[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (62,309)

Search Parameters:
Keywords = system efficiency

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
21 pages, 7409 KiB  
Article
Harnessing the Influence of Pressure and Nutrients on Biological CO2 Methanation Using Response Surface Methodology and Artificial Neural Network—Genetic Algorithm Approaches
by Alexandros Chatzis, Konstantinos N. Kontogiannopoulos, Nikolaos Dimitrakakis, Anastasios Zouboulis and Panagiotis G. Kougias
Fermentation 2025, 11(1), 43; https://doi.org/10.3390/fermentation11010043 (registering DOI) - 18 Jan 2025
Abstract
The biological methanation process has emerged as a promising alternative to thermo-catalytic methods due to its ability to operate under milder conditions. However, challenges such as low hydrogen solubility and the need for precise trace element supplementation (Fe(II), Ni(II), Co(II)) constrain methane production [...] Read more.
The biological methanation process has emerged as a promising alternative to thermo-catalytic methods due to its ability to operate under milder conditions. However, challenges such as low hydrogen solubility and the need for precise trace element supplementation (Fe(II), Ni(II), Co(II)) constrain methane production yield. This study investigates the combined effects of trace element concentrations and applied pressure on biological methanation, addressing their synergistic interactions. Using a face-centered composite design, batch mode experiments were conducted to optimize methane production. Response Surface Methodology (RSM) and Artificial Neural Network (ANN)—Genetic Algorithm (GA) approaches were employed to model and optimize the process. RSM identified optimal ranges for trace elements and pressure, while ANN-GA demonstrated superior predictive accuracy, capturing nonlinear relationships with a high R² (>0.99) and minimal prediction errors. ANN-GA optimization indicated 97.9% methane production efficiency with a reduced conversion time of 15.9 h under conditions of 1.5 bar pressure and trace metal concentrations of 25.0 mg/L Fe(II), 0.20 mg/L Ni(II), and 0.02 mg/L Co(II). Validation experiments confirmed these predictions with deviations below 5%, underscoring the robustness of the models. The results highlight the synergistic effects of pressure and trace metals in enhancing gas–liquid mass transfer and enzymatic pathways, demonstrating the potential of computational modeling and experimental validation to optimize biological methanation systems, contributing to sustainable methane production. Full article
(This article belongs to the Special Issue Microbial Fixation of CO2 to Fuels and Chemicals)
Show Figures

Figure 1

Figure 1
<p>(<b>a</b>) The batch reactor utilized in this study. (<b>b</b>) Schematic representation of the batch reactors placed on a magnetic stirrer and inside a laboratory air oven.</p>
Full article ">Figure 2
<p>FCC perturbation plots for: (<b>a</b>) conversion time (h), (<b>b</b>) conversion rate (%). (Pressure (bar), X<sub>A</sub> factor with green; Fe(II) (mg/L), X<sub>B</sub> factor with red; Ni(II) (mg/L), X<sub>C</sub> factor with blue; Co(II) (mg/L), X<sub>D</sub> factor with orange line).</p>
Full article ">Figure 3
<p>Response surface and contour plots for (<b>a</b>) conversion time (h), (<b>b</b>) conversion rate (%) (as a function of pressure (bar), (X<sub>A</sub>) and Fe(II) concentration (mg/L), (X<sub>B</sub>).</p>
Full article ">Figure 4
<p>Overlay contour plot depicting the optimum DSp (yellow area). The red X mark shows the selected optimum conditions.</p>
Full article ">Figure 5
<p>(<b>a</b>) The ANN 4-7-2 topology with input, hidden, and output layers; (<b>b</b>) regression of experimental and predicted values after normalization.</p>
Full article ">Figure 6
<p>Error histogram for training, validation, and test sets for the created model.</p>
Full article ">Figure 7
<p>Evolution of fitness function (the ANN) through iteration using the GA for the desired response values.</p>
Full article ">Figure 8
<p>Comparison of experimental and predicted values of: (<b>a</b>) conversion using RSM; (<b>b</b>) time using RSM; (<b>c</b>) conversion using ANN; (<b>d</b>) time using ANN.</p>
Full article ">
24 pages, 1927 KiB  
Article
Revolution of Digital Marketing with DeFi Systems for Cultural Organizations
by Thomas Fotiadis, Damianos P. Sakas, Alkistis E. Papadopoulou, Artemis G. Andreou, Dimitrios P. Reklitis and Nikolaos T. Giannakopoulos
Sustainability 2025, 17(2), 746; https://doi.org/10.3390/su17020746 (registering DOI) - 18 Jan 2025
Viewed by 2
Abstract
Cultural organizations, such as museums, increasingly seek innovative ways to enhance their financial sustainability and attract diverse, global audiences. Implementing cryptocurrency payments and DeFi systems offers these institutions an opportunity to modernize their operations, streamline transactions, and boost digital marketing efforts, aligning with [...] Read more.
Cultural organizations, such as museums, increasingly seek innovative ways to enhance their financial sustainability and attract diverse, global audiences. Implementing cryptocurrency payments and DeFi systems offers these institutions an opportunity to modernize their operations, streamline transactions, and boost digital marketing efforts, aligning with the growing demand for decentralized financial solutions. Using statistical analyses such as correlations and simple linear regression (SLR) models, combined with AnyLogic modeling, this study examines how integrating DeFi systems, including cryptocurrency payments, can improve the sustainable management of these institutions. The findings suggest that by adopting DeFi technologies, museums can enhance their digital marketing efficiency, increase engagement, and attract a broader audience. The analysis reveals that museums accepting cryptocurrency benefit from broader digital marketing factors, with referral and branded traffic significantly driving organic search, whereby paid social traffic correlates positively with paid strategies, and the authority score is largely influenced by organic traffic. In contrast, non-crypto museums rely more heavily on referral traffic and organic costs, with narrower marketing influences affecting their performance. Full article
(This article belongs to the Section Sustainable Management)
Show Figures

Figure 1

Figure 1
<p>HM modeling process development.</p>
Full article ">Figure 2
<p>Simulation results of the museums that accept (<b>a</b>) or not (<b>b</b>) cryptocurrency payments. The metrics that do not appear in the graph have near to zero values and trend close to the xx line (e.g., Y_Refferal Traffic, N_Referral Traffic, etc.).</p>
Full article ">Figure 2 Cont.
<p>Simulation results of the museums that accept (<b>a</b>) or not (<b>b</b>) cryptocurrency payments. The metrics that do not appear in the graph have near to zero values and trend close to the xx line (e.g., Y_Refferal Traffic, N_Referral Traffic, etc.).</p>
Full article ">
29 pages, 4950 KiB  
Article
Sustainable Design in Agriculture—Energy Optimization of Solar Greenhouses with Renewable Energy Technologies
by Danijela Nikolić, Saša Jovanović, Nebojša Jurišević, Novak Nikolić, Jasna Radulović, Minja Velemir Radović and Isidora Grujić
Energies 2025, 18(2), 416; https://doi.org/10.3390/en18020416 (registering DOI) - 18 Jan 2025
Viewed by 16
Abstract
In modern agriculture today, the cultivation of agricultural products cannot be imagined without greenhouses. This paper presents an energy optimization of a solar greenhouse with a photovoltaic system (PV) and a ground-source heat pump (GSHP). The PV system generates electricity, while the GSHP [...] Read more.
In modern agriculture today, the cultivation of agricultural products cannot be imagined without greenhouses. This paper presents an energy optimization of a solar greenhouse with a photovoltaic system (PV) and a ground-source heat pump (GSHP). The PV system generates electricity, while the GSHP is used for heating and cooling. A greenhouse is designed with an Open Studio plug-in in the Google SketchUp environment, the EnergyPlus software (8.7.1 version) was used for energy simulation, and the GenOpt software (2.0.0 version) was used for optimization of the azimuth angle and PV cell efficiency. Results for different solar greenhouse orientations and different photovoltaic module efficiency are presented in the paper. The obtained optimal azimuth angle of the solar greenhouse was −8°. With the installation of a PV array with higher module efficiency (20–24%), it is possible to achieve annual energy savings of 6.87–101.77%. Also, with the PV module efficiency of 23.94%, a concept of zero-net-energy solar greenhouses (ZNEG) is achieved at optimal azimuth and slope angle. Through the environmental analysis of different greenhouses, CO2 emissions of PV and GSHP are calculated and compared with electricity usage. Saved CO2 emission for a zero-net-energy greenhouse is 6626 kg CO2/year. An economic analysis of installed renewable energy systems was carried out: with the total investment of 19,326 € for ZNEG, the payback period is 8.63 years. Full article
Show Figures

