Dan Gu, Yufeng Xie, Shulin Liu, Yuan Wei, Jiayi Shen
{"title":"Dynamic Modeling of Motorized Spindle System with Unbalanced Mass and Spindle Inclination","authors":"Dan Gu, Yufeng Xie, Shulin Liu, Yuan Wei, Jiayi Shen","doi":"10.3390/app131810053","DOIUrl":"https://doi.org/10.3390/app131810053","url":null,"abstract":"The high-speed motorized spindle has been wildly used in the field of aerospace processing, due to its advantages such as high speed, high precision, and high efficiency. CNC machine tools used for processing aerospace products require high machining accuracy, and once the spindle fails, it will seriously affect the quality of product processing. Thus, it is important to study the faults of the spindle, especially the faults caused by subtle errors. In this work, a dynamic model of a spindle with unbalanced mass fault and spindle inclination fault is established, and the natural frequencies and mode shapes of the motorized spindle are calculated by using the whole transfer matrix method (WTMM). The deflections of the spindle initial end in the different situations are discussed when the two faults happen independently. The results show that the spindle end deflection of the same fault has different sensitivity at different speeds. At the third order of natural frequencies, the deflection of a motorized spindle is greatest regardless of the fault that occurs. Although the motorized spindle rotates at the same speed, different faults could cause different mode shapes. At the lower speed, when the unbalanced mass fault happens, the mode shape is in an arched shape, and while the spindle inclination fault happens, the mode shape is in a concave shape.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48618488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experiments and Design of an Anti-Disaster Support System for Apple Orchards","authors":"Hee-Du Lee, Swoo-Heon Lee, K. Shin, Jun-seop Lee","doi":"10.3390/app131810033","DOIUrl":"https://doi.org/10.3390/app131810033","url":null,"abstract":"A number of apple trees have collapsed in South Korea due to strong winds caused by typhoons. In fact, apple trees are protected by various types of support systems. However, despite this, they have still been damaged. The reason why the trees collapsed is that the installation of a support system is based not on scientific facts but on empirical facts. The purpose of this study was to evaluate the structural safety of the anti-disaster support system of apple trees. Equivalent static tests of the support systems, i.e., fences and matrix supports, were carried out. The result of the equivalent static tests indicated that the bearing capacity of the foundation is considered an important factor for the performance of the fence support, and the elements played a major role in the case of the matrix support due to the connection of the strut wire and the mat wire. Based on this test result, design criteria and standard specifications of the apple tree support system in response to local wind speed are proposed.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46713630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Carlos A. Rovetto, Edmanuel Cruz, Ivonne Nuñez, Keyla Santana, Andrzej Smolarz, José Rangel, E. Cano
{"title":"Minimizing Intersection Waiting Time: Proposal of a Queue Network Model Using Kendall’s Notation in Panama City","authors":"Carlos A. Rovetto, Edmanuel Cruz, Ivonne Nuñez, Keyla Santana, Andrzej Smolarz, José Rangel, E. Cano","doi":"10.3390/app131810030","DOIUrl":"https://doi.org/10.3390/app131810030","url":null,"abstract":"The paper presents a proposed queuing model based on Kendall’s notation for the intersection of two streets in Panama City (53 East and 56 East). The proposed model is based on a set of traffic lights that controls the flow of vehicles at the intersection according to a predetermined schedule. The model analyzes the stability of the system and simulations are performed to evaluate its performance. The main objective of the paper is to optimize the vehicle flow by minimizing the waiting time for passage. In the study, it was observed that the current traffic light system on Calle 50 (50th Street) is unstable and oversaturated during weekdays, which generates large vehicle queues with no estimated exit times. It was proposed to increase the system capacity to 1300 vehicles per hour to achieve reasonable stability and provide a solution to improve traffic signal timing on 50th Street. The need to increase the system capacity has been demonstrated and an optimal value has been suggested. The evaluation of other models and the use of AI can further strengthen the system and improve the prediction accuracy in different traffic scenarios.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42490079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Two Scenario-Based Heuristics for Stochastic Shift Design Problem with Task-Based Demand","authors":"Zhiying Wu, Qing-xin Chen, Ning Mao, Guoning Xu","doi":"10.3390/app131810070","DOIUrl":"https://doi.org/10.3390/app131810070","url":null,"abstract":"In this paper, we propose a deterministic shift design model with task-based demand and give the corresponding stochastic version with a probability constraint such that the shift plan designed is staffed with the workforce with a certain probability of performing all given tasks. Since we currently find no suitable methods for solving this stochastic model from the literature related to solving stochastic shift design models, we developed a single-stage heuristic method based on statistics, whose main idea is to reduce the occurrence of manpower shortage by prolonging the resource occupation time of a task, but this leads to a serious waste of resources, which is common in solving resource allocation problems with uncertain durations. To reduce the cost of wastage, we also propose a two-stage heuristic approach that is a two-stage heuristic with an evolutionary strategy. The two heuristics show their effectiveness in solving the proposed stochastic model in numerical experiments, and the two-stage heuristic significantly outperforms the one-stage heuristic in cost optimization and solution time stability.