Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (13,979)

Search Parameters:
Keywords = control enabler

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
15 pages, 1107 KiB  
Article
Maximising Achievable Rate Using Intelligent Reflecting Surface in 6G Wireless Communication Systems
by Afrin Jahan Eva, Md. Sahal, Rabita Amin, Muhammad R. A. Khandaker, Risala Tasin Khan, Faisal Tariq and ASM Ashraf Mahmud
Appl. Sci. 2025, 15(15), 8732; https://doi.org/10.3390/app15158732 (registering DOI) - 7 Aug 2025
Abstract
Intelligent reflecting surface (IRS) is a promising technique which aims to shift the paradigm of uncontrollable wireless environment to a controllable one by adding the function of reconfigurability using multiple passive reflecting elements. In this work, optimal beamforming design for maximising achievable rate [...] Read more.
Intelligent reflecting surface (IRS) is a promising technique which aims to shift the paradigm of uncontrollable wireless environment to a controllable one by adding the function of reconfigurability using multiple passive reflecting elements. In this work, optimal beamforming design for maximising achievable rate with respect to variable location of the IRS is considered. In particular, a single-cell wireless system that employs an IRS to aid communication between the user and an access point (AP) equipped with multiple antennas is adopted. An optimisation problem is formulated which aims to maximise the achievable rate, subject to signal-to-interference-plus-noise ratio (SINR) constraint of each individual user as well as the total transmit power constraint at the AP. The problem is solved by jointly optimising the transmit beamforming using active aerial array at the AP and the reflection coefficients using passive phase shifting at the IRS. Since the original optimisation problem is strictly non-convex, the problem is solved optimally by solving a corresponding power minimisation problem. Rigorous simulations have been carried out and the results demonstrate that the IRS-enabled system outperforms benchmark systems and employs significantly fewer RF power amplifiers. Full article
(This article belongs to the Special Issue Future Wireless Communication)
Show Figures

Figure 1

22 pages, 6051 KiB  
Article
Research on GNSS Spoofing Detection and Autonomous Positioning Technology for Drones
by Jiawen Zhou, Mei Hu, Chao Zhou, Zongmin Liu and Chao Ma
Electronics 2025, 14(15), 3147; https://doi.org/10.3390/electronics14153147 (registering DOI) - 7 Aug 2025
Abstract
With the rapid development of the low-altitude economy, the application of drones in both military and civilian fields has become increasingly widespread. The safety and accuracy of their positioning and navigation have become critical factors in ensuring the successful execution of missions. Currently, [...] Read more.
With the rapid development of the low-altitude economy, the application of drones in both military and civilian fields has become increasingly widespread. The safety and accuracy of their positioning and navigation have become critical factors in ensuring the successful execution of missions. Currently, GNSS spoofing attack techniques are becoming increasingly sophisticated, posing a serious threat to the reliability of drone positioning. This paper proposes a GNSS spoofing detection and autonomous positioning method for drones operating in mission mode, which is based on visual sensors and does not rely on additional hardware devices. First, during the deception detection phase, the ResNet50-SE twin network is used to extract and match real-time aerial images from the drone’s camera with satellite image features obtained via GNSS positioning, thereby identifying positioning anomalies. Second, once deception is detected, during the positioning recovery phase, the system uses the SuperGlue network to match real-time aerial images with satellite image features within a specific area, enabling the drone’s absolute positioning. Finally, experimental validation using open-source datasets demonstrates that the method achieves a GNSS spoofing detection accuracy of 89.5%, with 89.7% of drone absolute positioning errors controlled within 13.9 m. This study provides a comprehensive solution for the safe operation and stable mission execution of drones in complex electromagnetic environments. Full article
Show Figures