Figure 1

Figure 1
<p>Model of analyzed solar greenhouse with installed renewable energy systems (winter period).</p>
Full article ">Figure 2
<p>Modeled solar greenhouse: (<b>a</b>) side wall; (<b>b</b>) south wall.</p>
Full article ">Figure 3
<p>Model of an installed photovoltaic array of a solar greenhouse.</p>
Full article ">Figure 4
<p>Monthly heating/cooling load of a solar greenhouse.</p>
Full article ">Figure 5
<p>Monthly energy consumption in a referent solar greenhouse.</p>
Full article ">Figure 6
<p>The azimuth angle of a solar greenhouse.</p>
Full article ">Figure 7
<p>Cooling load of solar greenhouses with different azimuth angles (on 15 July).</p>
Full article ">Figure 8
<p>Heating load of solar greenhouses with different azimuth angles (on 15 December).</p>
Full article ">Figure 9
<p>Heating and cooling energy consumption in a solar greenhouse with different azimuth angles.</p>
Full article ">Figure 10
<p>Generated energy and energy consumption in solar greenhouses with different azimuth angles.</p>
Full article ">Figure 11
<p>Energy consumption and generated energy of solar greenhouses with different PV module efficiency.</p>
Full article ">Figure 12
<p>Energy consumption, generated energy, and energy surplus in the zero-net-energy greenhouse.</p>
Full article ">Figure 13
<p>Emission and total emission of CO<sub>2</sub> (yearly) in different greenhouses.</p>
Full article ">Figure 14
<p>Investments, Financial savings and Payback periods of different greenhouses.</p>
Full article ">Figure 15
<p>Payback periods for different GSHP and different feed-in tariffs.</p>
Full article ">
33 pages, 1275 KiB  
Article
Prediction of Marine Shaft Centerline Trajectories Using Transformer-Based Models
by Jialin Han, Qingbo Zhu, Sheng Yang, Wan Xia and Yongjun Yao
Symmetry 2025, 17(1), 137; https://doi.org/10.3390/sym17010137 (registering DOI) - 18 Jan 2025
Viewed by 23
Abstract
The accurate prediction of marine shaft centerline trajectories is essential for ensuring the operational performance and safety of ships. In this study, we propose a novel Transformer-based model to forecast the lateral and longitudinal displacements of ship main shafts. A key challenge in [...] Read more.
The accurate prediction of marine shaft centerline trajectories is essential for ensuring the operational performance and safety of ships. In this study, we propose a novel Transformer-based model to forecast the lateral and longitudinal displacements of ship main shafts. A key challenge in this prediction task is capturing both short-term fluctuations and long-term dependencies in shaft displacement data, which traditional models struggle to address. Our Transformer-based model integrates Bidirectional Splitting–Agg Attention and Sequence Progressive Split–Aggregation mechanisms to efficiently process bidirectional temporal dependencies, decompose seasonal and trend components, and handle the inherent symmetry of the shafting system. The symmetrical nature of the shafting system, with left and right shafts experiencing similar dynamic conditions, aligns with the bidirectional attention mechanism, enabling the model to better capture the symmetric relationships in displacement data. Experimental results demonstrate that the proposed model significantly outperforms traditional methods, such as Autoformer and Informer, in terms of prediction accuracy. Specifically, for 96 steps ahead, the mean absolute error (MAE) of our model is 0.232, compared to 0.235 for Autoformer and 0.264 for Informer, while the mean squared error (MSE) of our model is 0.209, compared to 0.242 for Autoformer and 0.286 for Informer. These results underscore the effectiveness of Transformer-based models in accurately predicting long-term marine shaft centerline trajectories, leveraging both temporal dependencies and structural symmetry, thus contributing to maritime monitoring and performance optimization. Full article
(This article belongs to the Section Engineering and Materials)
17 pages, 2396 KiB  
Article
Experimental Setup and Machine Learning-Based Prediction Model for Electro-Cyclone Filter Efficiency: Filtering of Ship Particulate Matter Emission
by Aleksandr Šabanovič, Jonas Matijošius, Dragan Marinković, Aleksandras Chlebnikovas, Donatas Gurauskis, Johannes H. Gutheil and Artūras Kilikevičius
Atmosphere 2025, 16(1), 103; https://doi.org/10.3390/atmos16010103 (registering DOI) - 18 Jan 2025
Viewed by 33
Abstract
Ship emissions significantly impact air quality, particularly in coastal and port regions, contributing to elevated concentrations of PM2.5, and PM10, with varying effects observed across different locations. This study investigates the effectiveness of emission control policies, inland and port-specific [...] Read more.
Ship emissions significantly impact air quality, particularly in coastal and port regions, contributing to elevated concentrations of PM2.5, and PM10, with varying effects observed across different locations. This study investigates the effectiveness of emission control policies, inland and port-specific contributions to air pollution, and the health risks posed by particulate matter (PM). A regression discontinuity model at Ningbo Port revealed that ship activities show moderate PM2.5 and PM10 variations. In Busan Port, container ships accounted for the majority of emissions, with social costs from pollutants estimated at USD 31.55 million annually. Inland shipping near the Yangtze River demonstrated significant PM contributions, emphasizing regional impacts. Health risks from PM2.5, a major global toxic pollutant, were highlighted, with links to respiratory, cardiovascular, and cognitive disorders. Advances in air purification technologies, including hybrid electrostatic filtration systems, have shown promising efficiency in removing submicron particles and toxic gases, reducing energy costs. In this paper, a random forest machine learning model developed to predict particulate concentrations post-cleaning demonstrated robust performance (MAE = 0.49 P/cm3, R2 = 0.97). These findings underscore the critical need for stringent emission controls, innovative filtration systems, and comprehensive monitoring to mitigate the environmental and health impacts of ship emissions. Full article
(This article belongs to the Special Issue Shipping Emissions and Air Pollution (2nd Edition))
Show Figures

Figure 1

Figure 1
<p>Actual vs. predicted concentration after cleaning.</p>
Full article ">Figure 2
<p>Actual vs. predicted concentration after cleaning by particle dosage speed (<b>a</b>) 2 mm/h; (<b>b</b>) 4 mm/h; (<b>c</b>) 8 mm/h; (<b>d</b>) 16 mm/h.</p>
Full article ">Figure 2 Cont.
<p>Actual vs. predicted concentration after cleaning by particle dosage speed (<b>a</b>) 2 mm/h; (<b>b</b>) 4 mm/h; (<b>c</b>) 8 mm/h; (<b>d</b>) 16 mm/h.</p>
Full article ">Figure 3
<p>Residuals of predictions by dosage speed: (<b>a</b>) 2 mm/h; (<b>b</b>) 4 mm/h; (<b>c</b>) 8 mm/h; (<b>d</b>) 16 mm/h.</p>
Full article ">Figure 3 Cont.
<p>Residuals of predictions by dosage speed: (<b>a</b>) 2 mm/h; (<b>b</b>) 4 mm/h; (<b>c</b>) 8 mm/h; (<b>d</b>) 16 mm/h.</p>
Full article ">
27 pages, 962 KiB  
Article
Zero-Trust Access Control Mechanism Based on Blockchain and Inner-Product Encryption in the Internet of Things in a 6G Environment
by Shoubai Nie, Jingjing Ren, Rui Wu, Pengchong Han, Zhaoyang Han and Wei Wan
Sensors 2025, 25(2), 550; https://doi.org/10.3390/s25020550 (registering DOI) - 18 Jan 2025
Viewed by 41
Abstract
Within the framework of 6G networks, the rapid proliferation of Internet of Things (IoT) devices, coupled with their decentralized and heterogeneous characteristics, presents substantial security challenges. Conventional centralized systems face significant challenges in effectively managing the diverse range of IoT devices, and they [...] Read more.
Within the framework of 6G networks, the rapid proliferation of Internet of Things (IoT) devices, coupled with their decentralized and heterogeneous characteristics, presents substantial security challenges. Conventional centralized systems face significant challenges in effectively managing the diverse range of IoT devices, and they are inadequate in addressing the requirements for reduced latency and the efficient processing and analysis of large-scale data. To tackle these challenges, this paper introduces a zero-trust access control framework that integrates blockchain technology with inner-product encryption. By using smart contracts for automated access control, a reputation-based trust model for decentralized identity management, and inner-product encryption for fine-grained access control, the framework ensures data security and efficiency. Firstly, smart contracts are employed to automate access control, and software-defined boundaries are defined for different application domains. Secondly, through a trust model based on a consensus algorithm of node reputation values and a registration-based inner-product encryption algorithm supporting fine-grained access control, zero-trust self-sovereign enhanced identity management in the 6G environment of the Internet of Things is achieved. Furthermore, the use of multiple auxiliary chains for storing data across different application domains not only mitigates the risks associated with data expansion but also achieves micro-segmentation, thereby enhancing the efficiency of access control. Finally, empirical evidence demonstrates that, compared with the traditional methods, this paper’s scheme improves the encryption efficiency by 14%, reduces the data access latency by 18%, and significantly improves the throughput. This mechanism ensures data security while maintaining system efficiency in environments with large-scale data interactions. Full article
Show Figures

