by vehicles on each lane was simulated, and the simulation results were converted by the rain flow counting method. The residual life of the rotating restricted short suspender was predicted by the comparison between the fatigue test results and the fitting curve of the simulation results. From this study, several of the following conclusions can be summarized: The measured fracture gap size is negatively correlated with the effective area of the suspender, and the gap size of 8mm is a key value. When the fatigue load cycle reaches 345,000 times, the suspender is already in a dangerous state. Additionally, the fractured gap size is considered as the judgment basis for the usability of rotating restricted short suspenders. When the gap size is less than 8 mm, the suspender can be continually used after maintenance and should be updated after 6 years. Otherwise, the suspender needs to be replaced immediately. Full article
Show Figures

Figure 1

Figure 1
<p>Ma’anshan Yangtze River Bridge and its suspender: (<b>a</b>) General layout of the bridge; (<b>b</b>) Cross-section of the parallel wires; (<b>c</b>) General layout of the suspender of the parallel wires.</p>
Full article ">Figure 1 Cont.
<p>Ma’anshan Yangtze River Bridge and its suspender: (<b>a</b>) General layout of the bridge; (<b>b</b>) Cross-section of the parallel wires; (<b>c</b>) General layout of the suspender of the parallel wires.</p>
Full article ">Figure 2
<p>Technical condition inspection of the short suspender: (<b>a</b>) NY-29-1; (<b>b</b>) NZ-30-1; (<b>c</b>) NZ-39-1; (<b>d</b>) NZ-94-2; (<b>e</b>) NZ-97-1; (<b>f</b>) NZ-97-2.</p>
Full article ">Figure 3
<p>Test setup for the degradation assessment: (<b>a</b>) Actual scene; (<b>b</b>) Position indication of the displacement gauges.</p>
Full article ">Figure 4
<p>Deformation increments of each specimen: (<b>a</b>) NY-029-1; (<b>b</b>) NZ-030-1; (<b>c</b>) NZ-039-1; (<b>d</b>) NZ-094-2.</p>
Full article ">Figure 4 Cont.
<p>Deformation increments of each specimen: (<b>a</b>) NY-029-1; (<b>b</b>) NZ-030-1; (<b>c</b>) NZ-039-1; (<b>d</b>) NZ-094-2.</p>
Full article ">Figure 5
<p>Comparison of the elastic modulus test results and fitting results.</p>
Full article ">Figure 6
<p>Comparison between the effective area ratios and the measured fracture gap size.</p>
Full article ">Figure 7
<p>Setup of fatigue performance test: (<b>a</b>) Loading device; (<b>b</b>) Arrangement of the fatigue specimen; (<b>c</b>) Description of finite rotation; (<b>d</b>) Relationship between the specimen and horizontal line.</p>
Full article ">Figure 7 Cont.
<p>Setup of fatigue performance test: (<b>a</b>) Loading device; (<b>b</b>) Arrangement of the fatigue specimen; (<b>c</b>) Description of finite rotation; (<b>d</b>) Relationship between the specimen and horizontal line.</p>
Full article ">Figure 8
<p>Damage condition of the specimen at different loading stages: (<b>a</b>) After the 1st loading stage; (<b>b</b>) After the 2nd loading stage; (<b>c</b>) After anatomy; (<b>d</b>) Cross-section of the broken parallel wires.</p>
Full article ">Figure 9
<p>Calculation principles of the simplified simulation method.</p>
Full article ">Figure 10
<p>Annual average traffic volume change and vehicle proportion.</p>
Full article ">Figure 11
<p>Traffic flow characteristics of different lanes: (<b>a</b>) Daily variation in the average traffic volume of heavy vehicles; (<b>b</b>) Probability of different lanes being selected by various heavy vehicles.</p>
Full article ">Figure 12
<p>Characteristics of individual vehicles: (<b>a</b>) Normal distribution fitting of the vehicle speed; (<b>b</b>) Ratio of the axle load to the vehicle weight; (<b>c</b>) Multi-peak fitting of the vehicle weight.</p>
Full article ">Figure 13
<p>Simulation results based on random traffic theory: (<b>a</b>) Lane distribution; (<b>b</b>) Stress response of the suspenders caused by the vehicles on each lane.</p>
Full article ">Figure 14
<p>Relationship between the amplitude and the frequency of fatigue stress in each year: (<b>a</b>) 2014; (<b>b</b>) 2015; (<b>c</b>) 2016; (<b>s</b>) 2017; (<b>e</b>) 2018; (<b>f</b>) 2019; (<b>g</b>) 2020.</p>
Full article ">Figure 15
<p>Inherent life of the short suspender under different stress levels.</p>
Full article ">Figure 16
<p>The converted fatigue cycle curve and its fitting curve.</p>
Full article ">
25 pages, 3555 KiB  
Article
Causal Analysis and Prevention Strategies for Safety Risks in Prefabricated Building Construction Based on Accident Data and Complex Network Theory
by Wei Liu, Xiao Luo, Baojun Liang and Junhao Xie
Buildings 2025, 15(2), 152; https://doi.org/10.3390/buildings15020152 - 7 Jan 2025
Viewed by 685
Abstract
As China’s construction industry pays increasing attention to occupational health, prefabricated buildings, as an important direction for industry transformation, are gradually gaining widespread attention. However, because relevant management regulations have not yet been perfected, work-related injuries still occur from time to time. In [...] Read more.
As China’s construction industry pays increasing attention to occupational health, prefabricated buildings, as an important direction for industry transformation, are gradually gaining widespread attention. However, because relevant management regulations have not yet been perfected, work-related injuries still occur from time to time. In order to comprehensively analyze safety risks in prefabricated building construction (PBC), this article systematically discusses construction safety risks and their causal relationships based on accident data and complex network theory. By constructing a network model of safety accident causes in PBC, the topology of the network was evaluated, the relationship between accidents and safety risks was revealed, and key safety risk factors were identified. Research shows that the attack strategies of betweenness centrality and degree centrality can significantly affect the stability of the network structure, and the EffG attack strategy performs better in identifying key nodes. In addition, human factors and management factors are the main causes of accidents. In particular, the two factors of insufficient safety education and training and insufficient safety hazard investigation play a decisive role in network connectivity. This study also further analyzed the formation probabilities of critical risk paths for various types of accidents. Among them, object impact accidents have the highest probability of occurrence, reaching 0.19779, while collapse accidents have the lowest probability of occurrence at only 0.02046. In response to these findings, this article proposes strategies, such as strengthening safety training, regular hidden danger inspections, and optimizing on-site management, to reduce construction safety risks and promote the sustainable development of the construction industry. Full article
(This article belongs to the Section Construction Management, and Computers & Digitization)
Show Figures

