[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (19,702)

Search Parameters:
Keywords = embedding

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
13 pages, 553 KiB  
Article
The Impact of 8- and 4-Bit Quantization on the Accuracy and Silicon Area Footprint of Tiny Neural Networks
by Paweł Tumialis, Marcel Skierkowski, Jakub Przychodny and Paweł Obszarski
Electronics 2025, 14(1), 14; https://doi.org/10.3390/electronics14010014 - 24 Dec 2024
Abstract
In the field of embedded and edge devices, efforts have been made to make deep neural network models smaller due to the limited size of the available memory and the low computational efficiency. Typical model footprints are under 100 KB. However, for some [...] Read more.
In the field of embedded and edge devices, efforts have been made to make deep neural network models smaller due to the limited size of the available memory and the low computational efficiency. Typical model footprints are under 100 KB. However, for some applications, models of this size are too large. In low-voltage sensors, signals must be processed, classified or predicted with an order of magnitude smaller memory. Model downsizing can be performed by limiting the number of model parameters or quantizing their weights. These types of operations have a negative impact on the accuracy of the deep network. This study tested the effect of model downscaling techniques on accuracy. The main idea was to reduce neural network models to 3 k parameters or less. Tests were conducted on three different neural network architectures in the context of three separate research problems, modeling real tasks for small networks. The impact of the reduction in the accuracy of the network depends mainly on its initial size. For a network reduced from 40 k parameters, a decrease in accuracy of 16 percentage points was achieved, and for a network with 20 k parameters, a decrease of 8 points was achieved. To obtain the best results, knowledge distillation and quantization-aware training methods were used for training. Thanks to this, the accuracy of the 4-bit networks did not differ significantly from the 8-bit ones and their results were approximately four percentage points worse than those of the full precision networks. For the fully connected network, synthesis to ASIC (application-specific integrated circuit) was also performed to demonstrate the reduction in the silicon area occupied by the model. The 4-bit quantization limits the silicon area footprint by 90%. Full article
14 pages, 2382 KiB  
Article
Edge-AI Enabled Wearable Device for Non-Invasive Type 1 Diabetes Detection Using ECG Signals
by Maria Gragnaniello, Vincenzo Romano Marrazzo, Alessandro Borghese, Luca Maresca, Giovanni Breglio and Michele Riccio
Bioengineering 2025, 12(1), 4; https://doi.org/10.3390/bioengineering12010004 - 24 Dec 2024
Abstract
Diabetes is a chronic condition, and traditional monitoring methods are invasive, significantly reducing the quality of life of the patients. This study proposes the design of an innovative system based on a microcontroller that performs real-time ECG acquisition and evaluates the presence of [...] Read more.
Diabetes is a chronic condition, and traditional monitoring methods are invasive, significantly reducing the quality of life of the patients. This study proposes the design of an innovative system based on a microcontroller that performs real-time ECG acquisition and evaluates the presence of diabetes using an Edge-AI solution. A spectrogram-based preprocessing method is combined with a 1-Dimensional Convolutional Neural Network (1D-CNN) to analyze the ECG signals directly on the device. By applying quantization as an optimization technique, the model effectively balances memory usage and accuracy, achieving an accuracy of 89.52% with an average precision and recall of 0.91 and 0.90, respectively. These results were obtained with a minimal memory footprint of 347 kB flash and 23 kB RAM, showcasing the system’s suitability for wearable embedded devices. Furthermore, a custom PCB was developed to validate the system in a real-world scenario. The hardware integrates high-performance electronics with low power consumption, demonstrating the feasibility of deploying Edge-AI for non-invasive, real-time diabetes detection in resource-constrained environments. This design represents a significant step forward in improving the accessibility and practicality of diabetes monitoring. Full article
(This article belongs to the Special Issue Monitoring and Analysis of Human Biosignals, Volume II)
Show Figures

Figure 1

Figure 1
<p>Schematic block diagram of the PCB design. The main components include the section for the Analog Front-End (AFE) using the MAX30003, the Microcontroller Unit (MCU) based on the STM32F401, and the output section utilizing Bluetooth low energy (BLE) for communication.</p>
Full article ">Figure 2
<p>Rendering of the top and bottom layers of the custom PCB. On the left side, the electrodes are highlighted.</p>
Full article ">Figure 3
<p>The overall procedure began with the creation of a useful dataset by D1NAMO. These data were then processed through spectrogram analysis, followed by CNN inference, which was used to display the results.</p>
Full article ">Figure 4
<p>Example waveforms of (<b>a</b>) a diabetic ECG signal and (<b>b</b>) a healthy ECG.</p>
Full article ">Figure 5
<p>Schematic representation of the neural network design. The structure consists of input layers for ECG data, followed by key processing layers, leading to the final classification output.</p>
Full article ">Figure 6
<p>Confusion matrix.</p>
Full article ">Figure 7
<p>Graphical results from the ST Edge AI Developer Cloud following the benchmark test.</p>
Full article ">
34 pages, 4788 KiB  
Article
FFL-IDS: A Fog-Enabled Federated Learning-Based Intrusion Detection System to Counter Jamming and Spoofing Attacks for the Industrial Internet of Things
by Tayyab Rehman, Noshina Tariq, Farrukh Aslam Khan and Shafqat Ur Rehman
Sensors 2025, 25(1), 10; https://doi.org/10.3390/s25010010 - 24 Dec 2024
Abstract
The Internet of Things (IoT) contains many devices that can compute and communicate, creating large networks. Industrial Internet of Things (IIoT) represents a developed application of IoT, connecting with embedded technologies in production in industrial operational settings to offer sophisticated automation and real-time [...] Read more.
The Internet of Things (IoT) contains many devices that can compute and communicate, creating large networks. Industrial Internet of Things (IIoT) represents a developed application of IoT, connecting with embedded technologies in production in industrial operational settings to offer sophisticated automation and real-time decisions. Still, IIoT compels significant cybersecurity threats beyond jamming and spoofing, which could ruin the critical infrastructure. Developing a robust Intrusion Detection System (IDS) addresses the challenges and vulnerabilities present in these systems. Traditional IDS methods have achieved high detection accuracy but need improved scalability and privacy issues from large datasets. This paper proposes a Fog-enabled Federated Learning-based Intrusion Detection System (FFL-IDS) utilizing Convolutional Neural Network (CNN) that mitigates these limitations. This framework allows multiple parties in IIoT networks to train deep learning models with data privacy preserved and low-latency detection ensured using fog computing. The proposed FFL-IDS is validated on two datasets, namely the Edge-IIoTset, explicitly tailored to environments with IIoT, and CIC-IDS2017, comprising various network scenarios. On the Edge-IIoTset dataset, it achieved 93.4% accuracy, 91.6% recall, 88% precision, 87% F1 score, and 87% specificity for jamming and spoofing attacks. The system showed better robustness on the CIC-IDS2017 dataset, achieving 95.8% accuracy, 94.9% precision, 94% recall, 93% F1 score, and 93% specificity. These results establish the proposed framework as a scalable, privacy-preserving, high-performance solution for securing IIoT networks against sophisticated cyber threats across diverse environments. Full article
(This article belongs to the Special Issue AI Technology for Cybersecurity and IoT Applications)
Show Figures

