Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,832)

Search Parameters:
Keywords = key nodes

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
17 pages, 4531 KiB  
Article
Using Artificial Neural Networks to Predict Operational Parameters of a Drinking Water Treatment Plant (DWTP)
by Stylianos Gyparakis, Ioannis Trichakis and Evan Diamadopoulos
Water 2024, 16(19), 2863; https://doi.org/10.3390/w16192863 (registering DOI) - 9 Oct 2024
Abstract
The scope of the present study is the estimation of key operational parameters of a drinking water treatment plant (DWTP), particularly the dosages of treatment chemicals, using artificial neural networks (ANNs) based on measurable in situ data. The case study consists of the [...] Read more.
The scope of the present study is the estimation of key operational parameters of a drinking water treatment plant (DWTP), particularly the dosages of treatment chemicals, using artificial neural networks (ANNs) based on measurable in situ data. The case study consists of the Aposelemis DWTP, where the plant operator had an estimation of the ANN output parameters for the required dosages of water treatment chemicals based on observed water quality and other operational parameters at the time. The estimated DWTP main operational parameters included residual ozone (O3) and dosages of the chemicals used: anionic polyelectrolyte (ANPE), poly-aluminum chloride hydroxide sulfate (PACl), and chlorine gas (Cl2(g)). Daily measurable results of water sample analysis and recordings from the DWTP Supervisory Control and Data Acquisition System (SCADA), covering a period of 38 months, were used as input parameters for the artificial neural network (1188 values for each of the 14 measurable parameters). These input parameters included: raw water supply (Q), raw water turbidity (T1), treated water turbidity (T2), treated water residual free chlorine (Cl2), treated water concentration of residual aluminum (Al), filtration bed inlet water turbidity (T3), daily difference in water height in reservoir (∆H), raw water pH (pH1), treated water pH (pH2), and daily consumption of DWTP electricity (El). Output/target parameters were: residual O3 after ozonation (O3), anionic polyelectrolyte (ANPE), poly-aluminum chloride hydroxide sulfate (PACl), and chlorine gas supply (Cl2(g)). A total of 304 different ANN models were tested, based on the best test performance (tperf) indicator. The one with the optimum performance indicator was selected. The scenario finally chosen was the one with 100 neural networks, 100 nodes, 42 hidden nodes, 10 inputs, and 4 outputs. This ANN model achieved excellent simulation results based on the best testing performance indicator, which suggests that ANNs are potentially useful tools for the prediction of a DWTP’s main operational parameters. Further research could explore the prediction of water chemicals used in a DWTP by using ANNs with a smaller number of operational parameters to ensure greater flexibility, without prohibitively reducing the reliability of the prediction model. This could prove useful in cases with a much higher sample size, given the data-demanding nature of ANNs. Full article
Show Figures

Figure 1

20 pages, 14832 KiB  
Article
Coupled Analysis of Risk Factor for Tailing Pond Dam Failure Accident Based on N–K Model and SNA
by Liwei Yuan, Di Chen, Sumin Li, Guolong Wang, Yanlin Li, Bin Li and Minghui Chen
Sustainability 2024, 16(19), 8686; https://doi.org/10.3390/su16198686 - 8 Oct 2024
Viewed by 205
Abstract
The failure of tailings pond dams represents a complex coupled system involving various risk factors, including human, governance, facilities, and environmental aspects. It is crucial to identify key risk factors at the system level to enhance the safety management of tailings ponds. We [...] Read more.
The failure of tailings pond dams represents a complex coupled system involving various risk factors, including human, governance, facilities, and environmental aspects. It is crucial to identify key risk factors at the system level to enhance the safety management of tailings ponds. We analyzed 74 cases of tailings pond dam failure accidents, both domestically and internationally, from the perspectives of human, governance, facility, and environment. We employed the 2–4 Model to identify and extract the causes of dam failures, summarizing these into four primary risk factors and 40 secondary risk factors, while constructing a risk coupling mechanism model. The natural killing (N–K) model was implemented to analyze the risk coupling values of primary risk factors and quantify these couplings. The N–K model facilitated an analysis of the risk coupling values of first-level risk factors, while social network analysis (SNA) was employed to visualize the relationships among second-level risk factors and assess the centrality and accessibility of nodes within the risk factor network. The out-degree of the risk nodes was corrected by integrating the N–K model with the SNA, leading to the identification of key risk factors associated with tailings pond dam failures and the formulation of corresponding safety prevention and control strategies. The findings indicate that managing multi-risk factor coupling is an effective approach to mitigating the occurrence of tailings pond dam failure accidents. Notably, unfavorable environmental risk factors significantly contribute to the coupling of human–governance–facility–environmental risks, necessitating targeted management strategies. Furthermore, inadequate safety supervision, weak safety awareness, inadequate receipt and inspection, and irregular operation represent additional key risk factors requiring focused prevention and control efforts. Full article
Show Figures