Figure 1

Figure 1
<p>Research framework.</p>
Full article ">Figure 2
<p>Proportion of various types of safety accidents in China’s PBC from 2014 to 2023.</p>
Full article ">Figure 3
<p>Causal network model of safety accidents in PBC.</p>
Full article ">Figure 4
<p>Comprehensive analysis diagram of network nodes for the causes of safety accidents in PBC. (<b>a</b>): Betweenness Centrality Analysis; (<b>b</b>): Clustering Coefficient Analysis; (<b>c</b>): Point Degree Centrality Analysis; (<b>d</b>): Closeness Centrality Analysis; (<b>e</b>): PageRank Value Analysis.</p>
Full article ">Figure 5
<p>Largest connected component ratio change under various attack strategies.</p>
Full article ">Figure 6
<p>Distribution of node importance based on EffG values.</p>
Full article ">Figure 7
<p>Comparative analysis of EffG attack strategy with degree and betweenness centrality attacks.</p>
Full article ">Figure 8
<p>Impact of node removal on the largest connected component ratio in the safety risk network of PBC.</p>
Full article ">Figure 9
<p>Comparison of key risk factors across different types of accidents.</p>
Full article ">
11 pages, 295 KiB  
Article
Rivers and Lakes: Zhuangzi’s Critique of Just War and the Zhuangzian War Ethics and Peace Strategy
by Ting-mien Lee
Religions 2025, 16(1), 46; https://doi.org/10.3390/rel16010046 - 6 Jan 2025
Viewed by 676
Abstract
Just war theory, significantly shaped by Christian moral theology, has provided a prominent ethical framework for discussions on the justice of war. Numerous works have been published on classical Chinese counterparts, including passages from the Mengzi, Mozi, Xunzi, and Huangdi [...] Read more.
Just war theory, significantly shaped by Christian moral theology, has provided a prominent ethical framework for discussions on the justice of war. Numerous works have been published on classical Chinese counterparts, including passages from the Mengzi, Mozi, Xunzi, and Huangdi Sijing. Although the Zhuangzi frequently discusses warfare, it has been largely overlooked in this field of research because its war ethics do not revolve around any concept similar to that of justice. Based on Zhuangzian critiques of Confucian and Mohist views on justice, this paper tentatively reconstructs Zhuangzian war ethics. This reconstruction reveals a perspective that the concept of just war or justified war is inherently problematic, and promoting such ideas can be perilous and even morally questionable. The belief that just war theory can help us identify a “just side” to morally condemn or legally restrain aggressors is a dangerous illusion. In practice, this approach fails to prevent wars and often exacerbates conflict. According to the Zhuangzian perspective, during wars, states do not operate as traditional political entities with universal jurisdiction and centralized authority. Instead, they resemble rivers and lakes with indistinct boundaries, rendering the concepts of justice and punishment largely irrelevant. A practical peace strategy, therefore, must abandon the pursuit of administering justice and punishing wrongdoers. Instead, it should focus on strategies that facilitate the involved parties to “forget” their grudges and start their peaceful relationship anew. Full article
21 pages, 1291 KiB  
Article
Wave Drift Force and Moment in Deep and Shallow Water
by Heinrich Söding
J. Mar. Sci. Eng. 2025, 13(1), 64; https://doi.org/10.3390/jmse13010064 - 2 Jan 2025
Viewed by 452
Abstract
To attain a low Energy Efficiency Design Index (EEDI), large ships possibly lack the necessary propulsion power to avoid stranding in case of strong adverse wind and wave conditions. To estimate this danger, here, the longitudinal and transverse drift force and the yaw [...] Read more.
To attain a low Energy Efficiency Design Index (EEDI), large ships possibly lack the necessary propulsion power to avoid stranding in case of strong adverse wind and wave conditions. To estimate this danger, here, the longitudinal and transverse drift force and the yaw drift moment caused by regular waves of arbitrary frequency and direction are computed using a 3-dimensional Rankine panel method. In many cases, drift forces are larger in shallow than in deep water. Therefore, the theory for computing drift force and moment is extended to shallow water. As published results for shallow water are lacking, the method is verified only for deep water by comparisons with results of model experiments and CFD computations for three ships. For one of them, the dependence of non-dimensional coefficients of longitudinal and transverse drift force and of the drift yaw moment on wave frequency, wave angle, water depth and ship speed is shown. The source files of the programs used for these computations may be obtained from the author if an adequate fee is donated to the Medecins Sans Frontieres or to the author. Full article
(This article belongs to the Special Issue Computational Fluid Dynamics and Acoustic Design Methods for Ship)
Show Figures