Figure 1

Figure 1
<p>Zero -trust security model in 6G.</p>
Full article ">Figure 2
<p>The zero-trust security framework.</p>
Full article ">Figure 3
<p>Detailed interactions of smart contracts.</p>
Full article ">Figure 4
<p>Encryption algorithm encryption time consumption.</p>
Full article ">Figure 5
<p>Encryption algorithm decryption time consumption.</p>
Full article ">Figure 6
<p>Throughput performance comparison.</p>
Full article ">Figure 7
<p>System throughput with and without encryption under varying concurrent requests.</p>
Full article ">Figure 8
<p>Impact of changes in the total number of identity management slices.</p>
Full article ">Figure 9
<p>Impact of changes in the minimum number of slices for identity management.</p>
Full article ">
28 pages, 10160 KiB  
Review
Recent Advances in Metal–Organic Framework-Based Anticancer Hydrogels
by Preeti Kush, Ranjit Singh and Parveen Kumar
Gels 2025, 11(1), 76; https://doi.org/10.3390/gels11010076 (registering DOI) - 18 Jan 2025
Viewed by 52
Abstract
Cancer is the second leading cause of death globally and the estimated number of new cancer cases and deaths will be ∼30.2 million and 16.3 million, respectively, by 2040. These numbers cause massive, physical, emotional, and financial burdens to society and the healthcare [...] Read more.
Cancer is the second leading cause of death globally and the estimated number of new cancer cases and deaths will be ∼30.2 million and 16.3 million, respectively, by 2040. These numbers cause massive, physical, emotional, and financial burdens to society and the healthcare system that lead to further research for a better and more effective therapeutic strategy to manage cancer. Metal–organic frameworks (MOFs) are promising alternative approaches for efficient drug delivery and cancer theranostics owing to their unique properties and the direct transportation of drugs into cells followed by controlled release, but they suffer from certain limitations like rigidity, poor dispersibility, fragility, aggregation probability, and limited surface accessibility. Therefore, MOFs were conjugated with polymeric hydrogels, leading to the formation of MOF-based hydrogels with abundant absorption sites, flexibility, and excellent mechanical properties. This review briefly describes the different strategies used for the synthesis and characterization of MOF-based hydrogels. Further, we place special emphasis on the recent advances in MOF-based hydrogels used to manage different cancers. Finally, we conclude the challenges and future perspectives of MOF-based hydrogels. We believe that this review will help researchers to develop more MOF-based hydrogels with augmented anticancer effects, enabling the effective management of cancer even without adverse effects. Full article
(This article belongs to the Special Issue Physicochemical Properties and Applications of Gel Materials)
36 pages, 2826 KiB  
Article
Design and Modeling of an Intelligent Robotic Gripper Using a Cam Mechanism with Position and Force Control Using an Adaptive Neuro-Fuzzy Computing Technique
by Imad A. Kheioon, Raheem Al-Sabur and Abdel-Nasser Sharkawy
Automation 2025, 6(1), 4; https://doi.org/10.3390/automation6010004 (registering DOI) - 18 Jan 2025
Viewed by 46
Abstract
Manufacturers increasingly turn to robotic gripper designs to improve the efficiency of gripping and moving objects and provide greater flexibility to these objects. Neuro-fuzzy techniques are the most widespread in developing gripper designs. In this study, the traditional gripper design is modified by [...] Read more.
Manufacturers increasingly turn to robotic gripper designs to improve the efficiency of gripping and moving objects and provide greater flexibility to these objects. Neuro-fuzzy techniques are the most widespread in developing gripper designs. In this study, the traditional gripper design is modified by adding a suitable cam that makes it compatible with the basic design, and an adaptive neuro-fuzzy inference system (ANFIS) is used in a MATLAB Simulink environment. The developed gripper investigates the follower path concerning the cam surface curve, and the gripper position is controlled using the developed ANFIS-PID. Three methods are examined in the developed ANFIS-PID controller: grid partitioning (genfis1), subtractive clustering (genfis2), and fuzzy C-means clustering (genfis3). The results show that the added cam can improve the gripping strength and that the ANFIS-PID model effectively handles the rise time and supported settling time. The developed ANFIS-PID controller demonstrates more efficient performance than Fuzzy-PID and traditional tuned-PID controllers. This proposed controller does not achieve any overshoot, and the rise time is improved by approximately 50–51%, and the steady-state error is improved by 75–95%, compared with Fuzzy-PID and tuned PID controllers. Moreover, the developed ANFIS-PID controller provides more stability for a wide range of set point displacements—0.05 cm, 0.5 cm, and 1.5 cm—during the testing period. The developed ANFIS-PID controller is not affected by disturbance, making it well suited for robotic gripper designs. Grip force control is also investigated using the proposed ANFIS-PID controller and compared with the Fuzzy-PID in three scenarios. The result from this force control proves objects’ higher actual gripping performance by using the proposed ANFIS-PID. Full article
(This article belongs to the Collection Smart Robotics for Automation)
21 pages, 651 KiB  
Article
A Comparative Study of Incremental ΔΣ Analog-to-Digital Converter Architectures with Extended Order and Resolution
by Monica Aziz, Paul Kaesser, Sameh Ibrahim and Maurits Ortmanns
Electronics 2025, 14(2), 372; https://doi.org/10.3390/electronics14020372 (registering DOI) - 18 Jan 2025
Viewed by 80
Abstract
Incremental Delta-Sigma (I-DS) analog-to-digital converters (ADCs) are one of the best candidates for integrated sensor interface systems when it comes to high resolution and power efficiency. Advanced architectures such as Multistage noise shaping (MASH) or extended counting (EC) I-DS ADCs can be used [...] Read more.
Incremental Delta-Sigma (I-DS) analog-to-digital converters (ADCs) are one of the best candidates for integrated sensor interface systems when it comes to high resolution and power efficiency. Advanced architectures such as Multistage noise shaping (MASH) or extended counting (EC) I-DS ADCs can be used to achieve a high resolution and fast conversion times and avoid stability issues. Different architectures have been proposed in the state of the art (SoA), but there exists no extensive quantitative or qualitative comparison between them. This manuscript fills this gap by providing a detailed system-level comparison between MASH, EC, and other architectural options in I-DS ADCs, where different performances between these architectures are realized depending on the employed oversampling ratio (OSR) and the chosen number of quantizer bits. Also, for specific MASH designs, the appropriate choice of the digital filter improves the SQNR. The advantages, disadvantages, and limitations of the different architectures are presented including non-idealities such as coefficient mismatch showing that 2-1 MASH-LI is less sensitive to mismatch and provides a high maximum stable amplitude (MSA) relative to the simulated architectures. Furthermore, the 2-1 EC achieves good results and comes with the advantage of a lower noise penalty factor compared to the MASH architectures. This work is intended to assist designers in selecting the most appropriate enhanced I-DS MASH architecture for their specific requirements and applications. Full article
Show Figures