Figure 1

39 pages, 938 KiB  
Article
A Survey of Data Security Sharing
by Dexin Zhu, Zhiqiang Zhou, Yuanbo Li, Huanjie Zhang, Yang Chen, Zilong Zhao and Jun Zheng
Symmetry 2025, 17(8), 1259; https://doi.org/10.3390/sym17081259 - 7 Aug 2025
Abstract
In the digital era, secure data sharing has become a core requirement for enabling cross-domain collaboration, cloud computing, and Internet of Things (IoT) applications, as well as a critical measure for safeguarding privacy and defending against malicious attacks. In light of the risks [...] Read more.
In the digital era, secure data sharing has become a core requirement for enabling cross-domain collaboration, cloud computing, and Internet of Things (IoT) applications, as well as a critical measure for safeguarding privacy and defending against malicious attacks. In light of the risks of data leakage and misuse in open environments, achieving efficient, controllable, and privacy-preserving data sharing has emerged as a key research focus. This paper first provides a systematic review of the prevailing secure data sharing technologies, including proxy re-encryption, searchable encryption, key agreement and distribution, and attribute-based encryption, summarizing their design principles and application features. Subsequently, game-theoretic modeling based on incentive theory is introduced to construct a strategic interaction framework between data owners and data users, aiming to analyze and optimize benefit allocation mechanisms. Furthermore, the paper explores the integration of game theory with secure sharing mechanisms to enhance the sustainability and stability of the data sharing ecosystem. Finally, it outlines the critical challenges currently faced in secure data sharing and discusses future research directions, offering theoretical insights and technical references for building a more comprehensive data sharing framework. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

29 pages, 3563 KiB  
Article
Assessment of Hydrogels for Intra-Articulate Application, Based on Sodium Hyaluronate Doped with Synthetic Polymers and Incorporated with Diclofenac Sodium
by Dorota Wójcik-Pastuszka, Maja Grabara and Witold Musiał
Int. J. Mol. Sci. 2025, 26(15), 7631; https://doi.org/10.3390/ijms26157631 - 6 Aug 2025
Abstract
The intra-articular application of drugs has gained considerable interest with regard to formulations for advanced drug delivery systems. It has been identified as a potential route for local drug delivery. A drug agent is usually incorporated into the hydrogel to prolong and control [...] Read more.
The intra-articular application of drugs has gained considerable interest with regard to formulations for advanced drug delivery systems. It has been identified as a potential route for local drug delivery. A drug agent is usually incorporated into the hydrogel to prolong and control the drug release. This study aimed to design and evaluate an intra-articular hydrogel based sodium hyaluronate, which was modified with an additional polymer to enable the sustained release of the incorporated anti-inflammatory agent, diclofenac sodium (NaDic). Viscosity studies, drug release tests and FTIR−ATR measurements, as well as DSC analysis, were carried out to evaluate the obtained formulations. The viscosity measurements were performed using a rotational viscometer. The drug release was carried out by employing the apparatus paddle over the disk. The concentration of the released drug was obtained spectrophotometrically. The results revealed that the addition of the second polymer to the matrix influenced the dynamic viscosity of the hydrogels. The highest viscosity of (25.33 ± 0.55) × 103 cP was observed when polyacrylic acid (PA) was doped in the formulation. This was due to the hydrogen bond formation between both polymers. The FTIR−ATR investigations and DSC study revealed the hydrogen bond formation between the drug and both polymers. The drug was released the slowest from hydrogel doped with PA and 17.2 ± 3.7% of NaDic was transported to the acceptor fluid within 8 h. The hydrogel based on hyaluronan sodium doped with PA and containing NaDic is a promising formulation for the prolonged and controlled intra-articulate drug delivery of anti-inflammatory agents. Full article
(This article belongs to the Special Issue New Insights into Hyaluronan in Human Medicine)
Show Figures

