[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (5,588)

Search Parameters:
Keywords = threat modeling

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
25 pages, 1083 KiB  
Article
Transforming Architectural Programs to Meet Industry 4.0 Demands: SWOT Analysis and Insights for Achieving Saudi Arabia’s Strategic Vision
by Aljawharah A. Alnaser, Jamil Binabid and Samad M. E. Sepasgozar
Buildings 2024, 14(12), 4005; https://doi.org/10.3390/buildings14124005 - 17 Dec 2024
Abstract
The Fourth Industrial Revolution (Industry 4.0) has profoundly transformed industries worldwide through the integration of advanced digital technologies, including artificial intelligence, digital twins, building information modeling (BIM), and the Internet of Things (IoT). The Architecture, Construction, and Engineering (ACE) sectors are increasingly adopting [...] Read more.
The Fourth Industrial Revolution (Industry 4.0) has profoundly transformed industries worldwide through the integration of advanced digital technologies, including artificial intelligence, digital twins, building information modeling (BIM), and the Internet of Things (IoT). The Architecture, Construction, and Engineering (ACE) sectors are increasingly adopting these innovations to meet the evolving demands of the global market. Within this dynamic context, Saudi Arabia has emerged as a front-runner and significant investor in this sector, as evidenced by the launch of ambitious mega-projects such as NEOM and The Line. These developments prompt valuable discussions about the readiness of graduates to adapt to rapid technological advancements and meet the current demands of the Saudi market. Although numerous studies have explored this issue, the Saudi context presents unique challenges and opportunities due to the accelerated pace of change within the ACE sectors, driven by the goals of Vision 2030. For this reason, this paper aims to address this gap by exploring the readiness of architectural programs in the context of Saudi Arabia to meet the demands of Industry 4.0. To achieve this, a comprehensive literature review was conducted, developing an analytical framework. Subsequently, a multiple-cases approach was employed, with an overall top-level discussion on the undergraduate architecture program subjects available in the five regions in Saudi Arabia. A combination of field observations, domain expertise, and evidence-based coding methods was employed to develop the SWOT analysis. The SWOT framework was utilized to identify key strengths, weaknesses, opportunities, and threats within the current academic programs. The findings were then analyzed in a comprehensive discussion, highlighting necessary transformations in existing programs. The methodology employed in our study involves prolonged engagement and persistent observation to enhance the quality and credibility of the discussion. This paper serves as a roadmap for guiding future educational reforms and aligning architectural education with emerging industry demands and technological advancements in the field. Four key themes are essential for aligning architectural education with Industry 4.0: sustainability in the built environment, innovation and creativity, digital applications in the built environment, and entrepreneurship and leadership in venture engineering. It also strongly emphasized sustainability courses and noted notable deficiencies in preparing students for a digitally driven professional landscape. For example, the average program comprises 162 credit hours and 58 courses, with only six related to Industry 4.0. The top five institutions offering Industry 4.0 courses ranked from highest to lowest are ARCH-U11, ARCH-U8, ARCH-U3, ARCH-U4, and ARCH-U15. ARCH-U11 offers the most Industry 4.0 courses, totaling 15, which account for 26.8% of its courses and 15% of its credit hours, in contrast to ARCH-U20, which offers no courses. The novelty of this research lies in its comprehensive analysis of the readiness of architecture program curricula from 20 Saudi universities to meet the requirements of Industry 4.0. Importantly, these findings support previous studies that established guidelines that mandate the inclusion of sustainability, innovation, and digital skills in architectural education programs. Contribution to the knowledge and findings is valuable for educational institutions, policymakers, and industry leaders, offering insights into evolving architectural education to meet future industry demands and foster technological innovation and sustainable development. Moreover, it provides actionable recommendations for curriculum development in alignment with Vision 2030. Contrary to expectations, findings show that lower-ranked universities offer more Industry 4.0-related courses than higher-ranked ones, emphasizing the need to align university evaluation standards with labor market demands. Full article
(This article belongs to the Special Issue Buildings for the 21st Century)
20 pages, 1330 KiB  
Review
A Critical Review of Overheating Risk Assessment Criteria in International and National Regulations—Gaps and Suggestions for Improvements
by Mahsan Sadeghi, Dong Chen and Anthony Wright
Energies 2024, 17(24), 6354; https://doi.org/10.3390/en17246354 - 17 Dec 2024
Abstract
The escalating environmental threat of indoor overheating, exacerbated by global climate change, urbanisation, and population growth, poses a severe risk to public health worldwide, specifically to those regions which are exposed to extreme heat events, such as Australia. This study delves into the [...] Read more.
The escalating environmental threat of indoor overheating, exacerbated by global climate change, urbanisation, and population growth, poses a severe risk to public health worldwide, specifically to those regions which are exposed to extreme heat events, such as Australia. This study delves into the critical issue of overheating within residential buildings, examining the existing state of knowledge on overheating criteria and reviewing overheating guidelines embedded in (a) international standards and (b) national building codes. Each regulatory document is analysed based on its underlying thermal comfort model, metric, and indices. The advantages and limitations of each document are practically discussed and for each legislative document and standard, and the quantitative measures have been reviewed, analysed, and summarised. The findings illuminate a global reliance on simplistic indices, such as indoor air temperature and operative temperature, in the existing regulatory documents. However, other critical environmental parameters, such as relative humidity, indoor air velocity, and physiological parameters including metabolic heat production and clothing insulation, are often not included. The absence of mandatory regulations for overheating criteria in residential buildings in some countries, such as in Australian homes, prompts the call for a holistic approach based on a thermal index inclusive of relevant environmental and physiological parameters to quantify heat stress exposure based on human thermal regulation. Gaps and limitations within existing guidelines are identified, and recommendations are proposed to strengthen the regulatory framework for overheating risk assessment in residential buildings. The findings hold significance for policymakers, building energy assessors, architects, and public health professionals, providing direction for the improvement of existing, and development of new, guidelines that aim to enhance indoor thermal condition and population health while ensuring energy efficiency and sustainability in the building stock. Full article
(This article belongs to the Special Issue Optimizing Energy Efficiency and Thermal Comfort in Building)
21 pages, 1245 KiB  
Article
Uncertainty Modelling of Groundwater-Dependent Vegetation
by Todd P. Robinson, Lewis Trotter and Grant W. Wardell-Johnson
Land 2024, 13(12), 2208; https://doi.org/10.3390/land13122208 - 17 Dec 2024
Abstract
Groundwater-dependent vegetation (GDV) is threatened globally by groundwater abstraction. Water resource managers require maps showing its distribution and habitat preferences to make informed decisions on its protection. This study, conducted in the southeast Pilbara region of Western Australia, presents a novel approach based [...] Read more.
Groundwater-dependent vegetation (GDV) is threatened globally by groundwater abstraction. Water resource managers require maps showing its distribution and habitat preferences to make informed decisions on its protection. This study, conducted in the southeast Pilbara region of Western Australia, presents a novel approach based on metrics summarising seasonal phenology (phenometrics) derived from Sentinel-2 imagery. We also determined the preferential habitat using ecological niche modelling based on land systems and topographic derivatives. The phenometrics and preferential habitat models were combined using a framework that allows for the expression of different levels of uncertainty. The large integral (LI) phenometric was capable of discriminating GDV and reduced the search space to 111 ha (<1%), requiring follow-up monitoring. Suitable habitat could be explained by a combination of land systems and negative topographic positions (e.g., valleys). This designated 13% of the study area as requiring protection against the threat of intense bushfires, invasive species, land clearing and other disturbances. High uncertainty represents locations where GDV appears to be absent but the habitat is suitable and requires further field assessment. Uncertainty was lowest at locations where the habitat is highly unsuitable (87%) and requires infrequent revisitation. Our results provide timely geospatial intelligence illustrating what needs to be monitored, protected and revisited by water resource managers. Full article
(This article belongs to the Special Issue Geospatial Data in Landscape Ecology and Biodiversity Conservation)
26 pages, 861 KiB  
Article
Blockchain-Assisted Secure and Lightweight Authentication Scheme for Multi-Server Internet of Drones Environments
by Sieun Ju, Hyewon Park, Seunghwan Son, Hyungpyo Kim, Youngho Park and Yohan Park
Mathematics 2024, 12(24), 3965; https://doi.org/10.3390/math12243965 - 17 Dec 2024
Abstract
Unmanned aerial vehicles (UAVs) have seen widespread adoption across diverse sectors, including agriculture, logistics, surveillance, and disaster management, due to their capabilities for real-time data acquisition and autonomous operations. The integration of UAVs with Internet of Things (IoT) systems further amplifies their functionality, [...] Read more.
Unmanned aerial vehicles (UAVs) have seen widespread adoption across diverse sectors, including agriculture, logistics, surveillance, and disaster management, due to their capabilities for real-time data acquisition and autonomous operations. The integration of UAVs with Internet of Things (IoT) systems further amplifies their functionality, enabling sophisticated applications such as smart city management and environmental monitoring. In this context, blockchain technology plays a pivotal role by providing a decentralized, tamper-resistant ledger that facilitates secure data exchange between UAVs and connected devices. Its transparent and immutable characteristics mitigate the risk of a single point of failure, thereby enhancing data integrity and bolstering trust within UAV–IoT communication networks. However, the interconnected nature of these systems introduces significant security challenges, including unauthorized access, data breaches, and a variety of network-based attacks. These issues are further compounded by the limited computational capabilities of IoT devices and the inherent vulnerabilities of wireless communication channels. Recently, a lightweight mutual authentication scheme using blockchain was presented; however, our analysis identified several critical security flaws in these existing protocols, such as drone impersonation and session key disclosure. To address these vulnerabilities, we propose a secure and lightweight authentication scheme for multi-server UAV–IoT environments. The proposed protocol effectively mitigates emerging security threats while maintaining low computational and communication overhead. We validate the security of our scheme using formal methods, including the Real-Or-Random (RoR) model and BAN logic. Comparative performance evaluations demonstrate that our protocol enhances security while also achieving efficiency, making it well-suited for resource-constrained IoT applications. Full article
Show Figures