Figure 1

Figure 1
<p>(<b>a</b>) Multi-stage/-step I-DS ADC with three variants of requantization and (<b>b</b>) its timing diagram including the reset.</p>
Full article ">Figure 2
<p>(<b>a</b>) Block diagram of an exemplary incremental 2-1 MASH modulator with digital cancellation logic and reconstruction filter. The red dashed line indicates QE extraction from the first-stage quantizer (MASH-QE). The blue dashed line indicates the extraction of the QE from the last integrator output (MASH-LI) and (<b>b</b>) its timing diagram, including the reset.</p>
Full article ">Figure 3
<p>(<b>a</b>) Block diagram of an incremental 2-1 EC (Extended Counting) modulator with reconstruction filters and (<b>b</b>) its timing diagram, including the reset.</p>
Full article ">Figure 4
<p>Simulated SQNR of 2-0 and 2-1 MASH-QE, LI and EC at an OSR of 60. First stage: 3-bit quantizer. Second stage: 8-bit quantizer (2-0) or 4-bit quantizer (2-1).</p>
Full article ">Figure 5
<p>Simulated SQNR of 2-0 and 2-1 MASH-QE, LI and EC at an OSR of 60 including limiter blocks after each integrator and after the adder. First stage: 3-bit quantizer. Second stage: 8-bit quantizer (2-0) or 4-bit quantizer (2-1).</p>
Full article ">Figure 6
<p>Histogram of the swing at the output of the adder (before the limiter) at an input of −6 dBFS and at an input of −3 dBFS, respectively.</p>
Full article ">Figure 7
<p>Histogram of the swing at the last integrator output and the last sample of the last integrator output at an input amplitude of −3 dBFS, respectively.</p>
Full article ">Figure 8
<p>Simulated SQNR of 2-0 and 2-1 MASH-QE, LI and EC at an OSR of 60. An inter-stage gain of 6 is used for all the architectures. First stage: 3-bit quantizer. Second stage: 8-bit quantizer (2-0) or 4-bit quantizer (2-1).</p>
Full article ">Figure 9
<p>Simulated SQNR of 2-0 and 2-1 MASH-QE, LI, and EC at an input amplitude of −6 dBFS sinusoidal signal. An inter-stage gain of 6 is used for all the architectures. First stage: 3-bit quantizer. Second stage: 8-bit quantizer (2-0) or 4-bit quantizer (2-1).</p>
Full article ">Figure 10
<p>Simulated SQNR of 2-0 and 2-1 MASH-QE, LI and EC at an OSR of 100 and with limiter blocks included. First stage: 1-bit quantizer. Second stage: 8-bit quantizer (2-0) or 4-bit quantizer (2-1). The inter-stage gain is 1 for all architectures.</p>
Full article ">Figure 11
<p>NTFs of the exemplary 2-0 MASH-LI for the two different versions of the error cancellation logic <span class="html-italic">ECL</span><sub>LI,1</sub> and <span class="html-italic">ECL</span><sub>LI,2</sub>. Solid: single-bit quantizer in first stage and OSR = 100. Dashed: 3-bit quantizer in first stage and OSR = 60. The second stage is an 8-bit quantizer.</p>
Full article ">Figure 12
<p>Digital filter weights of the output of the second stage (<math display="inline"><semantics> <mrow> <msub> <mi>H</mi> <mn>2</mn> </msub> <mrow> <mo>(</mo> <mi>z</mi> <mo>)</mo> </mrow> <mo>·</mo> <mrow> <msub> <mi>H</mi> <mrow> <mi>rec</mi> </mrow> </msub> <mo stretchy="false">(</mo> <mi>z</mi> <mo stretchy="false">)</mo> </mrow> </mrow> </semantics></math>) in the case of the 2-0 MASH-LI at an OSR of 100. The first stage is scaled with the single-bit coefficients of <a href="#electronics-14-00372-t001" class="html-table">Table 1</a>. (<b>a</b>) shows the weights when <math display="inline"><semantics> <mrow> <msub> <mi>H</mi> <mn>2</mn> </msub> <mrow> <mo>(</mo> <mi>z</mi> <mo>)</mo> </mrow> </mrow> </semantics></math> is designed after <span class="html-italic">ECL</span><sub>LI,1</sub> and (<b>b</b>) for <span class="html-italic">ECL</span><sub>LI,2</sub>.</p>
Full article ">Figure 13
<p>Simulated mean and distribution of SQNR of the exemplary 2-0 MASH-QE, 2-0 MASH-LI and 2-0 EC architectures over the variation of the analog coefficients <math display="inline"><semantics> <msub> <mi>σ</mi> <mi>c</mi> </msub> </semantics></math> in percent at an input amplitude of −6 dBFS sinusoidal signal. OSR = 60, 3-bit first-stage and 8-bit second-stage quantizers, g = 6.</p>
Full article ">Figure 14
<p>Simulated mean and distribution of SQNR of the exemplary 2-1 MASH-QE, 2-1 MASH-LI, and 2-1 EC architectures at −6 dBFS sinusoidal input signal over the variation of analog coefficients with standard deviation <math display="inline"><semantics> <msub> <mi>σ</mi> <mi>c</mi> </msub> </semantics></math>. OSR = 60, 3-bit first stage and 4-bit second stage quantizers, g = 6.</p>
Full article ">Figure 15
<p>Simulated SQNR of 2-0 and 2-1 MASH-QE, LI and EC at an OSR of 60. First stage: 3-bit quantizer. Second stage: 8-bit quantizer (2-0) or 4-bit quantizer (2-1). The input is −6 dBFS sinusoidal signal and g = 6.</p>
Full article ">
25 pages, 11726 KiB  
Article
Low-Carbon Transformation of Polysilicon Park Energy Systems: Optimal Economic Strategy with TD3 Reinforcement Learning
by Shurui Hu, Chengwenxuan Zhao, Jialu Wu, Haiyang Bian, Yongkai Liu and Mingtao Li
Processes 2025, 13(1), 268; https://doi.org/10.3390/pr13010268 (registering DOI) - 18 Jan 2025
Viewed by 97
Abstract
To achieve the low-carbon transition in polysilicon production, this study proposes and validates a low-carbon economic dispatch strategy for a renewable hydrogen production and storage system in polysilicon parks based by TD3 algorithm. The study uses XGBoost to construct a surrogate model that [...] Read more.
To achieve the low-carbon transition in polysilicon production, this study proposes and validates a low-carbon economic dispatch strategy for a renewable hydrogen production and storage system in polysilicon parks based by TD3 algorithm. The study uses XGBoost to construct a surrogate model that reflects the nonlinear physical characteristics of the electrolyzer. Through a comparative analysis of operating strategies in five scenarios and sensitivity assessments of key parameters, complemented by comparisons with dispatch results from the DDPG and DQN algorithms, the effectiveness of the coupled operating strategy for electrolyzers, energy storage, and hydrogen storage devices is fully validated. This highlights the critical role of the TD3 algorithm in strengthening the robustness of the energy system under double-end source-load uncertainties. The results show that batteries flexibly adjust to the time-of-use electricity price, and the coordinated operation of the hydrogen storage devices as well as electrolyzers stabilize the electrolyzer efficiency, reducing the total system cost by 0.027% compared to fixed condition equipment models. The TD3 algorithm shows significant advantages in optimized dispatch, reducing the average daily operating cost by 0.6% and 1.2%, respectively, compared to the DDPG and DQN algorithms, and reducing the carbon emission cost by 2.0% and 12.0%, respectively. A comprehensive analysis shows that the proposed model reduces daily carbon emissions by 29.3% compared to the original system, but also introduces cost pressure, mainly due to the high operating costs of renewable energy equipment such as solar panels. This study provides a practical solution for renewable energy management. Full article
Show Figures

Figure 1

Figure 1
<p>Electrolyzer efficiency characteristic curve.</p>
Full article ">Figure 2
<p>Surrogate model prediction curve.</p>
Full article ">Figure 3
<p>Energy system architecture.</p>
Full article ">Figure 4
<p>TD3 algorithm network architecture.</p>
Full article ">Figure 5
<p>Weather prediction based on VMD-CNN-BiLSTM-Attention.</p>
Full article ">Figure 6
<p>Normalized data of irradiation, wind speed, load, and electricity price.</p>
Full article ">Figure 7
<p>Convergence curves of the TD3 algorithm under different hyperparameters.</p>
Full article ">Figure 8
<p>Dispatching strategy in different condition (<b>a</b>) energy balance in scenario 1; (<b>b</b>) typical summer condition; (<b>c</b>) typical winter condition; (<b>d</b>) reduced hydrogen tank capacity; (<b>e</b>) constant electrolyzer efficiency; (<b>f</b>) introducing average electrolyzer efficiency.</p>
Full article ">Figure 9
<p>Sensitivity analysis under price, renewable energy, and hydrogen demand volatility (<b>a</b>) price volatility; (<b>b</b>) renewable energy volatility; (<b>c</b>) hydrogen demand volatility.</p>
Full article ">
24 pages, 5440 KiB  
Article
Environmental Covariates for Sampling Optimization and Pest Prediction in Soybean Crops
by Cenneya Lopes Martins, Maiara Pusch, Wesley Augusto Conde Godoy and Lucas Rios do Amaral
AgriEngineering 2025, 7(1), 21; https://doi.org/10.3390/agriengineering7010021 (registering DOI) - 18 Jan 2025
Viewed by 71
Abstract
Insect pest infestations can vary due to spatial differences in microclimates and food availability within agroecosystems. Covariates can reflect these environmental conditions. This study tested whether using environmental covariates in two-phase sample optimization improved the spatial predictions for soybean insect pests. During the [...] Read more.
Insect pest infestations can vary due to spatial differences in microclimates and food availability within agroecosystems. Covariates can reflect these environmental conditions. This study tested whether using environmental covariates in two-phase sample optimization improved the spatial predictions for soybean insect pests. During the 2021–2022 crop season, insect pest samples were collected at 50 georeferenced points in a commercial soybean field in Brazil, alongside data on environmental covariates such as vegetation indices, soil properties, terrain topography, and distances from riparian areas. Three covariates were selected using correlation and principal component analysis (PCA). In the 2022–2023 crop season, sample designs were optimized using the iterative algorithm optimization of sample configurations using spatial simulated annealing (SPSANN) using the selected covariates, resulting in two optimized designs that were compared to a regular grid. Data from the three sampling designs comprising 50 points were evaluated using geostatistical methods, regression analysis (pest abundance), and classification (pest presence or absence) via the random forest algorithm. The data showed no spatial dependence, making using geostatistical interpolators inappropriate. However, a multi-objective optimized sampling design, tailored to refine configurations for identifying and estimating variograms and spatial trends essential for spatial interpolation, produced the most accurate predictions. Therefore, a two-phase sample optimization with prior in situ selection of environmental covariates improves pest predictions in agricultural systems, contributing to more efficient and sustainable agricultural management. Full article
Show Figures

