{"title":"PCA-based fast point feature histogram simplification algorithm for point clouds","authors":"Zhong Gan, Boyu Ma, Zihao Ling","doi":"10.1002/eng2.12800","DOIUrl":"10.1002/eng2.12800","url":null,"abstract":"<p>In order to realize efficient and lightweight digital inspection technology, we propose an improved method to simplification large volumes of scanned point cloud data of aircraft integral panels and facilitate subsequent processing. Fast Point Feature Histogram (FPFH) method is utilized to extract feature information and optimize the Principal Component Analysis (PCA) algorithm to calculate the contribution degree to transform into principal components, yielding PCA-based FPFH features. Next, based on PCA-based FPFH features, we classify the point cloud data into non-feature and feature point clouds and extract the feature point clouds through random downsampling to obtain simplified non-feature point clouds, extract the feature point clouds to retain their boundary integrity, and downsample the remaining feature point clouds by curvature to obtain the simplified feature point clouds. Finally, we combine the two to obtain the final simplified panel point cloud data within 30 s. To evaluate the simplification effect, we adopt a standardized information entropy-based point cloud simplification accuracy evaluation method based on the simplification rate. Our method achieves an information entropy of more than 0.95, indicating its effectiveness in simplification point cloud data for efficient and lightweight digital inspection technology.</p>","PeriodicalId":72922,"journal":{"name":"Engineering reports : open access","volume":null,"pages":null},"PeriodicalIF":1.8,"publicationDate":"2023-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/eng2.12800","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134908890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Numerical multiscale analysis of 3D printed short fiber composites parts: Filament anisotropy and toolpath effects","authors":"Alejandro Estefani, Luis Távara","doi":"10.1002/eng2.12799","DOIUrl":"10.1002/eng2.12799","url":null,"abstract":"<p>The aim of the present investigation is the development of a numerical model able to adequately represent the effect of several variables, associated to the fused deposition modeling (FDM) procedure, on the mechanical behavior of 3D printed parts. Specifically, 3D printed carbon short-fiber reinforced thermoplastic parts are numerically analyzed. Previous experimental results have proven that this kind of parts show a global anisotropic behavior, in terms of classical mechanical parameters as stiffness. Thus, special emphasis is done in analyzing the effect of the raster angle / toolpath (inherent to FDM) and the internal microstructure of the deposited filaments (due to the presence of the short fibers). Multiscale finite element models are used to represent the linear elastic behavior at macro scale. The numerical models are also able to include the effect of porosity. Based on experimental results of 3D printed composite parts with 100% infill and different raster angles, elastic transversely isotropic properties are estimated for the individual deposited filaments using a reverse engineering procedure. Obtained results show that for an adequate modeling of FDM composite parts, anisotropic properties of the filament must be taken into account, even when quasi-isotropic printing parameters are used (“cross-ply” configurations). Finally, additional numerical analyses of some parameters associated to the FDM technique are done. Specifically, the effect of porosity related to the infill pattern and percentage on the global (macro) apparent stiffness is analyzed.</p>","PeriodicalId":72922,"journal":{"name":"Engineering reports : open access","volume":null,"pages":null},"PeriodicalIF":1.8,"publicationDate":"2023-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/eng2.12799","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135170779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Numerical simulation study of wave dissipation performance of step-type breakwaters","authors":"Feng Jin, Zhouyi Huang, Wenhao Deng, Minyi Chen, You Ma, Peng Chai","doi":"10.1002/eng2.12798","DOIUrl":"10.1002/eng2.12798","url":null,"abstract":"<p>To improve the force endurance capacity of plate breakwaters, a step-type plate breakwater was proposed. The performance of the step-type breakwater was investigated by numerical simulation method. First, a two-dimensional numerical regular wave tank was constructed using FLUENT software, and the effectiveness of the tank application was verified by comparing with theoretical value and test data. Then, the numerical tank was used to simulate various working conditions, and the variation rules of the breakwater transmission coefficient with wave height, period, perforation rate, relative plate width, wave steepness, and number of layers were obtained. Finally, the difference in the wave dissipation mechanism between the step-type breakwater and the “”-type breakwater was discussed. The results indicated that the transmission coefficient of the step-type breakwater was small, which also proved to be good at dissipating long-period waves. In general, the wave dissipation performance of the step-type breakwater was better than that of the “”-type breakwater. The research can provide some clues for the research and design of corresponding breakwaters.