Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (98)

Search Parameters:
Keywords = dangerous memory

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
27 pages, 2637 KiB  
Article
An Intelligent Long Short-Term Memory-Based Machine Learning Model for the Potential Assessment of Global Hydropower Capacity in Sustainable Energy Transition and Security
by Muhammad Amir Raza, Abdul Karim, Mohammed Alqarni, Mahmoud Ahmad Al-Khasawneh, Touqeer Ahmed Jumani, Mohammed Aman and Muhammad I. Masud
Energies 2025, 18(13), 3324; https://doi.org/10.3390/en18133324 - 24 Jun 2025
Viewed by 773
Abstract
Climate change is a pressing global issue with severe consequences for the planet and human health. The Earth’s temperature has risen by 2 °C from 1901 to 2023, and this warming trend is expected to continue, causing potentially dangerous shifts in climate. Climate [...] Read more.
Climate change is a pressing global issue with severe consequences for the planet and human health. The Earth’s temperature has risen by 2 °C from 1901 to 2023, and this warming trend is expected to continue, causing potentially dangerous shifts in climate. Climate change impacts are already visible, with more frequent and severe heat waves, droughts, intense rain, and floods becoming increasingly common. Therefore, hydropower can contribute to addressing the global climate change issue and help to achieve global energy transition and stabilize global energy security. A Long Short-Term Memory (LSTM)-based model implemented in Python for global and regional hydropower forecasting was developed for a study period of 2023 to 2060 by taking the input data from 1980 to 2022. The results revealed that Asian countries have greater hydropower potential, which is expected to increase from 1926.51 TWh in 2023 to 2318.78 TWh in 2030, 2772.06 TWh in 2040, 2811.41 TWh in 2050, and 3195.79 TWh in 2060, as compared with the other regions of the world like the Middle East, Africa, Asia, Common Wealth of Independent State (CIS), Europe, North America, and South and Central America. The global hydropower potential is also expected to increase from 4350.12 TWh in 2023 to 4806.26 TWh in 2030, 5393.80 TWh in 2040, 6003.53 TWh in 2050, and 6644.06 TWh in 2060, which is sufficient for achieving energy transition and energy security goals. Furthermore, the performance and accuracy of the LSTM-based model were found to be 98%. This study will help in the efficient scheduling and management of hydropower resources, reducing uncertainties caused by environmental variability such as precipitation and runoff. The proposed model contributes to the energy transition and security that is needed to meet the global climate targets. Full article
(This article belongs to the Section B: Energy and Environment)
Show Figures

Figure 1

33 pages, 1387 KiB  
Article
Design of Non-Standard Finite Difference and Dynamical Consistent Approximation of Campylobacteriosis Epidemic Model with Memory Effects
by Ali Raza, Feliz Minhós, Umar Shafique, Emad Fadhal and Wafa F. Alfwzan
Fractal Fract. 2025, 9(6), 358; https://doi.org/10.3390/fractalfract9060358 - 29 May 2025
Viewed by 419
Abstract
Campylobacteriosis has been described as an ever-changing disease and health issue that is rather dangerous for different population groups all over the globe. The World Health Organization (WHO) reports that 33 million years of healthy living are lost annually, and nearly one in [...] Read more.
Campylobacteriosis has been described as an ever-changing disease and health issue that is rather dangerous for different population groups all over the globe. The World Health Organization (WHO) reports that 33 million years of healthy living are lost annually, and nearly one in ten persons have foodborne illnesses, including Campylobacteriosis. This explains why there is a need to develop new policies and strategies in the management of diseases at the intergovernmental level. Within this framework, an advanced stochastic fractional delayed model for Campylobacteriosis includes new stochastic, memory, and time delay factors. This model adopts a numerical computational technique called the Grunwald–Letnikov-based Nonstandard Finite Difference (GL-NSFD) scheme, which yields an exponential fitted solution that is non-negative and uniformly bounded, which are essential characteristics when working with compartmental models in epidemic research. Two equilibrium states are identified: the first is an infectious Campylobacteriosis-free state, and the second is a Campylobacteriosis-present state. When stability analysis with the help of the basic reproduction number R0 is performed, the stability of both equilibrium points depends on the R0 value. This is in concordance with the actual epidemiological data and the research conducted by the WHO in recent years, with a focus on the tendency to increase the rate of infections and the necessity to intervene in time. The model goes further to analyze how a delay in response affects the band of Campylobacteriosis spread, and also agrees that a delay in response is a significant factor. The first simulations of the current state of the system suggest that certain conditions can be achieved, and the eradication of the disease is possible if specific precautions are taken. The outcomes also indicate that enhancing the levels of compliance with the WHO-endorsed SOPs by a significant margin can lower infection rates significantly, which can serve as a roadmap to respond to this public health threat. Unlike most analytical papers, this research contributes actual findings and provides useful recommendations for disease management approaches and policies. Full article
(This article belongs to the Special Issue Applications of Fractional Calculus in Modern Mathematical Modeling)
Show Figures