Figure 1

23 pages, 1050 KiB  
Article
Lattice-Based Certificateless Proxy Re-Signature for IoT: A Computation-and-Storage Optimized Post-Quantum Scheme
by Zhanzhen Wei, Gongjian Lan, Hong Zhao, Zhaobin Li and Zheng Ju
Sensors 2025, 25(15), 4848; https://doi.org/10.3390/s25154848 - 6 Aug 2025
Abstract
Proxy re-signature enables transitive authentication of digital identities across different domains and has significant application value in areas such as digital rights management, cross-domain certificate validation, and distributed system access control. However, most existing proxy re-signature schemes, which are predominantly based on traditional [...] Read more.
Proxy re-signature enables transitive authentication of digital identities across different domains and has significant application value in areas such as digital rights management, cross-domain certificate validation, and distributed system access control. However, most existing proxy re-signature schemes, which are predominantly based on traditional public-key cryptosystems, face security vulnerabilities and certificate management bottlenecks. While identity-based schemes alleviate some issues, they introduce key escrow concerns. Certificateless schemes effectively resolve both certificate management and key escrow problems but remain vulnerable to quantum computing threats. To address these limitations, this paper constructs an efficient post-quantum certificateless proxy re-signature scheme based on algebraic lattices. Building upon algebraic lattice theory and leveraging the Dilithium algorithm, our scheme innovatively employs a lattice basis reduction-assisted parameter selection strategy to mitigate the potential algebraic attack vectors inherent in the NTRU lattice structure. This ensures the security and integrity of multi-party communication in quantum-threat environments. Furthermore, the scheme significantly reduces computational overhead and optimizes signature storage complexity through structured compression techniques, facilitating deployment on resource-constrained devices like Internet of Things (IoT) terminals. We formally prove the unforgeability of the scheme under the adaptive chosen-message attack model, with its security reducible to the hardness of the corresponding underlying lattice problems. Full article
(This article belongs to the Special Issue IoT Network Security (Second Edition))
Show Figures

Figure 1

18 pages, 973 KiB  
Article
Machine Learning-Based Vulnerability Detection in Rust Code Using LLVM IR and Transformer Model
by Young Lee, Syeda Jannatul Boshra, Jeong Yang, Zechun Cao and Gongbo Liang
Mach. Learn. Knowl. Extr. 2025, 7(3), 79; https://doi.org/10.3390/make7030079 - 6 Aug 2025
Abstract
Rust’s growing popularity in high-integrity systems requires automated vulnerability detection in order to maintain its strong safety guarantees. Although Rust’s ownership model and compile-time checks prevent many errors, sometimes unexpected bugs may occasionally pass analysis, underlining the necessity for automated safe and unsafe [...] Read more.
Rust’s growing popularity in high-integrity systems requires automated vulnerability detection in order to maintain its strong safety guarantees. Although Rust’s ownership model and compile-time checks prevent many errors, sometimes unexpected bugs may occasionally pass analysis, underlining the necessity for automated safe and unsafe code detection. This paper presents Rust-IR-BERT, a machine learning approach to detect security vulnerabilities in Rust code by analyzing its compiled LLVM intermediate representation (IR) instead of the raw source code. This approach offers novelty by employing LLVM IR’s language-neutral, semantically rich representation of the program, facilitating robust detection by capturing core data and control-flow semantics and reducing language-specific syntactic noise. Our method leverages a graph-based transformer model, GraphCodeBERT, which is a transformer architecture pretrained model to encode structural code semantics via data-flow information, followed by a gradient boosting classifier, CatBoost, that is capable of handling complex feature interactions—to classify code as vulnerable or safe. The model was evaluated using a carefully curated dataset of over 2300 real-world Rust code samples (vulnerable and non-vulnerable Rust code snippets) from RustSec and OSV advisory databases, compiled to LLVM IR and labeled with corresponding Common Vulnerabilities and Exposures (CVEs) identifiers to ensure comprehensive and realistic coverage. Rust-IR-BERT achieved an overall accuracy of 98.11%, with a recall of 99.31% for safe code and 93.67% for vulnerable code. Despite these promising results, this study acknowledges potential limitations such as focusing primarily on known CVEs. Built on a representative dataset spanning over 2300 real-world Rust samples from diverse crates, Rust-IR-BERT delivers consistently strong performance. Looking ahead, practical deployment could take the form of a Cargo plugin or pre-commit hook that automatically generates and scans LLVM IR artifacts during the development cycle, enabling developers to catch vulnerabilities at an early stage in the development cycle. Full article
Show Figures

