[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (728)

Search Parameters:
Keywords = notification

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
26 pages, 1014 KiB  
Article
Integrated Risk Framework (IRF)—Interconnection of the Ishikawa Diagram with the Enhanced HACCP System in Risk Assessment for the Sustainable Food Industry
by Mirel Glevitzky, Ioana Glevitzky, Paul Mucea-Ștef, Maria Popa, Gabriela-Alina Dumitrel and Mihaela Laura Vică
Sustainability 2025, 17(2), 536; https://doi.org/10.3390/su17020536 - 12 Jan 2025
Viewed by 282
Abstract
This paper presents a new risk assessment methodology called the Integrated Risk Framework (IRF) through the application of Ishikawa diagrams combined with the enhanced Hazard Analysis and Critical Control Point (HACCP) system. This risk investigation technique aims to ensure a significantly higher level [...] Read more.
This paper presents a new risk assessment methodology called the Integrated Risk Framework (IRF) through the application of Ishikawa diagrams combined with the enhanced Hazard Analysis and Critical Control Point (HACCP) system. This risk investigation technique aims to ensure a significantly higher level of quality, safety, and sustainability in food products by using improved classical methods with strong intercorrelation capabilities. The methodology proposes expanding the typology of basic physical, chemical, and biological risks outlined by the ISO 22000 Food Safety Management System standard, adding other auxiliary risks such as allergens, fraud/sabotage, Kosher/Halal compliance, Rapid Alert System for Food and Feed notification, or additional specific risks such as irradiation, radioactivity, genetically modified organisms, polycyclic aromatic hydrocarbons, African swine fever, peste of small ruminants, etc. depending on the specific technological process or ingredients. Simultaneously, it identifies causes for each operation in the technological flow based on the 5M diagram: Man, Method, Material, Machine, and Environment. For each identified risk and cause, its impact was determined according to its severity and likelihood of occurrence. The final effect is defined as the risk class, calculated as the arithmetic mean of the impact derived at each process stage based on the identified risks and causes. Within the study, the methodology was applied to the spring water bottling process. This provided a new perspective on analyzing the risk factors during the bottling operations by concurrently using Ishikawa diagrams and HACCP principles throughout the product’s technological flow. The results of the study can form new methodologies aimed at enhancing sustainable food safety management strategy. In risk assessment using these two tools, the possibility of cumulative or synergistic effects is considered, resulting in better control of all factors that may affect the manufacturing process. This new perspective on studying the dynamics of risk factor analysis through the simultaneous use of the fishbone diagram and the classical HACCP system can be extrapolated and applied to any manufacturing process in the food industry and beyond. Full article
Show Figures

Figure 1

Figure 1
<p>Risk analysis steps for IRF.</p>
Full article ">Figure 2
<p>Flow diagram of bottled natural spring water manufacturing process: (<b>a</b>) sparkling water and (<b>b</b>) still water.</p>
Full article ">Figure 3
<p>Ishikawa diagram—recommendations to determine the risk-generating causes of manufacturing stages.</p>
Full article ">Figure 4
<p>Identifying the factors that may produce the risks related to the water bottling process.</p>
Full article ">
11 pages, 4553 KiB  
Article
Safety Autonomous Platform for Data-Driven Risk Management Based on an On-Site AI Engine in the Electric Power Industry
by Dongyeop Lee, Daesik Lim and Joonwon Lee
Appl. Sci. 2025, 15(2), 630; https://doi.org/10.3390/app15020630 - 10 Jan 2025
Viewed by 313
Abstract
The electric power industry poses significant risks to workers with a wide range of hazards such as electrocution, electric shock, burns, and falls. Regardless of the types and characteristics of these hazards, electric power companies should protect their workers and provide a safe [...] Read more.
The electric power industry poses significant risks to workers with a wide range of hazards such as electrocution, electric shock, burns, and falls. Regardless of the types and characteristics of these hazards, electric power companies should protect their workers and provide a safe and healthy working environment, but it is difficult to identify the potential health and safety risks present in their workplace and take appropriate action to keep their workers free from harm. Therefore, this paper proposes a novel safety autonomous platform (SAP) for data-driven risk management in the electric power industry. It can automatically and precisely provide a safe and healthy working environment with the cooperation of safety mobility gateways (SMGs) according to the safety rule and risk index data created by the risk level of a current task, a worker profile, and the output of an on-site artificial intelligence (AI) engine in the SMGs. We practically implemented the proposed SAP architecture using the Hadoop ecosystem and verified its feasibility through a performance evaluation of the on-site AI engine and real-time operation of risk assessment and alarm notification for data-driven risk management. Full article
Show Figures

Figure 1

Figure 1
<p>Safety autonomous platform architecture and its overall cooperation with safety mobility gateways on providing data-driven risk management.</p>
Full article ">Figure 2
<p>Data-driven risk management procedure among the safety autonomous platform, safety mobility gateways, supervisors, and workers.</p>
Full article ">Figure 3
<p>On-site AI engine with multimodal ensemble models for risk assessment and alarm notification in safety mobility gateways (SMGs).</p>
Full article ">Figure 4
<p>Estimation of the risk index with the safety rule considering the risk level of a current task, a worker profile, the output of an ensemble model in an on-site AI engine, etc.</p>
Full article ">Figure 5
<p>Experimental results of facial detection with the customized Dlib/CNN model (<b>upper</b>) and anomaly detection of biometric index (BI) data with the customized TadGAN model (<b>lower</b>) that can be applied to ensemble models in an on-site AI engine.</p>
Full article ">Figure 6
<p>Experimental results of object detection with the customized YOLOv7 model applied to ensemble models in an on-site AI engine.</p>
Full article ">Figure 7
<p>Experimental results of data-driven risk management (assessment and alarm notification) between the safety autonomous platform (<b>left</b>) and the supervisor with a tablet PC (<b>right</b>).</p>
Full article ">
20 pages, 6021 KiB  
Article
Heat Stroke Warning System Prototype for Athletes: A Pilot Study
by Kanchana Silawarawet, Phattarakorn Kaewchukul and Sairag Saadprai
Sensors 2025, 25(2), 294; https://doi.org/10.3390/s25020294 - 7 Jan 2025
Viewed by 360
Abstract
This research has developed a heat stroke warning system prototype for athletes utilizing the following sensors: DHT22, GY-906-BAA MLX90614, MAX30102. The device calculates the heat stroke risk and notifies users. The data is recorded, stored, displayed on a free-access website which graphs body [...] Read more.
This research has developed a heat stroke warning system prototype for athletes utilizing the following sensors: DHT22, GY-906-BAA MLX90614, MAX30102. The device calculates the heat stroke risk and notifies users. The data is recorded, stored, displayed on a free-access website which graphs body temperature, ambient temperature, humidity, heart rate and heat stroke risk, and provides notifications for athletes engaged in outdoor activities. The researchers recorded sensors data (n = 1) for two sessions (12 min/session) in a closed room, at the sixth-minute marker, with an air conditioner activated to observe the changes observed by the sensors. For accuracy, the researchers employed Criterion-Related Validity, comparing sensor against standard equipment measurement. For reliability, we utilized Test-Retest Reliability, comparing sensor data from the first and second measurements. Accuracy and reliability were evaluated using the Pearson Correlation Coefficient, with significance set at p < 0.01. The DHT22 sensor demonstrates very high accuracy (r = 0.923) in ambient temperature and (r = 0.774) humidity measurements. It showed no significant reliability (r = 0.489) in temperature and (r = 0.185) humidity measurements. The GY-906-BAA MLX90614 sensor exhibited very high accuracy (r = 0.923) and reliability (r = 0.866) in body temperature measurements. The MAX30102 sensor lacked significant accuracy (r = 0.179) and reliability (r = 0.171) in heart rate measurements. The development of accuracy and reliability of sensors are important for preventing heat stroke in future applications. Full article
(This article belongs to the Section Wearables)
Show Figures