Figure 1

Figure 1
<p>Panel mesh on hull and water surface, source points (black) and surface height contours (red) for computing the steady flow around the 6500-TEU containership at 15 kn speed using program Pansteady.</p>
Full article ">Figure 2
<p>Non-dimensional surge, heave and pitch motion amplitudes of the 6500-TEU containership at zero (<b>top</b>) and 15 kn (<b>bottom</b>) speed according to experiments of Hong [<a href="#B11-jmse-13-00064" class="html-bibr">11</a>] and computations using programs Pansteady and Pandfds: Continuous and broken curves using 1177 and 3379, respectively, partly or fully submerged hull panels on starboard side.</p>
Full article ">Figure 3
<p>Comparison of added resistance coefficient <math display="inline"><semantics> <msub> <mi>C</mi> <mrow> <mi>A</mi> <mi>R</mi> </mrow> </msub> </semantics></math> for a 10,000-TEU containership at 20 knots speed. Curves are results of the programs Panfds (continuous) and the older program GLRankine (broken line). <b>Left</b>: Comparison with RANS calculations [<a href="#B12-jmse-13-00064" class="html-bibr">12</a>] using a coarse (triangles; 4996 hull panels) and a fine (squares; 10,998 hull panels on both ship sides) grid. <b>Right</b>: Comparison with model experiments [<a href="#B12-jmse-13-00064" class="html-bibr">12</a>] using two different evaluation methods.</p>
Full article ">Figure 4
<p>Comparison of added resistance coefficient <math display="inline"><semantics> <msub> <mi>C</mi> <mrow> <mi>A</mi> <mi>R</mi> </mrow> </msub> </semantics></math> of the KVLCC2 tanker for three different Froude numbers <math display="inline"><semantics> <msub> <mi>F</mi> <mi>n</mi> </msub> </semantics></math>. Curves are results of the programs Panfds using a normal (continuous) or a very fine body panel mesh (dotted curves); broken curves show results of the older program GLRankine; and markers designate results of model experiments by Bingje and Steen [<a href="#B13-jmse-13-00064" class="html-bibr">13</a>].</p>
Full article ">Figure 5
<p>Added resistance coefficient <math display="inline"><semantics> <msub> <mi>C</mi> <mrow> <mi>A</mi> <mi>R</mi> </mrow> </msub> </semantics></math> of the KVLCC2 tanker for speeds 5 and 15 knots, plotted over the length ratio parameter LRP. Continuous curves for wave angle 180 degrees (head waves), progressively shorter broken curves for wave angles 150, 120, 90, 60, 30 and 0 degrees.</p>
Full article ">Figure 6
<p>Transverse drift force coefficient of the KVLCC2 tanker for speeds 5 and 15 knots, plotted over the length ratio parameter LRP, for wave angles 150 (longest curve segments), 120, 90, 60 and 30 degrees (progressively shorter curve segments).</p>
Full article ">Figure 7
<p>Yaw drift moment coefficient of the KVLCC2 tanker for speeds 5 and 15 knots, plotted over the length ratio parameter LRP, for wave angles 150 (longest curve segments), 120, 90, 60 and 30 degrees (progressively shorter curve segments).</p>
Full article ">Figure 8
<p>Coefficients of added resistance, transverse drift force and yaw drift moment of the 6500-TEU containership at 20 knots speed, plotted over the length ratio parameter LRP. Continuous curve for wave angle 180 degrees, progressively shorter curve segments for angles 150, 120, 90, 60, 30 and 0 degrees.</p>
Full article ">Figure 9
<p>Coefficients of added resistance, transverse drift force and yaw drift moment of the 6500-TEU containership at 20 knots speed, plotted over the length ratio parameter LRP. Continuous curve for wave angle 180 degrees, progressively shorter curve segments for angles 150, 120, 90, 60, 30 and 0 degrees. Black for water depth 50 m, gray for deep water.</p>
Full article ">Figure 10
<p>Like <a href="#jmse-13-00064-f009" class="html-fig">Figure 9</a>, but for 25 m water depth.</p>
Full article ">Figure 11
<p>Coefficients of added resistance, transverse drift force and yaw drift moment of the 6500-TEU containership at 5 knots speed, plotted over the length ratio parameter LRP. Continuous curve for wave angle 180 degrees, progressively shorter curve segments for angles 150, 120, 90, 60, 30 and 0 degrees.</p>
Full article ">Figure 12
<p>Like <a href="#jmse-13-00064-f011" class="html-fig">Figure 11</a>, but for 50 m water depth (black) and for deep water (gray).</p>
Full article ">Figure 13
<p>Like <a href="#jmse-13-00064-f011" class="html-fig">Figure 11</a>, but for 25 m water depth (black) and for deep water (gray).</p>
Full article ">Figure 14
<p>Like <a href="#jmse-13-00064-f011" class="html-fig">Figure 11</a>, but for 17 m water depth (black) and for deep water (gray).</p>
Full article ">Figure A1
<p>Centers of direct neighbor panels <span class="html-italic">A</span>, <span class="html-italic">B</span>, <span class="html-italic">C</span> and meaning of vectors <span class="html-italic">a</span>, <span class="html-italic">b</span> and <span class="html-italic">c</span>.</p>
Full article ">Figure A2
<p>Selection of neighbor panels <span class="html-italic">A</span>, <span class="html-italic">B</span>, <span class="html-italic">C</span> to the panel of interest <span class="html-italic">O</span> if <span class="html-italic">O</span> has less than three at least partly submerged neighbors.</p>
Full article ">
21 pages, 2045 KiB  
Review
Evolution of Theories on Doxorubicin-Induced Late Cardiotoxicity-Role of Topoisomerase
by Jaroslaw Szponar, Erwin Ciechanski, Magda Ciechanska, Jaroslaw Dudka and Sławomir Mandziuk
Int. J. Mol. Sci. 2024, 25(24), 13567; https://doi.org/10.3390/ijms252413567 - 18 Dec 2024
Viewed by 1013
Abstract
Doxorubicin (DOX) has been widely used as a cytotoxic chemotherapeutic. However, DOX has a number of side effects, such as myelotoxicity or gonadotoxicity, the most dangerous of which is cardiotoxicity. Cardiotoxicity can manifest as cardiac arrhythmias, myocarditis, and pericarditis; life-threatening late cardiotoxicity can [...] Read more.
