[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (112)

Search Parameters:
Keywords = sandbox

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
13 pages, 3676 KiB  
Article
Three-Dimensional Modelling Approach for Low Angle Normal Faults in Southern Italy: The Need for 3D Analysis
by Asha Saxena, Giovanni Toscani, Lorenzo Bonini and Silvio Seno
Geosciences 2025, 15(2), 53; https://doi.org/10.3390/geosciences15020053 - 5 Feb 2025
Abstract
This paper presents three 3D reconstructions of different analogue models used to reproduce, interpret, and describe the geological setting of a seismogenic area in Southern Italy—the Messina Strait. Three-dimensional analysis is a technique that allows for less sparse and more congruent and coherent [...] Read more.
This paper presents three 3D reconstructions of different analogue models used to reproduce, interpret, and describe the geological setting of a seismogenic area in Southern Italy—the Messina Strait. Three-dimensional analysis is a technique that allows for less sparse and more congruent and coherent information about a study zone whose complete understanding reduces uncertainties and risks. A thorough structural and geodynamic description of the effects of low-angle normal faulting in the same region through analogue models has been widely investigated in the scientific literature. Sandbox models for fault behaviour during deformation and the effects of a Low Angle Normal Fault (LANF) on the seismotectonic setting are also studied. The deformational patterns associated with seismogenic faults, rotational behaviour of faults, and other related problems have not yet been thoroughly analysed. Most problems, like the evolution of normal faults, fault geometry, and others, have been cited and briefly outlined in earlier published works, but a three-dimensional approach is still significant. Here, we carried out a three-dimensional digital model for a complete and continuous structural model of a debated, studied area. The aim of this study is to highlight the importance of fully representing faults in complex and/or non-cylindrical structures, mainly when the shape and dimensions of the fault(s) are key parameters, like in seismogenic contexts. Full article
Show Figures

Figure 1

Figure 1
<p>Schematic map of Messina Strait showing different faults detected by various authors. The Inset map shows the location of the study area (adapted from [<a href="#B8-geosciences-15-00053" class="html-bibr">8</a>]).</p>
Full article ">Figure 2
<p>Three-dimensional model of sandbox experiment with (<b>a</b>) geographic references of the study area and (<b>b</b>) topographic surface showing the position of central graben with respect to the fault plane. The mobile wall is moving outside in different stages (0.5, 2.0, and 3.5 cm extension along the fault plane) of the experiment in the arrow direction to induce extension.</p>
Full article ">Figure 3
<p>Generation of different faults (F1 to F10) and topographic surfaces; (<b>a</b>–<b>c</b>) Development of different faults in different experiment stages showing the position of internal sections at 20, 40, and 60 cm (traces in the picture). Internal sections are 2 cm spaced, (<b>d</b>–<b>f</b>) Topographic surfaces with contour lines. The maximum depth of the central graben is −0.2 cm in MS-1, −1.2 cm in MS-2 and −2.2 cm in MS-3.</p>
Full article ">Figure 4
<p>Automatic construction of the cut-off lines on the fault plane (red surface) carried out using Move suite (PE Limited) software. (<b>a</b>,<b>b</b>) provide two different views of the fault plane where the footwall and hanging wall cut-off lines can be projected and the strike displacement variations are easily detectable.</p>
Full article ">Figure 5
<p>Binary graphs showing displacement with respect to the total amount of extension (in cm). The X-axis is relative to the dimensions of the models; the Y-axis shows the displacement along the fault plane. All models MS-1, MS-2, and MS-3 exhibit quasi-elliptical shapes for slip distribution. MS-3 has the deepest graben and, accordingly, it has the highest displacement among the others.</p>
Full article ">
24 pages, 1875 KiB  
Article
A Scalable Fog Computing Solution for Industrial Predictive Maintenance and Customization
by Pietro D’Agostino, Massimo Violante and Gianpaolo Macario
Electronics 2025, 14(1), 24; https://doi.org/10.3390/electronics14010024 - 25 Dec 2024
Viewed by 597
Abstract
This study presents a predictive maintenance system designed for industrial Internet of Things (IoT) environments, focusing on resource efficiency and adaptability. The system utilizes Nicla Sense ME sensors, a Raspberry Pi-based concentrator for real-time monitoring, and a Long Short-Term Memory (LSTM) machine-learning model [...] Read more.
This study presents a predictive maintenance system designed for industrial Internet of Things (IoT) environments, focusing on resource efficiency and adaptability. The system utilizes Nicla Sense ME sensors, a Raspberry Pi-based concentrator for real-time monitoring, and a Long Short-Term Memory (LSTM) machine-learning model for predictive analysis. Notably, the LSTM algorithm is an example of how the system’s sandbox environment can be used, allowing external users to easily integrate custom models without altering the core platform. In the laboratory, the system achieved a Root Mean Squared Error (RMSE) of 0.0156, with high accuracy across all sensors, detecting intentional anomalies with a 99.81% accuracy rate. In the real-world phase, the system maintained robust performance, with sensors recording a maximum Mean Absolute Error (MAE) of 0.1821, an R-squared value of 0.8898, and a Mean Absolute Percentage Error (MAPE) of 0.72%, demonstrating precision even in the presence of environmental interferences. Additionally, the architecture supports scalability, accommodating up to 64 sensor nodes without compromising performance. The sandbox environment enhances the platform’s versatility, enabling customization for diverse industrial applications. The results highlight the significant benefits of predictive maintenance in industrial contexts, including reduced downtime, optimized resource use, and improved operational efficiency. These findings underscore the potential of integrating Artificial Intelligence (AI) driven predictive maintenance into constrained environments, offering a reliable solution for dynamic, real-time industrial operations. Full article
Show Figures

Figure 1

Figure 1
<p>Fog computing architecture [<a href="#B11-electronics-14-00024" class="html-bibr">11</a>].</p>
Full article ">Figure 2
<p>The native system of the concentrator, without the sandbox.</p>
Full article ">Figure 3
<p>Functions of the native system of the concentrator, without the sandbox.</p>
Full article ">Figure 4
<p>Flowchart of the LSTM algorithm.</p>
Full article ">Figure 5
<p>The architecture of the experiment, in which the elaboration part is done by the sandbox (container host).</p>
Full article ">Figure 6
<p>Flowchart of the experiment.</p>
Full article ">Figure 7
<p>Mean square error of laboratory results (logarithmic scale).</p>
Full article ">Figure 8
<p>Image of the sensor NODE_13 mounted on the machine, head 13.</p>
Full article ">Figure 9
<p>Mean square error of real machine results (logarithmic scale).</p>
Full article ">Figure 10
<p>Example of temperatures and their values predicted.</p>
Full article ">
17 pages, 4629 KiB  
Article
A Framework for Optimizing Deep Learning-Based Lane Detection and Steering for Autonomous Driving
by Daniel Yordanov, Ashim Chakraborty, Md Mahmudul Hasan and Silvia Cirstea
Sensors 2024, 24(24), 8099; https://doi.org/10.3390/s24248099 - 19 Dec 2024
Viewed by 785
Abstract
Improving the ability of autonomous vehicles to accurately identify and follow lanes in various contexts is crucial. This project aims to provide a novel framework for optimizing a self-driving vehicle that can detect lanes and steer accordingly. A virtual sandbox environment was developed [...] Read more.
Improving the ability of autonomous vehicles to accurately identify and follow lanes in various contexts is crucial. This project aims to provide a novel framework for optimizing a self-driving vehicle that can detect lanes and steer accordingly. A virtual sandbox environment was developed in Unity3D that provides a semi-automated procedural road and driving generation framework for a variety of road scenarios. Four types of segments replicate actual driving situations by directing the car using strategically positioned waypoints. A training dataset thus generated was used to train a behavioral driving model that employs a convolutional neural network to detect the lane and ensure that the car steers autonomously to remain within lane boundaries. The model was evaluated on real-world driving footage from Comma.ai, exhibiting an autonomy of 77% in low challenge road conditions and of 66% on roads with sharper turns. Full article
(This article belongs to the Special Issue Advances in Sensing, Imaging and Computing for Autonomous Driving)
Show Figures