Figure 1

Figure 1
<p>IIoT applications.</p>
Full article ">Figure 2
<p>Intrusion Detection System (IDS) architecture for threat detection and response.</p>
Full article ">Figure 3
<p>Representation of an FL model.</p>
Full article ">Figure 4
<p>Representation of a CNN model.</p>
Full article ">Figure 5
<p>Jamming attack scenario in IIoT.</p>
Full article ">Figure 6
<p>Spoofing attack scenario in IIoT.</p>
Full article ">Figure 7
<p>Proposed architecture.</p>
Full article ">Figure 8
<p>Proposed model for intrusion detection in IIoT environments.</p>
Full article ">Figure 9
<p>Accuracy of test models and Edge-IIoTset validation results.</p>
Full article ">Figure 10
<p>Accuracy of test models and validation results for CIC-IDS2017.</p>
Full article ">Figure 11
<p>Precision of local and global models and validation results for Edge-IIoTset.</p>
Full article ">Figure 12
<p>CICIDS-2017: precision of test models and validation results.</p>
Full article ">Figure 13
<p>Recall of local and global models and validation results for Edge-IIoTset.</p>
Full article ">Figure 14
<p>Recall of test models and validation results for CIC-IDS2017.</p>
Full article ">Figure 15
<p>F1 score of local and global models and validation results for Edge-IIoTset.</p>
Full article ">Figure 16
<p>F1 score of local and global models and validation results for CIC-IDS2017.</p>
Full article ">Figure 17
<p>Specificity score for models and validation results for Edge-IIoTset.</p>
Full article ">Figure 18
<p>Specificity score for models and validation results for CIC-IDS2017.</p>
Full article ">Figure 19
<p>Confusion matrix.</p>
Full article ">
15 pages, 4064 KiB  
Article
Real-Time Monitoring Method and Circuit Based on Built-In Reliability Prediction
by Wenke Ren, Yanning Chen, Xiaoming Li, Xinjie Zhou, Baichen Song and Tianci Chang
Micromachines 2025, 16(1), 4; https://doi.org/10.3390/mi16010004 - 24 Dec 2024
Abstract
The failure of different chips under working conditions is influenced by various stress states such as different voltages, temperatures, stress durations, and stress variations. Therefore, the failure time has a great degree of dispersion, and similar chips may exhibit different failure mechanisms due [...] Read more.
The failure of different chips under working conditions is influenced by various stress states such as different voltages, temperatures, stress durations, and stress variations. Therefore, the failure time has a great degree of dispersion, and similar chips may exhibit different failure mechanisms due to variations in their working environments. This paper proposes three system-on-chip reliability failure prediction unit circuits: the time-dependent dielectric breakdown prediction circuit, the negative bias temperature instability prediction circuit, and the hot carrier injection prediction circuit. These circuits are embedded within the main chip, enabling real-time failure prediction and reliability mechanism diagnosis in the same working environment as the main chip. The three reliability failure prediction circuits are compact and energy efficient, allowing for their integration into a system on a chip as IP cores that provide early warning signals before system-on-chip failure. Compared to traditional reliability prediction methods, this approach offers the advantages of accurately identifying failure mechanisms, predicting failure times, and enabling real-time online monitoring. Full article
Show Figures