Figure 1

19 pages, 6565 KiB  
Article
Research on AGV Path Planning Based on Improved Directed Weighted Graph Theory and ROS Fusion
by Yinping Li and Li Liu
Actuators 2024, 13(10), 404; https://doi.org/10.3390/act13100404 - 7 Oct 2024
Viewed by 431
Abstract
This article addresses the common issues of insufficient computing power and path congestion for automated guided vehicles (AGVs) in real-world production environments, as well as the shortcomings of traditional path-planning algorithms that mainly consider the shortest path while ignoring vehicle turning time and [...] Read more.
This article addresses the common issues of insufficient computing power and path congestion for automated guided vehicles (AGVs) in real-world production environments, as well as the shortcomings of traditional path-planning algorithms that mainly consider the shortest path while ignoring vehicle turning time and stability. We propose a secondary path-planning method based on an improved directed weighted graph theory integrated with an ROS. Firstly, the production environment is modeled in detail to identify the initial position of the AGV. Secondly, the operational area is systematically divided, key nodes are selected and optimized, and a directed weighted graph is constructed with optimized weights. It is integrated with the ROS for path planning, using the Floyd algorithm to find the optimal path. The effectiveness and superiority of this method have been demonstrated through simulation verification and actual AGV operation testing. The path planning strategy and fusion algorithm proposed in this article that comprehensively considers distance and angle steering are simple and practical, effectively reducing production costs for enterprises. This method is suitable for logistics sorting and small transport AGVs with a shorter overall path-planning time, higher stability, and limited computing power, and it has reference significance and practical value. Full article
(This article belongs to the Section Actuators for Robotics)
Show Figures