Figure 1

33 pages, 26161 KiB  
Article
Adaptive Intermodal Transportation for Freight Resilience: An Integrated and Flexible Strategy for Managing Disruptions
by Siyavash Filom, Satrya Dewantara, Mahnam Saeednia and Saiedeh Razavi
Logistics 2025, 9(3), 107; https://doi.org/10.3390/logistics9030107 - 6 Aug 2025
Abstract
Background: Disruptions in freight transportation—such as service delays, infrastructure failures, and labor strikes—pose significant challenges to the reliability and efficiency of intermodal networks. To address these challenges, this study introduces Adaptive Intermodal Transportation (AIT), a resilient and flexible planning framework that enhances [...] Read more.
Background: Disruptions in freight transportation—such as service delays, infrastructure failures, and labor strikes—pose significant challenges to the reliability and efficiency of intermodal networks. To address these challenges, this study introduces Adaptive Intermodal Transportation (AIT), a resilient and flexible planning framework that enhances Synchromodal Freight Transport (SFT) by integrating real-time disruption management. Methods: Building on recent advances, we propose two novel strategies: (1) Reassign with Delay Buffer, which enables dynamic rerouting of shipments within a user-defined delay tolerance, and (2) (De)Consolidation, which allows splitting or merging of shipments across services depending on available capacity. These strategies are incorporated into a re-planning module that complements a baseline optimization model and a continuous disruption-monitoring system. Numerical experiments conducted on a Great Lakes-based case study evaluate the performance of the proposed strategies against a benchmark approach. Results: Results show that under moderate and high-disruption conditions, the proposed strategies reduce delay and disruption-incurred costs while increasing the percentage of matched shipments. The Reassign with Delay Buffer strategy offers controlled flexibility, while (De)Consolidation improves resource utilization in constrained environments. Conclusions: Overall, the AIT framework demonstrates strong potential for improving operational resilience in intermodal freight systems by enabling adaptive, disruption-aware planning decisions. Full article
Show Figures

Figure 1

28 pages, 1319 KiB  
Article
Beyond the Prompt: Investigating Retrieval-Based Monitoring in Self-Regulated Learning
by Mengjiao Wu and Christopher A. Was
J. Intell. 2025, 13(8), 99; https://doi.org/10.3390/jintelligence13080099 (registering DOI) - 6 Aug 2025
Abstract
Metacognitive monitoring plays a crucial role in self-regulated learning, as accurate monitoring enables effective control, which in turn impacts learning outcomes. Most studies on metacognitive monitoring have focused on learners’ monitoring abilities when they are explicitly prompted to monitor. However, in real-world educational [...] Read more.
Metacognitive monitoring plays a crucial role in self-regulated learning, as accurate monitoring enables effective control, which in turn impacts learning outcomes. Most studies on metacognitive monitoring have focused on learners’ monitoring abilities when they are explicitly prompted to monitor. However, in real-world educational settings, learners are more often prompted to control their learning, such as deciding whether to allocate additional time to a learning target. The primary goal of this study was to investigate whether retrieval is engaged when learners are explicitly prompted to control their learning processes by making study decisions. To address this, three experiments were conducted. In Experiment 1, participants (N = 39) studied 70 Swahili–English word pairs in a learning task. Each trial displayed a word pair for 8 s, followed by a distractor task (a two-digit mental addition) and a study decision intervention (choose “Study Again” or “Next”). After learning, participants provided a global judgment of learning (JOL), estimating their overall recall accuracy. Finally, they completed a cued recall test (Swahili cue). Responses were scored for accuracy and analyzed alongside study decisions, study decision reaction time (RT), and metacognitive judgments. Reaction times (RTs) for study decisions correlated positively with test accuracy, global judgments of learning (JOLs), and judgments of confidence (JOCs), suggesting retrieval likely underlies these decisions. Experiment 2 (N = 74, between-subjects) compared memory performance and intervention response time between single-study, restudy, retrieval (explicit recall prompt), and study decision (study decision prompt) groups to have better control over study time and cognitive processes. Although no significant group differences in test accuracy emerged, the retrieval group took longer to respond than the study decision group. Within-subject analyses revealed similar recall accuracy patterns: participants recalled successfully retrieved or “no restudy” items better than failed-retrieval or “restudy” items, implying shared cognitive processes underlying retrieval and study decision interventions. Experiment 3 (N = 74, within-subject, three learning conditions: single-study, retrieval, and study decision) replicated these findings, with no condition effects on test accuracy but longer RT for retrieval than study decisions. The similar recall accuracy patterns between retrieval and study decision interventions further supported shared cognitive processes underlying both tasks. Self-reports across experiments confirmed retrieval engagement in both retrieval and study decision interventions. Collectively, the results suggest that retrieval likely supports study decisions but may occur less frequently or less deeply than under explicit monitoring prompts. Additionally, this study explored objective, online measures to detect retrieval-based metacognitive monitoring. Full article
(This article belongs to the Section Studies on Cognitive Processes)
Show Figures