Figure 1

Figure 1
<p>Reliability analysis methods for different design stages.</p>
Full article ">Figure 2
<p>Embedded on-chip real-time monitoring method.</p>
Full article ">Figure 3
<p>TDDB prediction circuit structure diagram; unit: μm.</p>
Full article ">Figure 4
<p>NBTI prediction circuit structure diagram; unit: μm.</p>
Full article ">Figure 5
<p>HCI prediction circuit structure diagram.</p>
Full article ">Figure 6
<p>Prediction circuit simulation timing diagram. (<b>a</b>) TDDB prediction circuit simulation timing diagram. (<b>b</b>) NBTI prediction circuit simulation timing diagram. (<b>c</b>) HCI prediction circuit simulation timing diagram.</p>
Full article ">Figure 7
<p>Test environment diagram. (<b>a</b>) TDDB prediction circuit test environment. (<b>b</b>) NBTI prediction circuit test environment. (<b>c</b>) HCI prediction circuit test environment.</p>
Full article ">Figure 8
<p>Test results of the prediction circuit. (<b>a</b>) TDDB prediction circuit test result. (<b>b</b>) NBTI prediction circuit test result. (<b>c</b>) HCI prediction circuit test result. (<b>d</b>) HCI prediction circuit’s output signals.</p>
Full article ">
23 pages, 19203 KiB  
Article
Towards Automated Chicken Monitoring: Dataset and Machine Learning Methods for Visual, Noninvasive Reidentification
by Daria Kern, Tobias Schiele, Ulrich Klauck and Winfred Ingabire
Animals 2025, 15(1), 1; https://doi.org/10.3390/ani15010001 - 24 Dec 2024
Abstract
The chicken is the world’s most farmed animal. In this work, we introduce the Chicks4FreeID dataset, the first publicly available dataset focused on the reidentification of individual chickens. We begin by providing a comprehensive overview of the existing animal reidentification datasets. Next, we [...] Read more.
The chicken is the world’s most farmed animal. In this work, we introduce the Chicks4FreeID dataset, the first publicly available dataset focused on the reidentification of individual chickens. We begin by providing a comprehensive overview of the existing animal reidentification datasets. Next, we conduct closed-set reidentification experiments on the introduced dataset, using transformer-based feature extractors in combination with two different classifiers. We evaluate performance across domain transfer, supervised, and one-shot learning scenarios. The results demonstrate that transfer learning is particularly effective with limited data, and training from scratch is not necessarily advantageous even when sufficient data are available. Among the evaluated models, the vision transformer paired with a linear classifier achieves the highest performance, with a mean average precision of 97.0%, a top-1 accuracy of 95.1%, and a top-5 accuracy of 100.0%. Our evaluation suggests that the vision transformer architecture produces higher-quality embedding clusters than the Swin transformer architecture. All data and code are publicly shared under a CC BY 4.0 license. Full article
Show Figures

Figure 1

Figure 1
<p>Dataset overview.</p>
Full article ">Figure 2
<p>Data preprocessing pipeline for subsequent re-ID.</p>
Full article ">Figure 3
<p>Visibility distributions for all instances of each individual. Ducks and roosters are marked with an asterisk (*).</p>
Full article ">Figure 4
<p>Illustration of the training and evaluation process for the feature extractor and classifier, showcasing the linear classifier as an example in this workflow.</p>
Full article ">Figure 5
<p>Top-1 accuracy visualized in bar charts. The left bar chart combines the results in <a href="#animals-15-00001-t002" class="html-table">Table 2</a> and <a href="#animals-15-00001-t003" class="html-table">Table 3</a>. The right bar chart illustrates the one-shot experiments in <a href="#animals-15-00001-t004" class="html-table">Table 4</a>.</p>
Full article ">Figure A1
<p>Examples of visibility rating “best”, “good”, and “bad”.</p>
Full article ">Figure A2
<p>Uniform plumage examples from left to right: solid white, solid black, shades of gray, shades of orange.</p>
Full article ">Figure A3
<p>Mean runtime results by experiment type and model (log scale).</p>
Full article ">
10 pages, 2377 KiB  
Article
Could Marginal Adaptation of Composite Resin Restorations Be Influenced by a Different Polymer Using Different Techniques?
by Jefferson Ricardo Pereira, Alef Vermudt, Ageu Raupp Junior, Diego Saccon Bordignon, Henrique Vieira Medeiros, Lucas David Galvani, Ricardo Abreu da Rosa, Marcus Vinicius Reis Só and Milton Carlos Kuga
Coatings 2024, 14(12), 1618; https://doi.org/10.3390/coatings14121618 - 23 Dec 2024
Abstract
Background: Marginal adaptation is one of biggest challenges in restorative dentistry, mainly in restoration of composite resin. Even with development of lower shrinkage materials, like those which use the polymer silorane, it is necessary a faithful clinical protocol in order to obtain better [...] Read more.
Background: Marginal adaptation is one of biggest challenges in restorative dentistry, mainly in restoration of composite resin. Even with development of lower shrinkage materials, like those which use the polymer silorane, it is necessary a faithful clinical protocol in order to obtain better results and more clinical durability of restorative procedure. The purpose of this study was investigated if different polymers can influence on marginal adaptation of different composite resin restorations. Material and methods: Twenty class V cavities were confectioned in twenty human molars in a standardized way. Ten dentists received one tooth each and a questionnaire to describe their own clinical protocol. The other 10 teeth were restored by one researcher as control group. The cavities received the adhesive system than increments of composite resin, and so the restorations were finished with finishing bur (KG Sorensen, São Paulo, SP, Brazil) to remove the excess, followed by sof-lex discs (3M ESPE). After this stage, all of specimens were embedded in 1% Methylene blue (Prolabo, Paris, France) during 48 h. The evaluation of pigment penetration into the interfaces was performed after specimens were washed in distilled water and longitudinally sectioned with steel Diamond disc in low velocity. Results: There was significant statistical difference between the different techniques using compose resin. Conclusions: it was possible conclude that the clinical protocol to perform dental restoration interfere dramatically in the final results of restorative procedure. Full article
Show Figures