Figure 1

Figure 1
<p>Step-by-step methodology of the project. (In the validation image, red lines represent detected lane boundaries, the blue line shows the road’s central alignment, and the green line indicates the vehicle’s projected path).</p>
Full article ">Figure 2
<p>Depiction of a Chunk 1 driving scenario with multiple lanes and driving in both directions.</p>
Full article ">Figure 3
<p>Road scenario with ambiguous lane demarcations (Chunk 2).</p>
Full article ">Figure 4
<p>Highway environment featuring three lanes in each direction (Chunk 3).</p>
Full article ">Figure 5
<p>Chunk 4—A driving scenario on a three-lane highway environment similar to Chunk 3. The vehicle travels in the innermost lane, encountering diverse turn angles to enrich model training complexity and the diversity of the driving experience.</p>
Full article ">Figure 6
<p>Depiction of vehicle following set waypoints path.</p>
Full article ">Figure 7
<p>The distribution of steering angles from the collected dataset.</p>
Full article ">Figure 8
<p>Distribution of steering angles in the dataset after conducting the balancing using threshold method.</p>
Full article ">Figure 9
<p>Overview of the data augmentation techniques applied.</p>
Full article ">Figure 10
<p>Road view before and after pre-processing.</p>
Full article ">Figure 11
<p>CNN architecture.</p>
Full article ">Figure 12
<p>Lane detection workflow. (Bottom image at the right hand side: red lines represent detected lane boundaries, the blue line shows the road’s central alignment, and the green line indicates the vehicle’s projected path).</p>
Full article ">Figure 13
<p>Comparison between the steering angle the real driver (blue) and the predicted steering angle (red) generated by the proposed CNN model from the road footage for evaluation scenario (i).</p>
Full article ">Figure 14
<p>The histogram of position centrality precision generated by the proposed CNN model from real-world driving footage (evaluation scenario (i)).</p>
Full article ">Figure 15
<p>Comparison between the steering angle the real driver (blue) and the predicted steering angle (red) generated by the proposed CNN model from the road footage for evaluation scenario (ii).</p>
Full article ">Figure 16
<p>The histogram of position centrality precision generated by the proposed CNN model from real-world driving footage (evaluation scenario (ii)).</p>
Full article ">
22 pages, 5047 KiB  
Article
Attention-Based Malware Detection Model by Visualizing Latent Features Through Dynamic Residual Kernel Network
by Mainak Basak, Dong-Wook Kim, Myung-Mook Han and Gun-Yoon Shin
Sensors 2024, 24(24), 7953; https://doi.org/10.3390/s24247953 - 12 Dec 2024
Viewed by 724
Abstract
In recent years, significant research has been directed towards the taxonomy of malware variants. Nevertheless, certain challenges persist, including the inadequate accuracy of sample classification within similar malware families, elevated false-negative rates, and significant processing time and resource consumption. Malware developers have effectively [...] Read more.
In recent years, significant research has been directed towards the taxonomy of malware variants. Nevertheless, certain challenges persist, including the inadequate accuracy of sample classification within similar malware families, elevated false-negative rates, and significant processing time and resource consumption. Malware developers have effectively evaded signature-based detection methods. The predominant static analysis methodologies employ algorithms to convert the files. The analytic process is contingent upon the tool’s functionality; if the tool malfunctions, the entire process is obstructed. Most dynamic analysis methods necessitate the execution of a binary file within a sandboxed environment to examine its behavior. When executed within a virtual environment, the detrimental actions of the file might be easily concealed. This research examined a novel method for depicting malware as images. Subsequently, we trained a classifier to categorize new malware files into their respective classifications utilizing established neural network methodologies for detecting malware images. Through the process of transforming the file into an image representation, we have made our analytical procedure independent of any software, and it has also become more effective. To counter such adversaries, we employ a recognized technique called involution to extract location-specific and channel-agnostic features of malware data, utilizing a deep residual block. The proposed approach achieved remarkable accuracy of 99.5%, representing an absolute improvement of 95.65% over the equal probability benchmark. Full article
Show Figures

Figure 1

Figure 1
<p>Distribution of malware families in the dataset used for the study.</p>
Full article ">Figure 2
<p>Illustration of the dynamic kernel generation.</p>
Full article ">Figure 3
<p>Distribution of malware family percentage in the dataset.</p>
Full article ">Figure 4
<p>Schematic diagram of the binary to image conversion.</p>
Full article ">Figure 5
<p>Overview representation of the proposed model.</p>
Full article ">Figure 6
<p>Overview of the proposed DRIN architecture: (<b>a</b>) illustrates the overall pyramidal structure of feature flow extraction module; (<b>b</b>) depicts the bottleneck block; (<b>c</b>) illustrates the modified residual kernel (RI-block).</p>
Full article ">Figure 7
<p>Construction of bottleneck of residual blocks. (<b>a</b>) Basic R-block; (<b>b</b>) RI block.</p>
Full article ">Figure 8
<p>Comparison of accuracy and loss metrics between traditional methods [<a href="#B38-sensors-24-07953" class="html-bibr">38</a>,<a href="#B39-sensors-24-07953" class="html-bibr">39</a>,<a href="#B40-sensors-24-07953" class="html-bibr">40</a>,<a href="#B41-sensors-24-07953" class="html-bibr">41</a>] and the proposed model.</p>
Full article ">Figure 9
<p>Accuracy graph of training, validation and test set over multi-class detection module.</p>
Full article ">Figure 10
<p>Confusion matrix of multi-class classification.</p>
Full article ">Figure 11
<p>Multi-class ROC of proposed network.</p>
Full article ">Figure 12
<p>Heatmap representation showing kernel activations.</p>
Full article ">
20 pages, 2824 KiB  
Article
Hydrakon, a Framework for Measuring Indicators of Deception in Emulated Monitoring Systems
by Kon Papazis and Naveen Chilamkurti
Future Internet 2024, 16(12), 455; https://doi.org/10.3390/fi16120455 - 4 Dec 2024
Viewed by 604
Abstract
The current cybersecurity ecosystem is proving insufficient in today’s increasingly sophisticated cyber attacks. Malware authors and intruders have pursued innovative avenues to circumvent emulated monitoring systems (EMSs) such as honeypots, virtual machines, sandboxes and debuggers to continue with their malicious activities while remaining [...] Read more.
The current cybersecurity ecosystem is proving insufficient in today’s increasingly sophisticated cyber attacks. Malware authors and intruders have pursued innovative avenues to circumvent emulated monitoring systems (EMSs) such as honeypots, virtual machines, sandboxes and debuggers to continue with their malicious activities while remaining inconspicuous. Cybercriminals are improving their ability to detect EMS, by finding indicators of deception (IoDs) to expose their presence and avoid detection. It is proving a challenge for security analysts to deploy and manage EMS to evaluate their deceptive capability. In this paper, we introduce the Hydrakon framework, which is composed of an EMS controller and several Linux and Windows 10 clients. The EMS controller automates the deployment and management of the clients and EMS for the purpose of measuring EMS deceptive capabilities. Experiments were conducted by applying custom detection vectors to client real machines, virtual machines and sandboxes, where various artifacts were extracted and stored as csv files on the EMS controller. The experiment leverages the cosine similarity metric to compare and identify similar artifacts between a real system and a virtual machine or sandbox. Our results show that Hydrakon offers a valid approach to assess the deceptive capabilities of EMS without the need to target specific IoD within the target system, thereby fostering more robust and effective emulated monitoring systems. Full article
Show Figures