Figure 1

12 pages, 351 KiB  
Article
HOTGAME: A Corpus of Early House and Techno Music from Germany and America
by Tim Ziemer
Metrics 2025, 2(2), 8; https://doi.org/10.3390/metrics2020008 - 29 May 2025
Viewed by 328
Abstract
Many publications on early house and techno music have the character of documentation and include (auto-)biographical statements from contemporaries of the scene. This literature has led to many statements, hypotheses, and conclusions. The weaknesses of such sources are their selective and subjective nature, [...] Read more.
Many publications on early house and techno music have the character of documentation and include (auto-)biographical statements from contemporaries of the scene. This literature has led to many statements, hypotheses, and conclusions. The weaknesses of such sources are their selective and subjective nature, and the danger of unclear memories, romanticization, and constructive memory. Consequently, a validation through content-based, quantitative music analyses is desirable. For this purpose, the HOuse and Techno music from Germany and AMErica (HOTGAME) corpus was built. Metrics from the field of data quality control show that the corpus is representative and explanatory for house and techno music from Germany and the United States of America between 1984 and 1994. HOTGAME can serve as a reliable source for the analysis of early house and techno music using big data methods, like inferential statistics and machine learning. Full article
Show Figures

Figure 1

16 pages, 227 KiB  
Article
Dangerous Memories and Violence
by Donald Tyoapine Komboh
Religions 2025, 16(4), 493; https://doi.org/10.3390/rel16040493 - 10 Apr 2025
Viewed by 365
Abstract
The big challenge regarding social violence is relationships and the quest for societies to live together. As a result, this has affected, in different ways, how various demographics are composed, economies are built and religions are practiced. This investigation weighs in on these [...] Read more.
The big challenge regarding social violence is relationships and the quest for societies to live together. As a result, this has affected, in different ways, how various demographics are composed, economies are built and religions are practiced. This investigation weighs in on these matters to delineate the issues critically. It spotlights the thrust of the matter, which is based on trust and fairness. Adopting a categorical theological method, this article interrogates Johann Baptist Metz’s categories of memory, solidarity and narratives in reverse. It highlights relationships, narratives and community to dissect the issues of violence in Taraba State with the intention of restoring relationships. Conflicts result from a series of broken relationships, and they become ethnic and religious. In intentionally engaging these categories, the hope is that they serve as a formidable resource for interrogating these conflicts and providing a reset for healthy living. Full article
(This article belongs to the Special Issue Global Catholicism)
27 pages, 743 KiB  
Article
Blockchain-Based Privacy-Preserving Authentication and Access Control Model for E-Health Users
by Abdullah Alabdulatif
Information 2025, 16(3), 219; https://doi.org/10.3390/info16030219 - 13 Mar 2025
Cited by 1 | Viewed by 1843
Abstract
The advancement of e-health systems has resulted in substantial enhancements in healthcare delivery via effective data management and accessibility. The use of digital health solutions presents dangers to sensitive health information, including unauthorised access, privacy violations, and security weaknesses. This research presents a [...] Read more.
The advancement of e-health systems has resulted in substantial enhancements in healthcare delivery via effective data management and accessibility. The use of digital health solutions presents dangers to sensitive health information, including unauthorised access, privacy violations, and security weaknesses. This research presents a blockchain-based paradigm for privacy-preserving authentication and access control specifically designed for e-health systems. The architecture utilises the Ethereum blockchain, smart contracts, blind signatures, Proof of Authority (PoA) consensus, and one-way hash functions to improve data integrity, security, and privacy in a decentralised framework. The proposed methodology addresses computational efficiency and scalability issues via the implementation of lightweight cryptographic techniques, achieving an average authentication delay of 0.059 milliseconds, which represents a 4000-fold improvement compared to current approaches. The model exhibits a significant decrease in memory use, requiring just 0.0198 MB in contrast to the 96.98 MB required by benchmark models, and attains an average signature verification duration of 0.00092 milliseconds. The findings demonstrate the model’s capability for safe, efficient, and scalable applications in e-health, which guarantees privacy and adherence to regulatory norms. Full article
(This article belongs to the Special Issue Cybersecurity, Cybercrimes, and Smart Emerging Technologies)
Show Figures