</p>","PeriodicalId":72922,"journal":{"name":"Engineering reports : open access","volume":null,"pages":null},"PeriodicalIF":1.8,"publicationDate":"2023-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/eng2.12798","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135413972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal operation and control of smart energy systems","authors":"Hongxun Hui, Tao Chen, Han Wang, Sheng Wang","doi":"10.1002/eng2.12790","DOIUrl":"https://doi.org/10.1002/eng2.12790","url":null,"abstract":"<p>This editorial provides a summary of the topics and papers selected for the Special Issue on “optimal operation and control of smart energy systems”. After undergoing a rigorous review process, 10 papers have been accepted for publication. These papers cover various aspects of smart energy systems and are distributed as follows: control strategy of distributed resources (two papers), optimal operation of energy systems under uncertainties (three papers), defect detection and risk evaluation of energy systems (two papers), low-carbon economical energy systems (three papers). The Guest Editorial Board hopes this Special Issue can provide valuable information for future research and advancements in the field of optimal operation and control of smart energy systems.</p>","PeriodicalId":72922,"journal":{"name":"Engineering reports : open access","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/eng2.12790","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50139286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Oroko Joanes Agung', Kimotho James, Kabini Samuel, Murimi Evan
{"title":"Generative and self-supervised ensemble modeling for multivariate tool wear monitoring","authors":"Oroko Joanes Agung', Kimotho James, Kabini Samuel, Murimi Evan","doi":"10.1002/eng2.12788","DOIUrl":"10.1002/eng2.12788","url":null,"abstract":"<p>Development of an effective tool wear monitor requires maximum utilization of information from associated data, especially in machine learning based modeling. However, vastly varied annotated training data is required, which is not only expensive but impractical to obtain. In the present work, a contiguous approach of artificial data generation followed up by self-supervised pre-training before supervised model fine tuning and final stacked generalized ensembling, has been adopted to develop an effective tool wear monitor in a low data regime. Cross-validated results of proposed methodology adoption in tool wear prediction on an experimental data set of few labeled samples attained an averaged MAE of 0.035, RMSE of 0.045 and MAPE of <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mn>12</mn>\u0000 <mo>.</mo>\u0000 <mn>5</mn>\u0000 <mo>%</mo>\u0000 </mrow>\u0000 <annotation>$$ 12.5% $$</annotation>\u0000 </semantics></math> on the best case ensemble, which was comparatively superior to a purely supervised-only trained deep model on the same data set, with an overall accuracy enhancement of over <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mn>25</mn>\u0000 <mo>%</mo>\u0000 </mrow>\u0000 <annotation>$$ 25% $$</annotation>\u0000 </semantics></math>. The proposed approach provides an effective experimental data augmentation technique while simultaneously minimizing aleatoric uncertainty and allowing for utilization of information from often ignored static cutting parameters.</p>","PeriodicalId":72922,"journal":{"name":"Engineering reports : open access","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/eng2.12788","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135667792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wei Song, Yueying Ji, Kuanliang Zhu, Yan Yang, Yan Zhou
{"title":"Measurement of tensile strength of well cement sheath in underground gas storage based on tensile failure method","authors":"Wei Song, Yueying Ji, Kuanliang Zhu, Yan Yang, Yan Zhou","doi":"10.1002/eng2.12734","DOIUrl":"10.1002/eng2.12734","url":null,"abstract":"<p>During gas injection in gas storage, the inner pressure increase, potentially leading to tensile failure of the cement sheath. At present, the fracture strength of cement stone is measured using the Brazilian splitting method (BSM), which is prone to errors due to stress concentration at the loading point. To overcome this drawback, a novel test device and measurement method were developed to assess the tensile. This device utilizes the tensile failure method (TFM) to evaluate the sealing integrity of the cement sheath. The tensile strength tested by the BSM was found to be 40% higher than that tested by the TFM. Furthermore, based on the optimization of the cement slurry for underground gas storage (UGS) in the Jidong oilfield using both the TFM and the BSM. We found that using the BSM cannot optimize the cement slurry that meets the requirements for gas storage well cementing. The latex cement slurry was selected by the TMF for UGS well.</p>","PeriodicalId":72922,"journal":{"name":"Engineering reports : open access","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/eng2.12734","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135888538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modulation of electronic structures in N-doped TiO2(B) for hydrogen evolution: A density functional theory study","authors":"Yilei He, Yanze Wei, Zumin Wang, Xu Zhou, Ranbo Yu","doi":"10.1002/eng2.12795","DOIUrl":"10.1002/eng2.12795","url":null,"abstract":"<p>N-doping is an effective technique for enhancing the exploitation of TiO<sub>2</sub> under visible light, thanks to the level of doping introduced. It is also important to explore N-doping in the metastable polymorph TiO<sub>2</sub>(B), which is renowned for its applications in energy materials. In order to investigate the impact of N-doping on the optical properties of TiO<sub>2</sub>(B), a systematic comparison of the electronic structural and optical properties of pure and N-doped TiO<sub>2</sub>(B) was conducted using density function theory (DFT) calculations. The results indicate that N-doping is more thermodynamically favorable at the O site with four coordinated atoms. Upon N-doping, impurity states emerged within the bandgap of TiO<sub>2</sub>(B), leading to a significant reduction in the energy gap. Consequently, N-doping primarily enhances the absorbance of visible light, which is crucial for photocatalysis. Furthermore, the adsorption energy of H at the (0 0 1) surface of N-doped TiO<sub>2</sub>(B) decreased by 2.75 eV, providing valuable insight for the design of TiO<sub>2</sub>(B) with exceptional photo- and electro-catalytic performance.