Figure 1

Figure 1
<p>Blockchain-assisted multi-server IoD environments.</p>
Full article ">Figure 2
<p>System model.</p>
Full article ">Figure 3
<p>AKA phase of the proposed scheme.</p>
Full article ">Figure 4
<p>Role of user and drone.</p>
Full article ">Figure 5
<p>AVISPA result on mutual authentication and key agreement phase.</p>
Full article ">Figure 6
<p>Communication comparison. Refs. [<a href="#B12-mathematics-12-03965" class="html-bibr">12</a>,<a href="#B16-mathematics-12-03965" class="html-bibr">16</a>,<a href="#B17-mathematics-12-03965" class="html-bibr">17</a>,<a href="#B18-mathematics-12-03965" class="html-bibr">18</a>,<a href="#B23-mathematics-12-03965" class="html-bibr">23</a>,<a href="#B41-mathematics-12-03965" class="html-bibr">41</a>].</p>
Full article ">
39 pages, 4291 KiB  
Review
Machine Learning and Deep Learning for Crop Disease Diagnosis: Performance Analysis and Review
by Habiba Njeri Ngugi, Andronicus A. Akinyelu and Absalom E. Ezugwu
Agronomy 2024, 14(12), 3001; https://doi.org/10.3390/agronomy14123001 - 17 Dec 2024
Viewed by 58
Abstract
Crop diseases pose a significant threat to global food security, with both economic and environmental consequences. Early and accurate detection is essential for timely intervention and sustainable farming. This paper presents a review of machine learning (ML) and deep learning (DL) techniques for [...] Read more.
Crop diseases pose a significant threat to global food security, with both economic and environmental consequences. Early and accurate detection is essential for timely intervention and sustainable farming. This paper presents a review of machine learning (ML) and deep learning (DL) techniques for crop disease diagnosis, focusing on Support Vector Machines (SVMs), Random Forest (RF), k-Nearest Neighbors (KNNs), and deep models like VGG16, ResNet50, and DenseNet121. The review method includes an in-depth analysis of algorithm performance using key metrics such as accuracy, precision, recall, and F1 score across various datasets. We also highlight the data imbalances in commonly used datasets, particularly PlantVillage, and discuss the challenges posed by these imbalances. The research highlights critical insights regarding ML and DL models in crop disease detection. A primary challenge identified is the imbalance in the PlantVillage dataset, with a high number of healthy images and a strong bias toward certain disease categories like fungi, leaving other categories like mites and molds underrepresented. This imbalance complicates model generalization, indicating a need for preprocessing steps to enhance performance. This study also shows that combining Vision Transformers (ViTs) with Green Chromatic Coordinates and hybridizing these with SVM achieves high classification accuracy, emphasizing the value of advanced feature extraction techniques in improving model efficacy. In terms of comparative performance, DL architectures like ResNet50, VGG16, and convolutional neural network demonstrated robust accuracy (95–99%) across diverse datasets, underscoring their effectiveness in managing complex image data. Additionally, traditional ML models exhibited varied strengths; for instance, SVM performed better on balanced datasets, while RF excelled with imbalanced data. Preprocessing methods like K-means clustering, Fuzzy C-Means, and PCA, along with ensemble approaches, further improved model accuracy. Lastly, the study underscores that high-quality, well-labeled datasets, stakeholder involvement, and comprehensive evaluation metrics such as F1 score and precision are crucial for optimizing ML and DL models, making them more effective for real-world applications in sustainable agriculture. Full article
(This article belongs to the Collection Machine Learning in Digital Agriculture)
Show Figures