Figure 1

27 pages, 542 KiB  
Article
Unsupervised Learning for Lateral-Movement-Based Threat Mitigation in Active Directory Attack Graphs
by David Herranz-Oliveros, Marino Tejedor-Romero, Jose Manuel Gimenez-Guzman and Luis Cruz-Piris
Electronics 2024, 13(19), 3944; https://doi.org/10.3390/electronics13193944 - 6 Oct 2024
Viewed by 402
Abstract
Cybersecurity threats, particularly those involving lateral movement within networks, pose significant risks to critical infrastructures such as Microsoft Active Directory. This study addresses the need for effective defense mechanisms that minimize network disruption while preventing attackers from reaching key assets. Modeling Active Directory [...] Read more.
Cybersecurity threats, particularly those involving lateral movement within networks, pose significant risks to critical infrastructures such as Microsoft Active Directory. This study addresses the need for effective defense mechanisms that minimize network disruption while preventing attackers from reaching key assets. Modeling Active Directory networks as a graph in which the nodes represent the network components and the edges represent the logical interactions between them, we use centrality metrics to derive the impact of hardening nodes in terms of constraining the progression of attacks. We propose using Unsupervised Learning techniques, specifically density-based clustering algorithms, to identify those nodes given the information provided by their metrics. Our approach includes simulating attack paths using a snowball model, enabling us to analytically evaluate the impact of hardening on delaying Domain Administration compromise. We tested our methodology on both real and synthetic Active Directory graphs, demonstrating that it can significantly slow down the propagation of threats from reaching the Domain Administration across the studied scenarios. Additionally, we explore the potential of these techniques to enable flexible selection of the number of nodes to secure. Our findings suggest that the proposed methods significantly enhance the resilience of Active Directory environments against targeted cyber-attacks. Full article
(This article belongs to the Special Issue Machine Learning for Cybersecurity: Threat Detection and Mitigation)
21 pages, 690 KiB  
Article
A Certificate-Less Distributed Key Management Scheme for Space Networks
by Changyuan Luo and Ling Sun
Mathematics 2024, 12(19), 3126; https://doi.org/10.3390/math12193126 - 6 Oct 2024
Viewed by 288
Abstract
The specificity and complexity of space networks render the traditional key management mechanism no longer applicable. The certificate-less-based distributed spatial network key management scheme proposed in this paper combines the characteristics of space networks, solving the problems regarding the difficulty of implementing centralized [...] Read more.
The specificity and complexity of space networks render the traditional key management mechanism no longer applicable. The certificate-less-based distributed spatial network key management scheme proposed in this paper combines the characteristics of space networks, solving the problems regarding the difficulty of implementing centralized key management in space networks and the excessive overhead required for maintaining public key certificates by constructing a distributed key generation center and establishing strategies such as private key updates, master key component updates, and session key negotiation. This method also avoids the key escrow problem inherent in existing identity-based key management schemes. This scheme provides the DPKG construction method for space networks; designs the update strategy for the DPKG node’s master key sharing, providing a specific update algorithm; introduces the batch private key update mechanism; and uses the mapping function to evenly distribute the node’s update requests throughout the update time period, avoiding the problem of overly concentrated update requests. After analysis and simulation verification, it was proven that the scheme can meet the necessary security requirements, offering good stability and scalability. Full article
(This article belongs to the Special Issue Applications of Cryptography Theory in Network Security)
20 pages, 12816 KiB  
Article
KAN-HyperMP: An Enhanced Fault Diagnosis Model for Rolling Bearings in Noisy Environments
by Jun Wang, Zhilin Dong and Shuang Zhang
Sensors 2024, 24(19), 6448; https://doi.org/10.3390/s24196448 - 5 Oct 2024
Viewed by 447
Abstract
Rolling bearings often produce non-stationary signals that are easily obscured by noise, particularly in high-noise environments, making fault detection a challenging task. To address this challenge, a novel fault diagnosis approach based on the Kolmogorov–Arnold Network-based Hypergraph Message Passing (KAN-HyperMP) model is proposed. [...] Read more.
Rolling bearings often produce non-stationary signals that are easily obscured by noise, particularly in high-noise environments, making fault detection a challenging task. To address this challenge, a novel fault diagnosis approach based on the Kolmogorov–Arnold Network-based Hypergraph Message Passing (KAN-HyperMP) model is proposed. The KAN-HyperMP model is composed of three key components: a neighbor feature aggregation block, a feature fusion block, and a KANLinear block. Firstly, the neighbor feature aggregation block leverages hypergraph theory to integrate information from more distant neighbors, aiding in the reduction of noise impact, even when nearby neighbors are severely affected. Subsequently, the feature fusion block combines the features of these higher-order neighbors with the target node’s own features, enabling the model to capture the complete structure of the hypergraph. Finally, the smoothness properties of B-spline functions within the Kolmogorov–Arnold Network (KAN) are employed to extract critical diagnostic features from noisy signals. The proposed model is trained and evaluated on the Southeast University (SEU) and Jiangnan University (JNU) Datasets, achieving accuracy rates of 99.70% and 99.10%, respectively, demonstrating its effectiveness in fault diagnosis under both noise-free and noisy conditions. Full article
Show Figures