Figure 1

21 pages, 2675 KiB  
Article
Cyberbullying Detection, Prevention, and Analysis on Social Media via Trustable LSTM-Autoencoder Networks over Synthetic Data: The TLA-NET Approach
by Alfredo Cuzzocrea, Mst Shapna Akter, Hossain Shahriar and Pablo García Bringas
Future Internet 2025, 17(2), 84; https://doi.org/10.3390/fi17020084 - 12 Feb 2025
Cited by 1 | Viewed by 1673
Abstract
The plague of cyberbullying on social media exerts a dangerous influence on human lives. Due to the fact that online social networks continue to daily expand, the proliferation of hate speech is also growing. Consequentially, distressing content is often implicated in the onset [...] Read more.
The plague of cyberbullying on social media exerts a dangerous influence on human lives. Due to the fact that online social networks continue to daily expand, the proliferation of hate speech is also growing. Consequentially, distressing content is often implicated in the onset of depression and suicide-related behaviors. In this paper, we propose an innovative framework, named as the trustable LSTM-autoencoder network (TLA NET), which is designed for the detection of cyberbullying on social media by employing synthetic data. We introduce a state-of-the-art method for the automatic production of translated data, which are aimed at tackling data availability issues. Several languages, including Hindi and Bangla, continue to face research limitations due to the absence of adequate datasets. Experimental identification of aggressive comments is carried out via datasets in Hindi, Bangla, and English. By employing TLA NET and traditional models, such as long short-term memory (LSTM), bidirectional long short-term memory (BiLSTM), the LSTM-autoencoder, Word2vec, bidirectional encoder representations from transformers (BERT), and the Generative Pre-trained Transformer 2 (GPT-2), we perform the experimental identification of aggressive comments in datasets in Hindi, Bangla, and English. In addition to this, we employ evaluation metrics that include the F1-score, accuracy, precision, and recall, to assess the performance of the models. Our model demonstrates outstanding performance across all the datasets by achieving a remarkable 99% accuracy and positioning itself as a frontrunner when compared to previous works that make use of the dataset featured in this research. Full article
(This article belongs to the Section Cybersecurity)
Show Figures

Figure 1

26 pages, 13220 KiB  
Article
YOLOv8-Based XR Smart Glasses Mobility Assistive System for Aiding Outdoor Walking of Visually Impaired Individuals in South Korea
by Incheol Jeong, Kapyol Kim, Jungil Jung and Jinsoo Cho
Electronics 2025, 14(3), 425; https://doi.org/10.3390/electronics14030425 - 22 Jan 2025
Cited by 1 | Viewed by 2980
Abstract
This study proposes an eXtended Reality (XR) glasses-based walking assistance system to support independent and safe outdoor walking for visually impaired people. The system leverages the YOLOv8n deep learning model to recognize walkable areas, public transport facilities, and obstacles in real time and [...] Read more.
This study proposes an eXtended Reality (XR) glasses-based walking assistance system to support independent and safe outdoor walking for visually impaired people. The system leverages the YOLOv8n deep learning model to recognize walkable areas, public transport facilities, and obstacles in real time and provide appropriate guidance to the user. The core components of the system are Xreal Light Smart Glasses and an Android-based smartphone, which are operated through a mobile application developed using the Unity game engine. The system divides the user’s field of vision into nine zones, assesses the level of danger in each zone, and guides the user along a safe walking path. The YOLOv8n model was trained to recognize sidewalks, pedestrian crossings, bus stops, subway exits, and various obstacles on a smartphone connected to XR glasses and demonstrated an average processing time of 583 ms and an average memory usage of 80 MB, making it suitable for real-time use. The experiments were conducted on a 3.3 km route around Bokjeong Station in South Korea and confirmed that the system works effectively in a variety of walking environments, but recognized the need to improve performance in low-light environments and further testing with visually impaired people. By proposing an innovative walking assistance system that combines XR technology and artificial intelligence, this study is expected to contribute to improving the independent mobility of visually impaired people. Future research will further validate the effectiveness of the system by integrating it with real-time public transport information and conducting extensive experiments with users with varying degrees of visual impairment. Full article
Show Figures