Figure 1

Figure 1
<p>Preferred reporting items for systematic reviews and meta-analysis (PRISMA) diagram for this study.</p>
Full article ">Figure 2
<p>General workflow of an ML-based crop detection technique.</p>
Full article ">Figure 3
<p>General workflow of a DL-based crop detection technique.</p>
Full article ">Figure 4
<p>Crop distribution in the PlantVillage dataset.</p>
Full article ">Figure 5
<p>Distribution of healthy and unhealthy samples in the PlantVillage dataset.</p>
Full article ">Figure 6
<p>Statistics of crop diseases in PlantVillage dataset.</p>
Full article ">Figure 7
<p>Classification accuracy of other ML algorithms from different authors.</p>
Full article ">Figure 8
<p>Classification accuracies of SVM-based crop detection techniques. Data sourced from [<a href="#B28-agronomy-14-03001" class="html-bibr">28</a>,<a href="#B29-agronomy-14-03001" class="html-bibr">29</a>,<a href="#B30-agronomy-14-03001" class="html-bibr">30</a>,<a href="#B31-agronomy-14-03001" class="html-bibr">31</a>,<a href="#B32-agronomy-14-03001" class="html-bibr">32</a>,<a href="#B33-agronomy-14-03001" class="html-bibr">33</a>].</p>
Full article ">Figure 9
<p>Classification accuracies of KNN-based crop detection techniques. Data sourced from [<a href="#B32-agronomy-14-03001" class="html-bibr">32</a>,<a href="#B34-agronomy-14-03001" class="html-bibr">34</a>,<a href="#B36-agronomy-14-03001" class="html-bibr">36</a>,<a href="#B37-agronomy-14-03001" class="html-bibr">37</a>].</p>
Full article ">Figure 10
<p>Classification accuracies of RF-based crop detection techniques. Data sourced from [<a href="#B32-agronomy-14-03001" class="html-bibr">32</a>,<a href="#B39-agronomy-14-03001" class="html-bibr">39</a>,<a href="#B40-agronomy-14-03001" class="html-bibr">40</a>,<a href="#B41-agronomy-14-03001" class="html-bibr">41</a>,<a href="#B42-agronomy-14-03001" class="html-bibr">42</a>].</p>
Full article ">Figure 11
<p>Classification accuracies of other ML-based crop detection techniques. Data sourced from [<a href="#B43-agronomy-14-03001" class="html-bibr">43</a>,<a href="#B44-agronomy-14-03001" class="html-bibr">44</a>,<a href="#B45-agronomy-14-03001" class="html-bibr">45</a>,<a href="#B46-agronomy-14-03001" class="html-bibr">46</a>].</p>
Full article ">Figure 12
<p>Performance of CNN-based crop detection techniques. Data sourced from [<a href="#B47-agronomy-14-03001" class="html-bibr">47</a>,<a href="#B48-agronomy-14-03001" class="html-bibr">48</a>,<a href="#B49-agronomy-14-03001" class="html-bibr">49</a>,<a href="#B50-agronomy-14-03001" class="html-bibr">50</a>,<a href="#B51-agronomy-14-03001" class="html-bibr">51</a>,<a href="#B52-agronomy-14-03001" class="html-bibr">52</a>,<a href="#B53-agronomy-14-03001" class="html-bibr">53</a>].</p>
Full article ">Figure 13
<p>Classification accuracies of other DL-based crop detection techniques. Data sourced from [<a href="#B46-agronomy-14-03001" class="html-bibr">46</a>,<a href="#B47-agronomy-14-03001" class="html-bibr">47</a>,<a href="#B49-agronomy-14-03001" class="html-bibr">49</a>,<a href="#B52-agronomy-14-03001" class="html-bibr">52</a>,<a href="#B53-agronomy-14-03001" class="html-bibr">53</a>,<a href="#B54-agronomy-14-03001" class="html-bibr">54</a>].</p>
Full article ">Figure 14
<p>Classification accuracies of VGG16-based crop detection techniques. Data sourced from [<a href="#B14-agronomy-14-03001" class="html-bibr">14</a>,<a href="#B56-agronomy-14-03001" class="html-bibr">56</a>,<a href="#B58-agronomy-14-03001" class="html-bibr">58</a>,<a href="#B60-agronomy-14-03001" class="html-bibr">60</a>,<a href="#B62-agronomy-14-03001" class="html-bibr">62</a>].</p>
Full article ">Figure 15
<p>Classification accuracies of ResNet-based crop detection techniques. Data sourced from [<a href="#B27-agronomy-14-03001" class="html-bibr">27</a>,<a href="#B53-agronomy-14-03001" class="html-bibr">53</a>,<a href="#B61-agronomy-14-03001" class="html-bibr">61</a>,<a href="#B63-agronomy-14-03001" class="html-bibr">63</a>,<a href="#B64-agronomy-14-03001" class="html-bibr">64</a>,<a href="#B65-agronomy-14-03001" class="html-bibr">65</a>].</p>
Full article ">Figure 16
<p>Classification accuracies of DenseNet121-based crop detection techniques. Data sourced from [<a href="#B10-agronomy-14-03001" class="html-bibr">10</a>,<a href="#B16-agronomy-14-03001" class="html-bibr">16</a>,<a href="#B18-agronomy-14-03001" class="html-bibr">18</a>,<a href="#B20-agronomy-14-03001" class="html-bibr">20</a>,<a href="#B46-agronomy-14-03001" class="html-bibr">46</a>,<a href="#B62-agronomy-14-03001" class="html-bibr">62</a>].</p>
Full article ">Figure 17
<p>Classification accuracies of the best-performing ML-based crop detection techniques [<a href="#B31-agronomy-14-03001" class="html-bibr">31</a>,<a href="#B35-agronomy-14-03001" class="html-bibr">35</a>,<a href="#B36-agronomy-14-03001" class="html-bibr">36</a>,<a href="#B43-agronomy-14-03001" class="html-bibr">43</a>].</p>
Full article ">Figure 18
<p>Comparison between the least-performing ML-based crop detection techniques.</p>
Full article ">Figure 19
<p>Classification accuracy of the best-performing DL-based techniques. Data sourced from [<a href="#B20-agronomy-14-03001" class="html-bibr">20</a>,<a href="#B49-agronomy-14-03001" class="html-bibr">49</a>,<a href="#B58-agronomy-14-03001" class="html-bibr">58</a>,<a href="#B62-agronomy-14-03001" class="html-bibr">62</a>].</p>
Full article ">
19 pages, 11385 KiB  
Article
Mechanism Study on the Intrinsic Damage and Microchemical Interactions of Argillaceous Siltstone Under Different Water Temperatures
by Ning Liang, Tao Jin, Jingjing Zhang and Damin Lu
Appl. Sci. 2024, 14(24), 11747; https://doi.org/10.3390/app142411747 - 16 Dec 2024
Viewed by 321
Abstract
Argillaceous siltstone is prone to deformation and softening when exposed to water, which poses a great threat to practical engineering. There are significant differences in the degrees of damage to this type of rock caused by solutions with different water temperatures. This study [...] Read more.
Argillaceous siltstone is prone to deformation and softening when exposed to water, which poses a great threat to practical engineering. There are significant differences in the degrees of damage to this type of rock caused by solutions with different water temperatures. This study aimed to better understand the effect of temperature on argillaceous siltstone by designing immersion tests at water temperatures of 5, 15, 25, and 35 °C, analyzing the mechanical properties and cation concentration shifts under each condition. A water temperature–force coupled geometric damage model for argillaceous siltstone was developed, incorporating a Weibull distribution function and composite damage factors to derive a statistical damage constitutive model. The findings reveal that, with increasing water temperature, the peak strength and elastic modulus of argillaceous siltstone display a concave trend, initially decreasing and then increasing, while the cation concentration follows a convex trend, first increasing and then decreasing. Between 15 and 25 °C, the stress–strain behavior transitions from a four-phase to a five-phase pattern, with pronounced plasticity. The model’s theoretical curves align closely with experimental data, with the Weibull parameters m and λ effectively capturing the rock’s strength and plastic characteristics. Changes in water temperature notably influence the damage variable D12 in the context of water temperature–peak stress coupling, with D12 initially increasing and then decreasing with higher temperatures. These research results can provide new methods for exploring the paths of soft rock disasters and provide guidance for designing defenses in geotechnical engineering. Full article
(This article belongs to the Section Materials Science and Engineering)
Show Figures