Figure 1

Figure 1
<p>Hydrakon architecture containing several components and modules.</p>
Full article ">Figure 2
<p>Workflow cloning and deploying clients via FOG server.</p>
Full article ">Figure 3
<p>EMS controller main menu.</p>
Full article ">Figure 4
<p>EMS threat evasion model encapsulating the distinction of evasive vectors applied to indicators of deception to a given EMS security tool.</p>
Full article ">Figure 5
<p>EMS threat evasion methodology showing the phases involved in evaluating an EMS security tool’s deceptive nature.</p>
Full article ">Figure 6
<p>EMS evasive vectors workflow to evaluate the similarity of target systems using cosine similarity.</p>
Full article ">Figure 7
<p>Display cosine similarity of bare metal, virtual machine and sandbox artifacts in graph format.</p>
Full article ">
20 pages, 5123 KiB  
Article
Research on the Patterns of Seawater Intrusion in Coastal Aquifers Induced by Sea Level Rise Under the Influence of Multiple Factors
by Xinzhe Cao, Qiaona Guo and Wenheng Liu
Water 2024, 16(23), 3457; https://doi.org/10.3390/w16233457 - 1 Dec 2024
Viewed by 814
Abstract
In the context of global warming, rising sea levels are intensifying seawater intrusion in coastal areas. Due to the complex hydrodynamic conditions and increasing groundwater over-extraction in these regions, understanding the patterns of seawater intrusion is crucial for effective prevention and control. This [...] Read more.
In the context of global warming, rising sea levels are intensifying seawater intrusion in coastal areas. Due to the complex hydrodynamic conditions and increasing groundwater over-extraction in these regions, understanding the patterns of seawater intrusion is crucial for effective prevention and control. This study employed a sandbox model to investigate both vertical and horizontal seawater intrusion into a coastal unconfined aquifer with an impermeable dam under varying conditions of sea level rise, coastal slope, and groundwater pumping rate. Additionally, a two-dimensional SEAWAT model was developed to simulate seawater intrusion under these experimental conditions. The results indicate that sea level rise significantly increases the extent and intensity of seawater intrusion. When sea level rises by 3.5 cm, 4.5 cm, and 5.5 cm, the areas of the saline wedge reached 362 cm2, 852 cm2, and 1240 cm2, respectively, with both horizontal and vertical intrusion ranges expanding considerably. When groundwater extraction is superimposed, vertical seawater intrusion is notably intensified. At an extraction rate of 225 cm3/min, the vertical intrusion areas corresponding to sea level rises of 3.5 cm, 4.5 cm, and 5.5 cm were 495 cm2, 1035 cm2, and 1748 cm2, respectively, showing significant expansion, and this expansion becomes more pronounced as sea levels rise. In contrast, slope variations had a significant impact only on vertical seawater intrusion. As the slope decreased from tanα = 1/5 to tanα = 1/9, the upper saline wedge area expanded from 525 cm2 to 846 cm2, considerably increasing the vertical intrusion range. Finally, the combined effects of groundwater extraction and sea level rise exacerbate seawater intrusion more severely than either factor alone, presenting greater challenges for coastal water resource management. Full article
(This article belongs to the Section Oceans and Coastal Zones)
Show Figures