Figure 1

Figure 1
<p>Diagram of the two-phase sample optimization research using environmental covariates.</p>
Full article ">Figure 2
<p>Location of the experimental area showing the two fields. Cartographic base: IBGE, 2023. Basemap: Google Satellite.</p>
Full article ">Figure 3
<p>Environmental covariates. Vegetation indices (cycle image): EVI, NDVI, NDRE, SFDVI, and DVI ((<b>A</b>–<b>E</b>), respectively); soil clay content (<b>F</b>); slope (<b>G</b>); river distance (<b>H</b>), and riparian forest distance (<b>I</b>).</p>
Full article ">Figure 4
<p>Sampling designs in Phase 1 (<b>A</b>) and Phase 2 (<b>B</b>–<b>E</b>). (<b>A</b>) Phase 1: 28 optimized MSSD sampling points combined with 22 random points (50 points). Phase 2: Regular grid (<b>B</b>), optimized CORR design (<b>C</b>), optimized SPAN design (<b>D</b>), each with 50 points, and external dataset (20 points).</p>
Full article ">Figure 5
<p>PCA results using the median of pests and the mean of the VIs in the soybean cycle.</p>
Full article ">Figure 6
<p>Scatter plots and metrics of RF regression modeling using environmental covariates in predicting the total pests using the regular (squares), CORR (stars), and SPAN (triangles) sampling designs ((<b>A</b>–<b>C</b>), respectively), and the prediction of <span class="html-italic">E. heros</span> in the same sampling designs (<b>D</b>–<b>F</b>). The red line represents the 1:1 ideal relationship (observed = predicted), while the dashed line indicates the regression line of the model predictions.</p>
Full article ">Figure 7
<p>Scatter plots and external validation metrics for the total pest predictions using the regular (squares), CORR (stars), and SPAN (triangles) sampling designs ((<b>A</b>–<b>C</b>), respectively). The red line represents the 1:1 ideal relationship (observed = predicted), while the dashed line indicates the regression line of the model predictions.</p>
Full article ">Figure 8
<p>Environmental covariates, pest sampling points, and prediction maps. (<b>A</b>–<b>C</b>) Environmental covariates selected in phase 1: soil clay content, NDVI, and distance from river. (<b>D</b>–<b>F</b>) Predicted maps using the RF regression algorithm, with environmental covariates as predictors of total pests abundance in the regular, CORR, and SPAN sampling designs, respectively. (<b>G</b>–<b>I</b>) Predicted maps using the RF classifier algorithm, with environmental covariates as predictors of the presence and absence of <span class="html-italic">E. heros</span> in the regular, CORR, and SPAN sampling designs, respectively.</p>
Full article ">
23 pages, 7213 KiB  
Article
Advanced Adaptive Rule-Based Energy Management for Hybrid Energy Storage Systems (HESSs) to Enhance the Driving Range of Electric Vehicles
by Chew Kuew Wai, Taha Sadeq and Lee Cheun Hau
Vehicles 2025, 7(1), 6; https://doi.org/10.3390/vehicles7010006 (registering DOI) - 18 Jan 2025
Viewed by 90
Abstract
The energy storage system (ESS) plays a crucial role in electric vehicles (EVs), impacting their performance and efficiency. While batteries are the standard choice for energy storage, they come with drawbacks like low power density and limited life cycles, which can hinder pure [...] Read more.
The energy storage system (ESS) plays a crucial role in electric vehicles (EVs), impacting their performance and efficiency. While batteries are the standard choice for energy storage, they come with drawbacks like low power density and limited life cycles, which can hinder pure battery electric vehicles (PBEVs). To address these issues, a hybrid energy storage system (HESS) that combines a battery with a supercapacitor provides a more effective solution. The battery delivers consistent power, while the supercapacitor manages peak power demands and regenerative braking energy. This study proposes a new energy management strategy for the HESS, an advanced adaptive rule-based algorithm. The results of the standard rule-based and adaptive rule-based algorithms are used to verify the proposed control algorithm. The system was modeled in MATLAB/Simulink and evaluated across three driving cycles—UDDS, NYCC, and Japan1015—while varying states of charge for the supercapacitors. The findings indicate that the HESS significantly alleviates battery stress compared to a pure battery system, enhancing both efficiency and lifespan. Among the algorithms tested, the advanced adaptive rule-based algorithm yielded the best results, increasing the number of viable drive cycles. Full article
(This article belongs to the Topic Electric Vehicles Energy Management, 2nd Volume)
Show Figures