Figure 1

Figure 1
<p>Engineering disaster map. (<b>a</b>) Mine collapse. (<b>b</b>) Mountain landslide.</p>
Full article ">Figure 2
<p>Argillaceous siltstone samples.</p>
Full article ">Figure 3
<p>Diagram of the experimental scheme.</p>
Full article ">Figure 4
<p>Physical parameters of clay powder under different water temperatures. (<b>a</b>) Peak strength. (<b>b</b>) Elastic modulus.</p>
Full article ">Figure 5
<p>Stress–strain curve of argillaceous siltstone. Soaked for (<b>a</b>) 1 day, (<b>b</b>) 3 days, (<b>c</b>) 7 days, and (<b>d</b>) 14 days.</p>
Full article ">Figure 5 Cont.
<p>Stress–strain curve of argillaceous siltstone. Soaked for (<b>a</b>) 1 day, (<b>b</b>) 3 days, (<b>c</b>) 7 days, and (<b>d</b>) 14 days.</p>
Full article ">Figure 6
<p>Failure modes of argillaceous siltstone under different water temperatures: (<b>a</b>) 5 °C. (<b>b</b>) 15 °C. (<b>c</b>) 25 °C. (<b>d</b>) 35 °C.</p>
Full article ">Figure 6 Cont.
<p>Failure modes of argillaceous siltstone under different water temperatures: (<b>a</b>) 5 °C. (<b>b</b>) 15 °C. (<b>c</b>) 25 °C. (<b>d</b>) 35 °C.</p>
Full article ">Figure 7
<p>Microstructural images of argillaceous siltstone under the influence of different water temperatures. (<b>a</b>) Water temperature at 5 °C. (<b>b</b>) Water temperature at 15 °C. (<b>c</b>) Water temperature at 25 °C. (<b>d</b>) Water temperature at 35 °C.</p>
Full article ">Figure 7 Cont.
<p>Microstructural images of argillaceous siltstone under the influence of different water temperatures. (<b>a</b>) Water temperature at 5 °C. (<b>b</b>) Water temperature at 15 °C. (<b>c</b>) Water temperature at 25 °C. (<b>d</b>) Water temperature at 35 °C.</p>
Full article ">Figure 8
<p>Geometric damage model. (<b>a</b>) Damage under different water temperatures without reaching the yield point. (<b>b</b>) Load-induced damage beyond the yield point.</p>
Full article ">Figure 9
<p>Comparison of experimental and theoretical curves. Soaked for (<b>a</b>) 1 day, (<b>b</b>) 3 days, (<b>c</b>) 7 days, and (<b>d</b>) 14 days.</p>
Full article ">Figure 9 Cont.
<p>Comparison of experimental and theoretical curves. Soaked for (<b>a</b>) 1 day, (<b>b</b>) 3 days, (<b>c</b>) 7 days, and (<b>d</b>) 14 days.</p>
Full article ">Figure 10
<p>The variation patterns of the constitutive model parameters <span class="html-italic">m</span> and <span class="html-italic">λ</span>. (<b>a</b>) The variation pattern of parameter <span class="html-italic">m</span>. (<b>b</b>) The variation pattern of parameter <span class="html-italic">λ</span>.</p>
Full article ">Figure 11
<p>Bar chart representing damage variables <span class="html-italic">D</span><sub>1</sub> and <span class="html-italic">D</span><sub>12</sub>. Soaked for (<b>a</b>) 1 day, (<b>b</b>) 3 days, (<b>c</b>) 7 days, and (<b>d</b>) 14 days.</p>
Full article ">Figure 12
<p>Chemical reactions and adsorption processes at the water–rock interface.</p>
Full article ">Figure 13
<p>Change curves of cation concentrations in solutions at different temperatures. (<b>a</b>) Na<sup>+</sup>. (<b>b</b>) Ca<sup>+</sup>. (<b>c</b>) K<sup>+</sup>. (<b>d</b>) Total cations.</p>
Full article ">
25 pages, 1532 KiB  
Article
Re-Evaluating Deep Learning Attacks and Defenses in Cybersecurity Systems
by Meaad Ahmed, Qutaiba Alasad, Jiann-Shiun Yuan and Mohammed Alawad
Big Data Cogn. Comput. 2024, 8(12), 191; https://doi.org/10.3390/bdcc8120191 - 16 Dec 2024
Viewed by 330
Abstract
Cybersecurity attacks pose a significant threat to the security of network systems through intrusions and illegal communications. Measuring the vulnerability of cybersecurity is crucial for refining the overall system security to further mitigate potential security risks. Machine learning (ML)-based intrusion detection systems (IDSs) [...] Read more.
Cybersecurity attacks pose a significant threat to the security of network systems through intrusions and illegal communications. Measuring the vulnerability of cybersecurity is crucial for refining the overall system security to further mitigate potential security risks. Machine learning (ML)-based intrusion detection systems (IDSs) are mainly designed to detect malicious network traffic. Unfortunately, ML models have recently been demonstrated to be vulnerable to adversarial perturbation, and therefore enable potential attackers to crash the system during normal operation. Among different attacks, generative adversarial networks (GANs) have been known as one of the most powerful threats to cybersecurity systems. To address these concerns, it is important to explore new defense methods and understand the nature of different types of attacks. In this paper, we investigate four serious attacks, GAN, Zeroth-Order Optimization (ZOO), kernel density estimation (KDE), and DeepFool attacks, on cybersecurity. Deep analysis was conducted on these attacks using three different cybersecurity datasets, ADFA-LD, CSE-CICIDS2018, and CSE-CICIDS2019. Our results have shown that KDE and DeepFool attacks are stronger than GANs in terms of attack success rate and impact on system performance. To demonstrate the effectiveness of our approach, we develop a defensive model using adversarial training where the DeepFool method is used to generate adversarial examples. The model is evaluated against GAN, ZOO, KDE, and DeepFool attacks to assess the level of system protection against adversarial perturbations. The experiment was conducted by leveraging a deep learning model as a classifier with the three aforementioned datasets. The results indicate that the proposed defensive model refines the resilience of the system and mitigates the presented serious attacks. Full article
26 pages, 9592 KiB  
Article
Evolution of Vegetation Coverage in the Jinan Section of the Basin of the Yellow River (China), 2008–2022: Spatial Dynamics and Drivers
by Dongling Ma, Zhenxin Lin, Qian Wang, Yifan Yu, Qingji Huang and Yingwei Yan
Forests 2024, 15(12), 2219; https://doi.org/10.3390/f15122219 - 16 Dec 2024
Viewed by 287
Abstract
The Yellow River Basin serves as a critical ecological barrier in China. However, it has increasingly faced severe ecological and environmental challenges, with soil erosion and overgrazing being particularly prominent issues. As an important region in the middle and lower reaches of the [...] Read more.
The Yellow River Basin serves as a critical ecological barrier in China. However, it has increasingly faced severe ecological and environmental challenges, with soil erosion and overgrazing being particularly prominent issues. As an important region in the middle and lower reaches of the Yellow River, the Jinan section of the Yellow River Basin is similarly affected by these problems, posing significant threats to the stability and sustainability of its ecosystems. To scientifically identify areas severely impacted by soil erosion and systematically quantify the effects of climate change on vegetation coverage within the Yellow River Basin, this study focuses on the Jinan section. By analyzing the spatio-temporal evolution patterns of the Normalized Difference Vegetation Index (NDVI), this research aims to explore the driving mechanisms behind these changes and further predict the future spatial distribution of NDVI, providing theoretical support and practical guidance for regional ecological conservation and sustainable development. This study employed the slope trend analysis method to examine the spatio-temporal variation characteristics of NDVI in the Jinan section of the Yellow River Basin from 2008 to 2022 and utilized the FLUS model to predict the spatial distribution of NDVI in 2025. The Optimal Parameters-based Geographical Detector (OPGD) model was applied to systematically analyze the impacts of four key driving factors—precipitation (PRE), temperature (TEM), population density (POP), and gross domestic product (GDP) on vegetation coverage. Finally, correlation and lag effect analyses were conducted to investigate the relationships between NDVI and TEM as well as NDVI and PRE. The research results indicate the following: (1) from 2008 to 2022, the NDVI values during the growing season in the Jinan section of the Yellow River Basin exhibited a significant increasing trend. This growth suggests a continuous improvement in regional vegetation coverage, likely influenced by the combined effects of natural and anthropogenic factors. (2) The FLUS model predicts that, by 2025, the proportion of high-density NDVI areas will rise to 55.35%, reflecting the potential for further optimization of vegetation coverage under appropriate management. (3) POP had a particularly significant impact on vegetation coverage, and its interaction with TEM, PRE, and GDP generated an amplified combined effect, indicating the dominant role of the synergy between socioeconomic and climatic factors in regional vegetation dynamics. (4) NDVI exhibited a significant positive correlation with both temperature and precipitation, further demonstrating that climatic conditions were key drivers of vegetation coverage changes. (5) In urban areas, NDVI showed a certain time lag in response to changes in precipitation and temperature, whereas this lag effect was not significant in suburban and mountainous areas, highlighting the regulatory role of human activities and land use patterns on vegetation dynamics in different regions. These findings not only reveal the driving mechanisms and influencing factors behind vegetation coverage changes but also provide critical data support for ecological protection and economic development planning in the Yellow River Basin, contributing to the coordinated advancement of ecological environment construction and economic growth. Full article
(This article belongs to the Section Forest Ecology and Management)
16 pages, 782 KiB  
Systematic Review
The Dynamics of Antibody Titres Against SARS-CoV-2 in Vaccinated Healthcare Workers: A Systemic Literature Review
by Vilija Gurkšnienė, Tadas Alčauskas, Fausta Majauskaitė and Ligita Jančorienė
Vaccines 2024, 12(12), 1419; https://doi.org/10.3390/vaccines12121419 - 16 Dec 2024
Viewed by 445
Abstract
Background and Objectives: Given that COVID-19 vaccination is a relatively recent development, particularly when compared to immunisation against other diseases, it is crucial to assess its efficacy in vaccinated populations. This literature review analysed studies that monitored antibody titres against SARS-CoV-2 in healthcare [...] Read more.
Background and Objectives: Given that COVID-19 vaccination is a relatively recent development, particularly when compared to immunisation against other diseases, it is crucial to assess its efficacy in vaccinated populations. This literature review analysed studies that monitored antibody titres against SARS-CoV-2 in healthcare workers who received COVID-19 vaccines. Methods: Using the PICO (Population, Intervention, Comparators, Outcomes) model recommended in the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) guidelines we included 43 publications which analyse antibody dynamics following primary vaccination, the effects of booster doses, and the influence of factors such as COVID-19C infection, age, and sex on antibody kinetics. Results: All the studies demonstrated a strong immunogenic response to the vaccines. Re-gardless of the vaccine used, over 95% of the pre-vaccination seronegative population be-came seropositive in all studies. Depending on the sampling intervals provided by the re-searchers, antibody levels were quantitatively highest during the first three months after vaccination, but levels inevitably declined over time. The monthly decline in antibodies observed in all these studies highlighted the necessity for booster doses. Studies analysing the impact of revaccination on antibody dynamics have confirmed that revaccination is an effective tool to boost humoral immunity against SARS-CoV-2. An-tibodies appear to persist for a longer period of time after revaccination, although they are subject to similar factors influencing antibody dynamics, such as age, comorbidities, and exposure to COVID-19. In addition, heterogeneous revaccination strategies have been shown to be more effective than homogeneous revaccination. Conclusions: Our review demonstrated that antibody levels against SARS-CoV-2 inevitably decline after vaccination, leaving the question of ongoing booster strategies open. The studies reviewed provided evidence of the effectiveness of booster vaccination, despite differences in age, sex, and prior COVID-19 infection. This suggests that repeated vaccination remains a highly effective method for mitigating the continued threat posed by COVID-19. Full article
(This article belongs to the Section COVID-19 Vaccines and Vaccination)
Show Figures