Figure 1

20 pages, 2554 KiB  
Article
Comprehensive Evaluation and Selection of Cardamom (Elettaria cardamomum (L.) Maton) Germplasm Using Morphological Traits
by Martha Patricia Herrera-González, Alejandra Zamora-Jerez, Rolando Cifuentes-Velasquez, Luis Andrés Arévalo-Rodríguez and Santiago Pereira-Lorenzo
Plants 2024, 13(19), 2786; https://doi.org/10.3390/plants13192786 - 4 Oct 2024
Viewed by 329
Abstract
Cardamom (Elettaria cardamomum (L.) Maton) plays a crucial role in Guatemala’s agriculture, supporting local families and covering 169,429.29 ha (making it the world’s leading producer). Since its introduction to Guatemala in 1910, limited research has focused on unraveling the diversity and defining [...] Read more.
Cardamom (Elettaria cardamomum (L.) Maton) plays a crucial role in Guatemala’s agriculture, supporting local families and covering 169,429.29 ha (making it the world’s leading producer). Since its introduction to Guatemala in 1910, limited research has focused on unraveling the diversity and defining morphological traits critical for selecting excellent accessions. In this study, we examined 17 morphological traits across 288 accessions to identify key features associated with the germplasm. The comprehensive analysis employed principal component analysis, a morphological composite value (F-value), linear regression, and hierarchical clustering. The Shannon–Wiener diversity index ranged from 0.10 to 2.02, indicating the variation in diversity among traits. Principal component analysis and hierarchical clustering revealed six distinct germplasm groups. The comprehensive analysis facilitated the selection of 14 excellent accessions, and the regression equation incorporating criteria such as plant height, capsule color, panicle number per plant, panicle length, rhizome color, cluster number per panicle, cluster node length, and capsule number per cluster to identify cardamom germplasm. To develop a conservation strategy for the two putative foreign varieties (‘Malabar’ and ‘Mysore’/’Vazhukka’) introduced in Guatemala based on plant height, another 12 accessions were selected with a second comprehensive evaluation. This information offers insights into cardamom diversity for informed selection enhancing national utilization, productivity, and conservation. Full article
(This article belongs to the Section Plant Genetic Resources)
Show Figures

Graphical abstract

11 pages, 4060 KiB  
Communication
Study of a Crosstalk Suppression Scheme Based on Double-Stage Semiconductor Optical Amplifiers
by Xintong Lu, Xinyu Ma and Baojian Wu
Sensors 2024, 24(19), 6403; https://doi.org/10.3390/s24196403 - 2 Oct 2024
Viewed by 367
Abstract
An all-optical crosstalk suppression scheme is desirable for wavelength and space division multiplexing optical networks by improving the performance of the corresponding nodes. We put forward a scheme comprising double-stage semiconductor optical amplifiers (SOAs) for wavelength-preserving crosstalk suppression. The wavelength position of the [...] Read more.
An all-optical crosstalk suppression scheme is desirable for wavelength and space division multiplexing optical networks by improving the performance of the corresponding nodes. We put forward a scheme comprising double-stage semiconductor optical amplifiers (SOAs) for wavelength-preserving crosstalk suppression. The wavelength position of the degenerate pump in the optical phase conjugation (OPC) is optimized for signal-to-crosstalk ratio (SXR) improvement. The crosstalk suppression performance of the double-stage SOA scheme for 20 Gb/s quadrature phase shift keying (QPSK) signals is investigated by means of simulations, including the input SXR range and the crosstalk wavelength deviation. For the case with identical-frequency crosstalk, the double-stage SOA scheme can achieve equivalent SXR improvement of 1.5 dB for an input SXR of 10 dB. Thus, the double-stage SOA scheme proposed here is more suitable for few-mode fiber systems and networks. Full article
Show Figures