Figure 1

Figure 1
<p>Schematic representation of seawater intrusion in sandbox model.</p>
Full article ">Figure 2
<p>Real-life sandbox configuration for simulating seawater intrusion.</p>
Full article ">Figure 3
<p>Experimental and simulated steady-state salinity distributions in the sand tank.</p>
Full article ">Figure 4
<p>Temporal variation in saltwater wedge length in steady-state experiment.</p>
Full article ">Figure 5
<p>Salinity variation at coordinate (50, 20) (50, 40) (75, 20) (100, 1) in numerical simulation.</p>
Full article ">Figure 6
<p>Temporal variation in saltwater wedge length in steady-state experiment.</p>
Full article ">Figure 7
<p>Temporal variation in saltwater wedge length in steady-state experiment.</p>
Full article ">Figure 8
<p>Temporal variation in saltwater wedge length under different sea-level rise scenarios without groundwater extraction. Based on experiment group A in <a href="#water-16-03457-f007" class="html-fig">Figure 7</a>.</p>
Full article ">Figure 9
<p>Temporal variation of saltwater wedge length under different sea-level rise scenarios with groundwater extraction. Based on experiment group B in <a href="#water-16-03457-f007" class="html-fig">Figure 7</a>.</p>
Full article ">Figure 10
<p>Comparison of upper saltwater wedge area under different coastal slopes and pumping conditions over time, based on experiment groups C and D in <a href="#water-16-03457-f007" class="html-fig">Figure 7</a>.</p>
Full article ">Figure 11
<p>Comparison of upper saltwater wedge length and height under different coastal slopes over time without groundwater extraction, based on experiment group C in <a href="#water-16-03457-f007" class="html-fig">Figure 7</a>.</p>
Full article ">Figure 12
<p>Comparison of upper saltwater wedge length and height under different coastal slopes over time with groundwater extraction. Based on experiment group D in <a href="#water-16-03457-f007" class="html-fig">Figure 7</a>.</p>
Full article ">Figure 13
<p>Impact of pumping rates on vertical seawater intrusion area over time, based on experiment group D in <a href="#water-16-03457-f007" class="html-fig">Figure 7</a>.</p>
Full article ">Figure 14
<p>Temporal variation in horizontal seawater intrusion length under different pumping rates, based on experiment group D in <a href="#water-16-03457-f007" class="html-fig">Figure 7</a>.</p>
Full article ">
22 pages, 12163 KiB  
Article
Assessing the Use of Electrical Resistivity for Monitoring Crude Oil Contaminant Distribution in Unsaturated Coastal Sands Under Varying Salinity
by Margaret A. Adeniran, Michael A. Oladunjoye and Kennedy O. Doro
Geosciences 2024, 14(11), 308; https://doi.org/10.3390/geosciences14110308 - 14 Nov 2024
Viewed by 986
Abstract
Monitoring crude oil spills in coastal areas is challenging due to limitations in traditional in situ methods. Electrical resistivity imaging (ERI) offers a high-resolution approach to monitoring the subsurface spatial distribution of crude oil, but its effectiveness in highly-resistive, unsaturated coastal sands with [...] Read more.
Monitoring crude oil spills in coastal areas is challenging due to limitations in traditional in situ methods. Electrical resistivity imaging (ERI) offers a high-resolution approach to monitoring the subsurface spatial distribution of crude oil, but its effectiveness in highly-resistive, unsaturated coastal sands with varying salinity remains unexplored. This study assessed the effectiveness of ERI for monitoring crude oil spills in sandy soil using a 200 × 60 × 60 cm 3D sandbox filled with medium-fine-grained sand under unsaturated conditions. Two liters of crude oil were spilled under controlled conditions and monitored for 48 h using two surface ERI transects with 98 electrodes spaced every 2 cm and a dipole–dipole electrode array. The influence of varying salinity was simulated by varying the pore-fluid conductivities at four levels (0.6, 20, 50, and 85 mS/cm). After 48 h, the results show a percentage resistivity increase of 980%, 280%, 142%, and 70% for 0.6, 20, 50, and 85 mS/cm, respectively. The crude oil migration patterns varied with porewater salinity as higher salinity enhanced the crude oil retention at shallow depth. High salinity produces a smaller resistivity contrast, thus limiting the sensitivity of ERI in detecting the crude oil contaminant. These findings underscore the need to account for salinity variations when designing remediation strategies, as elevated salinity may restrict crude oil migration, resulting in localized contaminations. Full article
(This article belongs to the Section Geophysics)
Show Figures

Figure 1

Figure 1
<p>(<b>a</b>) Experimental design of the sandbox showing an inflow and outflow chamber on the left and right sides; (<b>b</b>) Laboratory setup of the sandbox and the geophysical measurements with the cables connected to 98 electrodes. The electrodes are spaced 2 cm apart along a 198 cm profile length.</p>
Full article ">Figure 2
<p>Two-dimensional resistivity inversion results for (<b>a</b>) unsaturated sand with a concentration of (0.6 mS/cm), iteration no. = 3, RMS = 1.12; (<b>b</b>) unsaturated salt-impacted sand with a concentration of (20 mS/cm), iteration no. = 3, RMS = 1; and (<b>c</b>) unsaturated salt-impacted sand with a concentration of (50 mS/cm), iteration no. = 3, RMS = 1.2; (<b>d</b>) unsaturated salt-impacted sand with concentration of (85 mS/cm), iteration no = 3, RMS = 1.5.</p>
Full article ">Figure 3
<p>Two-dimensional resistivity inversion result taken across Profile 1 and Profile 2 for unsaturated sand during the crude oil spillage experiment. Five separate measurements were taken at different times for over 49.15 h using the dipole–dipole array. The red box at the top of the profile shows the crude oil spill surface location between x = 60 cm and x = 75 cm. The white-dashed lines show the left and right boundaries of the crude oil contaminant front.</p>
Full article ">Figure 4
<p>Two-dimensional resistivity inversion results across Profiles 1 and 2 for unsaturated salt-impacted sand with a salinity of 20 mS/cm during the crude oil spill experiment. Five separate measurements were taken at different times for over 49.15 h using the dipole–dipole array. The red box at the top of the profiles show the crude oil spill surface location between x = 60 cm and x = 75 cm. The white-dashed lines show the left and right boundaries of the crude oil contaminant front.</p>
Full article ">Figure 5
<p>Two-dimensional resistivity inversion results taken across Profiles 1 and 2 for unsaturated salt-impacted sand with a salt concentration of 50 mS/cm during the crude oil spill experiment. Five separate measurements were taken at different times for over 49.15 h using a dipole–dipole array. The red box at the top of the profile shows the crude oil spill surface location between x = 60 cm and x = 75 cm. The white-dashed lines show the left and right boundaries of the crude oil contaminant front.</p>
Full article ">Figure 6
<p>Two-dimensional resistivity inversion results taken across Profiles 1 and 2 for unsaturated salt-impacted sand with a salt concentration of 85 mS/cm during the crude oil spill experiment. Five separate measurements were taken at different times for over 49.15 h using a dipole–dipole array. The red box at the top of the profile shows the crude oil spill surface location between x = 60 cm and x = 75 cm. The white-dashed lines show the left and right boundaries of the crude oil contaminant front.</p>
Full article ">Figure 7
<p>Two-dimensional time-lapse inversion results showing the percentage difference in an unsaturated sand with 0.6 mS/cm concentration, from 0 h to 49.15 h using a dipole–dipole array. The red box at the top of the profile shows the crude oil spill surface location between x = 60 cm and x = 75 cm.</p>
Full article ">Figure 8
<p>Two-dimensional time-lapse inversion results showing the percentage difference in an unsaturated salt-impacted sand with salt concentration of 20 mS/cm from 0 h to 49.15 h using a dipole–dipole array. The red box at the top of the profile shows the crude oil spill surface location between x = 60 cm and x = 75 cm.</p>
Full article ">Figure 9
<p>Two-dimensional time-lapse inversion result showing the percentage difference in an unsaturated salt-impacted sand with salt concentration of 50 mS/cm from 0 h to 49.15 h using a dipole–dipole array. The red box at the top of the profile shows the crude oil spill surface location between x = 60 cm and x = 75 cm.</p>
Full article ">Figure 10
<p>Two-dimensional time-lapse inversion results showing the percentage difference in an unsaturated salt-impacted sand with salt concentration of 85 mS/cm from 0 h to 49.15 h using a dipole–dipole array. The red box at the top of the profile shows the crude oil spill surface location between x = 60 cm and x = 75 cm.</p>
Full article ">Figure 11
<p>Scattered plots showing variations in percentage difference in resistivity with depth for an unsaturated sand extracted from inverted resistivity model for (<b>A1</b>–<b>A4</b>) 0.6 mS/cm, at x = 0.5 m, 0.9 m, 1.1 m, and 1.3 m, respectively; (<b>B1</b>–<b>B4</b>) 20 mS/cm, at x = 0.5 m, 0.9 m, 1.1 m, and 1.3 m, respectively; (<b>C1</b>–<b>C4</b>) 50 mS/cm at x = 0.5 m, 0.9 m, 1.1 m, and 1.3 m, respectively; and (<b>D1</b>–<b>D4</b>) 85 mS/cm at x = 0.5 m, 0.9 m, 1.1 m, and 1.3 m, respectively.</p>
Full article ">
17 pages, 10449 KiB  
Article
The Effect Characterization of Lens on LNAPL Migration Based on High-Density Resistivity Imaging Technique
by Guizhang Zhao, Jiale Cheng, Menghan Jia, Hongli Zhang, Hongliang Li and Hepeng Zhang
Appl. Sci. 2024, 14(22), 10389; https://doi.org/10.3390/app142210389 - 12 Nov 2024
Viewed by 708
Abstract
Light non-aqueous phase liquids (LNAPLs), which include various petroleum products, are a significant source of groundwater contamination globally. Once introduced into the subsurface, these contaminants tend to accumulate in the vadose zone, causing chronic soil and water pollution. The vadose zone often contains [...] Read more.
Light non-aqueous phase liquids (LNAPLs), which include various petroleum products, are a significant source of groundwater contamination globally. Once introduced into the subsurface, these contaminants tend to accumulate in the vadose zone, causing chronic soil and water pollution. The vadose zone often contains lens-shaped bodies with diverse properties that can significantly influence the migration and distribution of LNAPLs. Understanding the interaction between LNAPLs and these lens-shaped bodies is crucial for developing effective environmental management and remediation strategies. Prior research has primarily focused on LNAPL behavior in homogeneous media, with less emphasis on the impact of heterogeneous conditions introduced by lens-shaped bodies. To investigate the impact of lens-shaped structures on the migration of LNAPLs and to assess the specific effects of different types of lens-shaped structures on the distribution characteristics of LNAPL migration, this study simulates the LNAPL leakage process using an indoor two-dimensional sandbox. Three distinct test groups were conducted: one with no lens-shaped aquifer, one with a low-permeability lens, and one with a high-permeability lens. This study employs a combination of oil front curve mapping and high-density resistivity imaging techniques to systematically evaluate how the presence of lens-shaped structures affects the migration behavior, distribution patterns, and corresponding resistivity anomalies of LNAPLs. The results indicate that the migration rate and distribution characteristics of LNAPLs are influenced by the presence of a lens in the gas band of the envelope. The maximum vertical migration distances of the LNAPL are as follows: high-permeability lens (45 cm), no lens-shaped aquifer (40 cm), and low-permeability lens (35 cm). Horizontally, the maximum migration distances of the LNAPL to the upper part of the lens body decreases in the order of low-permeability lens, high-permeability lens, and no lens-shaped aquifer. The low-permeability lens impedes the vertical migration of the LNAPL, significantly affecting its migration path. It creates a flow around effect, hindering the downward migration of the LNAPL. In contrast, the high-permeability lens has a weaker retention effect and creates preferential flow paths, promoting the downward migration of the LNAPL. Under conditions with no lens-shaped aquifer and a high-permeability lens, the region of positive resistivity change rate is symmetrical around the axis where the injection point is located. Future research should explore the impact of various LNAPL types, lens geometries, and water table fluctuations on migration patterns. Incorporating numerical simulations could provide deeper insights into the mechanisms controlling LNAPL migration in heterogeneous subsurface environments. Full article
Show Figures