Figure 1

20 pages, 3519 KiB  
Article
Attention-Based Hybrid Deep Learning Models for Classifying COVID-19 Genome Sequences
by A. M. Mutawa
AI 2025, 6(1), 4; https://doi.org/10.3390/ai6010004 - 2 Jan 2025
Cited by 3 | Viewed by 1598
Abstract
Background: COVID-19 genetic sequence research is crucial despite immunizations and pandemic control. COVID-19-causing SARS-CoV-2 must be understood genomically for several reasons. New viral strains may resist vaccines. Categorizing genetic sequences helps researchers track changes and assess immunization efficacy. Classifying COVID-19 genome sequences with [...] Read more.
Background: COVID-19 genetic sequence research is crucial despite immunizations and pandemic control. COVID-19-causing SARS-CoV-2 must be understood genomically for several reasons. New viral strains may resist vaccines. Categorizing genetic sequences helps researchers track changes and assess immunization efficacy. Classifying COVID-19 genome sequences with other viruses helps to understand its evolution and interactions with other illnesses. Methods: The proposed study introduces a deep learning-based COVID-19 genomic sequence categorization approach. Attention-based hybrid deep learning (DL) models categorize 1423 COVID-19 and 11,388 other viral genome sequences. An unknown dataset is also used to assess the models. The five models’ accuracy, f1-score, area under the curve (AUC), precision, Matthews correlation coefficient (MCC), and recall are evaluated. Results: The results indicate that the Convolutional neural network (CNN) with Bidirectional long short-term memory (BLSTM) with attention layer (CNN-BLSTM-Att) achieved an accuracy of 99.99%, which outperformed the other models. For external validation, the model shows an accuracy of 99.88%. It reveals that DL-based approaches with an attention layer can accurately classify COVID-19 genomic sequences with a high degree of accuracy. This method might assist in identifying and classifying COVID-19 virus strains in clinical situations. Immunizations have lowered COVID-19 danger, but categorizing its genetic sequences is crucial to global health activities to plan for recurrence or future viral threats. Full article
Show Figures