Doxorubicin (DOX) has been widely used as a cytotoxic chemotherapeutic. However, DOX has a number of side effects, such as myelotoxicity or gonadotoxicity, the most dangerous of which is cardiotoxicity. Cardiotoxicity can manifest as cardiac arrhythmias, myocarditis, and pericarditis; life-threatening late cardiotoxicity can result in heart failure months or years after the completion of chemotherapy. The development of late cardiomyopathy is not yet fully understood. The most important question is how DOX reprograms the cardiomyocyte, after which DOX is excreted from the body, initially without symptoms. However, clinically overt cardiomyopathy develops over the following months and years. Since the 1980s, DOX-induced disorders in cardiomyocytes have been thought to be related to oxidative stress and dependent on the Fe/reactive oxygen species (ROS) mechanism. That line of evidence was supported by dexrazoxane (DEX) protection, the only Food and Drug Administration (FDA)-approved drug for preventing DOX-induced cardiomyopathy, which complexes iron. Thus, the hypothesis related to Fe/ROS provides a plausible explanation for the induction of the development of late cardiomyopathy via DOX. However, in subsequent studies, DEX was used to identify another important mechanism in DOX-induced cardiomyopathy that is related to topoisomerase 2β (Top2β). Does the Top2β hypothesis explain the mechanisms of the development of DOX-dependent late heart failure? Several of these mechanisms have been identified to date, proving the involvement of Top2β in the regulation of the redox balance, including oxidative stress. Thus, the development of late cardiomyopathy can be explained based on mechanisms related to Top2β. In this review, we highlight free radical theory, iron imbalance, calcium overload, and finally, a theory based on Top2β. Full article
(This article belongs to the Special Issue Molecular Mechanisms of Cardiotoxicity)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Late cardiotoxic effects of doxorubicin, involving dilated cardiomyopathy caused by cardiac remodeling, ventricle dilatation, progression of fibrosis, and finally, left ventricular ejection fraction reduction; ↑—increase, ↓—decrease.</p>
Full article ">Figure 2
<p>The cytotoxic effect of doxorubicin is directly related to reactive oxygen species (ROS). Briefly, DOX easily obtains electrons from NADH and NADPH in the presence of iron in reactions catalyzed by NADPH, cytochrome P-450 reductase, iNOS, and others. After obtaining an electron, DOX forms a semiquinone radical and transfers an electron to molecular oxygen, forming O<sub>2</sub><sup>•−</sup>. The presence of O<sub>2</sub><sup>•−</sup> favors the generation of other ROS, which damage lipids, proteins, and mitochondrial DNA (mtDNA). NADH is largely consumed in the DOX redox cycle once DOX is attached to cardiolipin in the inner mitochondrial membrane, through which adenosine triphosphate (ATP) synthesis decreases, leading to mitochondrial electron transport chain dysfunction. The four-electron reduction of oxygen to water decreases in favor of one-, two-, and three-electron reduction, which triggers oxidative stress and mtDNA damage. These lead to a positive feedback effect, finally manifesting as heart failure. DEX and the active Top2β cluster together and inhibit DOX–Top2β complex formation, stopping the cycle at an early stage; ↑—increase, ↓—decrease; A—adriamycin (doxorubicin); ADP—adenosine diphosphate; D—dexrazoxane; ETC—electron transport chain.</p>
Full article ">Figure 3
<p>Iron imbalance. Transferrin-bound Fe<sup>3+</sup> enters the cell through transferrin receptor 1 (TfR1), whereas Fe<sup>2+</sup> predominantly enters via divalent metal transporter 1 (DMT1), as well as through L- and T-type calcium channels (LTCC and TTCC). Ferric iron is reduced inside the cell’s endosome to ferrous iron by the six-transmembrane epithelial antigen of prostate 3 (STEAP3). The formation of the DOX semiquinone radical concurrently occurs with the release of iron from ferritin. The increased concentrations of H<sub>2</sub>O<sub>2</sub>, O<sub>2</sub><sup>•−</sup> and ONOO<sub>−</sub> induced by DOX trigger the release of an iron atom from [4Fe-4S] aconitase, converting it to the [3Fe-4S] conformation. Consequently, the transcriptional activity of ferritin is reduced, leading to ferritinophagy and decreasing the expression of the iron regulatory gene, lowering the human homeostatic iron regulator protein (HFE) synthesis, in the nucleus. These processes result in the accumulation of a labile iron pool in Fe<sup>2+</sup> form, which promotes the Fenton reaction, causing lipid peroxidation and triggering ferroptosis, thereby exacerbating cardiotoxicity; ↑—increase, ↓—decrease, DOX—doxorubicin, A—adriamycin (doxorubicin).</p>
Full article ">Figure 4
<p>Role of Top2β in the cytotoxic effect of DOX. Once the DOX–Top2β complex is created, DSBs and DNA transcription changes lead to defective mitochondrial biogenesis. Mitochondrial dysfunction is secondary to the suppression of PPARGC1A and PPARGC1B transcription, which regulate genes involved in the electron transport chain, the tricarboxylic acid cycle, and the β-oxidation of fatty acids via ESR1 and NRF1/NRF2. Once the PPARGC1A and PPARGC1B expression is suppressed, the superoxide dismutase (SOD), peroxiredoxin, and thioredoxin expression is also suppressed, promoting ROS production. Thus, disturbances in the mitochondrial electron transport chain lead to the one-, two-, and three-electron reduction of oxygen, triggering oxidative stress and a snowball effect in the mitochondria and leading to heart failure; ↑—increase; ↓—decrease; A—adriamycin (doxorubicin); ADP—adenosine diphosphate; ATP—adenosine triphosphate; DSBs—double-strand breaks; ETC—electron transport chain.</p>
Full article ">
12 pages, 3767 KiB  
Article
Microseismic Electronic Fencing for Monitoring of Transboundary Mining in Mines
by Jianbiao Yang, Guangyin Lu, Lei Li and Dazhou Zhang
Appl. Sci. 2024, 14(23), 11043; https://doi.org/10.3390/app142311043 - 27 Nov 2024
Viewed by 576
Abstract
Mine transboundary mining has been occurring frequently in recent years, and this illegal behavior has brought great potential danger to mine safety while also causing greater losses of state-owned assets. However, the current method of monitoring transboundary mining is still mainly based on [...] Read more.
Mine transboundary mining has been occurring frequently in recent years, and this illegal behavior has brought great potential danger to mine safety while also causing greater losses of state-owned assets. However, the current method of monitoring transboundary mining is still mainly based on underground verification by supervisors, which is far from meeting the demand for supervision. Microseismic monitoring technology is effective for monitoring transboundary mining due to its ability to locate vibration signals. For mine transboundary mining monitoring, this paper proposes a microseismic electronic fence method focusing on mine boundary locating, which differs from the routine microseismic monitoring used in mining operations. This method focuses its key monitoring area on the mine boundary. The deployment mode, number of sensors, and localization theory are analyzed, and numerical simulation and field measurement data analysis results show that the microseismic electronic fence method can achieve a localization accuracy of 15–20 m for underground microseismic events in the vicinity of mine boundaries, which can be effectively applied to the monitoring of transboundary mining activities. Full article
Show Figures