Figure 1

Figure 1
<p>System design overview.</p>
Full article ">Figure 2
<p>The device components.</p>
Full article ">Figure 3
<p>Notification flowchart.</p>
Full article ">Figure 4
<p>Website sitemap.</p>
Full article ">Figure 5
<p>Comparison of ambient temperature measurements: thermometer vs. the DHT22 sensor before calibrating.</p>
Full article ">Figure 6
<p>(<b>a</b>) Temperature measurements after sensor configuration: thermometer vs. adjusted the DHT22 sensor. (<b>b</b>) Comparison of first and second measurements of the DHT22 sensor for temperature measurements.</p>
Full article ">Figure 7
<p>Comparison of humidity measurements: hygrometer vs. the DHT22 sensor.</p>
Full article ">Figure 8
<p>(<b>a</b>) Humidity measurements after sensor configuration: hygrometer vs. adjusted DHT22 sensor. (<b>b</b>) Comparison of first and second measurements of the DHT22 sensor for humidity measurements.</p>
Full article ">Figure 9
<p>(<b>a</b>) Comparison of body temperature measurements: digital thermometer vs. the GY-906-BAA MLX90614 infrared temperature sensor. (<b>b</b>) Comparison of first and second measurements of the GY-906-BAA MLX90614 infrared temperature sensor.</p>
Full article ">Figure 10
<p>(<b>a</b>) Comparison of heart rate measurements: pulse oximeter vs. the MAX30102 heart rate sensor. (<b>b</b>) Comparison of first and second measurements of the MAX30102 heart rate sensor.</p>
Full article ">Figure 11
<p>The risk information page.</p>
Full article ">Figure 12
<p>The display data page.</p>
Full article ">
23 pages, 3687 KiB  
Article
End-to-End Methodology for Predictive Maintenance Based on Fingerprint Routines and Anomaly Detection for Machine Tool Rotary Components
by Amaia Arregi, Aitor Barrutia and Iñigo Bediaga
J. Manuf. Mater. Process. 2025, 9(1), 12; https://doi.org/10.3390/jmmp9010012 - 3 Jan 2025
Viewed by 460
Abstract
This work introduces an end-to-end methodology, from data gathering to fault notification, for the predictive maintenance of rotary components of machine tools. This is done through fingerprint routines; that is, processes that are executed periodically under the same no-load conditions to obtain a [...] Read more.
This work introduces an end-to-end methodology, from data gathering to fault notification, for the predictive maintenance of rotary components of machine tools. This is done through fingerprint routines; that is, processes that are executed periodically under the same no-load conditions to obtain a snapshot of the machine condition. High-frequency vibration data gathered during these routines combined with knowledge about the machine structure and its components are used to obtain failure-specific features. These features are then introduced to an anomaly and paradigm shifts detection algorithm. The method is evaluated through three distinct scenarios. First, we use synthetically generated data to test its ability to detect controlled variations and edge cases. Second, we use with publicly available data obtained from bearing run-to-failure tests under normal load conditions on a specially designed test rig. Finally, the methodology is validated using real-world data collected from a spindle bearing installed in a machine tool. The novelty of this work lies in performing anomaly detection using failure-specific features derived from fingerprint routines, ensuring stability over time and enabling precise identification of machine conditions with minimal data requirements. Full article
(This article belongs to the Special Issue Smart Manufacturing in the Era of Industry 4.0)
Show Figures

Figure 1

Figure 1
<p>Example of a frequency spectrum obtained from the vibration data of a rolling bearing. The red crosses correspond to the amplitude peaks of the frequency associated with the FTF failure and its harmonics.</p>
Full article ">Figure 2
<p>Example diagram of a kinematic chain.</p>
Full article ">Figure 3
<p>Data model schema.</p>
Full article ">Figure 4
<p>Example of a FFT spectrum in velocity, obtained from the vibration data of a rolling bearing. The green bands represent the set <math display="inline"><semantics> <mi mathvariant="script">B</mi> </semantics></math>, i.e., the union of frequency intervals used for the severity computation.</p>
Full article ">Figure 5
<p>Synthetic signal with annotated concept drift points (red lines). The signal is presented in arbitrary units (a.u.).</p>
Full article ">Figure 6
<p>Results obtained using the proposed methodology on the synthetically generated dataset.</p>
Full article ">Figure 7
<p>Evolution of the severity values related to the BPFO failure.</p>
Full article ">Figure 8
<p>Performance comparison between changepoint detection algorithms and our method for cycles 600 to 950.</p>
Full article ">Figure 9
<p>Performance comparison between changepoint detection algorithms and our method for cycles 950 to 984.</p>
Full article ">Figure 10
<p>Spalls on the bearing outer ring, highlighted with white arrows on the left, and wear in one of the bearing balls, marked with a dotted frame on the right.</p>
Full article ">Figure 11
<p>(<b>left</b>) Raw acceleration plot during a FR; (<b>right</b>) raw acceleration plot during a FR (detail).</p>
Full article ">Figure 12
<p>FFTs in velocity (<b>left</b>) and demodulation (<b>right</b>). The data used to calculate these FFTs are the same as in <a href="#jmmp-09-00012-f011" class="html-fig">Figure 11</a>.</p>
Full article ">Figure 13
<p>Evolution of the demodulation spectrum over the time of the NN 3016 KTN/SP bearing. In green, the bands related to the SFF for the BPFO. The amplitudes of the spectrum become higher progressively, indicating that the bearing is deteriorating.</p>
Full article ">Figure 14
<p>Re-stabilization of anomaly detection algorithm. The green dotted lines mark changes in scenario.</p>
Full article ">
16 pages, 3040 KiB  
Article
Sensory Feedback of Grasp Security by Direct Neural Stimulation Improves Amputee Prediction of Object Slip
by Andrew B. Smiles, Eric J. Earley, Ning Jiang and Max Ortiz-Catalan
Prosthesis 2025, 7(1), 3; https://doi.org/10.3390/prosthesis7010003 - 30 Dec 2024
Viewed by 396
Abstract
Background: Prostheses are becoming more advanced and biomimetic with time, providing additional capabilities to their users. However, prosthetic sensation lags far behind its natural limb counterpart, limiting the use of sensory feedback in prosthetic motion planning and execution. Without actionable sensation, prostheses may [...] Read more.
Background: Prostheses are becoming more advanced and biomimetic with time, providing additional capabilities to their users. However, prosthetic sensation lags far behind its natural limb counterpart, limiting the use of sensory feedback in prosthetic motion planning and execution. Without actionable sensation, prostheses may never meet the functional requirements to match biological performance. Methods: We propose an approach for upper limb prosthetic grasp security feedback, delivered to the wearer through direct nerve stimulation proportional to the likelihood of objects slipping from grasp. This proportional feedback is based on a linear regression of the sensors embedded in a prosthetic hand to predict slip before it occurs. Four participants with transhumeral amputation performed pulling tasks with their prosthetic hand grasping an object at predetermined grip forces, attempting to pull the object with as much force as possible without slip. These trials were performed with two different prediction notification paradigms. Results: At lower grasp forces, where slip was more likely, a strong, single impulse notification of impending slip reduced the incidence of object slip by a median of 32%, but the maximum achieved pull forces did not change. At higher grasp forces, where slip was less likely, the maximum achieved pull forces increased by a median of 19% across participants when provided with a stimulation strength inversely proportional to the grasp security, but slip incidence was unchanged. Conclusions: These results suggest that this approach may be effective in recreating a lost sense of grip stability in the missing limb that can be incorporated into motor planning and ultimately prevent unanticipated object slips. Full article
Show Figures