Figure 1

25 pages, 2369 KiB  
Article
A Secure Key Exchange and Authentication Scheme for Securing Communications in the Internet of Things Environment
by Ali Peivandizadeh, Haitham Y. Adarbah, Behzad Molavi, Amirhossein Mohajerzadeh and Ali H. Al-Badi
Future Internet 2024, 16(10), 357; https://doi.org/10.3390/fi16100357 - 30 Sep 2024
Viewed by 622
Abstract
In today’s advanced network and digital age, the Internet of Things network is experiencing a significant growing trend and, due to its wide range of services and network coverage, has been able to take a special place in today’s technology era. Among the [...] Read more.
In today’s advanced network and digital age, the Internet of Things network is experiencing a significant growing trend and, due to its wide range of services and network coverage, has been able to take a special place in today’s technology era. Among the applications that can be mentioned for this network are the field of electronic health, smart residential complexes, and a wide level of connections that have connected the inner-city infrastructure in a complex way to make it smart. The notable and critical issue that exists in this network is the extent of the elements that make up the network and, due to this, the strong and massive data exchanges at the network level. With the increasing deployment of the Internet of Things, a wide range of challenges arise, especially in the discussion of establishing network security. Regarding security concerns, ensuring the confidentiality of the data being exchanged in the network, maintaining the privacy of the network nodes, protecting the identity of the network nodes, and finally implementing the security policies required to deal with a wide range of network cyber threats are of great importance. A fundamental element in the security of IoT networks is the authentication process, wherein nodes are required to validate each other’s identities to ensure the establishment of secure communication channels. Through the enforcement of security prerequisites, in this study, we suggested a security protocol focused on reinforcing security characteristics and safeguarding IoT nodes. By utilizing the security features provided by Elliptic Curve Cryptography (ECC) and employing the Elliptic Curve Diffie–Hellman (ECDH) key-exchange mechanism, we designed a protocol for authenticating nodes and establishing encryption keys for every communication session within the Internet of Things. To substantiate the effectiveness and resilience of our proposed protocol in withstanding attacks and network vulnerabilities, we conducted evaluations utilizing both formal and informal means. Furthermore, our results demonstrate that the protocol is characterized by low computational and communication demands, which makes it especially well-suited for IoT nodes operating under resource constraints. Full article
(This article belongs to the Section Cybersecurity)
Show Figures

Figure 1

35 pages, 15840 KiB  
Article
An Integrated Framework for Estimating Origins and Destinations of Multimodal Multi-Commodity Import and Export Flows Using Multisource Data
by Muhammad Safdar, Ming Zhong, Zhi Ren and John Douglas Hunt
Systems 2024, 12(10), 406; https://doi.org/10.3390/systems12100406 - 30 Sep 2024
Viewed by 462
Abstract
Estimating origin-destination (OD) demand is integral to urban, regional, and national freight transportation planning and modeling systems. However, in developing countries, existing studies reveal significant inconsistencies between OD estimates for domestic and import/export commodities derived from interregional input-output (IO) tables and those from [...] Read more.
Estimating origin-destination (OD) demand is integral to urban, regional, and national freight transportation planning and modeling systems. However, in developing countries, existing studies reveal significant inconsistencies between OD estimates for domestic and import/export commodities derived from interregional input-output (IO) tables and those from regional IO tables. These discrepancies create a significant challenge for properly forecasting the freight demand of regional/interregional multimodal transportation networks. To this end, this study proposes a novel integrated framework for estimating regional and international (import/export) OD freight flows for a set of key commodities that dominate long-distance transportation. The framework leverages multisource data and follows a three-step process. First, a spatial economic model, PECAS activity allocation, is developed to estimate freight OD demand within a specific region. Second, the international (import and export) freight OD is estimated from different zones to foreign countries, including major import and export nodes such as international seaports, using a gravity model with the zone-pair friction obtained from a multimodal transportation model. Third, the OD matrices are converted from monetary value to tonnage and assigned to the multimodal transportation super network using the incremental freight assignment method. The model is calibrated using traffic counts of the highways, railways, and port throughput data. The proposed framework is tested through a case study of the Province of Jiangxi, which is crucial for forecasting freight demand before the planning, design, and operation of the Ganyue Canal. The predictive analytics of the proposed framework demonstrated high validity, where the goodness-of-fit (R2) between the observed and estimated freight flows on specific links for each of the three transport modes was higher than 0.9. This indirectly confirms the efficacy of the model in predicting freight OD demands. The proposed framework is adaptable to other regions and aids practitioners in providing a comprehensive tool for informed decision-making in freight demand modeling. Full article
Show Figures