Figure 1

Figure 1
<p>Diagram of the experimental setup.</p>
Full article ">Figure 2
<p>Schematic diagram of the measurement method.</p>
Full article ">Figure 3
<p>Variation in the LNAPL migration velocity (No lens-shaped aquifer). (<b>a</b>) Migration process. (<b>b</b>) Lateral migration velocity at different heights. (<b>c</b>) Vertical migration velocity.</p>
Full article ">Figure 3 Cont.
<p>Variation in the LNAPL migration velocity (No lens-shaped aquifer). (<b>a</b>) Migration process. (<b>b</b>) Lateral migration velocity at different heights. (<b>c</b>) Vertical migration velocity.</p>
Full article ">Figure 4
<p>Variation in the LNAPL migration velocity (low-permeability lens). (<b>a</b>) Migration process. (<b>b</b>) Lateral migration velocity at different heights. (<b>c</b>) Migration process.</p>
Full article ">Figure 4 Cont.
<p>Variation in the LNAPL migration velocity (low-permeability lens). (<b>a</b>) Migration process. (<b>b</b>) Lateral migration velocity at different heights. (<b>c</b>) Migration process.</p>
Full article ">Figure 5
<p>Variation in the LNAPL migration velocity (high-permeability lens). (<b>a</b>) Migration process. (<b>b</b>) Lateral migration velocity at different heights. (<b>c</b>) Vertical migration velocity.</p>
Full article ">Figure 5 Cont.
<p>Variation in the LNAPL migration velocity (high-permeability lens). (<b>a</b>) Migration process. (<b>b</b>) Lateral migration velocity at different heights. (<b>c</b>) Vertical migration velocity.</p>
Full article ">Figure 6
<p>Maximum migration distance for different test groups.</p>
Full article ">Figure 7
<p>Rate of change of resistance (no lens-shaped aquifer). (<b>a</b>) 30 min (<b>b</b>) 60 min (<b>c</b>) 120 min (<b>d</b>) 180 min (<b>e</b>) 240 min (<b>f</b>) 300 min.</p>
Full article ">Figure 8
<p>Resistance rate of change (low-permeability lens). (<b>a</b>) 30 min (<b>b</b>) 100 min (<b>c</b>) 300 min (<b>d</b>) 400 min (<b>e</b>) 500 min (<b>f</b>) 660 min.</p>
Full article ">Figure 9
<p>Rate of change of resistance (high-permeability lens). (<b>a</b>) 60 min (<b>b</b>) 100 min (<b>c</b>) 200 min (<b>d</b>) 300 min (<b>e</b>) 400 min (<b>f</b>) 490 min.</p>
Full article ">
15 pages, 1777 KiB  
Article
Going beyond API Calls in Dynamic Malware Analysis: A Novel Dataset
by Slaviša Ilić, Milan Gnjatović, Ivan Tot, Boriša Jovanović, Nemanja Maček and Marijana Gavrilović Božović
Electronics 2024, 13(17), 3553; https://doi.org/10.3390/electronics13173553 - 6 Sep 2024
Cited by 1 | Viewed by 1294
Abstract
Automated sandbox-based analysis systems are dominantly focused on sequences of API calls, which are widely acknowledged as discriminative and easily extracted features. In this paper, we argue that an extension of the feature set beyond API calls may improve the malware detection performance. [...] Read more.
Automated sandbox-based analysis systems are dominantly focused on sequences of API calls, which are widely acknowledged as discriminative and easily extracted features. In this paper, we argue that an extension of the feature set beyond API calls may improve the malware detection performance. For this purpose, we apply the Cuckoo open-source sandbox system, carefully configured for the production of a novel dataset for dynamic malware analysis containing 22,200 annotated samples (11,735 benign and 10,465 malware). Each sample represents a full-featured report generated by the Cuckoo sandbox when a corresponding binary file is submitted for analysis. To support our position that the discriminative power of the full-featured sandbox reports is greater than the discriminative power of just API call sequences, we consider samples obtained from binary files whose execution induced API calls. In addition, we derive an additional dataset from samples in the full-featured dataset, whose samples contain only information on API calls. In a three-way factorial design experiment (considering the feature set, the feature representation technique, and the random forest model hyperparameter settings), we trained and tested a set of random forest models in a two-class classification task. The obtained results demonstrate that resorting to full-featured sandbox reports improves malware detection performance. The accuracy of 95.56 percent obtained for API call sequences was increased to 99.74 percent when full-featured sandbox reports were considered. Full article
(This article belongs to the Special Issue Intelligent Solutions for Network and Cyber Security)
Show Figures