Figure 1

Figure 1
<p>The Ottobock SensorHand Speed system (left) includes sensors measuring normal (light red) and shear loads (dark red) at the tip of the thumb, and joint torque (blue) at the thumb joint. These sensors were used to train a slip predictor model, which was incorporated into the Digital Limb Controller (right) as part of this study to provide grasp security sensory feedback.</p>
Full article ">Figure 2
<p>(<b>a</b>) Training block, (<b>b</b>) trial totem detail [mm], and (<b>c</b>) view of trial totem grasped by prosthetic before a pull attempt.</p>
Full article ">Figure 3
<p>Visual example of relation between normal (<span class="html-italic">y</span>) and shear (<span class="html-italic">z</span>) sensor measurements from prosthetic fingertips and regressor output across grasp and pull movements. (<b>a</b>) Grasping object, (<b>b</b>) neutral grasp, (<b>c</b>) pulling object to right until slip, (<b>d</b>) returning to neutral grasp, (<b>e</b>) pulling object to left until slip, (<b>f</b>) returning to neutral grasp.</p>
Full article ">Figure 4
<p>The experimental setup (above) involved one experimenter connecting the trial totem to different elastic bands to ensure that the participant used their sense of pull force, and not pull distance, during trials. A second experimenter recorded the maximum pull force for each trial. The opaque divider (below) blinded the participant to which elastic was in use and the force results from each trial.</p>
Full article ">Figure 5
<p>Median number of objects that slipped from lower-force grasp (15 N) when participants received <span class="html-italic">spike</span> or <span class="html-italic">amplitude stimulation</span> was reduced by 7.5 and 4.5, respectively, compared to <span class="html-italic">no stimulation</span>. Number of slips generally did not change discernably with higher-force grasp (25N).</p>
Full article ">Figure 6
<p>When pulling objects with a higher-force grasp (25 N), participants were able to impart greater pulling forces with <span class="html-italic">spike</span> and <span class="html-italic">amplitude stimulation</span> compared to <span class="html-italic">no feedback</span>. Only <span class="html-italic">spike stimulation</span> resulted in greater pull forces with a lower-force grasp (15 N). Points represent raw data, boxes represent median and quartiles, and whiskers extend to points within 1.5x the interquartile range.</p>
Full article ">Figure 7
<p>Pull forces were generally higher for high-force grasps (25 N) compared to low-force grasps (15 N), as expected. However, differences in median pull forces were larger when participants received <span class="html-italic">spike</span> or <span class="html-italic">amplitude stimulation</span>, indicating greater understanding of grasp security. Points represent raw data, boxes represent median and quartiles, and whiskers extend to points within 1.5x the interquartile range.</p>
Full article ">
23 pages, 800 KiB  
Article
A Blockchain-Based Protocol for Fair Delivery for Receipts
by M. Francisca Hinarejos, Josep-Lluis Ferrer-Gomila, Andreu-Pere Isern-Deyà and Gerardo-Francisco Chévez-Alvarado
Future Internet 2025, 17(1), 5; https://doi.org/10.3390/fi17010005 - 27 Dec 2024
Viewed by 363
Abstract
Message exchange for acknowledgment of receipt (e.g., for services that provide recipients with certain documents, such as sanctions, summonses, or requirements, which are often sent by public administrations) has traditionally been provided through protocols based on the use of trusted third parties (TTPs). [...] Read more.
Message exchange for acknowledgment of receipt (e.g., for services that provide recipients with certain documents, such as sanctions, summonses, or requirements, which are often sent by public administrations) has traditionally been provided through protocols based on the use of trusted third parties (TTPs). More recently, solutions have been proposed that totally or partially replace the TTP with a blockchain. However, an analysis of these proposals reveals that they have one or more of the following drawbacks: failure to meet confidentiality requirements, the use of TTPs, and susceptibility to attacks that make them unfair. In this paper, we present a method of providing fair delivery for receipts based on a blockchain that does not suffer from the above disadvantages: it is fair and confidential and does not use a TTP. In addition, we demonstrate the feasibility of the protocol through a cost analysis and a proof-of-concept implementation, showing that our solution is more economical than existing solutions, and can be considered cost-effective even under low time requirements. Full article
Show Figures