Figure 1

Figure 1
<p>Fissures or gaps in the interface between the tooth structure and the adhesive material of the restoration can compromise the marginal integrity and longevity of the restoration.</p>
Full article ">Figure 2
<p>Example of a Class V Cavity.</p>
Full article ">Figure 3
<p>Silorane composite resin and its adhesive system.</p>
Full article ">Figure 4
<p>Example of a Class V Cavity restored with Silorane composite resin.</p>
Full article ">Figure 5
<p>Example of score 3.</p>
Full article ">Figure 6
<p>Mean values of marginal microleakage scores in both the control and experimental groups. Score (1) indicating complete absence of microleakage, (2) indicating leakage up to half of the surrounding wall, (3) indicating leakage in all of the surrounding wall, (4) indicating leakage in both the surrounding and axial walls, and (5) indicating leakage in both the surrounding and axial walls extending towards the pulp.</p>
Full article ">
15 pages, 1257 KiB  
Article
SocialJGCF: Social Recommendation with Jacobi Polynomial-Based Graph Collaborative Filtering
by Heng Lu and Ziwei Chen
Appl. Sci. 2024, 14(24), 12070; https://doi.org/10.3390/app142412070 - 23 Dec 2024
Abstract
With the flourishing of social media platforms, data in social networks, especially user-generated content, are growing rapidly, which makes it hard for users to select relevant content from the overloaded data. Recommender systems are thus developed to filter user-relevant content for better user [...] Read more.
With the flourishing of social media platforms, data in social networks, especially user-generated content, are growing rapidly, which makes it hard for users to select relevant content from the overloaded data. Recommender systems are thus developed to filter user-relevant content for better user experiences and also the commercial needs of social platform providers. Graph neural networks have been widely applied in recommender systems for better recommendation based on past interactions between users and corresponding items due to the graph structure of social data. Users might also be influenced by their social connections, which is the focus of social recommendation. Most works on recommendation systems try to obtain better representations of user embeddings and item embeddings. Compared with recommendation systems only focusing on interaction graphs, social recommendation has an additional task of combining user embedding from the social graph and interaction graph. This paper proposes a new method called SocialJGCF to address these problems, which applies Jacobi-Polynomial-Based Graph Collaborative Filtering (JGCF) to the propagation of the interaction graph and social graph, and a graph fusion is used to combine the user embeddings from the interaction graph and social graph. Experiments are conducted on two real-world datasets, epinions and LastFM. The result shows that SocialJGCF has great potential in social recommendation, especially for cold-start problems. Full article
15 pages, 24936 KiB  
Article
A Model and Quantitative Framework for Evaluating Iterative Steganography
by Marcin Pery and Robert Waszkowski
Entropy 2024, 26(12), 1130; https://doi.org/10.3390/e26121130 - 23 Dec 2024
Abstract
This study presents a detailed characterization of iterative steganography, a unique class of information-hiding techniques, and proposes a formal mathematical model for their description. A novel quantitative measure, the Incremental Information Function (IIF), is introduced to evaluate the process of information gain in [...] Read more.
This study presents a detailed characterization of iterative steganography, a unique class of information-hiding techniques, and proposes a formal mathematical model for their description. A novel quantitative measure, the Incremental Information Function (IIF), is introduced to evaluate the process of information gain in iterative steganographic methods. The IIF offers a comprehensive framework for analyzing the step-by-step process of embedding information into a cover medium, focusing on the cumulative effects of each iteration in the encoding and decoding cycles. The practical application and efficacy of the proposed method are demonstrated using detailed case studies in video steganography. These examples highlight the utility of the IIF in delineating the properties and characteristics of iterative steganographic techniques. The findings reveal that the IIF effectively captures the incremental nature of information embedding and serves as a valuable tool for assessing the robustness and capacity of steganographic systems. This research provides significant insights into the field of information hiding, particularly in the development and evaluation of advanced steganographic methods. The IIF emerges as an innovative and practical analytical tool for researchers, offering a quantitative approach to understanding and optimizing iterative steganographic techniques. Full article
(This article belongs to the Section Signal and Data Analysis)
Show Figures

Figure 1

Figure 1
<p>Plots of the functions <span class="html-italic">IIF</span><sub>(0,0)</sub>, <span class="html-italic">IIF</span><sub>(1,1)</sub>, <span class="html-italic">IIF</span><sub>(0,1)</sub>, <span class="html-italic">IIF</span><sub>(1,0)</sub>, and <span class="html-italic">IIF</span> for video steganogram No. 1.</p>
Full article ">Figure 2
<p>Plots of the IIF for video steganogram No. 2 encoded with 5 levels of encoding.</p>
Full article ">
23 pages, 1844 KiB  
Article
Using Artificial Intelligence to Support Peer-to-Peer Discussions in Science Classrooms
by Kelly Billings, Hsin-Yi Chang, Jonathan M. Lim-Breitbart and Marcia C. Linn
Educ. Sci. 2024, 14(12), 1411; https://doi.org/10.3390/educsci14121411 - 23 Dec 2024
Abstract
In successful peer discussions students respond to each other and benefit from supports that focus discussion on one another’s ideas. We explore using artificial intelligence (AI) to form groups and guide peer discussion for grade 7 students. We use natural language processing (NLP) [...] Read more.
In successful peer discussions students respond to each other and benefit from supports that focus discussion on one another’s ideas. We explore using artificial intelligence (AI) to form groups and guide peer discussion for grade 7 students. We use natural language processing (NLP) to identify student ideas in science explanations. The identified ideas, along with Knowledge Integration (KI) pedagogy, informed the design of a question bank to support students during the discussion. We compare groups formed by maximizing the variety of ideas among participants to randomly formed groups. We embedded the chat tool in an earth science unit and tested it in two classrooms at the same school. We report on the accuracy of the NLP idea detection, the impact of maximized versus random grouping, and the role of the question bank in focusing the discussion on student ideas. We found that the similarity of student ideas limited the value of maximizing idea variety and that the question bank facilitated students’ use of knowledge integration processes. Full article
Show Figures