Figure 1

Figure 1
<p>The publication selection process.</p>
Full article ">
11 pages, 771 KiB  
Article
Agarose Hydrogels Enriched by Humic Acids as a Functional Model for the Transport of Pharmaceuticals in Nature Systems
by Martina Klučáková and Petra Závodská
Molecules 2024, 29(24), 5937; https://doi.org/10.3390/molecules29245937 - 16 Dec 2024
Viewed by 209
Abstract
The presence of pharmaceuticals in nature systems poses a threat to the environment, plants, animals, and, last but not least, human health. Their transport in soils, waters, and sediments plays important roles in the toxicity and bioavailability of pharmaceuticals. The mobility of pharmaceuticals [...] Read more.
The presence of pharmaceuticals in nature systems poses a threat to the environment, plants, animals, and, last but not least, human health. Their transport in soils, waters, and sediments plays important roles in the toxicity and bioavailability of pharmaceuticals. The mobility of pharmaceuticals can be affected by their interactions with organic matter and other soil and water constituents. In this study, a model agarose hydrogel enriched by humic acid as a representative of organic matter is used as a transport medium for pharmaceuticals. Sulphapyridine (as a representative of sulphonamide antibiotics) and diclofenac (as a representative of widely used non-steroidal anti-inflammatory drugs) were chosen for experiments in diffusion cells. Pharmaceuticals were passed through the hydrogel from the donor solution to the acceptor compartment and could interact with humic acids incorporated in the hydrogel. The lag time was prolonged if the hydrogel was enriched by humic acids from 134 to 390 s for sulphapyridine and from 323 to 606 s for diclofenac. Similarly, the incorporation of humic acids in the hydrogel resulted in a decrease in the determined diffusion coefficients. The decrease was stronger in the first stage of the experiment when diffusing particles could interact with vacant binding sites. Full article
(This article belongs to the Section Physical Chemistry)
Show Figures