Graphical abstract

16 pages, 289 KiB  
Editorial
Introducing Susceptibilities: Toward a Cultural Politics of Consent Under Erasure
by Karyn Ball
Philosophies 2024, 9(6), 184; https://doi.org/10.3390/philosophies9060184 - 5 Dec 2024
Viewed by 1343
Abstract
The broad aim of this introduction to a Special Issue on “Susceptibilities: Toward a Cultural Politics of Consent under Erasure” is to broach key questions and research directions that illuminate contemporary public debates about the conditions and limits of conscious intention (and consent [...] Read more.
The broad aim of this introduction to a Special Issue on “Susceptibilities: Toward a Cultural Politics of Consent under Erasure” is to broach key questions and research directions that illuminate contemporary public debates about the conditions and limits of conscious intention (and consent as a byproduct thereof), which is typically treated as a “property” that can be “underdeveloped”, “given”, or “taken away”. In keeping with Jacques Derrida’s repudiation of the metaphysics of presence, the perspective animating this essay is that the psychoanalytic standpoint of the unconscious deconstructs the epistemological privilege of determinacy, consistency, and wholeness in treatments of intentional consciousness. Given Jean Laplanche’s attention to the residues of coherent ego fetishism in Sigmund Freud’s oeuvre, the former’s critique of self-sovereignty as evinced in his theorization of the “enigmatic signifier”, “primal repression”, and “afterwardsness” assumes a pivotal role in the analysis of how writers as represented here by Sarah Polley in Run Towards the Danger narrate the vicissitudes of their traumatic memories of sexual assault. Ultimately, then, the implications of this analysis will carry over to brief discussions of this Special Issue’s seven contributions by Melissa Wright, Karen McFadyen, J. Asher Godley, Madeleine Reddon, Gautam Basu Thakur, Robert Hughes, and Rebecca Saunders. Full article
(This article belongs to the Special Issue Susceptibilities: Toward a Cultural Politics of Consent under Erasure)
15 pages, 2366 KiB  
Article
Gas Leakage Detection Using Tiny Machine Learning
by Majda El Barkani, Nabil Benamar, Hanae Talei and Miloud Bagaa
Electronics 2024, 13(23), 4768; https://doi.org/10.3390/electronics13234768 - 2 Dec 2024
Cited by 5 | Viewed by 3657
Abstract
Gas leakage detection is a critical concern in both industrial and residential settings, where real-time systems are essential for quickly identifying potential hazards and preventing dangerous incidents. Traditional detection systems often rely on centralized data processing, which can lead to delays and scalability [...] Read more.
Gas leakage detection is a critical concern in both industrial and residential settings, where real-time systems are essential for quickly identifying potential hazards and preventing dangerous incidents. Traditional detection systems often rely on centralized data processing, which can lead to delays and scalability issues. To overcome these limitations, in this study, we present a solution based on tiny machine learning (TinyML) to process data directly on devices. TinyML has the potential to execute machine learning algorithms locally, in real time, and using tiny devices, such as microcontrollers, ensuring faster and more efficient responses to potential dangers. Our approach combines an MLX90640 thermal camera with two optimized convolutional neural networks (CNNs), MobileNetV1 and EfficientNet-B0, deployed on the Arduino Nano 33 BLE Sense. The results show that our system not only provides real-time analytics but does so with high accuracy—88.92% for MobileNetV1 and 91.73% for EfficientNet-B0—while achieving inference times of 1414 milliseconds and using just 124.8 KB of memory. Compared to existing solutions, our edge-based system overcomes common challenges related to latency and scalability, making it a reliable, fast, and efficient option. This work demonstrates the potential for low-cost, scalable gas detection systems that can be deployed widely to enhance safety in various environments. By integrating cutting-edge machine learning models with affordable IoT devices, we aim to make safety more accessible, regardless of financial limitations, and pave the way for further innovation in environmental monitoring solutions. Full article
Show Figures

Figure 1

11 pages, 223 KiB  
Article
Survivors’ Narratives of the Oklahoma City Bombing Retold Seven Years Post-Disaster
by Elizabeth W. Pollio, Samir Abu-Hamad, Jennifer Wang, Carol S. North and David E. Pollio
Emerg. Care Med. 2024, 1(4), 417-427; https://doi.org/10.3390/ecm1040041 - 20 Nov 2024
Viewed by 1356
Abstract
Introduction: A large proportion of the existing voluminous disaster mental health research literature represents the quantitative study of psychopathology, especially posttraumatic stress disorder. Subjective disaster experience is relatively unexplored. Qualitative narratives of surviving a disaster may provide insight into individual experiences of it [...] Read more.
Introduction: A large proportion of the existing voluminous disaster mental health research literature represents the quantitative study of psychopathology, especially posttraumatic stress disorder. Subjective disaster experience is relatively unexplored. Qualitative narratives of surviving a disaster may provide insight into individual experiences of it and efforts to derive meaning from it. Methods: From an initial random sample of 182 survivors of the Oklahoma City bombing, narrative descriptions of this experience were collected 7 years after the bomb blast from 116 of the original sample, for the purpose of examining persistent as well as newly evolving content through qualitative analysis. The narrative content was analyzed for the evolution of thematic content in narrative data also collected at 6 months post-disaster and 1 year later. Results: The thematic content of the bombing experience was structured in a chronological fashion from the bomb blast (sensory, cognitive, and emotional), its immediate aftermath (e.g., escaping danger), and later experiences, (e.g., leaving the bomb site and receiving hospital treatment). During the time between interviews, the focus and general content of the narratives changed minimally, despite considerable compression of detail. Conclusions: The consistency of the material in these narratives over 7 years may reflect the persistence and salience of disaster memories, with the potential for its continuation for the rest of their lives. Full article
15 pages, 8780 KiB  
Article
A Lightweight, Centralized, Collaborative, Truncated Signed Distance Function-Based Dense Simultaneous Localization and Mapping System for Multiple Mobile Vehicles
by Haohua Que, Haojia Gao, Weihao Shan, Xinghua Yang and Rong Zhao
Sensors 2024, 24(22), 7297; https://doi.org/10.3390/s24227297 - 15 Nov 2024
Viewed by 1326
Abstract
Simultaneous Localization And Mapping (SLAM) algorithms play a critical role in autonomous exploration tasks requiring mobile robots to autonomously explore and gather information in unknown or hazardous environments where human access may be difficult or dangerous. However, due to the resource-constrained nature of [...] Read more.
Simultaneous Localization And Mapping (SLAM) algorithms play a critical role in autonomous exploration tasks requiring mobile robots to autonomously explore and gather information in unknown or hazardous environments where human access may be difficult or dangerous. However, due to the resource-constrained nature of mobile robots, they are hindered from performing long-term and large-scale tasks. In this paper, we propose an efficient multi-robot dense SLAM system that utilizes a centralized structure to alleviate the computational and memory burdens on the agents (i.e. mobile robots). To enable real-time dense mapping of the agent, we design a lightweight and accurate dense mapping method. On the server, to find correct loop closure inliers, we design a novel loop closure detection method based on both visual and dense geometric information. To correct the drifted poses of the agents, we integrate the dense geometric information along with the trajectory information into a multi-robot pose graph optimization problem. Experiments based on pre-recorded datasets have demonstrated our system’s efficiency and accuracy. Real-world online deployment of our system on the mobile vehicles achieved a dense mapping update rate of ∼14 frames per second (fps), a onboard mapping RAM usage of ∼3.4%, and a bandwidth usage of ∼302 KB/s with a Jetson Xavier NX. Full article
Show Figures