Figure 1

Figure 1
<p>Schematic model and vibration signal recording: (<b>a</b>) example of 3D model (<b>b</b>) vibration signal recording.</p>
Full article ">Figure 2
<p>Five different arrangements of observation systems (the small red triangle is the surface sensor, the small blue triangle is the well sensor, and the green sphere is the events): (<b>a</b>) conventional arrangement (<b>b</b>) regular arrangement (<b>c</b>) circular arrangement (<b>d</b>) nested arrangement (<b>e</b>) nested arrangement (add well sensors).</p>
Full article ">Figure 3
<p>Comparison of localization results of different observing systems: (<b>a</b>) comparison of localization errors of 5 arrangements (<b>b</b>) comparison of horizontal and depth localization errors.</p>
Full article ">Figure 4
<p>Localization results for different depths at the scale of the observing system: (<b>a</b>) distribution of events (<b>b</b>) depth vs. localization error.</p>
Full article ">Figure 5
<p>Layout and localization results for different numbers of sensor arrangements (the small red triangle in (<b>a</b>,<b>c</b>) is the surface sensor, the small blue triangle is the well sensor, and the green sphere is the event): (<b>a</b>) 39 sensors (<b>b</b>) localization results for 6~39 sensors (<b>c</b>) 15 sensors (<b>d</b>) localization results for 15 sensors.</p>
Full article ">Figure 6
<p>Live view of station layout and vibration signal recording: (<b>a</b>) live view (<b>b</b>) vibration recording.</p>
Full article ">Figure 7
<p>Localization results: (<b>a</b>) seismic event distribution (<b>b</b>) horizontal direction (<b>c</b>) vertical direction.</p>
Full article ">
22 pages, 6029 KiB  
Article
Integrated Assessment of Security Risk Considering Police Resources
by Jieying Chen, Weihong Li, Yaxing Li and Yebin Chen
ISPRS Int. J. Geo-Inf. 2024, 13(11), 415; https://doi.org/10.3390/ijgi13110415 - 16 Nov 2024
Viewed by 984
Abstract
The existing research on security risk often focuses on specific types of crime, overlooking an integrated assessment of security risk by leveraging existing police resources. Thus, we draw on crime geography theories, integrating public security business data, socioeconomic data, and spatial analysis techniques, [...] Read more.
The existing research on security risk often focuses on specific types of crime, overlooking an integrated assessment of security risk by leveraging existing police resources. Thus, we draw on crime geography theories, integrating public security business data, socioeconomic data, and spatial analysis techniques, to identify integrated risk points and areas by examining the distribution of police resources and related factors and their influence on security risk. The findings indicate that security risk areas encompass high-incidence areas of public security issues, locations with concentrations of dangerous individuals and key facilities, and regions with a limited police presence, characterized by dense populations, diverse urban functions, high crime probabilities, and inadequate supervision. While both police resources and security risk are concentrated in urban areas, the latter exhibits a more scattered distribution on the urban periphery, suggesting opportunities to optimize resource allocation by extending police coverage to risk hotspots lacking patrol stations. Notably, Level 1 security risk areas often coincide with areas lacking a police presence, underscoring the need for strategic resource allocation. By comprehensively assessing the impact of police resources and public security data on spatial risk distribution, this study provides valuable insights for public security management and police operations. Full article
Show Figures