Figure 1

Figure 1
<p>Examples of diffusion data: (<b>a</b>) data obtained for sulphapyridine (blue) and diclofenac (red) in the donor part of diffusion cells during the experiment with the pure agarose hydrogel; (<b>b</b>) data obtained for sulphapyridine in the acceptor part during the diffusion through the pure agarose hydrogel (blue) and the hydrogel with incorporated humic acids (black).</p>
Full article ">Figure 2
<p>Examples of adsorption/desorption data obtained for sulphapyridine (<b>a</b>) and diclofenac (<b>b</b>): adsorption efficiency (red) and mobile fraction (green).</p>
Full article ">
20 pages, 13615 KiB  
Article
Landscape Character Identification and Zoning Management in Disaster-Prone Mountainous Areas: A Case Study of Mentougou District, Beijing
by Shuchang Li and Jinshi Zhang
Land 2024, 13(12), 2191; https://doi.org/10.3390/land13122191 - 15 Dec 2024
Viewed by 283
Abstract
Disaster-prone mountainous regions face complex human–environment conflicts resulting from the combined influences of natural disaster threats, ecosystem conservation, and resource development. This study takes Mentougou District as the research area, leveraging landscape character identification methods to develop a multidimensional evaluation framework integrating safety, [...] Read more.
Disaster-prone mountainous regions face complex human–environment conflicts resulting from the combined influences of natural disaster threats, ecosystem conservation, and resource development. This study takes Mentougou District as the research area, leveraging landscape character identification methods to develop a multidimensional evaluation framework integrating safety, ecology, and landscape aspects, providing a foundation for zoning and management decisions. Four characteristic elements—elevation, geomorphology, vegetation type, and land cover type—were extracted during the landscape character identification phase. Two-step clustering and eCognition multi-scale segmentation were used to identify 12 landscape character types (LCTs) and delineate Landscape Character Areas (LCAs). The MaxEnt model was applied during the evaluation phase to assess debris flow susceptibility. At the same time, AHP and ArcGIS spatial overlay methods were used to evaluate ecological resilience and landscape resource quality. The three-dimensional evaluation results for the 12 LCAs were clustered and manually interpreted, resulting in four levels of protection and development areas. Management strategies were proposed from three perspectives: debris flow disaster prevention, ecosystem conservation, and landscape resource development. This method provides a pathway to balance human–environment conflicts in disaster-prone mountainous regions, promoting scientific zoning management and sustainable development in vast mountainous areas. Full article
(This article belongs to the Section Land Planning and Landscape Architecture)
Show Figures

Figure 1

Figure 1
<p>Location of the Mentougou District.</p>
Full article ">Figure 2
<p>Methodological framework.</p>
Full article ">Figure 3
<p>(<b>A</b>) Preliminary landscape character area map; (<b>B</b>) Final landscape character area map.</p>
Full article ">Figure 4
<p>(<b>A</b>) AUC value for model suitability test; (<b>B</b>) The jackknife test evaluates the importance of environmental variables for debris flow susceptibility.</p>
Full article ">Figure 5
<p>(<b>A</b>) Debris flow susceptibility assessment results; (<b>B</b>) Debris flow susceptibility levels.</p>
Full article ">Figure 6
<p>(<b>A</b>) Ecological resilience assessment results; (<b>B</b>) Ecological resilience levels.</p>
Full article ">Figure 7
<p>(<b>A</b>) Landscape resource quality assessment results; (<b>B</b>) Landscape resource quality levels.</p>
Full article ">Figure 8
<p>Zoning map for LCAs.</p>
Full article ">
28 pages, 3524 KiB  
Systematic Review
Integrating Artificial Intelligence and the Internet of Things in Cultural Heritage Preservation: A Systematic Review of Risk Management and Environmental Monitoring Strategies
by Neeraparng Laohaviraphap and Tanut Waroonkun
Buildings 2024, 14(12), 3979; https://doi.org/10.3390/buildings14123979 - 15 Dec 2024
Viewed by 407
Abstract
Heritage buildings are increasingly vulnerable to environmental challenges like air pollution and climate change. Traditional preservation methods primarily rely on periodic inspections and manual interventions and struggle to address these evolving and dynamic threats. This systematic review analyzes how integrating Artificial Intelligence (AI) [...] Read more.
Heritage buildings are increasingly vulnerable to environmental challenges like air pollution and climate change. Traditional preservation methods primarily rely on periodic inspections and manual interventions and struggle to address these evolving and dynamic threats. This systematic review analyzes how integrating Artificial Intelligence (AI) and Internet of Things (IoT) technologies can transform cultural heritage preservation. Using the PRISMA guidelines, 92 articles from SCOPUS were reviewed, highlighting key risk management and environmental monitoring methodologies. The study found that while IoT enables real-time air quality and structural health monitoring, AI enhances data analysis, providing predictive insights. The combination of IoT and AI facilitates proactive risk management, ensuring more resilient conservation strategies. Despite the growing use of these technologies, adoption remains uneven, particularly in regions most impacted by climate change. The study identifies significant research gaps and proposes an innovative framework that leverages Heritage Building Information Modeling (H-BIM) and Digital Twin (DT) for continuous monitoring and predictive maintenance through a multi-step process, beginning with the digitalization of heritage assets using H-BIM, followed by the creation of real-time digital replicas via DT. By integrating advanced technologies, the framework offers a more adaptive and sustainable approach to preserving cultural heritage, addressing both immediate threats and long-term vulnerabilities. This research underscores the need for a global, technology-driven response to safeguard heritage buildings for future generations. Full article
(This article belongs to the Section Architectural Design, Urban Science, and Real Estate)
Show Figures