Figure 1

Figure 1
<p>Mt. Hood explanation item.</p>
Full article ">Figure 2
<p>Chat grouping logic for the NLP-informed condition and randomized condition.</p>
Full article ">Figure 3
<p>Chat interface and sample student discussion. Students’ initial answers to the Mt. Hood assessment item are displayed above the chat environment. Question bank prompts are displayed next to the chat environment, and students can select questions they want to add to the chat. <span class="html-italic">Students used * to indicate corrections in spelling</span>.</p>
Full article ">Figure 4
<p>Number of KI processes groups engaged in during the chat was split into groups that used the adaptive question bank and groups that did not use the adaptive question bank.</p>
Full article ">
17 pages, 3169 KiB  
Article
Knowledge Reasoning- and Progressive Distillation-Integrated Detection of Electrical Construction Violations
by Bin Ma, Gang Liang, Yufei Rao, Wei Guo, Wenjie Zheng and Qianming Wang
Sensors 2024, 24(24), 8216; https://doi.org/10.3390/s24248216 - 23 Dec 2024
Abstract
To address the difficulty in detecting workers’ violation behaviors in electric power construction scenarios, this paper proposes an innovative method that integrates knowledge reasoning and progressive multi-level distillation techniques. First, standards, norms, and guidelines in the field of electric power construction are collected [...] Read more.
To address the difficulty in detecting workers’ violation behaviors in electric power construction scenarios, this paper proposes an innovative method that integrates knowledge reasoning and progressive multi-level distillation techniques. First, standards, norms, and guidelines in the field of electric power construction are collected to build a comprehensive knowledge graph, aiming to provide accurate knowledge representation and normative analysis. Then, the knowledge graph is combined with the object-detection model in the form of triplets, where detected objects and their interactions are represented as subject–predicate–object relationship. These triplets are embedded into the model using an adaptive connection network, which dynamically weights the relevance of external knowledge to enhance detection accuracy. Furthermore, to enhance the model’s performance, the paper designs a progressive multi-level distillation strategy. On one hand, knowledge transfer is conducted at the object level, region level, and global level, significantly reducing the loss of contextual information during distillation. On the other hand, two teacher models of different scales are introduced, employing a two-stage distillation strategy where the advanced teacher guides the primary teacher in the first stage, and the primary teacher subsequently distills this knowledge to the student model in the second stage, effectively bridging the scale differences between the teacher and student models. Experimental results demonstrate that under the proposed method, the model size is reduced from 14.5 MB to 3.8 MB, and the floating-point operations (FLOPs) are reduced from 15.8 GFLOPs to 5.9 GFLOPs. Despite these optimizations, the AP50 reaches 92.4%, showing a 1.8% improvement compared to the original model. These results highlight the method’s effectiveness in accurately detecting workers’ violation behaviors, providing a quantitative basis for its superiority and offering a novel approach for safety management and monitoring at construction sites. Full article
Show Figures

Figure 1

Figure 1
<p>Model structure.</p>
Full article ">Figure 2
<p>Example of triplet relationships.</p>
Full article ">Figure 3
<p>External-knowledge reasoning module.</p>
Full article ">Figure 4
<p>Adaptive connection network.</p>
Full article ">Figure 5
<p>Multi-level knowledge-distillation network structure.</p>
Full article ">Figure 6
<p>Samples from the violation detection dataset. (The red rectangular box indicates the target).</p>
Full article ">Figure 7
<p>Visualization results of different model detections. (<b>a</b>–c) are YOLOv5, (<b>d</b>–<b>f</b>) are the method proposed in this paper.</p>
Full article ">Figure 8
<p>Feature map visualization.</p>
Full article ">
18 pages, 5521 KiB  
Article
Characteristics and Control of Subway Train-Induced Environmental Vibration: A Case Study
by Lizhong Song, Xiang Xu, Quanmin Liu, Haiwen Zhang and Yisheng Zhang
Buildings 2024, 14(12), 4080; https://doi.org/10.3390/buildings14124080 - 23 Dec 2024
Abstract
With the widespread construction of the subway in the Chinese mainland, the environmental vibration caused by subway operation has attracted increasing attention. Train-induced environmental vibrations can cause structural deformation, uneven settlement of line foundations, and tunnel leakage, affecting the structural safety of lines [...] Read more.
With the widespread construction of the subway in the Chinese mainland, the environmental vibration caused by subway operation has attracted increasing attention. Train-induced environmental vibrations can cause structural deformation, uneven settlement of line foundations, and tunnel leakage, affecting the structural safety of lines and foundations. This research focuses on a segment of the Nanchang Metro Line 3, which has been chosen as the subject of investigation. A numerical model was developed to analyze the subway train-induced environmental vibration, employing the finite element method (FEM). Utilizing a numerical model, an investigation was conducted to examine the impact of train speed on the subway train-induced environmental vibration, the train-induced environmental vibration transmission characteristics were analyzed, and the control effects of vibration reduction tracks on train-induced environmental vibration were discussed. Train-induced vibration tests were also conducted on Nanchang Metro Line 3 to verify the control effects of various vibration reduction tracks. The results indicate that the subway train-induced environmental vibration rises as the train speed goes up, and the vibration peaks always appear around 63 Hz. When the train speed doubles, the Z-vibration level increases from about 5.1 dB to 5.9 dB. Subway train-induced environmental vibration shows a fluctuating decreasing trend with increasing distance from the centerline of the tunnel. The Z-vibration level reaches its maximum 4 m away from the centerline of the tunnel. Compared with the embedded sleeper, the vibration-damping fastener exhibits a vibration reduction effect of about 9 dB to 18 dB, the rubber vibration-damping pad exhibits a better vibration reduction effect of about 16 dB to 24 dB, and the steel spring floating plate exhibits the best vibration-damping effect of about 18 dB to 28 dB. The calculated Z-vibration levels are basically consistent with the measured values, indicating the accuracy of the calculated results of the control effects of the vibration reduction tracks. Full article
(This article belongs to the Special Issue Vibration Prediction and Noise Assessment of Building Structures)
Show Figures