Figure 1

Figure 1
<p>Example segments of benign (<b>left</b>) and malware (<b>right</b>) JSON reports generated by the Cuckoo sandbox.</p>
Full article ">Figure 2
<p>Full-featured reports represented with CV: (<b>left</b>) a graphical representation of the validation accuracy with respect to the number of decision trees in a random forest model; (<b>right</b>) the confusion matrix obtained for the optimal random forest model (0—benign, 1—malware).</p>
Full article ">Figure 3
<p>Full-featured reports represented with TF-IDF: (<b>left</b>) a graphical representation of the validation accuracy with respect to the number of decision trees in a random forest model; (<b>right</b>) the confusion matrix obtained for the optimal random forest model (0—benign, 1—malware).</p>
Full article ">Figure 4
<p>API call sequences represented with CV: (<b>left</b>) a graphical representation of the validation accuracy with respect to the number of decision trees in a random forest model, (<b>right</b>) the confusion matrix obtained for the optimal random forest model (0—benign, 1—malware).</p>
Full article ">Figure 5
<p>API call sequences represented with TF-IDF: (<b>left</b>) a graphical representation of the validation accuracy with respect to the number of decision trees in a random forest model; (<b>right</b>) the confusion matrix obtained for the optimal random forest model (0—benign, 1—malware).</p>
Full article ">
22 pages, 8900 KiB  
Article
Technology Selection of High-Voltage Offshore Substations Based on Artificial Intelligence
by Tiago A. Antunes, Rui Castro, Paulo J. Santos and Armando J. Pires
Energies 2024, 17(17), 4278; https://doi.org/10.3390/en17174278 - 27 Aug 2024
Viewed by 1006
Abstract
This paper proposes an automated approach to the technology selection of High-Voltage Alternating Current (HVAC) Offshore Substations (OHVS) for the integration of Oil & Gas (O&G) production and Offshore Wind Farms (OWF) based on Artificial Intelligence (AI) techniques. Due to the complex regulatory [...] Read more.
This paper proposes an automated approach to the technology selection of High-Voltage Alternating Current (HVAC) Offshore Substations (OHVS) for the integration of Oil & Gas (O&G) production and Offshore Wind Farms (OWF) based on Artificial Intelligence (AI) techniques. Due to the complex regulatory landscape and project diversity, this is enacted via a cost decision-model which was developed based on Knowledge-Based Systems (KBS) and incorporated into an optioneering software named Transmission Optioneering Model (TOM). Equipped with an interactive dashboard, it uses detailed transmission and cost models, as well as a technological and commercial benchmarking of offshore projects to provide a standardized selection approach to OHVS design. By automating this process, the deployment of a technically sound and cost-effective connection in an interactive sandbox environment is streamlined. The decision-model takes as primary inputs the power rating requirements and the distance of the offshore target site and tests multiple voltage/rating configurations and associated costs. The output is then the most technically and economically efficient interconnection setup. Since the TOM process relies on equivalent models and on a broad range of different projects, it is manufacturer-agnostic and can be used for virtually any site as a method that ensures both energy transmission and economic efficiency. Full article
Show Figures

Figure 1

Figure 1
<p>Evolution of the cost per MW of offshore substations based on their power rating.</p>
Full article ">Figure 2
<p>Typical cost breakdown for HVAC OHVS: (<b>a</b>) Generic and (<b>b</b>) different power ratings.</p>
Full article ">Figure 3
<p>Typical cost breakdown for HVDC OHVS: (<b>a</b>) Generic and (<b>b</b>) different power ratings.</p>
Full article ">Figure 4
<p>Weight ratios per MW for OHVS foundations.</p>
Full article ">Figure 5
<p>Average cost of OHVS topsides.</p>
Full article ">Figure 6
<p>Weight ratios for foundation and topsides for OHVS.</p>
Full article ">Figure 7
<p>HVAC OHVS Cost efficiencies due to economies of scale.</p>
Full article ">Figure 8
<p>Cost benchmarking per quantity of (<b>a</b>) HVAC 125–500 and (<b>b</b>) HVDC 500–2500 MW.</p>
Full article ">Figure 9
<p>Cost breakdown for HVDC interconnection.</p>
Full article ">Figure 10
<p>Cost benchmarking for multiple DC OHVS.</p>
Full article ">Figure 11
<p>Cost comparison between AC and DC offshore substations for 2–3 GW.</p>
Full article ">Figure 12
<p>Typical O&amp;M costs for (<b>a</b>) substations and (<b>b</b>) cable systems.</p>
Full article ">Figure 13
<p>Overview of the KBS structure of the technology selection model.</p>
Full article ">Figure 14
<p>Overview of the optioneering model workflow applied to the HVAC sandbox.</p>
Full article ">Figure 15
<p>Variable cost per MW of HVAC OHVS (dots) and logarithmic regression analysis (trend).</p>
Full article ">Figure 16
<p>Sandbox general parameter settings (Example).</p>
Full article ">Figure 17
<p>Sandbox transmission setup settings (Example).</p>
Full article ">Figure 18
<p>Line voltage and breaking distance for AC grid connection (Case #1).</p>
Full article ">Figure 19
<p>Active power flow and impact of compensation for AC grid connection (Case #1).</p>
Full article ">Figure 20
<p>Reactive power flow and impact of compensation for AC grid connection (Case #1).</p>
Full article ">Figure 21
<p>Line voltage and breaking distance for AC grid connection (Case #1*).</p>
Full article ">Figure 22
<p>Line voltage and breaking distance for AC grid connection (Case #2).</p>
Full article ">Figure 23
<p>Line voltage and breaking distance for AC grid connection (Case #3).</p>
Full article ">Figure 24
<p>Line voltage for AC grid connection (Case #3) without no-load triggering factor.</p>
Full article ">Figure 25
<p>Cost breakdown for AC grid connection (Case #3).</p>
Full article ">
20 pages, 2938 KiB  
Article
Market Value or Meta Value? The Value of Virtual Land during the Metaverse’s Digital Era
by Aurora Greta Ruggeri, Giuliano Marella and Laura Gabrielli
Land 2024, 13(8), 1135; https://doi.org/10.3390/land13081135 - 25 Jul 2024
Viewed by 1277
Abstract
Nowadays, some of the most expensive real estate is not “real” at all. Several investors are purchasing land in the virtual world of the Metaverse. To be more accurate in the wording, they are buying “meta-estates”. This work is dedicated to opening a [...] Read more.
Nowadays, some of the most expensive real estate is not “real” at all. Several investors are purchasing land in the virtual world of the Metaverse. To be more accurate in the wording, they are buying “meta-estates”. This work is dedicated to opening a debate about this emerging research field within the real estate discipline. It begins by discussing market segmentation, ownership, and pricing by comparing the traditional real estate market with the virtual estate market. Furthermore, this study involved interviews with six seasoned Metaverse land investors who participated in two Analytic Hierarchy Processes (AHPs). The first AHP ranked 14 investment typologies, while the second focused on ranking and discussing the most important characteristics of meta-estates that influence the formation of prices. As a result, the most appealing investments identified were day-trading, virtual land trading (buying to resell), and virtual land development (transforming and reselling). The primary characteristics of meta-estates considered by investors include the platform (e.g., Earth 2, Sandbox), the location within the platform (proximity to famous neighbours), and the architectural design of the buildings (designed by renowned architects). It is evident that the Metaverse represents a new frontier for land investors, and the primary aim of this study was to encourage other researchers to explore and investigate this evolving field. Full article
Show Figures