Figure 1

27 pages, 4681 KiB  
Article
Gecko-Inspired Robots for Underground Cable Inspection: Improved YOLOv8 for Automated Defect Detection
by Dehai Guan and Barmak Honarvar Shakibaei Asli
Electronics 2025, 14(15), 3142; https://doi.org/10.3390/electronics14153142 - 6 Aug 2025
Abstract
To enable intelligent inspection of underground cable systems, this study presents a gecko-inspired quadruped robot that integrates multi-degree-of-freedom motion with a deep learning-based visual detection system. Inspired by the gecko’s flexible spine and leg structure, the robot exhibits strong adaptability to confined and [...] Read more.
To enable intelligent inspection of underground cable systems, this study presents a gecko-inspired quadruped robot that integrates multi-degree-of-freedom motion with a deep learning-based visual detection system. Inspired by the gecko’s flexible spine and leg structure, the robot exhibits strong adaptability to confined and uneven tunnel environments. The motion system is modeled using the standard Denavit–Hartenberg (D–H) method, with both forward and inverse kinematics derived analytically. A zero-impact foot trajectory is employed to achieve stable gait planning. For defect detection, the robot incorporates a binocular vision module and an enhanced YOLOv8 framework. The key improvements include a lightweight feature fusion structure (SlimNeck), a multidimensional coordinate attention (MCA) mechanism, and a refined MPDIoU loss function, which collectively improve the detection accuracy of subtle defects such as insulation aging, micro-cracks, and surface contamination. A variety of data augmentation techniques—such as brightness adjustment, Gaussian noise, and occlusion simulation—are applied to enhance robustness under complex lighting and environmental conditions. The experimental results validate the effectiveness of the proposed system in both kinematic control and vision-based defect recognition. This work demonstrates the potential of integrating bio-inspired mechanical design with intelligent visual perception to support practical, efficient cable inspection in confined underground environments. Full article
(This article belongs to the Special Issue Robotics: From Technologies to Applications)
Show Figures