Figure 1

Figure 1
<p>Theoretical framework of the integrated assessment of security risk.</p>
Full article ">Figure 2
<p>Study area. Due to the signing of a confidentiality agreement with the Public Security Bureau, all drawings related to the research area have been encrypted, and it is not appropriate to add a compass.</p>
Full article ">Figure 3
<p>Research process of the integrated assessment of security risk.</p>
Full article ">Figure 4
<p>Distribution characteristics of public premises and their security risks in JY City: (<b>a</b>) political units; (<b>b</b>) commercial establishments; (<b>c</b>) transportation hubs; (<b>d</b>) community facilities; (<b>e</b>) public premises.</p>
Full article ">Figure 5
<p>Distribution characteristics of the security situation of security risk in JY City (partial). Due to the signing of a confidentiality agreement with the Public Security Bureau, all drawings related to the research area have been encrypted, and it is not appropriate to add a compass.</p>
Full article ">Figure 6
<p>Distribution characteristics of the urban morphology and their security risk in JY City: (<b>a</b>) political units; (<b>b</b>) commercial establishments; (<b>c</b>) transportation hubs; (<b>d</b>) community facilities.</p>
Full article ">Figure 7
<p>Distribution characteristics of the police resources of security risk in JY City (partial). Due to the signing of a confidentiality agreement with the Public Security Bureau, all drawings related to the research area have been encrypted, and it is not appropriate to add a compass.</p>
Full article ">Figure 8
<p>Hierarchical distribution map of integrated security risk points in JY City. Due to the signing of a confidentiality agreement with the Public Security Bureau, all drawings related to the research area have been encrypted, and it is not appropriate to add a compass.</p>
Full article ">Figure 9
<p>Hierarchical distribution map of the integrated security risk areas in JY City. Due to the signing of a confidentiality agreement with the Public Security Bureau, all drawings related to the research area have been encrypted, and it is not appropriate to add a compass.</p>
Full article ">
16 pages, 4286 KiB  
Article
Risk Assessment of Water Inrush from Coal Seam Floor with a PCA–RST Algorithm in Chenmanzhuang Coal Mine, China
by Weifu Gao, Yining Cao and Xufeng Dong
Water 2024, 16(22), 3269; https://doi.org/10.3390/w16223269 - 14 Nov 2024
Cited by 1 | Viewed by 824
Abstract
During coal mining, sudden inrushes of water from the floor pose significant risks, seriously affecting mine safety. This study utilizes the 3602 working face of the Chenmanzhuang coal mine as a case study, and the original influencing factors were downscaled using principal component [...] Read more.
During coal mining, sudden inrushes of water from the floor pose significant risks, seriously affecting mine safety. This study utilizes the 3602 working face of the Chenmanzhuang coal mine as a case study, and the original influencing factors were downscaled using principal component analysis (PCA) to obtain four key evaluation factors: water inflow, aquiclude thickness, water pressure, and exposed limestone thickness. The rough set theory (RST) was applied to determine the weights of the four main influencing factors as 0.2, 0.24, 0.36, and 0.2; furthermore, 19 groups of comprehensive values were calculated using the weighting method, and a water inrush risk assessment was conducted for several blocks within the working face. The results are presented as a contour map, highlighting various risk levels and identifying the water inrush danger zone on the coal seam floor. The study concludes that water inrush poses a threat in the western part of the working face, while the eastern area remains relatively safe. The accuracy and reliability of the model are demonstrated, providing a solid basis and guidance for predicting water inrush. Full article
Show Figures

Figure 1

Figure 1
<p>The location and geological structure of the Chenmanzhuang coal mine.</p>
Full article ">Figure 2
<p>Composite histogram of coal mine floor.</p>
Full article ">Figure 3
<p>Technology roadmap.</p>
Full article ">Figure 4
<p>Schematic figure.</p>
Full article ">Figure 5
<p>Water pressure contour map.</p>
Full article ">Figure 6
<p>Aquiclude thickness contour map.</p>
Full article ">Figure 7
<p>Comprehensive evaluation value contour map.</p>
Full article ">Figure 8
<p>Water inrush coefficient contour map.</p>
Full article ">
15 pages, 2532 KiB  
Article
Fake-News Attitude Evaluation in Terms of Visual Attention and Personality Traits: A Preliminary Study for Mitigating the Cognitive Warfare
by Stefano Menicocci, Viviana Lupo, Silvia Ferrara, Andrea Giorgi, Eleonora Serra, Fabio Babiloni and Gianluca Borghini
Behav. Sci. 2024, 14(11), 1026; https://doi.org/10.3390/bs14111026 - 1 Nov 2024
Viewed by 1623
Abstract
Although the Internet grants access to a large amount of information, it is crucial to verify its reliability before relying on it. False information is a dangerous medium that poses a considerable threat, as it impacts individuals’ perceptions and information processing, eventually shaping [...] Read more.
Although the Internet grants access to a large amount of information, it is crucial to verify its reliability before relying on it. False information is a dangerous medium that poses a considerable threat, as it impacts individuals’ perceptions and information processing, eventually shaping people’s behaviors. Misinformation can be weaponized, especially in cross-border conflicts, where it can be used as a means to erode social cohesion by manipulating public opinion and exacerbate tensions between nations. Cognitive Warfare targets human cognition shaping to be a realm of warfare. It entails the synergy of activities designed to alter perceptions of reality, along with other Instruments of Power, to affect attitudes and behaviors by influencing, protecting, or disrupting cognition on an individual, group, or population level to gain an advantage over an opponent. The objective of our study was to identify behavioral patterns and profile personality traits most likely to accept fake news as true, aiming to mitigate the phenomenon and impact of misinformation and disinformation, as well as addressing the concerning effects of Cognitive Warfare. Based on the Big Five Theory model, we investigated the variation in visual attention and level of Conscientiousness, Open-Mindedness, and Emotional Stability in regard to the capability to detect fake news. In this study, we measured Implicit reaction time (IRT) and visual behavior (Eye Tracker) while participants were shown both fake and real news. The results indicated that subjects who were able to differentiate between fake news and real news tended to exhibit lower levels of Open-Mindedness and focused heavily on the visual elements of the posts. Full article
(This article belongs to the Section Social Psychology)
Show Figures