Figure 1

Figure 1
<p>Block structure: Relevant fields for our scenario.</p>
Full article ">Figure 2
<p>Fair delivery for receipts scenario.</p>
Full article ">Figure 3
<p>Protocol specification.</p>
Full article ">Figure 4
<p><math display="inline"><semantics> <mrow> <mi>A</mi> <mi>c</mi> <mi>c</mi> <mi>e</mi> <mi>p</mi> <mi>t</mi> </mrow> </semantics></math> function input data.</p>
Full article ">Figure 5
<p>Event logs for the <math display="inline"><semantics> <mrow> <mi>A</mi> <mi>c</mi> <mi>c</mi> <mi>e</mi> <mi>p</mi> <mi>t</mi> </mrow> </semantics></math> transaction receipt.</p>
Full article ">Figure 6
<p><math display="inline"><semantics> <mrow> <mi>P</mi> <mi>u</mi> <mi>b</mi> <mi>l</mi> <mi>i</mi> <mi>s</mi> <mi>h</mi> </mrow> </semantics></math> function input data.</p>
Full article ">Figure 7
<p>Event logs for the <math display="inline"><semantics> <mrow> <mi>P</mi> <mi>u</mi> <mi>b</mi> <mi>l</mi> <mi>i</mi> <mi>s</mi> <mi>h</mi> </mrow> </semantics></math> transaction receipt.</p>
Full article ">Figure 8
<p>Gas cost of our solution compared with those of EVM-based solutions without a TTP.</p>
Full article ">Figure 9
<p>Estimated average cost of our solution (measured in USD) in 2024 (from January 2024 to July 2024).</p>
Full article ">Figure 10
<p>Estimated higher cost for minimum delay (measured in USD) in 2024 (from January 2024 to July 2024).</p>
Full article ">
30 pages, 10797 KiB  
Article
Bayesian Inference for Zero-Modified Power Series Regression Models
by Katiane S. Conceição, Marinho G. Andrade, Victor Hugo Lachos and Nalini Ravishanker
Mathematics 2025, 13(1), 60; https://doi.org/10.3390/math13010060 - 27 Dec 2024
Viewed by 601
Abstract
Count data often exhibit discrepancies in the frequencies of zeros, which commonly occur across various application domains. These data may include excess zeros (zero inflation) or, less frequently, a scarcity of zeros (zero deflation). In regression models, both situations can arise at different [...] Read more.
Count data often exhibit discrepancies in the frequencies of zeros, which commonly occur across various application domains. These data may include excess zeros (zero inflation) or, less frequently, a scarcity of zeros (zero deflation). In regression models, both situations can arise at different levels of covariates. The zero-modified power series regression model provides an effective framework for modeling such count data, as it does not require prior knowledge of the type of zero modification, whether zero inflation or zero deflation, and can accommodate overdispersion, equidispersion, or underdispersion present in the data. This paper proposes a Bayesian estimation procedure based on the stochastic gradient Hamiltonian Monte Carlo algorithm, effectively addressing many challenges associated with estimating the model parameters. Additionally, we introduce a measure of Bayesian efficiency to evaluate the impact of prior information on parameter estimation. The practical utility of the proposed method is demonstrated through both simulated and real data across different types of zero modification. Full article
(This article belongs to the Section Probability and Statistics)
Show Figures

Figure 1

Figure 1
<p>The mean <math display="inline"><semantics> <msub> <mi>μ</mi> <mrow> <mi>Z</mi> <mi>M</mi> <mi>N</mi> <mi>B</mi> </mrow> </msub> </semantics></math> (<b>a</b>) and the parameters <span class="html-italic">p</span> (<b>b</b>) fitted according to the MHDI for the 642 municipalities of São Paulo in 2019 and 2020.</p>
Full article ">Figure A1
<p>Bayesian relative efficiency of the ZTP estimation if a Poisson distribution is true: (<b>a</b>) asymptotic BRE (<math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>300</mn> </mrow> </semantics></math>); (<b>b</b>) Sample BRE for <math display="inline"><semantics> <mrow> <mi>β</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math> (<math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>30</mn> </mrow> </semantics></math>); (<b>c</b>) Sample BRE for <math display="inline"><semantics> <mrow> <mi>β</mi> <mo>=</mo> <mn>50</mn> </mrow> </semantics></math> (<math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <mn>30</mn> </mrow> </semantics></math>).</p>
Full article ">Figure A2
<p>Bayesian relative efficiency of the ZTNB estimation for <math display="inline"><semantics> <mi>μ</mi> </semantics></math> if a negative binomial distribution is true: (<b>a</b>) asymptotic BRE (<math display="inline"><semantics> <mi>μ</mi> </semantics></math>); (<b>b</b>) empirical BRE (<math display="inline"><semantics> <mi>μ</mi> </semantics></math>) for <math display="inline"><semantics> <mrow> <mi>β</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>; (<b>c</b>) empirical BRE (<math display="inline"><semantics> <mi>μ</mi> </semantics></math>) for <math display="inline"><semantics> <mrow> <mi>β</mi> <mo>=</mo> <mn>50</mn> </mrow> </semantics></math>.</p>
Full article ">Figure A3
<p>Bayesian relative efficiency of the ZTNB estimation for <math display="inline"><semantics> <mi>ϕ</mi> </semantics></math> in a negative binomial distribution is true: (<b>a</b>) asymptotic BRE(<math display="inline"><semantics> <mi>ϕ</mi> </semantics></math>); (<b>b</b>) empirical BRE(<math display="inline"><semantics> <mi>ϕ</mi> </semantics></math>) for <math display="inline"><semantics> <mrow> <mi>β</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>; (<b>c</b>) empirical BRE(<math display="inline"><semantics> <mi>ϕ</mi> </semantics></math>) for <math display="inline"><semantics> <mrow> <mi mathvariant="bold-italic">β</mi> <mo>=</mo> <mn>50</mn> </mrow> </semantics></math>.</p>
Full article ">Figure A4
<p>Results of the SGHMC algorithm for estimating the parameters of the ZMNB regression model applied to the data of 2019: (<b>a</b>) <math display="inline"><semantics> <mrow> <msub> <mi>β</mi> <mn>1</mn> </msub> <mo>=</mo> <msub> <mi>β</mi> <mrow> <mi>μ</mi> <mo>,</mo> <mn>1</mn> </mrow> </msub> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <msub> <mi>β</mi> <mn>2</mn> </msub> <mo>=</mo> <msub> <mi>β</mi> <mrow> <mi>μ</mi> <mo>,</mo> <mn>2</mn> </mrow> </msub> </mrow> </semantics></math>; (<b>c</b>) <math display="inline"><semantics> <mrow> <msub> <mi>β</mi> <mn>3</mn> </msub> <mo>=</mo> <msub> <mi>β</mi> <mrow> <mi>ω</mi> <mo>,</mo> <mn>1</mn> </mrow> </msub> </mrow> </semantics></math> (<b>d</b>) <math display="inline"><semantics> <mrow> <msub> <mi>β</mi> <mn>4</mn> </msub> <mo>=</mo> <msub> <mi>β</mi> <mrow> <mi>ω</mi> <mo>,</mo> <mn>2</mn> </mrow> </msub> </mrow> </semantics></math>; (<b>e</b>) <math display="inline"><semantics> <mi>ϕ</mi> </semantics></math>.</p>
Full article ">Figure A5
<p>Results of the SGHMC algorithm for estimating the parameters of the ZMNB regression model applied to the data of 2020: (<b>a</b>) <math display="inline"><semantics> <mrow> <msub> <mi>β</mi> <mn>1</mn> </msub> <mo>=</mo> <msub> <mi>β</mi> <mrow> <mi>μ</mi> <mo>,</mo> <mn>1</mn> </mrow> </msub> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <msub> <mi>β</mi> <mn>2</mn> </msub> <mo>=</mo> <msub> <mi>β</mi> <mrow> <mi>μ</mi> <mo>,</mo> <mn>2</mn> </mrow> </msub> </mrow> </semantics></math>; (<b>c</b>) <math display="inline"><semantics> <mrow> <msub> <mi>β</mi> <mn>3</mn> </msub> <mo>=</mo> <msub> <mi>β</mi> <mrow> <mi>ω</mi> <mo>,</mo> <mn>1</mn> </mrow> </msub> </mrow> </semantics></math> (<b>d</b>) <math display="inline"><semantics> <mrow> <msub> <mi>β</mi> <mn>4</mn> </msub> <mo>=</mo> <msub> <mi>β</mi> <mrow> <mi>ω</mi> <mo>,</mo> <mn>2</mn> </mrow> </msub> </mrow> </semantics></math>; (<b>e</b>) <math display="inline"><semantics> <mi>ϕ</mi> </semantics></math>.</p>
Full article ">
26 pages, 6009 KiB  
Article
Enhancing Campus Environment: Real-Time Air Quality Monitoring Through IoT and Web Technologies
by Alfiandi Aulia Rahmadani, Yan Watequlis Syaifudin, Budhy Setiawan, Yohanes Yohanie Fridelin Panduman and Nobuo Funabiki
J. Sens. Actuator Netw. 2025, 14(1), 2; https://doi.org/10.3390/jsan14010002 - 25 Dec 2024
Viewed by 467
Abstract
Nowadays, enhancing campus environments through mitigations of air pollutions is an essential endeavor to support academic achievements, health, and safety of students and staffs in higher educational institutes. In laboratories, pollutants from welding, auto repairs, or chemical experiments can drastically degrade the air [...] Read more.
Nowadays, enhancing campus environments through mitigations of air pollutions is an essential endeavor to support academic achievements, health, and safety of students and staffs in higher educational institutes. In laboratories, pollutants from welding, auto repairs, or chemical experiments can drastically degrade the air quality in the campus, endangering the respiratory and cognitive health of students and staffs. Besides, in universities in Indonesia, automobile emissions of harmful substances such as carbon monoxide (CO), nitrogen dioxide (NO2), and hydrocarbon (HC) have been a serious problem for a long time. Almost everybody is using a motorbike or a car every day in daily life, while the number of students is continuously increasing. However, people in many campuses including managements do not be aware these problems, since air quality is not monitored. In this paper, we present a real-time air quality monitoring system utilizing Internet of Things (IoT) integrated sensors capable of detecting pollutants and measuring environmental conditions to visualize them. By transmitting data to the SEMAR IoT application server platform via an ESP32 microcontroller, this system provides instant alerts through a web application and Telegram notifications when pollutant levels exceed safe thresholds. For evaluations of the proposed system, we adopted three sensors to measure the levels of CO, NO2, and HC and conducted experiments in three sites, namely, Mechatronics Laboratory, Power and Emission Laboratory, and Parking Lot, at the State Polytechnic of Malang, Indonesia. Then, the results reveal Good, Unhealthy, and Dangerous for them, respectively, among the five categories defined by the Indonesian government. The system highlighted its ability to monitor air quality fluctuations, trigger warnings of hazardous conditions, and inform the campus community. The correlation of the sensor levels can identify the relationship of each pollutant, which provides insight into the characteristics of pollutants in a particular scenario. Full article
Show Figures