Figure 1

Figure 1
<p>Schematic diagram of train–track coupling vibration analysis model.</p>
Full article ">Figure 2
<p>Rail roughness spectrum.</p>
Full article ">Figure 3
<p>Numerical model of train-induced environmental vibration: (<b>a</b>) overall model diagram; (<b>b</b>) partial enlarged view of the subway tunnel.</p>
Full article ">Figure 4
<p>A schematic diagram of the calculation points.</p>
Full article ">Figure 5
<p>Spectra of wheel–rail force amplitudes at different speeds.</p>
Full article ">Figure 6
<p>The Z-vibration-level spectra of typical points caused by the train passing through the subway tunnel at different speeds: (<b>a</b>) P1; (<b>b</b>) P2; (<b>c</b>) P3; (<b>d</b>) P4; (<b>e</b>) P5; (<b>f</b>) P6; (<b>g</b>) P7; (<b>h</b>) P8.</p>
Full article ">Figure 6 Cont.
<p>The Z-vibration-level spectra of typical points caused by the train passing through the subway tunnel at different speeds: (<b>a</b>) P1; (<b>b</b>) P2; (<b>c</b>) P3; (<b>d</b>) P4; (<b>e</b>) P5; (<b>f</b>) P6; (<b>g</b>) P7; (<b>h</b>) P8.</p>
Full article ">Figure 7
<p>The linear fittings of the relationship between Z-vibration levels and the base-10 logarithm of the train speed: (<b>a</b>) P1; (<b>b</b>) P2; (<b>c</b>) P3; (<b>d</b>) P4; (<b>e</b>) P5; (<b>f</b>) P6; (<b>g</b>) P7; (<b>h</b>) P8.</p>
Full article ">Figure 7 Cont.
<p>The linear fittings of the relationship between Z-vibration levels and the base-10 logarithm of the train speed: (<b>a</b>) P1; (<b>b</b>) P2; (<b>c</b>) P3; (<b>d</b>) P4; (<b>e</b>) P5; (<b>f</b>) P6; (<b>g</b>) P7; (<b>h</b>) P8.</p>
Full article ">Figure 8
<p>The Z-vibration level spectra at various points caused by the train passing through the subway tunnel at different speeds: (<b>a</b>) 60 km/h; (<b>b</b>) 80 km/h; (<b>c</b>) 100 km/h; (<b>d</b>) 120 km/h; (<b>e</b>) 140 km/h; (<b>f</b>) 160 km/h.</p>
Full article ">Figure 9
<p>The variation curves of subway train-induced ground vibration with changing distance at speeds of 60, 80, 100, 120, 140, and 160 km/h.</p>
Full article ">Figure 10
<p>The Z-vibration level spectra at various points with different tracks: (<b>a</b>) P3; (<b>b</b>) P4; (<b>c</b>) P5; (<b>d</b>) P6; I P7; (<b>f</b>) P8.</p>
Full article ">Figure 11
<p>Test photos: (<b>a</b>) a test section; (<b>b</b>) an accelerometer installed on the tunnel wall.</p>
Full article ">Figure 12
<p>Comparison between the calculated and measured values of Z-vibration levels at P2.</p>
Full article ">
15 pages, 8375 KiB  
Article
Nanodots of Transition Metal Sulfides, Carbonates, and Oxides Obtained Through Spontaneous Co-Precipitation with Silica
by Bastian Rödig, Diana Funkner, Thomas Frank, Ulrich Schürmann, Julian Rieder, Lorenz Kienle, Werner Kunz and Matthias Kellermeier
Nanomaterials 2024, 14(24), 2054; https://doi.org/10.3390/nano14242054 - 23 Dec 2024
Abstract
The controlled formation and stabilization of nanoparticles is of fundamental relevance for materials science and key to many modern technologies. Common synthetic strategies to arrest growth at small sizes and prevent undesired particle agglomeration often rely on the use of organic additives and [...] Read more.
The controlled formation and stabilization of nanoparticles is of fundamental relevance for materials science and key to many modern technologies. Common synthetic strategies to arrest growth at small sizes and prevent undesired particle agglomeration often rely on the use of organic additives and require non-aqueous media and/or high temperatures, all of which appear critical with respect to production costs, safety, and sustainability. In the present work, we demonstrate a simple one-pot process in water under ambient conditions that can produce particles of various transition metal carbonates and sulfides with sizes of only a few nanometers embedded in a silica shell, similar to particles derived from more elaborate synthesis routes, like the sol–gel process. To this end, solutions of soluble salts of metal cations (e.g., chlorides) and the respective anions (e.g., sodium carbonate or sulfide) are mixed in the presence of different amounts of sodium silicate at elevated pH levels. Upon mixing, metal carbonate/sulfide particles nucleate, and their subsequent growth causes a sensible decrease of pH in the vicinity. Dissolved silicate species respond to this local acidification by condensation reactions, which eventually lead to the formation of amorphous silica layers that encapsulate the metal carbonate/sulfide cores and, thus, effectively inhibit any further growth. The as-obtained carbonate nanodots can readily be converted into the corresponding metal oxides by secondary thermal treatment, during which their nanometric size is maintained. Although the described method clearly requires optimization towards actual applications, the results of this study highlight the potential of bottom-up self-assembly for the synthesis of functional nanoparticles at mild conditions. Full article
(This article belongs to the Section Inorganic Materials and Metal-Organic Frameworks)
Show Figures