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44746541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power Drive Architectures for Industrial Hydraulic Axes: Energy-Efficiency-Based Comparative Analysis","authors":"M. Tiboni","doi":"10.3390/app131810066","DOIUrl":"https://doi.org/10.3390/app131810066","url":null,"abstract":"In hydraulic systems, energy dissipation can be significant. The pressure losses that can occur in the hydraulic circuit, which are influenced by the adopted drive architecture, result in power consumption that is often significantly higher than that required by the mechanical system. This paper presents a comparative study of the energy efficiency of five common drive architectures in industrial hydraulic axes. The analysis is applied to a variable speed and force hydraulic blanking press, a fairly common industrial system, e.g., in the manufacture of semi-finished brass products. Standard, regenerative, high–low, variable-displacement pumps and variable speed drive configurations for a fixed-displacement pump were analyzed and compared. In each case, an appropriate and optimized sizing of the different components of the system was performed, and then the energy consumption was estimated for a load cycle common to all the considered cases. The results show that the choice of the power generation architecture of the hydraulic system has a very significant impact on the energy efficiency and consequently on the operating costs and the carbon footprint. The performed quantification of the potential energy efficiency of the considered drive architectures can be very useful in helping to make energy-conscious decisions.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46682358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sheroze Liaquat, Tanveer Hussain, Fadi Agha Kassab, B. Celik, Robert S. Fourney, T. Hansen
{"title":"Comparative Analysis of Peer-to-Peer PV Trading Strategies under the Influence of Network Constraints with Prosumer Sensitivity towards Network Coefficients","authors":"Sheroze Liaquat, Tanveer Hussain, Fadi Agha Kassab, B. Celik, Robert S. Fourney, T. Hansen","doi":"10.3390/app131810044","DOIUrl":"https://doi.org/10.3390/app131810044","url":null,"abstract":"With the increase in rooftop photovoltaic (PV) systems at the residential level, customers owning such renewable resources can act as a source of generation for other consumers in the same network. Peer-to-peer (P2P) energy trading refers to a local trading platform where the residential customers having excess PV power (prosumers) can interact with their neighbors without PV resources (customers) to improve the social welfare of society. However, the performance of a P2P market depends on the power system network constraints and trading strategy adopted for local energy trading. In this paper, we compare different trading strategies, i.e., the rule-based zero intelligent (ZI) strategy and the preference-based game theory (GT) approaches, for a constrained P2P platform. Quadratic trading loss and impedance-based network utilization fee models are suggested to define the network constraints for the P2P system. Additionally, a reluctance-based prosumer-sensitive model is developed to adjust the trading behavior of the participants under the heavy distribution losses/network fee. The presented results show that the suggested trading strategies enhanced the average welfare of the participants by approximately 17%. On average, the customers saved about $33.77 monthly, whereas the average monthly earnings of the prosumers were around $28.3. The ZI strategy enhanced the average monetary advantages of all the market participants by an average of 7% for a system having small distribution losses and a network fee as compared to the GT approach. Contrarily, for a system having high losses/a utilization fee, the GT approach improved the average welfare of the prosumers by around 75% compared to the ZI strategy. However, both trading strategies yielded competitive results compared to the traditional market under the standard values of network coefficients.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48197996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Stylianos Karagiannis, E. Magkos, Christoforos Ntantogian, Ricardo Cabecinha, Theo Fotis
{"title":"Cybersecurity and Medical Imaging: A Simulation-Based Approach to DICOM Communication","authors":"Stylianos Karagiannis, E. Magkos, Christoforos Ntantogian, Ricardo Cabecinha, Theo Fotis","doi":"10.3390/app131810072","DOIUrl":"https://doi.org/10.3390/app131810072","url":null,"abstract":"Medical imaging plays a crucial role in modern healthcare, providing essential information for accurate diagnosis and treatment planning. The Digital Imaging and Communications in Medicine (DICOM) standard has revolutionized the storage, transmission, and sharing of medical images and related data. Despite its advantages, implementation and deployment of the DICOM protocol often suffers from incomplete understanding, leading to vulnerabilities within the healthcare ecosystem. This research paper presents an implementation of DICOM communication and the development of a practical demonstration for simulation purposes The simulation can be used for conducting cybersecurity tests in the context of DICOM communication. Overall, the simulation provides a digital environment that can help in retrieving valuable insights into the practical aspects of DICOM communication and PACS integration, serving as a valuable resource for medical imaging professionals, researchers, and developers. These research results provide practical insights, and the DICOM simulation can be used in realistic contexts to showcase a variety of security scenarios.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43053940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing Retail Transactions: A Data-Driven Recommendation Using Modified RFM Analysis and Association Rules Mining","authors":"Angela Hsiang-Ling Chen, Sebastian Gunawan","doi":"10.3390/app131810057","DOIUrl":"https://doi.org/10.3390/app131810057","url":null,"abstract":"Retail transactions have become an integral part of the economic cycle of every country and even on a global scale. Retail transactions are a trade sector that has the potential to be developed continuously in the future. This research focused on building a specified and data-driven recommendation system based on customer-purchasing and product-selling behavior. Modified RFM analysis was used by adding two variables, namely periodicity and customer engagement index; clustering algorithm such as K-means clustering and Ward’s method; and association rules to determine the pattern of the cause–effect relationship on each transaction and four types of classifiers to apply and to validate the recommendation system. The results showed that based on customer behavior, it should be split into two groups: loyal and potential customers. In contrast, for product behavior, it also comprised three groups: bestseller, profitable, and VIP product groups. Based on the result, K-nearest neighbor is the most suitable classifier with a low chance of overfitting and a higher performance index.