Figure 1

16 pages, 2942 KiB  
Article
Improving Localization in Wireless Sensor Networks for the Internet of Things Using Data Replication-Based Deep Neural Networks
by Jehan Esheh and Sofiene Affes
Sensors 2024, 24(19), 6314; https://doi.org/10.3390/s24196314 - 29 Sep 2024
Viewed by 481
Abstract
Localization is one of the most challenging problems in wireless sensor networks (WSNs), primarily driven by the need to develop an accurate and cost-effective localization system for Internet of Things (IoT) applications. While machine learning (ML) algorithms have been widely applied in various [...] Read more.
Localization is one of the most challenging problems in wireless sensor networks (WSNs), primarily driven by the need to develop an accurate and cost-effective localization system for Internet of Things (IoT) applications. While machine learning (ML) algorithms have been widely applied in various WSN-based tasks, their effectiveness is often compromised by limited training data, leading to issues such as overfitting and reduced accuracy, especially when the number of sensor nodes is low. A key strategy to mitigate overfitting involves increasing both the quantity and diversity of the training data. To address the limitations posed by small datasets, this paper proposes an intelligent data augmentation strategy (DAS)-based deep neural network (DNN) that enhances the localization accuracy of WSNs. The proposed DAS replicates the estimated positions of unknown nodes generated by the Dv-hop algorithm and introduces Gaussian noise to these replicated positions, creating multiple modified datasets. By combining the modified datasets with the original training data, we significantly increase the dataset size, which leads to a substantial reduction in normalized root mean square error (NRMSE). The experimental results demonstrate that this data augmentation technique significantly improves the performance of DNNs compared to the traditional Dv-hop algorithm at a low number of nodes while maintaining an efficient computational cost for data augmentation. Therefore, the proposed method provides a scalable and effective solution for enhancing the localization accuracy of WSNs. Full article
(This article belongs to the Special Issue IoT and Wireless Sensor Network in Environmental Monitoring Systems)
Show Figures