Figure 1

25 pages, 7602 KiB  
Article
Enhancing Cyber-Physical Resiliency of Microgrid Control under Denial-of-Service Attack with Digital Twins
by Mahmoud S. Abdelrahman, Ibtissam Kharchouf, Hossam M. Hussein, Mustafa Esoofally and Osama A. Mohammed
Energies 2024, 17(16), 3927; https://doi.org/10.3390/en17163927 - 8 Aug 2024
Cited by 4 | Viewed by 1984
Abstract
Microgrids (MGs) are the new paradigm of decentralized networks of renewable energy sources, loads, and storage devices that can operate independently or in coordination with the primary grid, incorporating significant flexibility and supply reliability. To increase reliability, traditional individual MGs can be replaced [...] Read more.
Microgrids (MGs) are the new paradigm of decentralized networks of renewable energy sources, loads, and storage devices that can operate independently or in coordination with the primary grid, incorporating significant flexibility and supply reliability. To increase reliability, traditional individual MGs can be replaced by networked microgrids (NMGs), which are more dependable. However, when it comes to operation and control, they also pose challenges for cyber security and communication reliability. Denial of service (DoS) is a common danger to DC microgrids with advanced controllers that rely on active information exchanges and has been recorded as the most frequent cause of cyber incidents. It can disrupt data transmission, leading to ineffective control and system instability. This paper proposes digital twin (DT) technology as an integrated solution, with new, advanced analytics technology using machine learning and artificial intelligence to provide simulation capabilities to predict and estimate future states. By twinning the cyber-physical dynamics of NMGs using data-driven models, DoS attacks targeting cyber-layer agents will be detected and mitigated. A long short-term memory (LSTM) model data-driven digital twin approach for DoS attack detection and mitigation is implemented, tested, and evaluated. Full article
(This article belongs to the Special Issue Cyber Security in Microgrids and Smart Grids)
Show Figures