Figure 1

Figure 1
<p>The main topologies for the HESS in the literature. (<b>a</b>) passive topology, (<b>b</b>) semi-active topology type 1, (<b>c</b>) semi-active topology type 2, (<b>d</b>) active topology type 1, (<b>e</b>) active topology type 2, (<b>f</b>) active topology type 3.</p>
Full article ">Figure 2
<p>The classification of energy management systems for HESSs.</p>
Full article ">Figure 3
<p>Architecture of HESS for the electric vehicle in this research.</p>
Full article ">Figure 4
<p>HESS MATLAB/Simulink model based on the standard drive cycles.</p>
Full article ">Figure 5
<p>The standard rule-based algorithm flowchart.</p>
Full article ">Figure 6
<p>An adaptive rule-based algorithm flowchart.</p>
Full article ">Figure 7
<p>The advanced adaptive rule-based algorithm flowchart.</p>
Full article ">Figure 8
<p>HESS currents during first case using the standard rule-based algorithm for (<b>a</b>) UDDS, (<b>b</b>) NYCC, and (<b>c</b>) Japan1015.</p>
Full article ">Figure 8 Cont.
<p>HESS currents during first case using the standard rule-based algorithm for (<b>a</b>) UDDS, (<b>b</b>) NYCC, and (<b>c</b>) Japan1015.</p>
Full article ">Figure 9
<p>The battery states of charge in the three cases using the standard rule-based algorithm for UDDS, NYCC, and Japan1015 drive cycles.</p>
Full article ">Figure 10
<p>The supercapacitor states of charge in the three cases using the standard rule-based algorithm for UDDS, NYCC, and Japan1015 drive cycles.</p>
Full article ">Figure 11
<p>HESS currents during first case using the adaptive rule-based algorithm for (<b>a</b>) UDDS, (<b>b</b>) NYCC, and (<b>c</b>) Japan1015.</p>
Full article ">Figure 12
<p>The battery states of charge in the three cases using the adaptive rule-based algorithm for UDDS, NYCC, and Japan1015 drive cycles.</p>
Full article ">Figure 13
<p>The supercapacitor states of charge in the three cases using the adaptive rule-based algorithm for UDDS, NYCC, and Japan1015 drive cycles.</p>
Full article ">Figure 14
<p>HESS currents during first case using the advanced adaptive rule-based algorithm for (<b>a</b>) UDDS, (<b>b</b>) NYCC, and (<b>c</b>) Japan1015.</p>
Full article ">Figure 14 Cont.
<p>HESS currents during first case using the advanced adaptive rule-based algorithm for (<b>a</b>) UDDS, (<b>b</b>) NYCC, and (<b>c</b>) Japan1015.</p>
Full article ">Figure 15
<p>The battery states of charge in the three cases using the advanced adaptive rule-based algorithm for UDDS, NYCC, and Japan1015 drive cycles.</p>
Full article ">Figure 16
<p>The supercapacitor states of charge in the three cases using the advanced adaptive rule-based algorithm for UDDS, NYCC, and Japan1015 drive cycles.</p>
Full article ">Figure 17
<p>Comparison of the battery states of charge in the three cases using the three rule-based algorithms for UDDS, NYCC, and Japan1015 drive cycles.</p>
Full article ">
19 pages, 7245 KiB  
Article
Integrating Drone Truthing and Functional Classification of Remote Sensing Time Series for Supervised Vegetation Mapping
by Giacomo Quattrini, Simone Pesaresi, Nicole Hofmann, Adriano Mancini and Simona Casavecchia
Remote Sens. 2025, 17(2), 330; https://doi.org/10.3390/rs17020330 (registering DOI) - 18 Jan 2025
Viewed by 127
Abstract
Accurate vegetation mapping is essential for monitoring biodiversity and managing habitats, particularly in the context of increasing environmental pressures and conservation needs. Ground truthing plays a crucial role in ensuring the accuracy of supervised remote sensing maps, as it provides the high-quality reference [...] Read more.
Accurate vegetation mapping is essential for monitoring biodiversity and managing habitats, particularly in the context of increasing environmental pressures and conservation needs. Ground truthing plays a crucial role in ensuring the accuracy of supervised remote sensing maps, as it provides the high-quality reference data needed for model training and validation. However, traditional ground truthing methods are labor-intensive, time-consuming and restricted in spatial coverage, posing challenges for large-scale or complex landscapes. The advent of drone technology offers an efficient and cost-effective solution to these limitations, enabling the rapid collection of high-resolution imagery even in remote or inaccessible areas. This study proposes an approach to enhance the efficiency of supervised vegetation mapping in complex landscapes, integrating Multivariate Functional Principal Component Analysis (MFPCA) applied to the Sentinel-2 time series with drone-based ground truthing. Unlike traditional ground truthing activities, drone truthing enabled the generation of large, spatially balanced reference datasets, which are critical for machine learning classification systems. These datasets improved classification accuracy by ensuring a comprehensive representation of vegetation spectral variability, enabling the classifier to identify the key phenological patterns that best characterize and distinguish different vegetation types across the landscape. The proposed methodology achieves a classification accuracy of 92.59%, significantly exceeding the commonly reported thresholds for habitat mapping. This approach, characterized by its efficiency, repeatability and adaptability, aligns seamlessly with key environmental monitoring and conservation policies, such as the Habitats Directive. By integrating advanced remote sensing with drone-based technologies, it offers a scalable and cost-effective solution to the challenges of biodiversity monitoring, enabling timely updates and supporting effective habitat management in diverse and complex environments. Full article
Show Figures

Figure 1

Figure 1
<p>Supervised pipeline to derive plant associations and habitat maps from Sentinel-2 time series using Multivariate Functional Principal Component Analysis and drone truthing activities.</p>
Full article ">Figure 2
<p>Study area: (<b>a</b>) overview of the study area on a regional scale. (<b>b</b>) Reference data overlaid on the Digital Elevation Model, marking the boundaries of the Gola del Furlo State Nature Reserve (in black), the Special Protection Area (SPA) “Furlo” (code: IT5310029) (in blue) and the Special Area of Conservation (SAC) “Gola del Furlo” (IT5310016) (in red). (<b>c</b>) Entry points to the Furlo Gorge, with Mount Paganuccio to the left and Mount Pietralata to the right.</p>
Full article ">Figure 3
<p>Drone photo acquisition at each survey point. Initially, an overhead photo (<b>a</b>) is captured from high above the canopy. This is followed by a close-range shot (<b>b</b>), providing a detailed view. Here, <span class="html-italic">Ostrya carpinifolia</span> is prominently visible. At this lower altitude, photos are taken in the four cardinal directions (north, east, south, and west) for species abundance estimation. Both photos were captured on 6 July 2022.</p>
Full article ">Figure 4
<p>Graphical representation of the main findings from the Functional Data Analysis applied to the multispectral weekly time series of the Furlo area. (<b>a</b>) Seasonal profiles for all of the pixels in the study area, with the columns representing the nine Sentinel-2 bands analyzed. (<b>b</b>) The first three MFPCA components. The influence of these components on the overall means of the nine selected time series (depicted by the black line) is shown by adding (red line) or subtracting (blue line) a multiple (e.g., the median of the scores) of each principal functional component. (<b>c</b>) MFPCA ordination space based on the top three MFPCA components, enabling comparisons between vegetation types. The spider diagram illustrates the relationship between MFPC components and vegetation types, with the labels corresponding to <a href="#remotesensing-17-00330-t001" class="html-table">Table 1</a>.</p>
Full article ">Figure 5
<p>Seasonal temporal profiles of the target classes across various spectral bands correspond to the 1118 reference data points. The bold red line represents the mean vegetation band variation. The red polygon shows the 10th–90th percentile range. The black line represents the mean vegetation band variation for the entire study area. The row acronyms denote the plant associations and habitats listed in <a href="#remotesensing-17-00330-t001" class="html-table">Table 1</a>, while the columns refer to the different Sentinel-2 bands.</p>
Full article ">Figure 6
<p>Vegetation and habitats map of study area: the map was obtained by the supervised random forest classification of the main seasonal remotely sensed phenological variations, as well as the main topographic predictors. The legend acronyms correspond to the plant associations and habitats listed in <a href="#remotesensing-17-00330-t001" class="html-table">Table 1</a>. The boundaries of the Gola del Furlo State Nature Reserve are outlined in black, that of the Special Protection Area (SPA) “Furlo” (code: IT5310029) are outlined in blue, and that of the Special Area of Conservation (SAC) “Gola del Furlo” (IT5310016) are outlined in red.</p>
Full article ">Figure 7
<p>Forested area, photographed on 7 October 2022, which was challenging to survey with traditional methods due to its inaccessibility and complex topography, which would have required considerable time.</p>
Full article ">Figure A1
<p>Proportion of variance explained by the identified functional components (eigenvalues). The bar plot shows the proportion of variance explained by each principal component, with the cumulative variance illustrated by the red line. The first three components individually explain 48.55%, 26.79%, and 10.17% of the variance, respectively, accounting for a combined total of 85.51% of the variance. Collectively, the first 10 components account for 97.40% of the total variance.</p>
Full article ">
35 pages, 15001 KiB  
Article
Structural Response Prediction of Floating Offshore Wind Turbines Based on Force-to-Motion Transfer Functions and State-Space Models
by Jie Xu, Changjie Li, Wei Jiang, Fei Lin, Shi Liu, Hongchao Lu and Hongbo Wang
J. Mar. Sci. Eng. 2025, 13(1), 160; https://doi.org/10.3390/jmse13010160 (registering DOI) - 18 Jan 2025
Viewed by 114
Abstract
This paper proposes an innovative algorithm for forecasting the motion response of floating offshore wind turbines by employing force-to-motion transfer functions and state-space models. Traditional numerical integration techniques, such as the Newmark-β method, frequently struggle with inefficiencies due to the heavy computational demands [...] Read more.
This paper proposes an innovative algorithm for forecasting the motion response of floating offshore wind turbines by employing force-to-motion transfer functions and state-space models. Traditional numerical integration techniques, such as the Newmark-β method, frequently struggle with inefficiencies due to the heavy computational demands of convolution integrals in the Cummins equation. Our new method tackles these challenges by converting the problem into a system output calculation, thereby eliminating convolutions and potentially enhancing computational efficiency. The procedure begins with the estimation of force-to-motion transfer functions derived from the hydrostatic and hydrodynamic characteristics of the wind turbine. These transfer functions are then utilized to construct state-space models, which compactly represent the system dynamics. Motion responses resulting from initial conditions and wave forces are calculated using these state-space models, leveraging their poles and residues. We validated the proposed method by comparing its calculated responses to those obtained via the Newmark-β method. Initial tests on a single-degree-of-freedom (SDOF) system demonstrated that our algorithm accurately predicts motion responses. Further validation involved a numerical model of a spar-type floating offshore wind turbine, showing high accuracy in predicting responses to both regular and irregular wave conditions, closely aligning with results from conventional methods. Additionally, we assessed the efficiency of our algorithm over various simulation durations, confirming its superior performance compared to traditional time-domain methods. This efficiency is particularly advantageous for long-duration simulations. The proposed approach provides a robust and efficient alternative for predicting motion responses in floating offshore wind turbines, combining high accuracy with improved computational performance. It represents a promising tool for enhancing the development and evaluation of offshore wind energy systems. Full article
(This article belongs to the Special Issue Ship Behaviour in Extreme Sea Conditions)
Show Figures