Figure 1

16 pages, 2576 KiB  
Article
Modeling and Spatiotemporal Analysis of Actual Evapotranspiration in a Desert Steppe Based on SEBS
by Yanlin Feng, Lixia Wang, Chunwei Liu, Baozhong Zhang, Jun Wang, Pei Zhang and Ranghui Wang
Hydrology 2025, 12(8), 205; https://doi.org/10.3390/hydrology12080205 - 6 Aug 2025
Abstract
Accurate estimation of actual evapotranspiration (ET) is critical for understanding hydrothermal cycles and ecosystem functioning in arid regions, where water scarcity governs ecological resilience. To address persistent gaps in ET quantification, this study integrates multi-source remote sensing data, energy balance modeling, and ground-based [...] Read more.
Accurate estimation of actual evapotranspiration (ET) is critical for understanding hydrothermal cycles and ecosystem functioning in arid regions, where water scarcity governs ecological resilience. To address persistent gaps in ET quantification, this study integrates multi-source remote sensing data, energy balance modeling, and ground-based validation that significantly enhances spatiotemporal ET accuracy in the vulnerable desert steppe ecosystems. The study utilized meteorological data from several national stations and Landsat-8 imagery to process monthly remote sensing images in 2019. The Surface Energy Balance System (SEBS) model, chosen for its ability to estimate ET over large areas, was applied to derive modeled daily ET values, which were validated by a large-weighted lysimeter. It was shown that ET varied seasonally, peaking in July at 6.40 mm/day, and reaching a minimum value in winter with 1.83 mm/day in December. ET was significantly higher in southern regions compared to central and northern areas. SEBS-derived ET showed strong agreement with lysimeter measurements, with a mean relative error of 4.30%, which also consistently outperformed MOD16A2 ET products in accuracy. This spatial heterogeneity was driven by greater vegetation coverage and enhanced precipitation in the southeast. The steppe ET showed a strong positive correlation with surface temperatures and vegetation density. Moreover, the precipitation gradients and land use were primary controllers of spatial ET patterns. The process-based SEBS frameworks demonstrate dual functionality as resource-optimized computational platforms while enabling multi-scale quantification of ET spatiotemporal heterogeneity; it was therefore a reliable tool for ecohydrological assessments in an arid steppe, providing critical insights for water resource management and drought monitoring. Full article
(This article belongs to the Section Hydrological and Hydrodynamic Processes and Modelling)
Show Figures

Figure 1

46 pages, 3093 KiB  
Review
Security and Privacy in the Internet of Everything (IoE): A Review on Blockchain, Edge Computing, AI, and Quantum-Resilient Solutions
by Haluk Eren, Özgür Karaduman and Muharrem Tuncay Gençoğlu
Appl. Sci. 2025, 15(15), 8704; https://doi.org/10.3390/app15158704 (registering DOI) - 6 Aug 2025
Abstract
The IoE forms the foundation of the modern digital ecosystem by enabling seamless connectivity and data exchange among smart devices, sensors, and systems. However, the inherent nature of this structure, characterized by high heterogeneity, distribution, and resource constraints, renders traditional security approaches insufficient [...] Read more.
The IoE forms the foundation of the modern digital ecosystem by enabling seamless connectivity and data exchange among smart devices, sensors, and systems. However, the inherent nature of this structure, characterized by high heterogeneity, distribution, and resource constraints, renders traditional security approaches insufficient in areas such as data privacy, authentication, access control, and scalable protection. Moreover, centralized security systems face increasing fragility due to single points of failure, various AI-based attacks, including adversarial learning, model poisoning, and deepfakes, and the rising threat of quantum computers to encryption protocols. This study systematically examines the individual and integrated solution potentials of technologies such as Blockchain, Edge Computing, Artificial Intelligence, and Quantum-Resilient Cryptography within the scope of IoE security. Comparative analyses are provided based on metrics such as energy consumption, latency, computational load, and security level, while centralized and decentralized models are evaluated through a multi-layered security lens. In addition to the proposed multi-layered architecture, the study also structures solution methods and technology integrations specific to IoE environments. Classifications, architectural proposals, and the balance between performance and security are addressed from both theoretical and practical perspectives. Furthermore, a future vision is presented regarding federated learning-based privacy-preserving AI solutions, post-quantum digital signatures, and lightweight consensus algorithms. In this context, the study reveals existing vulnerabilities through an interdisciplinary approach and proposes a holistic framework for sustainable, scalable, and quantum-compatible IoE security. Full article
Show Figures