Figure 1

Figure 1
<p>Number of documents by year in the Scopus database (keyword “heritage” and “risk assessment”).</p>
Full article ">Figure 2
<p>PRISMA2020 flow diagram illustrating the systematic review process. The arrows indicate the progression through the stages (Identification, Screening, and Included).</p>
Full article ">Figure 3
<p>A map of Keywords Co-occurrence Network visualized from Bibliometrix<sup>®.</sup></p>
Full article ">Figure 4
<p>Distribution of Country Scientific Production from Bibliometrix<sup>®.</sup></p>
Full article ">Figure 5
<p>Heritage preservation framework integrating AI, IoT, H-BIM, and DT. The figure outlines a seven-step process, detailing the Purpose and Technologies for each step, with arrows showing the sequential flow.</p>
Full article ">
19 pages, 13626 KiB  
Article
ECVNet: A Fusion Network of Efficient Convolutional Neural Networks and Visual Transformers for Tomato Leaf Disease Identification
by Fendong Zou, Jing Hua, Yuanhao Zhu, Jize Deng and Ruimin He
Agronomy 2024, 14(12), 2985; https://doi.org/10.3390/agronomy14122985 - 15 Dec 2024
Viewed by 317
Abstract
Tomato leaf diseases pose a significant threat to plant growth and productivity, necessitating the accurate identification and timely management of these issues. Existing models for tomato leaf disease recognition can primarily be categorized into Convolutional Neural Networks (CNNs) and Visual Transformers (VTs). While [...] Read more.
Tomato leaf diseases pose a significant threat to plant growth and productivity, necessitating the accurate identification and timely management of these issues. Existing models for tomato leaf disease recognition can primarily be categorized into Convolutional Neural Networks (CNNs) and Visual Transformers (VTs). While CNNs excel in local feature extraction, they struggle with global feature recognition; conversely, VTs are advantageous for global feature extraction but are less effective at capturing local features. This discrepancy hampers the performance improvement of both model types in the task of tomato leaf disease identification. Currently, effective fusion models that combine CNNs and VTs are still relatively scarce. We developed an efficient CNNs and VTs fusion network named ECVNet for tomato leaf disease recognition. Specifically, we first designed a Channel Attention Residual module (CAR module) to focus on channel features and enhance the model’s sensitivity to the importance of feature channels. Next, we created a Convolutional Attention Fusion module (CAF module) to effectively extract and integrate both local and global features, thereby improving the model’s spatial feature extraction capabilities. We conducted extensive experiments using the Plant Village dataset and the AI Challenger 2018 dataset, with ECVNet achieving state-of-the-art recognition performance in both cases. Under the condition of 100 epochs, ECVNet achieved an accuracy of 98.88% on the Plant Village dataset and 86.04% on the AI Challenger 2018 dataset. The introduction of ECVNet provides an effective solution for the identification of plant leaf diseases. Full article
(This article belongs to the Section Pest and Disease Management)
Show Figures

Figure 1

Figure 1
<p>Example of tomato leaf disease images in the Plant Village dataset.</p>
Full article ">Figure 2
<p>Example of tomato leaf disease images in AI Challenger 2018 Dataset.</p>
Full article ">Figure 3
<p>Structure of the ECVNet.</p>
Full article ">Figure 4
<p>Structure of the CAR module.</p>
Full article ">Figure 5
<p>Structure of the CAF module.</p>
Full article ">Figure 6
<p>The training process with and without the CAF Module (left: results on the Plant Village dataset; right: results on the AI Challenger 2018 dataset).</p>
Full article ">Figure 7
<p>The training process with and without the CAF Module (left: results on the Plant Village dataset; right: results on the AI Challenger 2018 dataset).</p>
Full article ">Figure 8
<p>The training process of different models (left: results on the Plant Village dataset; right: results on the AI Challenger 2018 dataset).</p>
Full article ">Figure 9
<p>The ROC curve of ECVNet (left: results on the Plant Village dataset; right: results on the AI Challenger 2018 dataset).</p>
Full article ">Figure 10
<p>The PR curve of ECVNet (left: results on the Plant Village dataset; right: results on the AI Challenger 2018 dataset).</p>
Full article ">Figure 11
<p>The confusion matrix of ECVNet (left: results on the Plant Village dataset; right: results on the AI Challenger 2018 dataset).</p>
Full article ">Figure 12
<p>Visualized comparison of the feature extraction process.</p>
Full article ">Figure 13
<p>Grad-CAM activation mapping visualization comparison.</p>
Full article ">
19 pages, 2917 KiB  
Article
Identification of Plant Diseases in Jordan Using Convolutional Neural Networks
by Moy’awiah A. Al-Shannaq, Shahed AL-Khateeb, Abed Al-Raouf K. Bsoul and Ahmad A. Saifan
Electronics 2024, 13(24), 4942; https://doi.org/10.3390/electronics13244942 - 15 Dec 2024
Viewed by 433
Abstract
In the realm of global food security, plants serve as the primary source of sustenance. However, plant diseases pose a significant threat to this security. The process for diagnosing these diseases forms the bedrock of disease control efforts. The precision and expediency of [...] Read more.
In the realm of global food security, plants serve as the primary source of sustenance. However, plant diseases pose a significant threat to this security. The process for diagnosing these diseases forms the bedrock of disease control efforts. The precision and expediency of these diagnoses wield substantial influence over disease management and the consequent reduction of economic losses. This research endeavors to diagnose the prevalent crops in Jordan, as identified by the Jordanian Department of Statistics for the year 2019. These crops encompass four key agricultural varieties: cucumbers, tomatoes, lettuce, and cabbage. To facilitate this, a novel dataset known as “Jordan22” was meticulously curated. Jordan22 was compiled by collecting images of diseased and healthy plants captured on Jordanian farms. These images underwent meticulous classification by a panel of three agricultural specialists well-versed in plant disease identification and prevention. The Jordan22 dataset comprises a substantial size, amounting to 3210 images. The results yielded by the CNN were remarkable, with a test accuracy rate reaching an impressive 0.9712. Optimal performance was observed when images were resized to 256 × 256 dimensions, and max pooling was used instead of average pooling. Furthermore, the initial convolutional layer was set at a size of 32, with subsequent convolutional layers standardized at 128 in size. In conclusion, this research represents a pivotal step towards enhancing plant disease diagnosis and, by extension, global food security. Through the creation of the Jordan22 dataset and the meticulous training of a CNN model, we have achieved substantial accuracy in disease detection, paving the way for more effective disease management strategies in agriculture. Full article
(This article belongs to the Section Artificial Intelligence)
Show Figures

Figure 1

Figure 1
<p>Different datasets show tomato blight.</p>
Full article ">Figure 2
<p>Sample images in the dataset [<a href="#B20-electronics-13-04942" class="html-bibr">20</a>].</p>
Full article ">Figure 3
<p>Sample of the image in the Jordan22 dataset.</p>
Full article ">Figure 4
<p>Image transformations after executing ImageDataGenerator.</p>
Full article ">Figure 5
<p>Layers in a CNN.</p>
Full article ">Figure 6
<p>The effect of changing the size of the images (256 pixels × 256 pixels) in the CNN model.</p>
Full article ">Figure 7
<p>Accuracy of training and validation.</p>
Full article ">Figure 8
<p>Training and validation losses.</p>
Full article ">
23 pages, 22589 KiB  
Article
Landslide Prediction Validation in Western North Carolina After Hurricane Helene
by Sophia Lin, Shenen Chen, Ryan A. Rasanen, Qifan Zhao, Vidya Chavan, Wenwu Tang, Navanit Shanmugam, Craig Allan, Nicole Braxtan and John Diemer
Geotechnics 2024, 4(4), 1259-1281; https://doi.org/10.3390/geotechnics4040064 - 14 Dec 2024
Viewed by 191
Abstract
Hurricane Helene triggered 1792 landslides across western North Carolina and has caused damage to 79 bridges to date. Helene hit western North Carolina days after a low-pressure system dropped up to 254 mm of rain in some locations of western North Carolina (e.g., [...] Read more.
Hurricane Helene triggered 1792 landslides across western North Carolina and has caused damage to 79 bridges to date. Helene hit western North Carolina days after a low-pressure system dropped up to 254 mm of rain in some locations of western North Carolina (e.g., Asheville Regional Airport). The already waterlogged region experienced devastation as significant additional rainfall occurred during Helene, where some areas, like Asheville, North Carolina received an additional 356 mm of rain (National Weather Service, 2024). In this study, machine learning (ML)-generated multi-hazard landslide susceptibility maps are compared to the documented landslides from Helene. The landslide models use the North Carolina landslide database, soil survey, rainfall, USGS digital elevation model (DEM), and distance to rivers to create the landslide variables. From the DEM, aspect factors and slope are computed. Because recent research in western North Carolina suggests fault movement is destabilizing slopes, distance to fault was also incorporated as a predictor variable. Finally, soil types were used as a wildfire predictor variable. In total, 4794 landslides were used for model training. Random Forest and logistic regression machine learning algorithms were used to develop the landslide susceptibility map. Furthermore, landslide susceptibility was also examined with and without consideration of wildfires. Ultimately, this study indicates heavy rainfall and debris-laden floodwaters were critical in triggering both landslides and scour, posing a dual threat to bridge stability. Field investigations from Hurricane Helene revealed that bridge damage was concentrated at bridge abutments, with scour and sediment deposition exacerbating structural vulnerability. We evaluated the assumed flooding potential (AFP) of damaged bridges in the study area, finding that bridges with lower AFP values were particularly vulnerable to scour and submersion during flood events. Differentiating between landslide-induced and scour-induced damage is essential for accurately assessing risks to infrastructure. The findings emphasize the importance of comprehensive hazard mapping to guide infrastructure resilience planning in mountainous regions. Full article
Show Figures