Figure 1

Figure 1
<p>Flow diagram of the proposed algorithm.</p>
Full article ">Figure 2
<p>Discrete hydrodynamic parameters of SODF system: (<b>a</b>) added mass; and (<b>b</b>) damping.</p>
Full article ">Figure 3
<p>Comparison of the transfer function <math display="inline"><semantics> <mrow> <msub> <mi>H</mi> <mn>1</mn> </msub> <mo stretchy="false">(</mo> <mi>s</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math> between the analytical solution and the value determined by proposed algorithm.</p>
Full article ">Figure 4
<p>Comparison of the transfer function <math display="inline"><semantics> <mrow> <msub> <mi>H</mi> <mn>2</mn> </msub> <mo stretchy="false">(</mo> <mi>s</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math> between the analytical solution and the value determined by proposed algorithm.</p>
Full article ">Figure 5
<p>Comparison of the transfer function <math display="inline"><semantics> <mrow> <msub> <mi>H</mi> <mn>3</mn> </msub> <mo stretchy="false">(</mo> <mi>s</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math> between the analytical solution and the value determined by proposed algorithm.</p>
Full article ">Figure 6
<p>Impulse response functions of SDOF system: (<b>a</b>) <math display="inline"><semantics> <mrow> <msub> <mi>h</mi> <mn>1</mn> </msub> <mo stretchy="false">(</mo> <mi>s</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math> (<b>b</b>) <math display="inline"><semantics> <mrow> <msub> <mi>h</mi> <mn>2</mn> </msub> <mo stretchy="false">(</mo> <mi>s</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math> (<b>c</b>) <math display="inline"><semantics> <mrow> <msub> <mi>h</mi> <mn>3</mn> </msub> <mo stretchy="false">(</mo> <mi>s</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 7
<p>Retardation function of SODF system.</p>
Full article ">Figure 8
<p>Comparison of motion response due to initial conditions using Newmark-β and proposed algorithm.</p>
Full article ">Figure 9
<p>Exciting force acting on SDOF system.</p>
Full article ">Figure 10
<p>Total response comparison of SDOF system calculated by Newmark-β and proposed algorithm.</p>
Full article ">Figure 11
<p>Total response comparison in frequency domain: (<b>a</b>) amplitude; and (<b>b</b>) phase.</p>
Full article ">Figure 12
<p>Structural model of spar-type floating offshore wind turbine: (<b>a</b>) structural model; (<b>b</b>) hydrodynamic model.</p>
Full article ">Figure 13
<p>Added mass for floating offshore wind turbine: (<b>a</b>) <math display="inline"><semantics> <mrow> <msub> <mi>A</mi> <mrow> <mn>11</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>ω</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <msub> <mi>A</mi> <mrow> <mn>15</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>ω</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>c</b>) <math display="inline"><semantics> <mrow> <msub> <mi>A</mi> <mrow> <mn>24</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>ω</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>d</b>) <math display="inline"><semantics> <mrow> <msub> <mi>A</mi> <mrow> <mn>33</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>ω</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>e</b>) <math display="inline"><semantics> <mrow> <msub> <mi>A</mi> <mrow> <mn>44</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>ω</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; and (<b>f</b>) <math display="inline"><semantics> <mrow> <msub> <mi>A</mi> <mrow> <mn>66</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>ω</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 14
<p>Potential damping for floating offshore wind turbine: (<b>a</b>) <math display="inline"><semantics> <mrow> <msub> <mi>B</mi> <mrow> <mn>11</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>ω</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <msub> <mi>B</mi> <mrow> <mn>15</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>ω</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>c</b>) <math display="inline"><semantics> <mrow> <msub> <mi>B</mi> <mrow> <mn>24</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>ω</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>d</b>) <math display="inline"><semantics> <mrow> <msub> <mi>B</mi> <mrow> <mn>33</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>ω</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>e</b>) <math display="inline"><semantics> <mrow> <msub> <mi>B</mi> <mrow> <mn>44</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>ω</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; and (<b>f</b>) <math display="inline"><semantics> <mrow> <msub> <mi>B</mi> <mrow> <mn>66</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>ω</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 15
<p>Time history of retardation function: (<b>a</b>) <math display="inline"><semantics> <mrow> <msub> <mi>K</mi> <mrow> <mn>11</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <msub> <mi>K</mi> <mrow> <mn>15</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>c</b>) <math display="inline"><semantics> <mrow> <msub> <mi>K</mi> <mrow> <mn>24</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>d</b>) <math display="inline"><semantics> <mrow> <msub> <mi>K</mi> <mrow> <mn>33</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>e</b>) <math display="inline"><semantics> <mrow> <msub> <mi>K</mi> <mrow> <mn>44</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; and (<b>f</b>) <math display="inline"><semantics> <mrow> <msub> <mi>K</mi> <mrow> <mn>66</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 16
<p>Initial and estimated transfer function comparison of <math display="inline"><semantics> <mrow> <msub> <mi>H</mi> <mn>1</mn> </msub> <mo stretchy="false">(</mo> <mi>s</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>: (<b>a</b>) <math display="inline"><semantics> <mrow> <msub> <mi>H</mi> <mrow> <mn>1</mn> <mo>,</mo> <mn>11</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>s</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <msub> <mi>H</mi> <mrow> <mn>1</mn> <mo>,</mo> <mn>15</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>s</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>c</b>) <math display="inline"><semantics> <mrow> <msub> <mi>H</mi> <mrow> <mn>1</mn> <mo>,</mo> <mn>24</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>s</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>d</b>) <math display="inline"><semantics> <mrow> <msub> <mi>H</mi> <mrow> <mn>1</mn> <mo>,</mo> <mn>33</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>s</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>e</b>) <math display="inline"><semantics> <mrow> <msub> <mi>H</mi> <mrow> <mn>1</mn> <mo>,</mo> <mn>44</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>s</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; and (<b>f</b>) <math display="inline"><semantics> <mrow> <msub> <mi>H</mi> <mrow> <mn>1</mn> <mo>,</mo> <mn>66</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>s</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 17
<p>Initial and estimated transfer function comparison of <math display="inline"><semantics> <mrow> <msub> <mi>H</mi> <mn>2</mn> </msub> <mo stretchy="false">(</mo> <mi>s</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>: (<b>a</b>) <math display="inline"><semantics> <mrow> <msub> <mi>H</mi> <mrow> <mn>2</mn> <mo>,</mo> <mn>11</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>s</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <msub> <mi>H</mi> <mrow> <mn>2</mn> <mo>,</mo> <mn>15</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>s</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>c</b>) <math display="inline"><semantics> <mrow> <msub> <mi>H</mi> <mrow> <mn>2</mn> <mo>,</mo> <mn>24</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>s</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>d</b>) <math display="inline"><semantics> <mrow> <msub> <mi>H</mi> <mrow> <mn>2</mn> <mo>,</mo> <mn>33</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>s</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>e</b>) <math display="inline"><semantics> <mrow> <msub> <mi>H</mi> <mrow> <mn>2</mn> <mo>,</mo> <mn>44</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>s</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; and (<b>f</b>) <math display="inline"><semantics> <mrow> <msub> <mi>H</mi> <mrow> <mn>2</mn> <mo>,</mo> <mn>66</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>s</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 18
<p>Initial and estimated transfer function comparison of <math display="inline"><semantics> <mrow> <msub> <mi>H</mi> <mn>3</mn> </msub> <mo stretchy="false">(</mo> <mi>s</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>: (<b>a</b>) <math display="inline"><semantics> <mrow> <msub> <mi>H</mi> <mrow> <mn>3</mn> <mo>,</mo> <mn>11</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>s</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <msub> <mi>H</mi> <mrow> <mn>3</mn> <mo>,</mo> <mn>15</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>s</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>c</b>) <math display="inline"><semantics> <mrow> <msub> <mi>H</mi> <mrow> <mn>3</mn> <mo>,</mo> <mn>24</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>s</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>d</b>) <math display="inline"><semantics> <mrow> <msub> <mi>H</mi> <mrow> <mn>3</mn> <mo>,</mo> <mn>33</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>s</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>e</b>) <math display="inline"><semantics> <mrow> <msub> <mi>H</mi> <mrow> <mn>3</mn> <mo>,</mo> <mn>44</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>s</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; and (<b>f</b>) <math display="inline"><semantics> <mrow> <msub> <mi>H</mi> <mrow> <mn>3</mn> <mo>,</mo> <mn>66</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>s</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 19