Figure 1

21 pages, 8352 KiB  
Article
Research on Vibration Characteristics of Electric Drive Systems Based on Open-Phase Self-Fault-Tolerant Control
by Wenyu Bai, Yun Kuang, Zhizhong Xu, Yawen Wang and Xia Hua
Appl. Sci. 2025, 15(15), 8707; https://doi.org/10.3390/app15158707 (registering DOI) - 6 Aug 2025
Abstract
This paper presents an electromechanical coupling model integrating an equivalent magnetic network (EMN) model of a dual three-phase permanent magnet synchronous motor (DTP-PMSM) with the dynamic model of a helical planetary gear transmission system. Using this model, this study analyzes the dynamic characteristics [...] Read more.
This paper presents an electromechanical coupling model integrating an equivalent magnetic network (EMN) model of a dual three-phase permanent magnet synchronous motor (DTP-PMSM) with the dynamic model of a helical planetary gear transmission system. Using this model, this study analyzes the dynamic characteristics of an electric drive system, specifically motor phase current, electromagnetic torque, and gear meshing force, under self-fault-tolerant control strategies. Simulation and experimental results demonstrate that the self-fault-tolerant control strategy enables rapid fault tolerance during open-phase faults, significantly reducing system fault recovery time. Meanwhile, compared to the open-phase faults conditions, the self-fault-tolerant control effectively suppresses most harmonic components within the system; only the second harmonic amplitude of the electromagnetic torque exhibited an increase. This harmonic disturbance propagates to the gear system through electromechanical coupling, synchronously amplifying the second harmonic amplitude in the gear system’s vibration response. This study demonstrates that self-fault-tolerant control strategies significantly enhance the dynamic response performance of the electric drive system under open-phase faults conditions. Furthermore, this study also investigates the electromechanical coupling mechanism through which harmonics generated by this strategy affect the gear system’s dynamic response, providing theoretical support for co-optimization electromechanical coupling design and fault-tolerant control in high-reliability electric drive transmission systems. Full article
(This article belongs to the Section Mechanical Engineering)
Show Figures

Figure 1

22 pages, 1419 KiB  
Article
Bioconversion of Olive Pomace: A Solid-State Fermentation Strategy with Aspergillus sp. for Detoxification and Enzyme Production
by Laura A. Rodríguez, María Carla Groff, Sofía Alejandra Garay, María Eugenia Díaz, María Fabiana Sardella and Gustavo Scaglia
Fermentation 2025, 11(8), 456; https://doi.org/10.3390/fermentation11080456 - 6 Aug 2025
Abstract
This study aimed to evaluate solid-state fermentation (SSF) as a sustainable approach for the simultaneous detoxification of olive pomace (OP) and the production of industrially relevant enzymes. OP, a semisolid byproduct of olive oil extraction, is rich in lignocellulose and phenolic compounds, which [...] Read more.
This study aimed to evaluate solid-state fermentation (SSF) as a sustainable approach for the simultaneous detoxification of olive pomace (OP) and the production of industrially relevant enzymes. OP, a semisolid byproduct of olive oil extraction, is rich in lignocellulose and phenolic compounds, which limit its direct reuse due to phytotoxicity. A native strain of Aspergillus sp., isolated from OP, was employed as the biological agent, while grape pomace (GP) was added as a co-substrate to enhance substrate structure. Fermentations were conducted at two scales, Petri dishes (20 g) and a fixed-bed bioreactor (FBR, 2 kg), under controlled conditions (25 °C, 7 days). Key parameters monitored included dry and wet weight loss, pH, color, phenolic content, and enzymatic activity. Significant reductions in color and polyphenol content were achieved, reaching 68% in Petri dishes and 88.1% in the FBR, respectively. In the FBR, simultaneous monitoring of dry and wet weight loss enabled the estimation of fungal biotransformation, revealing a hysteresis phenomenon not previously reported in SSF studies. Enzymes such as xylanase, endopolygalacturonase, cellulase, and tannase exhibited peak activities between 150 and 180 h, with maximum values of 424.6 U·g−1, 153.6 U·g−1, 67.43 U·g−1, and 6.72 U·g−1, respectively. The experimental data for weight loss, enzyme production, and phenolic reduction were accurately described by logistic and first-order models. These findings demonstrate the high metabolic efficiency of the fungal isolate under SSF conditions and support the feasibility of scaling up this process. The proposed strategy offers a low-cost and sustainable solution for OP valorization, aligning with circular economy principles by transforming agro-industrial residues into valuable bioproducts. Full article
Show Figures