Figure 1

Figure 1
<p>System architecture for air quality monitoring system.</p>
Full article ">Figure 2
<p>Design overview of SEMAR IoT server platform.</p>
Full article ">Figure 3
<p>Hardware of air quality monitoring system.</p>
Full article ">Figure 4
<p>Web interface example.</p>
Full article ">Figure 5
<p>Data graph interface on <span class="html-italic">SEMAR</span> IoT server platform.</p>
Full article ">Figure 6
<p>Data export interface on <span class="html-italic">SEMAR</span> IoT server platform.</p>
Full article ">Figure 7
<p>Indonesian comparative data by <span class="html-italic">BMKG</span> [<a href="#B50-jsan-14-00002" class="html-bibr">50</a>].</p>
Full article ">Figure 8
<p>Initial system test data as of 2023.</p>
Full article ">Figure 9
<p>Overview and sensor location at <span class="html-italic">Mechatronics Laboratory</span>.</p>
Full article ">Figure 10
<p>Reading data of CO, NO<sub>2</sub>, and HC at <span class="html-italic">Mechatronics Laboratory</span>.</p>
Full article ">Figure 11
<p>Relationships between CO, NO<sub>2</sub>, and HC at <span class="html-italic">Mechatronics Laboratory</span>.</p>
Full article ">Figure 12
<p>Overview and sensor location at <span class="html-italic">Power and Emissions Laboratory</span>.</p>
Full article ">Figure 13
<p>Reading data of CO, NO<sub>2</sub>, and HC at <span class="html-italic">Power and Emissions Laboratory</span>.</p>
Full article ">Figure 14
<p>Relationships between CO, NO<sub>2</sub>, and HC at <span class="html-italic">Power and Emissions Laboratory</span>.</p>
Full article ">Figure 15
<p>Overview and sensor location at <span class="html-italic">Parking Lot</span>.</p>
Full article ">Figure 16
<p>Reading data of CO, NO<sub>2</sub>, and HC at <span class="html-italic">Parking Lot</span>.</p>
Full article ">Figure 17
<p>Relationships between CO, NO<sub>2</sub>, and HC at <span class="html-italic">Parking Lot</span>.</p>
Full article ">
19 pages, 33216 KiB  
Article
System Design for a Prototype Acoustic Network to Deter Avian Pests in Agriculture Fields
by Destiny Kwabla Amenyedzi, Micheline Kazeneza, Ipyana Issah Mwaisekwa, Frederic Nzanywayingoma, Philibert Nsengiyumva, Peace Bamurigire, Emmanuel Ndashimye and Anthony Vodacek
Agriculture 2025, 15(1), 10; https://doi.org/10.3390/agriculture15010010 - 24 Dec 2024
Viewed by 606
Abstract
Crop damage attributed to pest birds is an important problem, particularly in low-income countries. This paper describes a prototype system for pest bird detection using a Conv1D neural network model followed by scaring actions to reduce the presence of pest birds on farms. [...] Read more.
Crop damage attributed to pest birds is an important problem, particularly in low-income countries. This paper describes a prototype system for pest bird detection using a Conv1D neural network model followed by scaring actions to reduce the presence of pest birds on farms. Acoustic recorders were deployed on farms for data collection, supplemented by acoustic libraries. The sounds of pest bird species were identified and labeled. The labeled data were used in Edge Impulse to train a tinyML Conv1D model to detect birds of interest. The model was deployed on Arduino Nano 33 BLE Sense (nodes) and XIAO (Base station) microcontrollers to detect the pest birds, and based on the detection, scaring sounds were played to deter the birds. The model achieved an accuracy of 96.1% during training and 92.99% during testing. The testing F1 score was 0.94, and the ROC score was 0.99, signifying a good discriminatory ability of the model. The prototype was able to make inferences in 53 ms using only 14.8 k of peak RAM and only 43.8 K of flash memory to store the model. Results from the prototype deployment in the field demonstrated successful detection and triggering actions and SMS messaging notifications. Further development of this novel integrated and sustainable solution will add another tool for dealing with pest birds. Full article
(This article belongs to the Special Issue Smart Agriculture Sensors and Monitoring Systems for Field Detection)
Show Figures