Figure 1

35 pages, 7452 KiB  
Article
Mapping Financial Connections: Market Integration in Emerging Economies through Graph Theory
by Marc Cortés Rufé and Jordi Martí Pidelaserra
Risks 2024, 12(10), 154; https://doi.org/10.3390/risks12100154 - 29 Sep 2024
Viewed by 352
Abstract
In this study, we explore the financial and economic integration of BRICS nations (Brazil, Russia, India, China, and South Africa) and key emerging economies (Egypt, Saudi Arabia, and the UAE) using graph theory, aiming to map intersectoral connections and their impact on financial [...] Read more.
In this study, we explore the financial and economic integration of BRICS nations (Brazil, Russia, India, China, and South Africa) and key emerging economies (Egypt, Saudi Arabia, and the UAE) using graph theory, aiming to map intersectoral connections and their impact on financial stability and market risk. The research addresses a critical gap in the literature; while political and economic linkages between nations have been widely studied, the specific connectivity between sectors within these economies remains underexplored. Our methodology utilizes eigenvector centrality and Euclidean distance to construct a comprehensive network of 106 publicly listed firms from 2013 to 2022, across sectors such as energy, telecommunications, retail, and technology. The primary hypothesis is that sectors with higher centrality scores—indicative of their interconnectedness within the broader financial network—demonstrate greater resilience to market volatility and contribute disproportionately to sectoral profitability. The analysis yielded several key insights. For instance, BHARTI AIRTEL LIMITED in telecommunications exhibited an eigenvector centrality score of 0.9615, positioning it as a critical node in maintaining sectoral stability, while AMBEV SA in the retail sector, with a centrality score of 0.9938, emerged as a pivotal player influencing both profitability and risk. Sectors led by companies with high centrality showed a 20% increase in risk-adjusted returns compared to less connected entities, supporting the hypothesis that central firms act as stabilizers in fluctuating market conditions. The findings underscore the practical implications for policymakers and investors alike. Understanding the structure of these networks allows for more informed decision making in terms of investment strategies and macroeconomic policy. By identifying the central entities within these economic systems, both policymakers and investors can target their efforts more effectively, either to support growth initiatives or to mitigate systemic risks. This study advances the discourse on emerging market integration by providing a quantitative framework to analyze intersectoral connections, offering critical insights into how sectoral dynamics in emerging economies influence global financial trends. Full article
(This article belongs to the Special Issue Advances in Volatility Modeling and Risk in Markets)
18 pages, 7989 KiB  
Article
Intelligent Dance Motion Evaluation: An Evaluation Method Based on Keyframe Acquisition According to Musical Beat Features
by Hengzi Li and Xingli Huang
Sensors 2024, 24(19), 6278; https://doi.org/10.3390/s24196278 - 28 Sep 2024
Viewed by 402
Abstract
Motion perception is crucial in competitive sports like dance, basketball, and diving. However, evaluations in these sports heavily rely on professionals, posing two main challenges: subjective assessments are uncertain and can be influenced by experience, making it hard to guarantee timeliness and accuracy, [...] Read more.
Motion perception is crucial in competitive sports like dance, basketball, and diving. However, evaluations in these sports heavily rely on professionals, posing two main challenges: subjective assessments are uncertain and can be influenced by experience, making it hard to guarantee timeliness and accuracy, and increasing labor costs with multi-expert voting. While video analysis methods have alleviated some pressure, challenges remain in extracting key points/frames from videos and constructing a suitable, quantifiable evaluation method that aligns with the static–dynamic nature of movements for accurate assessment. Therefore, this study proposes an innovative intelligent evaluation method aimed at enhancing the accuracy and processing speed of complex video analysis tasks. Firstly, by constructing a keyframe extraction method based on musical beat detection, coupled with prior knowledge, the beat detection is optimized through a perceptually weighted window to accurately extract keyframes that are highly correlated with dance movement changes. Secondly, OpenPose is employed to detect human joint points in the keyframes, quantifying human movements into a series of numerically expressed nodes and their relationships (i.e., pose descriptions). Combined with the positions of keyframes in the time sequence, a standard pose description sequence is formed, serving as the foundational data for subsequent quantitative evaluations. Lastly, an Action Sequence Evaluation method (ASCS) is established based on all action features within a single action frame to precisely assess the overall performance of individual actions. Furthermore, drawing inspiration from the Rouge-L evaluation method in natural language processing, a Similarity Measure Approach based on Contextual Relationships (SMACR) is constructed, focusing on evaluating the coherence of actions. By integrating ASCS and SMACR, a comprehensive evaluation of dancers is conducted from both the static and dynamic dimensions. During the method validation phase, the research team judiciously selected 12 representative samples from the popular dance game Just Dance, meticulously classifying them according to the complexity of dance moves and physical exertion levels. The experimental results demonstrate the outstanding performance of the constructed automated evaluation method. Specifically, this method not only achieves the precise assessments of dance movements at the individual keyframe level but also significantly enhances the evaluation of action coherence and completeness through the innovative SMACR. Across all 12 test samples, the method accurately selects 2 to 5 keyframes per second from the videos, reducing the computational load to 4.1–10.3% compared to traditional full-frame matching methods, while the overall evaluation accuracy only slightly decreases by 3%, fully demonstrating the method’s combination of efficiency and precision. Through precise musical beat alignment, efficient keyframe extraction, and the introduction of intelligent dance motion analysis technology, this study significantly improves upon the subjectivity and inefficiency of traditional manual evaluations, enhancing the scientificity and accuracy of assessments. It provides robust tool support for fields such as dance education and competition evaluations, showcasing broad application prospects. Full article
(This article belongs to the Collection Sensors and AI for Movement Analysis)
Show Figures