Figure 1

Figure 1
<p>Photographs of samples obtained by mixing equal volumes of 10 mM solutions of CoCl<sub>2</sub> and (NH<sub>4</sub>)<sub>2</sub>CO<sub>3</sub>, with the latter containing different amounts of dissolved sodium silicate (from left to right): 0, 100, 300, 700, 1000, 1500, and 2000 ppm SiO<sub>2</sub>. The pH was adjusted to (<b>a</b>) 9.0 and (<b>b</b>) 11.0 after mixing with the addition of HCl and NaOH.</p>
Full article ">Figure 2
<p>TEM micrographs of typical reaction products obtained from mixtures containing 10 mM each of CoCl<sub>2</sub>, Na<sub>2</sub>CO<sub>3</sub>, and SiO<sub>2</sub> at native pH. (<b>a</b>) Colloidal aggregates formed by cation-induced condensation of silicate species. (<b>b</b>) Numerous CoCO<sub>3</sub> nanodots (dark spots), partially embedded in diffuse silica matrices (areas of lower contrast). Scale bars: 100 nm.</p>
Full article ">Figure 3
<p>ADF-STEM micrographs of nanostructures obtained by mixing equal volumes of 10 mM solutions of CoCl<sub>2</sub> and Na<sub>2</sub>CO<sub>3</sub>, with the latter containing 300 ppm (5 mM) SiO<sub>2</sub> at the native pH of 10.35. Scale bars: 50 nm. (<b>a</b>,<b>b</b>) show different positions on the grid with differing amount of captured nucleation cores, visible as white dots.</p>
Full article ">Figure 4
<p>TEM micrographs of silica-coated nanoparticles of (<b>a</b>) CdCO<sub>3</sub>, (<b>b</b>) CoCO<sub>3</sub>, (<b>c</b>) CuCO<sub>3</sub>, (<b>d</b>) MnCO<sub>3</sub>, (<b>e</b>) NiCO<sub>3,</sub> and (<b>f</b>) ZnCO<sub>3</sub>, obtained by spontaneous co-precipitation from solutions containing 10 mM each of metal chloride, Na<sub>2</sub>CO<sub>3,</sub> and sodium silicate, at the respective native pH of around 10.5. Scale bars: 50 nm.</p>
Full article ">Figure 5
<p>TEM micrographs of oxide nanoparticles obtained by calcination of silica-coated precursors of (<b>a</b>) CdCO<sub>3</sub>, (<b>b</b>) CoCO<sub>3</sub>, (<b>c</b>) CuCO<sub>3</sub>, (<b>d</b>) MnCO<sub>3</sub>, (<b>e</b>) NiCO<sub>3</sub>, and (<b>f</b>) ZnCO<sub>3</sub>, as shown in <a href="#nanomaterials-14-02054-f004" class="html-fig">Figure 4</a>. Note that numerous individual nanodots can be observed across the entire fields of view in (<b>e</b>,<b>f</b>). Scale bars: 50 nm.</p>
Full article ">Figure 6
<p>TEM micrographs of silica-coated nanoparticles of (<b>a</b>) CdS, (<b>b</b>) CoS, (<b>c</b>) CuS, (<b>d</b>) MnS, (<b>e</b>) NiS, and (<b>f</b>) ZnS, obtained by spontaneous co-precipitation from solutions containing 10 mM each of metal chloride, Na<sub>2</sub>S, and sodium silicate, at the respective native pH. Scale bars: 50 nm.</p>
Full article ">Scheme 1
<p>Spontaneous coating of metal carbonate particles (red circles) with shells of amorphous silica (blue rims) as a consequence of local pH gradients (green halos) in alkaline solutions, caused by bicarbonate dissociation and triggering the polycondensation of dissolved silicate species (blue shreds) in the immediate vicinity of growing particles. Redrawn according to the concept introduced in ref. [<a href="#B26-nanomaterials-14-02054" class="html-bibr">26</a>].</p>
Full article ">
17 pages, 4105 KiB  
Article
Experimental and Simulation Studies on Thermal Shock of Multilayer Thermal Barrier Coatings with an Intermediate Transition Layer at 1500 °C
by Pengpeng Liu, Shilong Yang, Kaibin Li, Weize Wang, Yangguang Liu and Ting Yang
Coatings 2024, 14(12), 1614; https://doi.org/10.3390/coatings14121614 - 23 Dec 2024
Abstract
Strain tolerance is a crucial factor affecting the thermal life of coatings, and a higher strain tolerance can effectively alleviate the thermal stresses on coatings during thermal shock. To improve the strain tolerance, the coating structure was optimized by introducing an intermediate transition [...] Read more.
Strain tolerance is a crucial factor affecting the thermal life of coatings, and a higher strain tolerance can effectively alleviate the thermal stresses on coatings during thermal shock. To improve the strain tolerance, the coating structure was optimized by introducing an intermediate transition layer in this study. The intermediate transition layer material was prepared using a 1:1 volume ratio mixture of 6–8 wt. % Yttria-stabilized zirconia (YSZ) and NiCrAlY powders in the experiments. The coating structure consisted of an Al2O3-GdAlO3 (AGAP) anti-erosion layer, a YSZ layer, an intermediate transition layer, and a bonding layer from top to bottom. After thermal shock experiments at 1500 °C, the coatings with the addition of the intermediate transition layer exhibited different failure modes, with the crack location shifting from between the YSZ and the bonding layer to within the intermediate transition layer, compared to the coatings without the intermediate transition layer. Finite element simulation analysis showed that the intermediate transition layer effectively increased the strain tolerance of the coating and significantly reduced the thermal stress. Furthermore, incorporating an embedded micron agglomerated particle-based (EMAP) thermal barrier coating structure into the intermediate transition layer effectively alleviated thermal stresses and enhanced the coating’s thermal insulation performance. Full article
Show Figures