Figure 1

Figure 1
<p>(<b>a</b>) Farmhands rattling sounds to repel pest birds from the beans farm at the University of Rwanda-Busogo campus (1°33′42.9″ S, 29°33′12.0″ E). (<b>b</b>) Acoustic monitoring deployment. Photos: D.K. Amenyedzi.</p>
Full article ">Figure 2
<p>Spectrograms illustrating species and environmental sounds. Panels (<b>A</b>–<b>G</b>) are spectrograms for several pest species, namely Chubb’s cisticola, common bulbul, common waxbill, red-billed quelea, village weaver, white-browed robin-chat, and yellow-fronted canary, respectively. Panel (<b>H</b>) is a beneficial bird species, hadada ibis, and panels (<b>I</b>–<b>K</b>) are examples of ambient noise, i.e., car horn, children talking, and rattling sounds, respectively.</p>
Full article ">Figure 3
<p>Visual representation of the same audio in the three feature selection techniques. (<b>a</b>) Spectrogram feature. (<b>b</b>) MFCC feature. (<b>c</b>) MFE feature.</p>
Full article ">Figure 4
<p>Conv1D network architecture.</p>
Full article ">Figure 5
<p>(<b>a</b>) The prototype setup on the PCB board minus speaker. (<b>b</b>) Deployment in the field with solar power to recharge the battery.</p>
Full article ">Figure 6
<p>Prototype system flowchart.</p>
Full article ">Figure 7
<p>Confusion matrix describing the performance of the MFE feature with the best Conv1D model.</p>
Full article ">Figure 8
<p>ROC curve for the MFE feature with the best Conv1D model.</p>
Full article ">Figure 9
<p>On-device result displayed on Arduino IDE serial monitor.</p>
Full article ">Figure 10
<p>Screenshots from a smartphone of SMS messages delivered from the base station and nodes. (<b>a</b>) SMS to the farmer from base station A indicating bird detections. (<b>b</b>) SMS from node B indicating bird detection. (<b>c</b>) SMS to the farmer from node C indicating a security threat.</p>
Full article ">
17 pages, 303 KiB  
Article
Functional Capacity Among Brazilian Older Adults 12 Months After COVID-19 Infection: A Cross-Sectional Study
by Flávia Cristina Sierra de Souza, Carlos Laranjeira, Maria Aparecida Salci, Carla Franciele Höring, Herbert Leopoldo de Freitas Góes, Vanessa Denardi Antoniassi Baldissera, Débora Moura, Viviani Camboin Meireles, Maria Fernanda Prado, Susanne Elero Betiolli, Jesús Puente Alcaraz, Carlos Alexandre Molena Fernandes and Lígia Carreira
J. Clin. Med. 2025, 14(1), 9; https://doi.org/10.3390/jcm14010009 - 24 Dec 2024
Viewed by 376
Abstract
Background/Objectives: Evidence suggests that older adults who survived COVID-19 were exposed to greater functional dependence in their daily living activities. This study aims to examine the prevalence of functional dependence and associated factors among Brazilian older people with functional dependence 12 months after [...] Read more.
Background/Objectives: Evidence suggests that older adults who survived COVID-19 were exposed to greater functional dependence in their daily living activities. This study aims to examine the prevalence of functional dependence and associated factors among Brazilian older people with functional dependence 12 months after COVID-19 infection. Methods: A cross-sectional study was carried out involving people aged 60 years or older in the state of Paraná, Brazil. One year after notification or hospital discharge due to COVID-19, between June 2021 and March 2022, participants responded to a questionnaire via telephone call about sociodemographic data and data on functionality using the Measure of Functional Independence (FIM). The outcome variable “assessment of functional capacity” was divided into functional dependence (FIM Total < 104) and functional independence (FIM Total ≥ 104). Results: A total of 768 older adults participated, with an average age of 68.03 ± 6.8 years (range between 60 and 100). A majority of them were female (50.3%), white (46%), with low education (37.4%), had a partner (56.3%), did not live alone (72.4%), and had their own home (52.2%). The prevalence of functional dependence was 7.2%. On average, participants scored 5.4 points lower on FIM one year after COVID-19 infection compared with those in the acute phase of COVID-19 (125.5 vs. 120.1; p < 0.001). Functional dependence was higher (p < 0.05) among women when compared to men (aOR = 2.28); in people who changed their work situation due to COVID-19 when compared to those with no change (aOR = 5.27); in people with fair/poor/bad self-reported health compared to those with excellent/good health (aOR = 2.97); in people with cardiovascular symptoms compared to those without cardiovascular symptoms (aOR = 3.37); and among the most severe cases of the disease (treatment in ICU) compared to mild cases (outpatient treatment) (aOR = 10.5). Conclusions: Most participants presented functional independence 12 months after COVID-19 infection. Cases of functional dependence were influenced by multidimensional factors, including physical health, economic, and psychosocial aspects. Full article
(This article belongs to the Special Issue Clinical Consequences of COVID-19: 2nd Edition)
15 pages, 3254 KiB  
Article
Mapping Drug-Resistant Tuberculosis Treatment Outcomes in Hunan Province, China
by Temesgen Yihunie Akalu, Archie C. A. Clements, Zuhui Xu, Liqiong Bai and Kefyalew Addis Alene
Trop. Med. Infect. Dis. 2025, 10(1), 3; https://doi.org/10.3390/tropicalmed10010003 - 24 Dec 2024
Viewed by 546
Abstract
Background: Drug-resistant tuberculosis (DR-TB) remains a major public health challenge in China, with varying treatment outcomes across different regions. Understanding the spatial distribution of DR-TB treatment outcomes is crucial for targeted interventions to improve treatment success in high-burden areas such as Hunan Province. [...] Read more.
Background: Drug-resistant tuberculosis (DR-TB) remains a major public health challenge in China, with varying treatment outcomes across different regions. Understanding the spatial distribution of DR-TB treatment outcomes is crucial for targeted interventions to improve treatment success in high-burden areas such as Hunan Province. This study aimed to map the spatial distribution of DR-TB treatment outcomes at a local level and identify sociodemographic and environmental factors associated with poor treatment outcomes in Hunan Province, China. Methods: A spatial analysis was conducted using DR-TB data from the Tuberculosis Control Institute of Hunan Province, covering the years 2013 to 2018. The outcome variable, the proportion of poor treatment outcomes, was defined as a composite measure of treatment failure, death, and loss to follow-up. Sociodemographic, economic, healthcare, and environmental variables were obtained from various sources, including the WorldClim database, the Malaria Atlas Project, and the Hunan Bureau of Statistics. These covariates were linked to a map of Hunan Province and DR-TB notification data using R software version 4.4.0. The spatial clustering of poor treatment outcomes was analyzed using the local Moran’s I and Getis–Ord statistics. A Bayesian logistic regression model was fitted, with the posterior parameters estimated using integrated nested Laplace approximation (INLA). Results: In total, 1381 DR-TB patients were included in the analysis. An overall upward trend in poor DR-TB treatment outcomes was observed, peaking at 14.75% in 2018. Deaths and treatment failures fluctuated over the years, with a notable increase in deaths from 2016 to 2018, while the proportion of patients lost to follow-up significantly declined from 2014 to 2018. The overall proportion of poor treatment outcomes was 9.99% (95% credible interval (CI): 8.46% to 11.70%), with substantial spatial clustering, particularly in Anxiang (50%), Anren (50%), and Chaling (42.86%) counties. The proportion of city-level indicators was significantly associated with higher proportions of poor treatment outcomes (odds ratio (OR): 1.011; 95% CRI: 1.20 December 2024 001–1.035). Conclusions: This study found a concerning increase in poor DR-TB treatment outcomes in Hunan Province, particularly in certain high-risk areas. Targeted public health interventions, including enhanced surveillance, focused healthcare initiatives, and treatment programs, are essential to improve treatment success. Full article
(This article belongs to the Special Issue Emerging and Re-emerging Infectious Diseases and Public Health)
Show Figures