Figure 1

15 pages, 547 KiB  
Article
An Explainable Deep Learning Approach for Stress Detection in Wearable Sensor Measurements
by Martin Karl Moser, Maximilian Ehrhart and Bernd Resch
Sensors 2024, 24(16), 5085; https://doi.org/10.3390/s24165085 - 6 Aug 2024
Cited by 4 | Viewed by 4742
Abstract
Stress has various impacts on the health of human beings. Recent success in wearable sensor development, combined with advancements in deep learning to automatically detect features from raw data, opens several interesting applications related to detecting emotional states. Being able to accurately detect [...] Read more.
Stress has various impacts on the health of human beings. Recent success in wearable sensor development, combined with advancements in deep learning to automatically detect features from raw data, opens several interesting applications related to detecting emotional states. Being able to accurately detect stress-related emotional arousal in an acute setting can positively impact the imminent health status of humans, i.e., through avoiding dangerous locations in an urban traffic setting. This work proposes an explainable deep learning methodology for the automatic detection of stress in physiological sensor data, recorded through a non-invasive wearable sensor device, the Empatica E4 wristband. We propose a Long-Short Term-Memory (LSTM) network, extended through a Deep Generative Ensemble of conditional GANs (LSTM DGE), to deal with the low data regime of sparsely labeled sensor measurements. As explainability is often a main concern of deep learning models, we leverage Integrated Gradients (IG) to highlight the most essential features used by the model for prediction and to compare the results to state-of-the-art expert-based stress-detection methodologies in terms of precision, recall, and interpretability. The results show that our LSTM DGE outperforms the state-of-the-art algorithm by 3 percentage points in terms of recall, and 7.18 percentage points in terms of precision. More importantly, through the use of Integrated Gradients as a layer of explainability, we show that there is a strong overlap between model-derived stress features for electrodermal activity and existing literature, which current state-of-the-art stress detection systems in medical research and psychology are based on. Full article
Show Figures

Figure 1

20 pages, 4014 KiB  
Article
Spatiotemporal Changes and Simulation Prediction of Ecological Security Pattern on the Qinghai–Tibet Plateau Based on Deep Learning
by Longqing Liu, Shidong Zhang, Wenshu Liu, Hongjiao Qu and Luo Guo
Land 2024, 13(7), 1073; https://doi.org/10.3390/land13071073 - 17 Jul 2024
Cited by 2 | Viewed by 1383
Abstract
Over the past two decades, due to the combined effects of natural and human factors, the ecological environment and resources of the Qinghai–Tibet Plateau (QTP) have faced serious threats, profoundly impacting its ecosystem and the lives of its residents. Therefore, the establishment of [...] Read more.
Over the past two decades, due to the combined effects of natural and human factors, the ecological environment and resources of the Qinghai–Tibet Plateau (QTP) have faced serious threats, profoundly impacting its ecosystem and the lives of its residents. Therefore, the establishment of the ecological security pattern (ESP) is crucial to cope with climate change, maintain ecosystem function, and sustainable development. Based on the Pressure–State–Response (PSR) model, this study constructed an evaluation index system for the ecological security (ES) of the QTP, evaluated the ES of the QTP during 2000–2020, and predicted the ES of the QTP during 2025–2035 based on the deep learning model. Combined with the residents’ perception of ES, the ES of the QTP was evaluated comprehensively. The results showed that: (1) From 2000 to 2020, the ES value of the QTP continued to rise, the number of dangerous and sensitive counties decreased, and the number of other counties increased. The overall spatial distribution features higher values in the southeast and lower values in the northwest and central regions. (2) From 2000 to 2020, both hot spots and cold spots on the QTP decreased, with the hot spots mainly concentrated in the southeast of the QTP, represented by Yunnan Province, and the cold spots shifting from west to east, mainly concentrated in the central QTP, represented by Qinghai Province. (3) The Long Short-Term Memory (LSTM) model demonstrates high prediction accuracy. Based on the prediction of LSTM, the ES value of the QTP will continue to rise from 2025 to 2035, and the number of safe counties will reach the highest level in history. The spatial distribution is still higher in the southeast and lower in the northwest and central regions. (4) By analyzing residents’ perception of 25 potential factors that may affect the ES of the QTP, the results show that residents generally believe that these factors have an important impact on ES, and their evaluation is between “important” and “very important”. In addition, there is a significant correlation between these factors and the predicted values of ES. The results of the study will help to improve our understanding of the overall ecological environment of the QTP, provide accurate positioning and reasonable help for the government to formulate relevant protection strategies, and lay a methodological and practical foundation for the sustainable development of the QTP. Full article
(This article belongs to the Special Issue Land Resource Assessment)
Show Figures

Figure 1

Back to TopTop