Figure 1

Figure 1
<p>Schematic of the Geometrical Model for Finite Element Simulation (the red arrow represents the path to the data extraction location).</p>
Full article ">Figure 2
<p>Cross-sectional morphologies of the as-sprayed (<b>a</b>,<b>d</b>) Group A, (<b>b</b>,<b>e</b>) Group B, and (<b>c</b>,<b>f</b>) Group C.</p>
Full article ">Figure 3
<p>Cross-sectional morphologies of coatings after thermal shock test (<b>a</b>) Group A, (<b>b</b>) Group B, (<b>c</b>) Group C.</p>
Full article ">Figure 4
<p>Temperature data plots of AYIB coatings with different intermediate transition layer thicknesses along the right boundary path at 1500 °C.</p>
Full article ">Figure 5
<p>Distribution of coating internal stresses along the right boundary path at 1500 °C for AYIB coatings with different intermediate transition layer thicknesses.</p>
Full article ">Figure 6
<p>Finite element model of AYI(E)B with different PEPC contents: (<b>a</b>) 3%; (<b>b</b>) 6%; (<b>c</b>) 9%.</p>
Full article ">Figure 7
<p>Temperature data plots of AYI(E)B coatings with different intermediate transition layer thicknesses along the right boundary path at 1500 °C.</p>
Full article ">Figure 8
<p>Stress distribution along the right boundary path at 1500 °C for coatings with different PEPC contents.</p>
Full article ">Figure 9
<p>AYI(E)B multilayer thermal barrier coating design solution.</p>
Full article ">
17 pages, 2618 KiB  
Article
Performance Evaluation of Modified Biochar as a Polycyclic Aromatic Hydrocarbon Adsorbent and Microbial-Immobilized Carrier
by Shuying Geng, Shushuai Mao, Guangming Xu, Aizhong Ding, Feiyong Chen, Junfeng Dou and Fuqiang Fan
Processes 2024, 12(12), 2939; https://doi.org/10.3390/pr12122939 - 23 Dec 2024
Abstract
Herein, biochars derived from corn stalks, rice husks, and bamboo powder were modified by nitric acid oxidation and sodium hydroxide alkali activation to identify efficient and cost-effective polycyclic aromatic hydrocarbon-adsorbent and microbial-immobilized carriers. The surface characterization and adsorption investigation results suggested that acid/alkali [...] Read more.
Herein, biochars derived from corn stalks, rice husks, and bamboo powder were modified by nitric acid oxidation and sodium hydroxide alkali activation to identify efficient and cost-effective polycyclic aromatic hydrocarbon-adsorbent and microbial-immobilized carriers. The surface characterization and adsorption investigation results suggested that acid/alkali modification promoted the phenanthrene removal ability in an aqueous solution of biochars via facilitating π–π/n–π electron donor–acceptor interactions, electrostatic interactions, hydrogen bonds, and hydrophobic interactions. Subsequently, the degrading bacteria Rhodococcus sp. DG1 was successfully immobilized on the rice husk-derived biochar with nitric acid oxidation (RBO), which exhibited the maximum phenanthrene adsorption efficiency (3818.99 µg·g−1), abundant surface functional groups, and a larger specific surface area (182.6 m2·g−1) and pore volume (0.141 m3·g−1). Degradation studies revealed that the microorganisms immobilized on RBO by the adsorption method yielded a significant phenanthrene removal rate of 80.15% after 30 days, which was 38.78% higher than that of the control. Conversely, the polymer gel network-based microenvironment in the microorganism-immobilized RBO by the combined adsorption–embedding method restricted the migration and diffusion of nutrients and pollutants in the reaction system. This study thus introduces an innovative modified biochar-based microbial immobilization technology characterized by a simple design, convenient operation, and high adsorption efficiency, offering valuable insights into material selection for PAH contamination bioremediation. Full article
(This article belongs to the Special Issue State-of-the-Art Wastewater Treatment Techniques)
Show Figures

Figure 1

Figure 1
<p>The fabrication procedure of biochar-immobilized microorganisms. The microorganisms immobilized by adsorption method and adsorption–embedding method were labeled as ARB and ERB, respectively.</p>
Full article ">Figure 2
<p>FTIR spectra (<b>a</b>), XRD patterns (<b>b</b>), and SEM images of biochar (<b>c</b>).</p>
Full article ">Figure 3
<p>Adsorption kinetics of PHE onto biochars, where (<b>a</b>–<b>c</b>) are kinetic model fitting; (<b>d</b>) is for IPD model fitting.</p>
Full article ">Figure 4
<p>Adsorption isotherms of PHE onto biochar.</p>
Full article ">Figure 5
<p>Adsorption and degradation mechanisms of PHE by biochar-immobilized microorganism.</p>
Full article ">Figure 6
<p>Degradation rates of PHE by different inoculants.</p>
Full article ">
16 pages, 2833 KiB  
Article
MGKGR: Multimodal Semantic Fusion for Geographic Knowledge Graph Representation
by Jianqiang Zhang, Renyao Chen, Shengwen Li, Tailong Li and Hong Yao
Algorithms 2024, 17(12), 593; https://doi.org/10.3390/a17120593 - 23 Dec 2024
Abstract
Geographic knowledge graph representation learning embeds entities and relationships in geographic knowledge graphs into a low-dimensional continuous vector space, which serves as a basic method that bridges geographic knowledge graphs and geographic applications. Previous geographic knowledge graph representation methods primarily learn the vectors [...] Read more.
Geographic knowledge graph representation learning embeds entities and relationships in geographic knowledge graphs into a low-dimensional continuous vector space, which serves as a basic method that bridges geographic knowledge graphs and geographic applications. Previous geographic knowledge graph representation methods primarily learn the vectors of entities and their relationships from their spatial attributes and relationships, which ignores various semantics of entities, resulting in poor embeddings on geographic knowledge graphs. This study proposes a two-stage multimodal geographic knowledge graph representation (MGKGR) model that integrates multiple kinds of semantics to improve the embedding learning of geographic knowledge graph representation. Specifically, in the first stage, a spatial feature fusion method for modality enhancement is proposed to combine the structural features of geographic knowledge graphs with two modal semantic features. In the second stage, a multi-level modality feature fusion method is proposed to integrate heterogeneous features from different modalities. By fusing the semantics of text and images, the performance of geographic knowledge graph representation is improved, providing accurate representations for downstream geographic intelligence tasks. Extensive experiments on two datasets show that the proposed MGKGR model outperforms the baselines. Moreover, the results demonstrate that integrating textual and image data into geographic knowledge graphs can effectively enhance the model’s performance. Full article
(This article belongs to the Section Algorithms for Multidisciplinary Applications)
Show Figures

Figure 1

Figure 1
<p>Multimodal data in the geographic knowledge graph provides semantic information for geographic attribute prediction.</p>
Full article ">Figure 2
<p>The framework of the proposed MGKGR. (<b>A</b>) Multimodal GeoKG Encoding module processes the multimodal data of multimodal GeoKG for effective encoding. (<b>B</b>) Two-Stage Multimodal Feature Fusion module integrates features from multiple modalities to generate the multimodal features of multimodal GeoKG.</p>
Full article ">Figure 3
<p>Model performance on attribute relations, adjacency relations, and mixed relations.</p>
Full article ">
Back to TopTop