Figure 1

30 pages, 2023 KiB  
Article
A Network Reliability Analysis Method for Complex Real-Time Systems: Case Studies in Railway and Maritime Systems
by Yu Zang, Jiaxiang E and Lance Fiondella
Mathematics 2024, 12(19), 3014; https://doi.org/10.3390/math12193014 - 27 Sep 2024
Viewed by 623
Abstract
The analysis of complex system reliability is an area of growing interest, particularly given the diverse and intricate nature of the subsystems and components these systems encompass. Tackling the reliability of such multifaceted systems presents challenges, including component wear, multiple failure modes, the [...] Read more.
The analysis of complex system reliability is an area of growing interest, particularly given the diverse and intricate nature of the subsystems and components these systems encompass. Tackling the reliability of such multifaceted systems presents challenges, including component wear, multiple failure modes, the cascading effects of these failures, and the associated uncertainties, which require careful consideration. While traditional studies have examined these elements, the dynamic interplay of information between subsystems and the overarching system has only recently begun to draw focus. A notably understudied aspect is the reliability analysis of complex real-time systems that must adapt to evolving operational conditions. This paper proposes a novel methodology for assessing the reliability of complex real-time systems. This method integrates complex network theory, thus capturing the intricate operational characteristics of these systems, with adjustments to several key complex network parameters to define the nuances of communication within the network framework. To showcase the efficacy and adaptability of our approach, we present case studies on railway and maritime systems. For the railway system, our analysis spans various operational scenarios: from single train operations to simultaneous operations across multiple or different radio block center regions, accounting for node and edge failures. In maritime systems, the case studies employing the VHF data exchange system under operational scenarios are subject to network reliability analysis, successfully pinpointing critical vulnerabilities and modules of high importance. The findings of our research are promising, demonstrating that the proposed method not only accurately evaluates the overall reliability of complex systems but also identifies the pivotal weak points—be it modules or links—warranting attention for system enhancement. Full article
Show Figures

Figure 1

14 pages, 30394 KiB  
Article
ADAR1 Promotes Myogenic Proliferation and Differentiation of Goat Skeletal Muscle Satellite Cells
by Zihao Zhao, Miao Xiao, Xiaoli Xu, Meijun Song, Dinghui Dai, Siyuan Zhan, Jiaxue Cao, Jiazhong Guo, Tao Zhong, Linjie Wang, Li Li and Hongping Zhang
Cells 2024, 13(19), 1607; https://doi.org/10.3390/cells13191607 - 25 Sep 2024
Viewed by 417
Abstract
As one of the most important economic traits for domestic animal husbandry, skeletal muscle is regulated by an intricate molecular network. Adenosine deaminase acting on RNA (ADAR1) involves various physiological processes and diseases, such as innate immunity and the development of lung adenocarcinoma, [...] Read more.
As one of the most important economic traits for domestic animal husbandry, skeletal muscle is regulated by an intricate molecular network. Adenosine deaminase acting on RNA (ADAR1) involves various physiological processes and diseases, such as innate immunity and the development of lung adenocarcinoma, breast cancer, gastric cancer, etc. However, its role in skeletal muscle growth requires further clarification. Here, we explored the functions of ADAR1 in the myogenic process of goat skeletal muscle satellite cells (MuSCs). The ADAR1 transcripts were noticeably enriched in goat visceral tissues compared to skeletal muscle. Additionally, its levels in slow oxidative muscles like the psoas major and minor muscles were higher than in the fast oxidative glycolytic and fast glycolytic muscles. Among the two common isoforms from ADAR1, p110 is more abundant than p150. Moreover, overexpressing ADAR1 enhanced the proliferation and myogenic differentiation of MuSCs. The mRNA-seq performed on MuSCs’ knockdown of ADAR1 obtained 146 differentially expressed genes (DEGs), 87 upregulated and 59 downregulated. These DEGs were concentrated in muscle development and process pathways, such as the MAPK and cAMP signaling pathways. Furthermore, many DEGs as the key nodes defined by protein–protein interaction networks (PPI), including STAT3, MYH3/8, TGFβ2, and ACTN4, were closely related to the myogenic process. Finally, RNA immunoprecipitation combined with qPCR (RIP-qPCR) showed that ADAR1 binds to PAX7 and MyoD mRNA. This study indicates that ADAR1 promotes the myogenic development of goat MuSCs, which provides a useful scientific reference for further exploring the ADAR1-related regulatory networks underlying mammal skeletal muscle growth. Full article
Show Figures

Figure 1

Back to TopTop