Figure 1

Figure 1
<p>Trend analysis of poor treatment outcomes, deaths, treatment failures, and LTFU among DR-TB patients in Hunan Province, 2013–2018.</p>
Full article ">Figure 2
<p>Spatial distribution of poor treatment outcomes by county in Hunan Province, 2013–2018.</p>
Full article ">Figure 3
<p>Spatial clustering of poor treatment outcomes among DR-TB patients in Hunan Province, 2013–2018, based on the Anselin local Moran’s I.</p>
Full article ">Figure 4
<p>Spatial clustering of poor DR-TB treatment outcomes in Hunan Province, 2013–2018, based on the Getis–Ord G-statistics.</p>
Full article ">Figure 5
<p>Posterior mean of the spatially structured random effects for poor treatment outcomes among drug-resistant tuberculosis patients in Hunan Province, 2013–2018.</p>
Full article ">
22 pages, 698 KiB  
Article
Echoes of the Day: Exploring the Interplay Between Daily Contexts and Smartphone Push Notification Experiences
by Mustafa Can Özdemir, Mati Mottus and David Lamas
Appl. Sci. 2025, 15(1), 14; https://doi.org/10.3390/app15010014 - 24 Dec 2024
Viewed by 387
Abstract
Smartphone push notifications aim to provide time-sensitive information to their users. However, notifications are often transmitted in ill-timed situations, causing users to be interrupted, annoyed, and stressed. This ultimately affects the overall notification experience as it does not consider the external contexts the [...] Read more.
Smartphone push notifications aim to provide time-sensitive information to their users. However, notifications are often transmitted in ill-timed situations, causing users to be interrupted, annoyed, and stressed. This ultimately affects the overall notification experience as it does not consider the external contexts the users are situated in. This study aims to shed light on how users manage notifications in their daily lives and how they perceive the experience as a whole. A total of 28 participants took part in a 5-day mixed-method diary study, which logged a total of 135 entries. Based on this, six types of characteristics emerged. These characteristics were formed from the combination of three main categories: notification related, day related, and user related. The findings of this study highlight implementing different strategies for each type of characteristic to mitigate the adverse effects notifications have on users. Full article
(This article belongs to the Special Issue Advanced Technologies for User-Centered Design and User Experience)
Show Figures

Figure 1

Figure 1
<p>This figure illustrates an organized structure of labels that were acquired from the diary entries; notification-related labels, day characteristics-related labels, user-related labels.</p>
Full article ">Figure 2
<p>Figure of cluster analysis with the formation of 4 clusters.</p>
Full article ">Figure 3
<p>Figure of notification clusters with their corresponding labels.</p>
Full article ">Figure 4
<p>Scale cards distributed among characteristics.</p>
Full article ">Figure 5
<p>Comparison of notification importance versus notification experience.</p>
Full article ">Figure 6
<p>Comparison of perceived notification frequency versus notification experience.</p>
Full article ">Figure 7
<p>Comparison of notification importance versus perceived notification frequency.</p>
Full article ">
16 pages, 785 KiB  
Article
Information and Computing Ecosystem’s Architecture for Monitoring and Forecasting Natural Disasters
by Valeria Gribova and Dmitry Kharitonov
Computers 2024, 13(12), 334; https://doi.org/10.3390/computers13120334 - 13 Dec 2024
Viewed by 472
Abstract
Monitoring natural phenomena using a variety of methods to predict disasters is a trend that is growing over time. However, there is a great disunity among methods and means of data analysis, formats and interfaces of storing and providing data, and software and [...] Read more.
Monitoring natural phenomena using a variety of methods to predict disasters is a trend that is growing over time. However, there is a great disunity among methods and means of data analysis, formats and interfaces of storing and providing data, and software and information systems for data processing. As part of a large project to create a planetary observatory that combines data from spatially distributed geosphere monitoring systems, the efforts of leading institutes of the Russian Academy of Sciences are also aimed at creating an information and computing ecosystem to unite researchers processing and analyzing the data obtained. This article provides a brief overview of the current state of publications on information ecosystems in various applied fields, and it also proposes a concept for an ecosystem on a multiagent basis with unique technical features. The concept of the ecosystem includes the following: the ability to function in a heterogeneous environment on federal principles, the parallelization of data processing between agents using Petri nets as a mechanism ensuring the correct execution of data processing scenarios, the concept of georeferenced alarm events requiring ecosystem reactions and possible notification of responsible persons, and multilevel information protection allowing data owners to control access at each stage of information processing. Full article
(This article belongs to the Section Cloud Continuum and Enabled Applications)
Show Figures