Figure 1

Figure 1
<p>Macro-categories of market segmentation.</p>
Full article ">Figure 2
<p>Investor’s 1 pairwise criteria matrix for AHP_mot.</p>
Full article ">Figure 3
<p>Investor’s 1 pairwise criteria matrix for AHP_fac.</p>
Full article ">Figure 4
<p>The AHP_MOT’s weights.</p>
Full article ">Figure 5
<p>The AHP_FAC’s weights.</p>
Full article ">Figure 6
<p>Investor’s 1 pairwise criteria matrix for Criterion 1 in the AHP_mot.</p>
Full article ">Figure 7
<p>Investor’s 1 pairwise criteria matrix for Criterion 1 in the AHP_fac.</p>
Full article ">Figure 8
<p>The AHP_MOT’s final decision matrix.</p>
Full article ">Figure 9
<p>The AHP_FAC’s final decision matrix.</p>
Full article ">Figure 10
<p>The AHP_MOT’s final classification.</p>
Full article ">Figure 11
<p>The AHP_FAC’s final classification.</p>
Full article ">
21 pages, 664 KiB  
Article
‘Feminine Threshold’: Theorizing Masculine Embodiment with Latinx Men
by Adriana Haro
Youth 2024, 4(3), 983-1003; https://doi.org/10.3390/youth4030062 - 12 Jul 2024
Viewed by 1968
Abstract
The aim of this paper is to discuss how young Latinx men living in Australia negotiate, embody, and complicate existing dominant and racialized masculinities. Queer and feminist theories are used to explore how Latinx men negotiate and embody masculinities, sexualities, and being ‘other’ [...] Read more.
The aim of this paper is to discuss how young Latinx men living in Australia negotiate, embody, and complicate existing dominant and racialized masculinities. Queer and feminist theories are used to explore how Latinx men negotiate and embody masculinities, sexualities, and being ‘other’ in a White dominant cultural context. These tensions were explored through semi-structured in-depth interviews and a creative visual method known as sandboxing with twenty-one Latinx men. Sandboxing aims to elicit conversation and allows for the reflection and sharing of a visual and symbolic representation of participants’ lives. The findings suggest masculinities are lived and embodied alongside negotiating racialization and sexualities. The fluidity of masculinities surfaces in participants’ reflexive engagement with masculinities and the nuances in negotiating and simultaneously reproducing gender binary norms. Participants’ careful negotiation in engaging with feminine culture led to developing the concept ‘feminine threshold’, a theoretical contribution offered in this article, in understanding how Latinx men negotiate masculinities. Full article
(This article belongs to the Special Issue Body Image: Youth, Gender and Health)
Show Figures

Figure 1

Figure 1
<p>Calvin’s sandbox depicting his life in Australia and progression of the ‘lightly’ pink shirt he wore to express himself while at home and the pink and ‘feminine’ colors he feels free to wear in Australia.</p>
Full article ">
15 pages, 274 KiB  
Article
Situational Management and Digital Situational Awareness Systems in Infrastructure Construction: Managerial Perspectives on Relevance, Challenges, and Adoption
by Eelon Lappalainen, Petri Uusitalo, Olli Seppänen, Antti Peltokorpi, Ana Reinbold, Antti Ainamo, Christopher Görsch and Roope Nyqvist
Buildings 2024, 14(7), 2035; https://doi.org/10.3390/buildings14072035 - 3 Jul 2024
Viewed by 1223
Abstract
Currently, digital situational awareness systems are popular in complex infrastructure construction projects. These systems monitor and assess environmental events, progress, resource availability, risks, and other project decision-making variables to support decision-making. However, little is known about how infrastructure construction (IC) professionals who utilize [...] Read more.
Currently, digital situational awareness systems are popular in complex infrastructure construction projects. These systems monitor and assess environmental events, progress, resource availability, risks, and other project decision-making variables to support decision-making. However, little is known about how infrastructure construction (IC) professionals who utilize situational awareness systems perceive how they support or hinder situational management. The purpose of this exploratory research is to study, in depth, the relevance, challenges, and adoption of situational management in IC projects using digital systems. The data were collected via semistructured interviews with 21 IC managers and situational awareness management experts from 11 companies involved in railway projects. The main findings indicate that problem-solving improved with situational management in general, especially with digital situational awareness systems. Seizing the possibilities for transparency that accompany digital situational awareness systems helped in discussing emerging problems and making project choices. Expectations about the realism of such expectations were easier to align with historical event data. On the other hand, the informants reported difficulty in motivating contractors to collect situational data in digital form, possibly because of a lack of understanding about the purpose of data collection, the manual nature of data collection, the perceived excessiveness of data collection, or the manual transfer of collected data into digital form. For these reasons, the informants reported limited faith in these systems. A perceived drawback of situational management, whether supported by digital situational awareness systems or not, was its lack of applicability to the realities of a construction site. Systems were designed for project management needs but not tailored to the needs of construction projects. The interviewees’ statements indicate that maintaining situational awareness requires active interaction and constant checking of the provided information, even requiring pressure on the contractors providing the information. This study highlights the need for practical human approaches to effectively use digital situational awareness technologies and situational management in IC. Full article
(This article belongs to the Section Construction Management, and Computers & Digitization)
30 pages, 35030 KiB  
Article
Data Management Framework for Highways: An Unreal Engine-Based Digital Sandbox Platform
by Huabing Lv, Guoqiang Wu, Jianping Song, Chunhua Mo, Guowen Yao and Xuanbo He
Buildings 2024, 14(7), 1961; https://doi.org/10.3390/buildings14071961 - 28 Jun 2024
Cited by 3 | Viewed by 1485
Abstract
The problems of information isolation, inefficiency, and paper-based data archiving in traditional highway survey and design methods are investigated in this paper. A novel digital sandbox platform framework was developed to promote the efficiency of route design, model data integration, and information sharing. [...] Read more.
The problems of information isolation, inefficiency, and paper-based data archiving in traditional highway survey and design methods are investigated in this paper. A novel digital sandbox platform framework was developed to promote the efficiency of route design, model data integration, and information sharing. Under the presented framework, an integrated application method for both the Building Information Modeling (BIM) and Geographic Information System (GIS) technologies was designed by using Unreal Engine technology. Firstly, a digital base model was established by integrating multi-disciplinary BIM model data and GIS three-dimensional (3D) multi-scale scene model data. On this basis, using Unreal Engine technology for visualization development, a digital sandbox platform with the data visualization, traffic organization simulation analysis, 3D spatial analysis, component information query, and scene switching functions was developed, which satisfies the 3D visualization and digitalization needs in the current highway planning and design. Additionally, the Analytic Hierarchy Process (AHP) was employed to analyze the impact of digital base model on the development and application of platform modules, including five crucial factors: data accuracy, data representation, multi-source data fusion, data management capability, and scene semantic representation. Finally, the research results indicate that the proposed digital sandbox platform framework provides users with a platform for integrated data management, information sharing, and 3D data visualization, while reducing design time by 30%, total design cost by 12%, and land occupancy rate by 10%. Full article
(This article belongs to the Special Issue Towards More Practical BIM/GIS Integration)
Show Figures