Figure 1

Figure 1
<p>Study area with location map illustrating North Carolina’s mountain area. (<b>a</b>) North Carolina’s distinct physiographic region distribution, (<b>b</b>) Blue Ridge Mountain area, and (<b>c</b>) hypothetical Appalachian Mountain formation during the Alleghenian orogeny.</p>
Full article ">Figure 2
<p>Path of Hurricane Helene moving through the Gulf of Mexico and landing near Perry, Florida as a Category 4 storm. Note the mountainous topography of western North Carolina.</p>
Full article ">Figure 3
<p>A composite representation of damaged bridges and landslide locations after Hurricane Helene.</p>
Full article ">Figure 4
<p>Some of the landslide locations after Hurricane Helene. (Photo credit: Shen-En Chen, Sophia Lin, and Qifan Zhao).</p>
Full article ">Figure 5
<p>A schematic of the calculation workflow for the probability of multi-hazard (wildfire, landslide, earthquake, and flooding) occurrence map, the probability of wildfire occurrence map, and of bridges of average flooding potential (AFP). Note that L+W+E represents landslides, wildfires, and earthquakes, and L+E represents landslides and earthquakes.</p>
Full article ">Figure 6
<p>Multi-hazard (without wildfire effect) risk map of North Carolina.</p>
Full article ">Figure 7
<p>Multi-hazard (with wildfire effect) susceptibility map of North Carolina.</p>
Full article ">Figure 8
<p>Multi-hazard susceptibility map in North Carolina with reported landslide locations: (<b>a</b>) landslide, wildfire, and earthquake; (<b>b</b>) landslide and earthquake.</p>
Full article ">Figure 9
<p>Analysis of reported landslides with the corresponding susceptibility probabilities: (<b>a</b>) multi-hazard scenario L+W+E; (<b>b</b>) multi-hazard scenario L+E; (<b>c</b>) difference between L+W+E and L+E; and (<b>d</b>) bar chart comparing the two scenarios by number of slides. Note that L+W+E represents landslides, wildfires, and earthquakes and L+E represents landslides and earthquakes.</p>
Full article ">Figure 10
<p>Hurricane Helene landslide damage to transportation structures and facilities: (<b>a</b>) by a roadside near Lake Lure; (<b>b</b>) by a parking space near Chimney Rock; (<b>c</b>) near a parking lot in Chimney Rock Village; and (<b>d</b>) below a county highway in Henderson County (Photo credit: Shen-En Chen, Sophia Lin, and Qifan Zhao).</p>
Full article ">Figure 11
<p>Hurricane Helene landslide damage to bridge structures: (<b>a</b>) Main Street bridge over a railroad, Saluda, NC; (<b>b</b>) bridge near Lake Lure; (<b>c</b>) the Big Hungry Road Bridge, Flat Rock; and (<b>d</b>) dam crossing, Lake Lure. (Photo credit: Shen-En Chen, Sophia Lin, and Qifan Zhao).</p>
Full article ">Figure 12
<p>Hurricane Helene flood-battered region in Chimney Rock Village, NC: (<b>a</b>) washed away bridge on the Chimney Rock Scenic Road over the Broad River, Chimney Rock Village, NC; (<b>b</b>) view from Main Street looking over Broad River; (<b>c</b>) scoured Broad River valley in front of Burnshirt Vineyards Bistro on Main Street, Chimney Rock Village, NC; and (<b>d</b>) the parking lot in front of Burnshirt Vineyards Bistro on Main Street, Chimney Rock Village, NC. (Photo credit: Shen-En Chen, Sophia Lin, and Qifan Zhao).</p>
Full article ">Figure 13
<p>Helene landslides and the associated susceptibility values as an accumulated function. Susceptibility values for the following multi-hazard scenarios: L+E (landslide and earthquake) and L+W+E (landslide, wildfire, and earthquake).</p>
Full article ">Figure 14
<p>Landslides with zero and 99~100% predictions for (<b>a</b>) without wildfire effects and (<b>b</b>) with wildfire effects.</p>
Full article ">Figure 15
<p>Conditioning factors used in this study, including reported landslides: (<b>a</b>) Elevation; (<b>b</b>) slope; (<b>c</b>) aspect; (<b>d</b>) soil type; (<b>e</b>) rainfall; (<b>f</b>) temperature; (<b>g</b>) forest cover; (<b>h</b>) distance to rivers; (<b>i</b>) distance to faults; (<b>j</b>) distance to roads; (<b>k</b>) distance to high population density; and (<b>l</b>) probability of wildfire occurrence.</p>
Full article ">Figure 16
<p>Typical bridge scour damage mechanism, including the formation of scour holes (local scour) around bridge piers, which can result in increased stress in the supporting geo-medium (riverbed material): (<b>a</b>) typical scour mechanism; (<b>b</b>) geo-medium stressing due to scour hole formation; (<b>c</b>) scour depths due to clear water scour vs. live-bed scour.</p>
Full article ">Figure 17
<p>Debris slide and scour combined mass waste mechanism of the Big Hungry River: (<b>a</b>) whole view of the Big Hungry Road (County route 1889) landslide, Flat Rock, NC; and (<b>b</b>) closeup of the slide and the river deposits, and (<b>c</b>) landslide assumption by [<a href="#B36-geotechnics-04-00064" class="html-bibr">36</a>].</p>
Full article ">Figure 18
<p>Reconstruction of the Big Hungry Road Bridge: (<b>a</b>) on the Flat Rock side; (<b>b</b>) on the Flat Rock side; (<b>c</b>) on the Flat Rock side, and (<b>d</b>) opposite to Flat Rock.</p>
Full article ">
Back to TopTop