Figure 1

Figure 1
<p>(<b>a</b>) On the left panel, the experimental setup during a recording is visible. We used the webcam as an eye tracker device to record the visual behavior of participants while exploring the posts. (<b>b</b>) On the right panel, the AOIs taken into consideration are shown.</p>
Full article ">Figure 2
<p>Experimental protocol. Before starting the experiment, the participants performed the eye tracker calibration and a short training trial. Successively, the participants watched a sequence of 8 news, and each of them remained on the screen for 22 s. Every two posts, participants were asked to indicate whether the two news were real or fake. Finally, 3 IATs were administered in random order for personality traits assessment.</p>
Full article ">Figure 3
<p>The first two pictures show an example of the training blocks. The third picture shows an example of the test block.</p>
Full article ">Figure 4
<p>The graph shows the difference in the NF on the AOI Post between the two conditions. The participants explored the AOI Post for a longer time (<span class="html-italic">p</span> = 0.02) when they were able to recognize the posts correctly. Asterisks indicate a statistically significant difference (<span class="html-italic">p</span> &lt; 0.05).</p>
Full article ">Figure 5
<p>The graph shows the difference in the TV on the AOI Post between the two conditions. The participants spent a significantly longer time (<span class="html-italic">p</span> = 0.005) on the AOI Post when they were able to recognize the posts correctly. Asterisks indicate statistically significant differences (<span class="html-italic">p</span> &lt; 0.05).</p>
Full article ">Figure 6
<p>The graph shows the difference in the RP on the AOI Post between the two conditions. The participants read and understood (<span class="html-italic">p</span> = 0.001) the AOI Post when they were able to recognize the posts correctly. Asterisks indicate a statistically significant difference (<span class="html-italic">p</span> &lt; 0.05).</p>
Full article ">Figure 7
<p>The graph shows the difference in the TV on the AOI Title between the two conditions. The participants spent significantly less time (<span class="html-italic">p</span> = 0.02) on the AOI Title when they were able to recognize the posts correctly. Asterisks indicate a statistically significant difference (<span class="html-italic">p</span> &lt; 0.05).</p>
Full article ">Figure 8
<p>The personality trait <span class="html-italic">Open-Mindedness</span> of participants able to recognize most of the fake news was significantly lower (<span class="html-italic">p</span> = 0.03) than those who did not. Asterisks indicate statistically significant differences (<span class="html-italic">p</span> &lt; 0.05). The Correct data distribution consisted of 22 values, while the Wrong group consisted of 28. No significant differences or trends were found for the IAT <span class="html-italic">Emotional Stability</span> and <span class="html-italic">Conscientiousness</span> between the two conditions.</p>
Full article ">
11 pages, 278 KiB  
Article
Shattering Reality: Monsters from the Multiverse
by Kristine Larsen
Humanities 2024, 13(6), 148; https://doi.org/10.3390/h13060148 - 29 Oct 2024
Viewed by 842
Abstract
Kaijū media frequently features dangerous scientific experiments as a central theme, invented by scientists who are falsely convinced that they both completely understand and control their advanced technology. In the past few decades, this has included the introduction of high-energy physics (HEP) experiments—especially [...] Read more.
Kaijū media frequently features dangerous scientific experiments as a central theme, invented by scientists who are falsely convinced that they both completely understand and control their advanced technology. In the past few decades, this has included the introduction of high-energy physics (HEP) experiments—especially mammoth particle accelerators—that, among other destructive results, allow for the entrance of equally large and dangerous creatures into our world from parallel dimensions. Public concerns voiced about the safety of the creation of two groundbreaking energy accelerators—the Relativistic Heavy Ion Collider (RHIC) in New York and the Large Hadron Collider (LHC) in Europe—in the early 21st century are tied to related science fiction media that capitalize on such fears (including Godzilla vs. Megaguirus [2000], Pacific Rim [2013], The Cloverfield Paradox [2018], The Kaiju Preservation Society [2022]). Particular attention is paid to the Netflix original series Stranger Things (2016–) as a detailed case study. This study concludes with an analysis of scientists’ attempts to embrace the popularity of Stranger Things in their communication with the general public, and suggests that ongoing issues with conspiracy theories have been fueled in part by such attempts, coupled with long-standing issues with the HEP community and their peculiar scientific naming conventions. Full article
27 pages, 4442 KiB  
Article
Research on Integration of Safety Policy System in Petrochemical Enterprises Based on Risk Hierarchical Control and Hidden Danger Investigation
by Kai Yu, Pingping Liu, Lujie Zhou and Rui Feng
Sustainability 2024, 16(20), 8746; https://doi.org/10.3390/su16208746 - 10 Oct 2024
Viewed by 1118
Abstract
To enhance the risk management capacity of petrochemical enterprises, this paper presents a systematic and in-depth study of risk hierarchical control and hidden danger investigation technologies. Firstly, a risk hierarchical control system was developed based on text mining and Risk Breakdown Structure (RBS) [...] Read more.
To enhance the risk management capacity of petrochemical enterprises, this paper presents a systematic and in-depth study of risk hierarchical control and hidden danger investigation technologies. Firstly, a risk hierarchical control system was developed based on text mining and Risk Breakdown Structure (RBS) theory, categorizing risk alarm levels into four tiers: no alarm, light alarm, medium alarm, and heavy alarm. Secondly, a hidden danger investigation and management system was established by integrating a three-dimensional hidden danger grading model with the Plan-Do-Check-Act (PDCA) closed-loop principle. Finally, a cooperative management technology system for risk and hidden dangers in petrochemical enterprises was constructed and validated using Shandong Luqing Petrochemical Enterprise as a case study. The results indicated that the comprehensive risk level of Shandong Luqing Petrochemical Enterprise is classified as II, with a yellow light warning signal. They demonstrated a positive correlation between the risk hierarchical control system and the hidden danger investigation and management system. The findings of this research provide valuable guidance for improving safety management in petrochemical enterprises. Full article
(This article belongs to the Section Sustainable Chemical Engineering and Technology)
Show Figures