<p>Impulse response function of <math display="inline"><semantics> <mrow> <msub> <mstyle mathvariant="bold" mathsize="normal"> <mi mathvariant="bold-italic">h</mi> </mstyle> <mn>1</mn> </msub> <mo stretchy="false">(</mo> <mi>s</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>: (<b>a</b>) <math display="inline"><semantics> <mrow> <msub> <mi>h</mi> <mrow> <mn>1</mn> <mo>,</mo> <mn>11</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <msub> <mi>h</mi> <mrow> <mn>1</mn> <mo>,</mo> <mn>15</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>c</b>) <math display="inline"><semantics> <mrow> <msub> <mi>h</mi> <mrow> <mn>1</mn> <mo>,</mo> <mn>24</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>d</b>) <math display="inline"><semantics> <mrow> <msub> <mi>h</mi> <mrow> <mn>1</mn> <mo>,</mo> <mn>33</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>e</b>) <math display="inline"><semantics> <mrow> <msub> <mi>h</mi> <mrow> <mn>1</mn> <mo>,</mo> <mn>44</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; and (<b>f</b>) <math display="inline"><semantics> <mrow> <msub> <mi>h</mi> <mrow> <mn>1</mn> <mo>,</mo> <mn>66</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 20
<p>Impulse response function of <math display="inline"><semantics> <mrow> <msub> <mstyle mathvariant="bold" mathsize="normal"> <mi mathvariant="bold-italic">h</mi> </mstyle> <mn>2</mn> </msub> <mo stretchy="false">(</mo> <mi>s</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>: (<b>a</b>) <math display="inline"><semantics> <mrow> <msub> <mi>h</mi> <mrow> <mn>2</mn> <mo>,</mo> <mn>11</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <msub> <mi>h</mi> <mrow> <mn>2</mn> <mo>,</mo> <mn>15</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>c</b>) <math display="inline"><semantics> <mrow> <msub> <mi>h</mi> <mrow> <mn>2</mn> <mo>,</mo> <mn>24</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>d</b>) <math display="inline"><semantics> <mrow> <msub> <mi>h</mi> <mrow> <mn>2</mn> <mo>,</mo> <mn>33</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>e</b>) <math display="inline"><semantics> <mrow> <msub> <mi>h</mi> <mrow> <mn>2</mn> <mo>,</mo> <mn>44</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; and (<b>f</b>) <math display="inline"><semantics> <mrow> <msub> <mi>h</mi> <mrow> <mn>2</mn> <mo>,</mo> <mn>66</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 21
<p>Impulse response function of <math display="inline"><semantics> <mrow> <msub> <mstyle mathvariant="bold" mathsize="normal"> <mi mathvariant="bold-italic">h</mi> </mstyle> <mn>3</mn> </msub> <mo stretchy="false">(</mo> <mi>s</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>: (<b>a</b>) <math display="inline"><semantics> <mrow> <msub> <mi>h</mi> <mrow> <mn>3</mn> <mo>,</mo> <mn>11</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <msub> <mi>h</mi> <mrow> <mn>3</mn> <mo>,</mo> <mn>15</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>c</b>) <math display="inline"><semantics> <mrow> <msub> <mi>h</mi> <mrow> <mn>3</mn> <mo>,</mo> <mn>24</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>d</b>) <math display="inline"><semantics> <mrow> <msub> <mi>h</mi> <mrow> <mn>3</mn> <mo>,</mo> <mn>33</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>e</b>) <math display="inline"><semantics> <mrow> <msub> <mi>h</mi> <mrow> <mn>3</mn> <mo>,</mo> <mn>44</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; and (<b>f</b>) <math display="inline"><semantics> <mrow> <msub> <mi>h</mi> <mrow> <mn>3</mn> <mo>,</mo> <mn>66</mn> </mrow> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 22
<p>Initial conditions of floating offshore wind turbine: (<b>a</b>) displacement; and (<b>b</b>) velocity.</p>
Full article ">Figure 23
<p>Comparison of motion response due to initial conditions using Newmark-β and proposed method: (<b>a</b>) <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mn>1</mn> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mn>2</mn> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>c</b>) <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mn>3</mn> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>d</b>) <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mn>4</mn> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>e</b>) <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mn>5</mn> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; and (<b>f</b>) <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mn>6</mn> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 24
<p>Hydrodynamic wave force per unit amplitude: (<b>a</b>) amplitude of surge; (<b>b</b>) phase of surge; (<b>c</b>) amplitude of heave; (<b>d</b>) phase of heave; (<b>e</b>) amplitude of pitch; and (<b>f</b>) phase of pitch.</p>
Full article ">Figure 25
<p>Regular wave force: (<b>a</b>) surge; (<b>b</b>) heave; and (<b>c</b>) pitch.</p>
Full article ">Figure 26
<p>Calculated motion response exited by regular wave: (<b>a</b>) <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mn>1</mn> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mn>3</mn> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; and (<b>c</b>) <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mn>5</mn> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 27
<p>Jonswap spectrum to simulate irregular waves.</p>
Full article ">Figure 28
<p>Irregular wave force: (<b>a</b>) surge; (<b>b</b>) heave; and (<b>c</b>) pitch.</p>
Full article ">Figure 29
<p>Calculated motion response exited by irregular wave: (<b>a</b>) <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mn>1</mn> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; (<b>b</b>) <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mn>3</mn> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>; and (<b>c</b>) <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mn>5</mn> </msub> <mo stretchy="false">(</mo> <mi>t</mi> <mo stretchy="false">)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 30
<p>Time consumption of proposed and Newmark-β.</p>
Full article ">
22 pages, 3406 KiB  
Article
Design of a Multi-Layer Symmetric Encryption System Using Reversible Cellular Automata
by George Cosmin Stănică and Petre Anghelescu
Mathematics 2025, 13(2), 304; https://doi.org/10.3390/math13020304 (registering DOI) - 18 Jan 2025
Viewed by 121
Abstract
The increasing demand for secure and efficient encryption algorithms has intensified the exploration of alternative cryptographic solutions, including biologically inspired systems like cellular automata. This study presents a symmetric block encryption design based on multiple reversible cellular automata (RCAs) that can assure both [...] Read more.
The increasing demand for secure and efficient encryption algorithms has intensified the exploration of alternative cryptographic solutions, including biologically inspired systems like cellular automata. This study presents a symmetric block encryption design based on multiple reversible cellular automata (RCAs) that can assure both computational efficiency and reliable restoration of original data. The encryption key, with a length of 224 bits, is composed of specific rules used by the four distinct RCAs: three with radius-2 neighborhoods and one with a radius-3 neighborhood. By dividing plaintext into 128-bit blocks, the algorithm performs iterative transformations over multiple rounds. Each round includes forward or backward evolution steps, along with dynamically computed shift values and reversible transformations to securely encrypt or decrypt data. The encryption process concludes with an additional layer of security by encrypting the final RCA configurations, further protecting against potential attacks on the encrypted data. Additionally, the 224-bit key length provides robust resistance against brute force attacks. Testing and analysis were performed using a custom-developed software (version 1.0) application, which helped demonstrate the algorithm’s robustness, encryption accuracy, and ability to maintain data integrity. Full article
(This article belongs to the Section E1: Mathematics and Computer Science)
Show Figures

Figure 1

Figure 1
<p>Visual representation of common boundary types.</p>
Full article ">Figure 2
<p>Reversible cellular automata cell state evolution.</p>
Full article ">Figure 3
<p>Principles of encryption and decryption using reversible cellular automata.</p>
Full article ">Figure 4
<p>Example of 8-bit LHCA with 90/150 rules.</p>
Full article ">Figure 5
<p>Round operations.</p>
Full article ">Figure 6
<p>Encryption of multiple blocks of plaintext.</p>
Full article ">Figure 7
<p>Production of shift values from SCA evolution.</p>
Full article ">Figure 8
<p>Usage of random generated data in the encryption system.</p>
Full article ">Figure 9
<p>Secret key architecture and role.</p>
Full article ">Figure 10
<p>Data diffusion across ASCII range: (<b>a</b>) Plaintext; (<b>b</b>) Ciphertext.</p>
Full article ">Figure 11
<p>Avalanche effect across a different number of rounds.</p>
Full article ">Figure 12
<p>Avalanche effect (multiple sample data).</p>
Full article ">
Back to TopTop