Figure 1

19 pages, 4247 KiB  
Article
Assessing CFTR Function and Epithelial Morphology in Human Nasal Respiratory Cell Cultures: A Combined Immunofluorescence and Electrophysiological Study
by Roshani Narayan Singh, Vanessa Mete, Willy van Driessche, Heymut Omran, Wolf-Michael Weber and Jörg Grosse-Onnebrink
Int. J. Mol. Sci. 2025, 26(15), 7618; https://doi.org/10.3390/ijms26157618 - 6 Aug 2025
Abstract
Cystic fibrosis (CF), the most common hereditary lung disease in Caucasians, is caused by dysfunction of the cystic fibrosis transmembrane conductance regulator (CFTR). We evaluated CFTR function using a newly developed Ussing chamber system, the Multi Trans Epithelial Current Clamp (MTECC), in an [...] Read more.
Cystic fibrosis (CF), the most common hereditary lung disease in Caucasians, is caused by dysfunction of the cystic fibrosis transmembrane conductance regulator (CFTR). We evaluated CFTR function using a newly developed Ussing chamber system, the Multi Trans Epithelial Current Clamp (MTECC), in an in vitro model of human airway epithelia. Air–liquid interface (ALI) cultures were established from nasal brushings of healthy controls (HC) and CF patients with biallelic CFTR variants. ALI layer thickness was similar between groups (HC: 62 ± 13 µm; CF: 55 ± 9 µm). Immunofluorescence showed apical CFTR expression in HC, but reduced or absent signal in CF cultures. MTECC enabled continuous measurement of transepithelial resistance (Rt), potential difference (PD), and conductance (Gt). Gt was significantly reduced in CF cultures compared to HC (0.825 ± 0.024 vs. −0.054 ± 0.016 mS/cm2), indicating impaired cAMP-inducible ion transport by CFTR. Treatment of CF cultures with elexacaftor, tezacaftor, and ivacaftor (Trikafta®) increased Gt, reflecting partial restoration of CFTR function. These findings demonstrate the utility of MTECC in detecting functional differences in CFTR activity and support its use as a platform for evaluating CFTR-modulating therapies. Our model may contribute to the development of personalized treatment strategies for CF patients. Full article
(This article belongs to the Special Issue Molecular Mechanisms and Pathophysiology of Cystic Fibrosis)
Show Figures

Figure 1

22 pages, 734 KiB  
Article
An Assembly Accuracy Analysis Method for Weak Rigid Components
by Dongping Zhao, Zhe Yuan, Xiaosong Zhao and Gangfeng Wang
Machines 2025, 13(8), 694; https://doi.org/10.3390/machines13080694 - 6 Aug 2025
Abstract
Most existing assembly accuracy analysis methods focus on rigid assemblies or assume assemblies to be rigid bodies, neglecting the influence of assembly deformation in weak rigid components (WRCs) such as thin-walled structures, cantilever structures, etc. As a result, the assembly accuracy analysis becomes [...] Read more.
Most existing assembly accuracy analysis methods focus on rigid assemblies or assume assemblies to be rigid bodies, neglecting the influence of assembly deformation in weak rigid components (WRCs) such as thin-walled structures, cantilever structures, etc. As a result, the assembly accuracy analysis becomes inaccurate, and the accuracy of key components cannot be effectively controlled. This may lead to serious issues such as forced assembly, repair, and rework. To address these problems, this study proposes a rigid–flexible coupling-based assembly accuracy analysis method for WRCs. The stiffness matrix and assembly deformation of WRCs are calculated, and by coupling assembly deformation with other assembly deviations, a rigid–flexible coupling assembly accuracy data model is established. This model incorporates multiple deviation sources, including assembly process variations, design tolerances, and assembly deformations. Assembly deviation transfer modeling and accumulation calculation methods for WRCs are investigated, enabling assembly accuracy simulation and statistical analysis. A case study on WRC assembly accuracy analysis is conducted, and the results demonstrate that the proposed method improves the accuracy of assembly analysis for WRCs, verifying its reliability. Full article
Back to TopTop