Figure 1

Figure 1
<p>Statistics of petrochemical accidents in China from 2013 to 2023.</p>
Full article ">Figure 2
<p>Accident time distribution map of China Petrochemical accident in 2023.</p>
Full article ">Figure 3
<p>Flow chart of petrochemical enterprise risk classification and control system.</p>
Full article ">Figure 4
<p>The three-dimensional hidden danger classification model.</p>
Full article ">Figure 5
<p>Flow chart of text mining.</p>
Full article ">Figure 6
<p>Hierarchical clustering diagram.</p>
Full article ">Figure 7
<p>Diagram of risk assessment index system for petrochemical enterprises.</p>
Full article ">Figure 8
<p>Three-dimensional risk classification model.</p>
Full article ">Figure 9
<p>Hidden danger closed-loop management flow chart.</p>
Full article ">Figure 10
<p>Relationship diagram between risk hierarchical control system and hidden danger investigation and management system.</p>
Full article ">Figure 11
<p>Petrochemical enterprise risk and hidden danger collaborative management technology system flow chart.</p>
Full article ">Figure 12
<p>Risk and hidden danger SPSS data view.</p>
Full article ">Figure 13
<p>Scatterplot of regression model.</p>
Full article ">Figure 14
<p>Regression standard residual histogram.</p>
Full article ">Figure 15
<p>P–P plot of regression standardized residuals.</p>
Full article ">
20 pages, 6774 KiB  
Article
A Driving Warning System for Explosive Transport Vehicles Based on Object Detection Algorithm
by Jinshan Sun, Ronghuan Zheng, Xuan Liu, Weitao Jiang and Mutian Jia
Sensors 2024, 24(19), 6339; https://doi.org/10.3390/s24196339 - 30 Sep 2024
Cited by 1 | Viewed by 766
Abstract
Due to the flammable and explosive nature of explosives, there are significant potential hazards and risks during transportation. During the operation of explosive transport vehicles, there are often situations where the vehicles around them approach or change lanes abnormally, resulting in insufficient avoidance [...] Read more.
Due to the flammable and explosive nature of explosives, there are significant potential hazards and risks during transportation. During the operation of explosive transport vehicles, there are often situations where the vehicles around them approach or change lanes abnormally, resulting in insufficient avoidance and collision, leading to serious consequences such as explosions and fires. Therefore, in response to the above issues, this article has developed an explosive transport vehicle driving warning system based on object detection algorithms. Consumer-level cameras are flexibly arranged around the vehicle body to monitor surrounding vehicles. Using the YOLOv4 object detection algorithm to identify and distance surrounding vehicles, using a game theory-based cellular automaton model to simulate the actual operation of vehicles, simulating the driver’s decision-making behavior when encountering other vehicles approaching or changing lanes abnormally during actual driving. The cellular automaton model was used to simulate two scenarios of explosive transport vehicles equipped with and without warning systems. The results show that when explosive transport vehicles encounter the above-mentioned dangerous situations, the warning system can timely issue warnings, remind drivers to make decisions, avoid risks, ensure the safety of vehicle operation, and verify the effectiveness of the warning system. Full article
(This article belongs to the Section Sensing and Imaging)
Show Figures

Figure 1

Figure 1
<p>Framework diagram of research ideas.</p>
Full article ">Figure 2
<p>Schematic diagram of monocular camera ranging principle.</p>
Full article ">Figure 3
<p>Dimensions of freight cars.</p>
Full article ">Figure 4
<p>Camera layout.</p>
Full article ">Figure 5
<p>Camera appearance.</p>
Full article ">Figure 6
<p>YOLOv4 network structure [<a href="#B19-sensors-24-06339" class="html-bibr">19</a>].</p>
Full article ">Figure 7
<p>Example of vehicle data images.</p>
Full article ">Figure 8
<p>Training images and box labels.</p>
Full article ">Figure 9
<p>Enhanced training dataset.</p>
Full article ">Figure 10
<p>The results of training.</p>
Full article ">Figure 11
<p>PR curve.</p>
Full article ">Figure 12
<p>Loss function curve.</p>
Full article ">Figure 13
<p>Capturing vehicle image information (safe vehicle distance).</p>
Full article ">Figure 14
<p>Capture vehicle image information (when the current rear distance is less than 60 m or the left and right distance is less than 1.5 m).</p>
Full article ">Figure 15
<p>Lane-changing rules.</p>
Full article ">Figure 16
<p>Flow chart of simulation steps for cellular automata.</p>
Full article ">Figure 17
<p>Traffic flow statistics.</p>
Full article ">Figure 18
<p>Statistical chart of average vehicle speed.</p>
Full article ">Figure 19
<p>Statistical chart of average vehicle density.</p>
Full article ">Figure 20
<p>Simulation process of cellular automata (time step 291).</p>
Full article ">Figure 21
<p>Program warning interface.</p>
Full article ">Figure 22
<p>Collision statistics without warning system.</p>
Full article ">Figure 23
<p>Collision statistics equipped with warning system.</p>
Full article ">
Back to TopTop