</p>","PeriodicalId":72922,"journal":{"name":"Engineering reports : open access","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/eng2.12795","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136033829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Can Artificial Intelligence be Conscious?","authors":"","doi":"10.33140/eoa.01.03.01","DOIUrl":"https://doi.org/10.33140/eoa.01.03.01","url":null,"abstract":"All magic and mystery disappear as soon as an obscure mysterious concept gets a rigorous formal definition. In order to provide an opportunity to talk about the applicability of philosophical / cognitive concepts to the subject area of AI, it is necessary to \"ground\" these concepts by formulating rigorous formal definitions for them. The fundamental importance of such formal definitions is quite obvious, since any concepts applied to the field of Information Technology must be \"codable\", i.e. potentially implementable in program code. Thus, the \"codable\" formal definitions of cognitive terms are the necessary basis on which alone it is possible to build the architecture of AI technology that has the ability to embody these concepts in a real software. The question of the adequacy of such definitions of \"reality\" and their compliance with existing generally accepted philosophical theories is also very important and quite discussable, but this does not affect the priority and fundamental nature of the requirement for the formulation of \"codable\" formal definitions. The formulation of \"codable\" definitions for the concept of \"consciousness\" and related cognitive concepts and, based on them, statements about their applicability to the subject area of AI is the topic of this publication. Covering questions: Can AI have a Personality / Motivations / Free Will?","PeriodicalId":72922,"journal":{"name":"Engineering reports : open access","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135923097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Inference Engine driven by Situation-Based Correlation","authors":"","doi":"10.33140/eoa.01.03.05","DOIUrl":"https://doi.org/10.33140/eoa.01.03.05","url":null,"abstract":"Drawing an intelligible inference is a challenging aspect of correlation studies in data mining. Regression analysis and inferences drawn based on correlation of system state play important role in decision making. However, traditional regression algorithms operate on data in an opaque manner thereby shielding end user from knowing the reasoning behind the inference drawn. Such techniques also fail to learn from repetitive historical conditions occurring in the system over a longer time-span. In this paper, we propose a novel situation- based correlation technique which can be used to not only predict system behavior but also to convey reasoning behind the prediction. “Situation” can be defined as a more inclusive version of the system state, which encompasses variables, parameters, rules, and relationships that describe the behavior of the system over the span of finite time interval. The proposed algorithm identifies similar situations in high dimensional time- series records and produces interpretable digital record of matching situations. We then deploy the proposed situation- based correlation algorithm as core of inference engine to successfully demonstrate fully functional expert system. (Abstract)","PeriodicalId":72922,"journal":{"name":"Engineering reports : open access","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135923095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity in Lesotho: Current Challenges and Future Opportunities","authors":"","doi":"10.33140/eoa.01.03.02","DOIUrl":"https://doi.org/10.33140/eoa.01.03.02","url":null,"abstract":"The rapid growth of digital technologies has transformed the world, enabling new opportunities while also introducing new security risks. Lesotho, like many other countries, faces a range of cybersecurity challenges that threaten the integrity of its information systems, data, and critical infrastructure. This paper provides an overview of the current state of cybersecurity in Lesotho, including the challenges faced by the country and the opportunities for improvement. One prominent cybersecurity concern is the persistent targeting of critical government systems, with a particular focus on the IFMIS (Integrated Financial Management Information System) within the Finance Ministry. This paper examines the vulnerabilities and risks associated with the IFMIS system and analyzes past cyberattacks, such as the successful breach on September 26, 2020, orchestrated by an insider within the Finance Ministry's IFMIS team. It also takes into account a recent attack on the IFMIS system that was encrypted by an unknown entity while synchronizing the backups, highlighting the ongoing threats. The paper reviews the regulatory framework for cybersecurity in Lesotho, the state of cybercrime and cyber threats, and the existing efforts to address these challenges. The paper also proposes a set of recommendations for enhancing cybersecurity in Lesotho, including measures to secure critical government systems like IFMIS to protect against future cyber threats and data breaches.","PeriodicalId":72922,"journal":{"name":"Engineering reports : open access","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135923096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}