Figure 1

Figure 1
<p>The research roadmap for this paper.</p>
Full article ">Figure 2
<p>BIM application in the lifecycle.</p>
Full article ">Figure 3
<p>GIS 3D multi-scale scene model.</p>
Full article ">Figure 4
<p>BIM and GIS model data integration.</p>
Full article ">Figure 5
<p>Design of platform functional modules.</p>
Full article ">Figure 6
<p>Hierarchy structure model.</p>
Full article ">Figure 7
<p>(<b>a</b>) Judgment matrix among five indicators. (<b>b</b>) Judgment matrix among factors of the data visualization module. (<b>c</b>) Judgment matrix among factors of the traffic organization simulation analysis module. (<b>d</b>) Judgment matrix among factors of the 3D spatial analysis module. (<b>e</b>) Judgment matrix among factors of the component information query module. (<b>f</b>) Judgment matrix among factors of the scene switching module.</p>
Full article ">Figure 8
<p>Combined weights of indicators for assessing the effectiveness of the platform’s functional modules from the digital base model.</p>
Full article ">Figure 9
<p>GIS 3D multi-scale scene model construction process.</p>
Full article ">Figure 10
<p>Absolute error magnitude in the <math display="inline"><semantics> <mi>X</mi> </semantics></math>, <math display="inline"><semantics> <mi>Y</mi> </semantics></math>, and <math display="inline"><semantics> <mi>Z</mi> </semantics></math> directions.</p>
Full article ">Figure 11
<p>Overall BIM modeling process for the highway.</p>
Full article ">Figure 12
<p>Digital base model.</p>
Full article ">Figure 13
<p>Georeferencing plugin parameters.</p>
Full article ">Figure 14
<p>Data visualization module—land use visualization.</p>
Full article ">Figure 15
<p>Simulation analysis traffic organization in the merging area.</p>
Full article ">Figure 16
<p>Optimization of route schemes.</p>
Full article ">Figure 17
<p>Measurement analysis.</p>
Full article ">Figure 18
<p>Section analysis.</p>
Full article ">Figure 19
<p>Component information query.</p>
Full article ">Figure 20
<p>Scene switching module—switching with 3D location icons.</p>
Full article ">Figure 21
<p>Stability performance test results of platform modules.</p>
Full article ">Figure 22
<p>Application performance test results of platform modules.</p>
Full article ">
29 pages, 9974 KiB  
Article
Benchmarking Android Malware Analysis Tools
by Javier Bermejo Higuera, Javier Morales Moreno, Juan Ramón Bermejo Higuera, Juan Antonio Sicilia Montalvo, Gustavo Javier Barreiro Martillo and Tomas Miguel Sureda Riera
Electronics 2024, 13(11), 2103; https://doi.org/10.3390/electronics13112103 - 28 May 2024
Viewed by 1363
Abstract
Today, malware is arguably one of the biggest challenges organisations face from a cybersecurity standpoint, regardless of the types of devices used in the organisation. One of the most malware-attacked mobile operating systems today is Android. In response to this threat, this paper [...] Read more.
Today, malware is arguably one of the biggest challenges organisations face from a cybersecurity standpoint, regardless of the types of devices used in the organisation. One of the most malware-attacked mobile operating systems today is Android. In response to this threat, this paper presents research on the functionalities and performance of different malicious Android application package analysis tools, including one that uses machine learning techniques. In addition, it investigates how these tools streamline the detection, classification, and analysis of malicious Android Application Packages (APKs) for Android operating system devices. As a result of the research included in this article, it can be highlighted that the AndroPytool, a tool that uses machine learning (ML) techniques, obtained the best results with an accuracy of 0.986, so it can be affirmed that the tools that use artificial intelligence techniques used in this study are more efficient in terms of detection capacity. On the other hand, of the online tools analysed, Virustotal and Pithus obtained the best results. Based on the above, new approaches can be suggested in the specification, design, and development of new tools that help to analyse, from a cybersecurity point of view, the code of applications developed for this environment. Full article
Show Figures

Figure 1

Figure 1
<p>File and folder structure after unzipping an APK.</p>
Full article ">Figure 2
<p>Work method.</p>
Full article ">Figure 3
<p>Method used to carry out the analysis of the APKs.</p>
Full article ">Figure 4
<p>Schematic of the operation approach of AndroPyTool [<a href="#B41-electronics-13-02103" class="html-bibr">41</a>].</p>
Full article ">Figure 5
<p>Comparison with Virus Total database.</p>
Full article ">Figure 6
<p>AndroPytool tool progress.</p>
Full article ">Figure 7
<p>Development of internal DroidBox analysis.</p>
Full article ">Figure 8
<p>JSON file structure.</p>
Full article ">Figure 9
<p>Conversion of JSON file into CSV to be treated.</p>
Full article ">Figure 10
<p>Filtering of JSON files for conversion to CSV to be processed.</p>
Full article ">Figure 11
<p>Data visualisation dataset APKs.</p>
Full article ">Figure 12
<p>Data visualisation dataset APKs.</p>
Full article ">Figure 13
<p>Methodology.</p>
Full article ">Figure 14
<p>Access to DroidKungFu app location permissions.</p>
Full article ">Figure 15
<p>Response when sending device data from the DroidKungfu application.</p>
Full article ">Figure 16
<p>Graph showing accuracy (ACC) and detection capability (RE).</p>
Full article ">Figure 17
<p>Comparative graph of False Positive Rate (FPR) and False Negative Rate (FNR).</p>
Full article ">
Back to TopTop