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45662579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Path Planning for Autonomous Vehicles in Unknown Dynamic Environment Based on Deep Reinforcement Learning","authors":"Hui Hu, Yuge Wang, Wenjie Tong, Jiao Zhao, Yulei Gu","doi":"10.3390/app131810056","DOIUrl":"https://doi.org/10.3390/app131810056","url":null,"abstract":"Autonomous vehicles can reduce labor power during cargo transportation, and then improve transportation efficiency, for example, the automated guided vehicle (AGV) in the warehouse can improve the operation efficiency. To overcome the limitations of traditional path planning algorithms in unknown environments, such as reliance on high-precision maps, lack of generalization ability, and obstacle avoidance capability, this study focuses on investigating the Deep Q-Network and its derivative algorithm to enhance network and algorithm structures. A new algorithm named APF-D3QNPER is proposed, which combines the action output method of artificial potential field (APF) with the Dueling Double Deep Q Network algorithm, and experience sample rewards are considered in the experience playback portion of the traditional Deep Reinforcement Learning (DRL) algorithm, which enhances the convergence ability of the traditional DRL algorithm. A long short-term memory (LSTM) network is added to the state feature extraction network part to improve its adaptability in unknown environments and enhance its spatiotemporal sensitivity to the environment. The APF-D3QNPER algorithm is compared with mainstream deep reinforcement learning algorithms and traditional path planning algorithms using a robot operating system and the Gazebo simulation platform by conducting experiments. The results demonstrate that the APF-D3QNPER algorithm exhibits excellent generalization abilities in the simulation environment, and the convergence speed, the loss value, the path planning time, and the path planning length of the APF-D3QNPER algorithm are all less than for other algorithms in diverse scenarios.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48441487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. A. Adebimpe, Ian Ouii Ng, Mohd Yamani Idna Idris, Mohammed Okmi, Chin Soon Ku, T. F. Ang, L. Y. Por
{"title":"Systemic Literature Review of Recognition-Based Authentication Method Resistivity to Shoulder-Surfing Attacks","authors":"L. A. Adebimpe, Ian Ouii Ng, Mohd Yamani Idna Idris, Mohammed Okmi, Chin Soon Ku, T. F. Ang, L. Y. Por","doi":"10.3390/app131810040","DOIUrl":"https://doi.org/10.3390/app131810040","url":null,"abstract":"The rapid advancement of information technology (IT) has given rise to a new era of efficient and fast communication and transactions. However, the increasing adoption of and reliance on IT has led to the exposure of personal and sensitive information online. Safeguarding this information against unauthorized access remains a persistent challenge, necessitating the implementation of improved computer security measures. The core objective of computer security is to ensure the confidentiality, availability, and integrity of data and services. Among the mechanisms developed to counter security threats, authentication stands out as a pivotal defense strategy. Graphical passwords have emerged as a popular authentication approach, yet they face vulnerability to shoulder-surfing attacks, wherein an attacker can clandestinely observe a victim’s actions. Shoulder-surfing attacks present a significant security challenge within the realm of graphical password authentication. These attacks occur when an unauthorized individual covertly observes the authentication process of a legitimate user by shoulder surfing the user or capturing the interaction through a video recording. In response to this challenge, various methods have been proposed to thwart shoulder-surfing attacks, each with distinct advantages and limitations. This study thus centers on reviewing the resilience of existing recognition-based graphical password techniques against shoulder-surfing attacks by conducting a comprehensive examination and evaluation of their benefits, strengths, and weaknesses. The evaluation process entailed accessing pertinent academic resources through renowned search engines, including Web of Science, Science Direct, IEEE Xplore, ProQuest, Scopus, Springer, Wiley Online Library, and EBSCO. The selection criteria were carefully designed to prioritize studies that focused on recognition-based graphical password methods. Through this rigorous approach, 28 studies were identified and subjected to a thorough review. The results show that fourteen of them adopted registered objects as pass-objects, bolstering security through object recognition. Additionally, two methods employed decoy objects as pass-objects, enhancing obfuscation. Notably, one technique harnessed both registered and decoy objects, amplifying the security paradigm. The results also showed that recognition-based graphical password techniques varied in their resistance to different types of shoulder-surfing attacks. Some methods were effective in preventing direct observation attacks, while others were vulnerable to video-recorded and multiple-observation attacks. This vulnerability emerged due to attackers potentially extracting key information by analyzing user interaction patterns in each challenge set. Notably, one method stood out as an exception, demonstrating resilience against all three types of shoulder-surfing attacks. In conclusion, this study contributes to a comprehensive understanding of the ef","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47735022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}