Figure 1

Figure 1
<p>Distribution of user roles according to their activities and ecosystem components.</p>
Full article ">Figure 2
<p>Three-level architecture of ecosystem for natural catastrophic events modeling.</p>
Full article ">Figure 3
<p>Model of certification mechanism in the ecosystem.</p>
Full article ">Figure 4
<p>Performance S3 storage system depending on file size.</p>
Full article ">
13 pages, 2063 KiB  
Article
(Micro)Plastic Foreign Bodies in Food and Feed: Notifications in the European Union
by Joana C. Prata
Microplastics 2024, 3(4), 742-754; https://doi.org/10.3390/microplastics3040046 - 11 Dec 2024
Viewed by 741
Abstract
Plastic particles, including microplastics, are increasingly common contaminants of the food chain, raising concerns over human health effects. The objective of this work was to contribute to a better understanding of their presence in food and feed based on notifications of plastic foreign [...] Read more.
Plastic particles, including microplastics, are increasingly common contaminants of the food chain, raising concerns over human health effects. The objective of this work was to contribute to a better understanding of their presence in food and feed based on notifications of plastic foreign bodies in the Rapid Alert System for Food and Feed (RASFF) of the European Union. Visible plastics accounted for 25 notifications per year from 2020 to 2023 (four years), becoming the third most common foreign body after glass and metal. Contamination is likely to originate during processing and packaging. Even though these results confirm the presence of plastics in the European food chain, notifications provide limited information and only visible particles may be reported. Regulations must establish active monitoring and limits for plastic particles in foods and feeds (e.g., in an amendment to Commission Regulation (EC) no. 1881/2006), including for smaller particle sizes (i.e., microplastics). However, the establishment of regulations is limited by knowledge gaps in analytical methods, foodstuff contamination, and toxicity. Research studies should prioritize knowledge gaps needed to support regulatory action and, ultimately, human health protection. Full article
(This article belongs to the Collection Current Opinion in Microplastics)
Show Figures

Figure 1

Figure 1
<p>Percentage of notifications of foreign bodies attributed to each class of the foreign body per year, from 2020 to 2023, and the four-year total average.</p>
Full article ">Figure 2
<p>Categories of products for which plastic particles were reported: (<b>a</b>) the number of notifications per food category; (<b>b</b>) the percentage of plastics in the total of foreign bodies notified for each food category.</p>
Full article ">Figure 3
<p>The detailed report of food products for which plastics foreign bodies have been reported in the European Union from 2020 to 2023. The less reported categories are, from left to right, pet food, ices and desserts, herbs and spices, and food additives and flavorings.</p>
Full article ">Figure A1
<p>The map of countries with the most frequent notifications for plastics as foreign bodies in food. The map was created in Datawrapper (<a href="https://datawrapper.de" target="_blank">https://datawrapper.de</a>, accessed 14 November 2024) using five linear (equidistant) categories for numerical data.</p>
Full article ">
13 pages, 2146 KiB  
Article
Developing an Alert System for Agricultural Protection: Sika Deer Detection Using Raspberry Pi
by Sandhya Sharma, Buchaputara Pansri, Suresh Timilsina, Bishnu Prasad Gautam, Yoshifumi Okada, Shinya Watanabe, Satoshi Kondo and Kazuhiko Sato
Electronics 2024, 13(23), 4852; https://doi.org/10.3390/electronics13234852 - 9 Dec 2024
Viewed by 565
Abstract
Agricultural loss due to the overpopulation of Sika deer poses a significant challenge in Japan, leading to frequent human–wildlife conflicts. We conducted a study in Muroran, Hokkaido (42°22′56.1″ N–141°01′51.5″ E), with the objective of monitoring Sika deer and notifying farmers and locals. We [...] Read more.
Agricultural loss due to the overpopulation of Sika deer poses a significant challenge in Japan, leading to frequent human–wildlife conflicts. We conducted a study in Muroran, Hokkaido (42°22′56.1″ N–141°01′51.5″ E), with the objective of monitoring Sika deer and notifying farmers and locals. We deployed a Sika deer detection model (YOLOv8-nano) on a Raspberry Pi, integrated with an infrared camera that captured images only when a PIR sensor was triggered. To further understand the timing of Sika deer visits and potential correlations with environmental temperature and humidity, respective sensors were installed on Raspberry Pi and the data were analyzed using an ANOVA test. In addition, a buzzer was deployed to deter Sika deer from the study area. The buzzer was deactivated in the first 10 days after deployment and was activated in the following 20 days. The Sika deer detection model demonstrated excellent performance, with precision and recall values approaching 1, and a bounding box creation latency of 0.82 frames per second. Once a bounding box was established after Sika deer detection, alert notifications were automatically sent via email and the LINE messaging application, with an average notification time of 0.32 s. Regarding the buzzer’s impact on Sika deer, 35% of the detected individuals reacted by standing upright with alert ears, while 65% immediately fled the area. Analysis revealed that the time of day for Sika deer visits was significantly correlated with humidity (F = 8.95, p < 0.05), but no significant association with temperature (F = 0.681, p > 0.05). These findings represent a significant step toward mitigating human–wildlife conflicts and reducing agricultural production losses through effective conservation measures. Full article
Show Figures

Figure 1

Figure 1
<p>Visualization of the research motivation.</p>
Full article ">Figure 2
<p>Circuit diagram for Raspberry Pi-based Sika deer monitoring and alert system.</p>
Full article ">Figure 3
<p>Workflow illustrating Sika deer real-time detection and alert mechanism.</p>
Full article ">Figure 4
<p>Components connected to the Raspberry Pi for Sika deer detection in the field: (<b>a</b>) external components housed inside a plastic box; (<b>b</b>) sensors, camera, and switch positioned outside the plastic box; (<b>c</b>) solar panel providing a continuous power supply; and (<b>d</b>) Raspberry Pi with components enclosed in a plastic box alongside a solar panel installed in the study field.</p>
Full article ">Figure 5
<p>Curves representing box and class loss for training and validation datasets.</p>
Full article ">Figure 6
<p>Performance metrics across multiple epochs.</p>
Full article ">Figure 7
<p>The number of herds observed daily before the buzzer activation was recorded. Day 1 represented the first day without the buzzer activation on the Raspberry Pi, followed by subsequent days.</p>
Full article ">Figure 8
<p>Images of individual Sika deer within each herd: (<b>a</b>) Herd 1, consisting of three individual Sika deer; and (<b>b</b>) Herd 2, consisting of two individual Sika deer.</p>
Full article ">Figure 9
<p>Visualization of alert mechanisms following Sika deer detection in captured images: (<b>a</b>) identification of Sika deer using bounding boxes in captured images; (<b>b</b>) alert notification via email; (<b>c</b>) alert notification through LINE application; and (<b>d</b>) analysis of Sika deer behavior following buzzer activation.</p>
Full article ">Figure 10
<p>Herd observations recorded at different times throughout the day, along with environmental temperature and humidity, after buzzer activation. The term “Day” refers to the number of days since the buzzer was activated; for example, “Day 1” indicates the first day after activation, “Day 4” refers to the fourth day, and so forth. The visualization only includes days when herds of Sika deer were observed, excluding days without any sightings.</p>
Full article ">
Back to TopTop