Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (50)

Search Parameters:
Keywords = flag codes

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
17 pages, 2889 KB  
Technical Note
Increasing Computational Efficiency of a River Ice Model to Help Investigate the Impact of Ice Booms on Ice Covers Formed in a Regulated River
by Karl-Erich Lindenschmidt, Mojtaba Jandaghian, Saber Ansari, Denise Sudom, Sergio Gomez, Stephany Valarezo Plaza, Amir Ali Khan, Thomas Puestow and Seok-Bum Ko
Water 2026, 18(2), 218; https://doi.org/10.3390/w18020218 - 14 Jan 2026
Viewed by 171
Abstract
The formation and stability of river ice covers in regulated waterways are critical for uninterrupted hydro-electric operations. This study investigates the modelling of ice cover development in the Beauharnois Canal along the St. Lawrence River with the presence and absence of ice booms. [...] Read more.
The formation and stability of river ice covers in regulated waterways are critical for uninterrupted hydro-electric operations. This study investigates the modelling of ice cover development in the Beauharnois Canal along the St. Lawrence River with the presence and absence of ice booms. Ice booms are deployed in this canal to promote the rapid formation of a stable ice cover during freezing events, minimizing disruptions to dam operations. Remote sensing data were used to assess the spatial extent and temporal evolution of an ice cover and to calibrate the river ice model RIVICE. The model was applied to simulate ice formation for the 2019–2020 ice season, first for the canal with a series of three ice booms and then rerun under a scenario without booms. Comparative analysis reveals that the presence of ice booms facilitates the development of a relatively thinner and more uniform ice cover. In contrast, the absence of booms leads to thicker ice accumulations and increased risk of ice jamming, which could impact water management and hydroelectric generation operations. Computational efficiencies of the RIVICE model were also sought. RIVICE was originally compiled with a Fortran 77 compiler, which restricted modern optimization techniques. Recompiling with NVFortran significantly improved performance through advanced instruction scheduling, cache management, and automatic loop analysis, even without explicit optimization flags. Enabling optimization further accelerated execution, albeit marginally, reducing redundant operations and memory traffic while preserving numerical integrity. Tests across varying ice cross-sectional spacings confirmed that NVFortran reduced runtimes by roughly an order of magnitude compared to the original model. A test GPU (Graphics Processing Unit) version was able to run the data interpolation routines on the GPU, but frequent data transfers between the CPU (Central Processing Unit) and GPU caused by shared memory blocks and fixed-size arrays made it slower than the original CPU version. Achieving efficient GPU execution would require substantial code restructuring to eliminate global states, adopt persistent data regions, and parallelize at higher level loops, or alternatively, rewriting in a GPU-friendly language to fully exploit modern architectures. Full article
Show Figures

Figure 1

13 pages, 254 KB  
Article
MixedPalletBoxes Dataset: A Synthetic Benchmark Dataset for Warehouse Applications
by Adamos Daios and Ioannis Kostavelis
Appl. Syst. Innov. 2026, 9(1), 14; https://doi.org/10.3390/asi9010014 - 29 Dec 2025
Viewed by 421
Abstract
Mixed palletizing remains a core challenge in distribution centers and modern warehouse operations, particularly within robotic handling and automation systems. Progress in this domain has been hindered by the lack of realistic, freely available datasets for rigorous algorithmic benchmarking. This work addresses this [...] Read more.
Mixed palletizing remains a core challenge in distribution centers and modern warehouse operations, particularly within robotic handling and automation systems. Progress in this domain has been hindered by the lack of realistic, freely available datasets for rigorous algorithmic benchmarking. This work addresses this gap by introducing MixedPalletBoxes, a family of seven synthetic datasets designed to evaluate algorithm scalability, adaptability and performance variability across a broad spectrum of workload sizes (500–100,000 records) generated via an open source Python script. These datasets enable the assessment of algorithmic behavior under varying operational complexities and scales. Each box instance is richly annotated with geometric dimensions, material properties, load capacities, environmental tolerances and handling flags. To support dynamic experimentation, the dataset is accompanied by a FastAPI-based tool that enables the on-demand creation of randomized daily picking lists simulating realistic inbound orders. Performance is analyzed through metrics such as pallet count, volume utilization, item distribution per pallet and runtime. Across all dataset sizes, the distributions of the physical attributes remain consistent, confirming stable generation behavior. The proposed framework combines standardization, feature richness and scalability, offering a transparent and extensible platform for benchmarking and advancing robotic mixed palletizing solutions. All datasets, generation code and evaluation scripts are publicly released to foster open collaboration and accelerate innovation in data-driven warehouse automation research. Full article
12 pages, 887 KB  
Article
A Pilot Study of Opportunistic Chronic Kidney Disease Screening in Primary Care Using a Clinical Decision Support System
by Maite López-Garrigós, Estanislao Puig, Selene Sánchez, Irene Gutiérrez, Maria Salinas, Alberto Ortiz and Emilio Flores
Diagnostics 2026, 16(1), 8; https://doi.org/10.3390/diagnostics16010008 - 19 Dec 2025
Viewed by 481
Abstract
Background/Objectives: CKD affects over 10% of adults and is often silent, delaying diagnosis. Opportunistic primary care screening supported by clinical decision support systems (CDSSs) may improve detection with minimal burden. We evaluated the feasibility, diagnostic yield, clinical actions, and reagent costs of [...] Read more.
Background/Objectives: CKD affects over 10% of adults and is often silent, delaying diagnosis. Opportunistic primary care screening supported by clinical decision support systems (CDSSs) may improve detection with minimal burden. We evaluated the feasibility, diagnostic yield, clinical actions, and reagent costs of a CDSS-enabled, albuminuria-first program using eGFR. Methods: This one-year cross-sectional intervention screened all patients receiving routine laboratory tests at a primary care center using a CDSS integrating prior labs, medical records, and guideline rules. Eligibility required patients age 60–85 (Group 1) or 18–59 with hypertension, diabetes, or cardiovascular disease (Group 2). Eligible patients received urine albumin and eGFR testing with standard phlebotomy; abnormal findings triggered confirmatory tests. Outcomes were diagnostic yield, KDIGO risk stratification, referral patterns, and reagent costs. The CDSS surfaced prompts and pre-populated orders in the laboratory interface. Results: Of 7722 targets, 1892 (24.5%) were flagged (34.2% of Group 2, 7.9% of Group 1), and 1774 (93.8%) completed screening. We identified 104 new CKD cases (5.9%): 75% KDIGO moderate risk, 19% high, and 6% very high. Twenty patients (1.1%) met criteria for nephrology referral. Guideline-directed therapy was started or optimized in 90%, and 62.5% received a new CKD diagnosis code. Reagent costs averaged EUR 0.51 per person screened and EUR 11.14 per CKD case detected. Most cases were early-stage and manageable in primary care. Conclusions: CDSS-enabled opportunistic screening in primary care is feasible, acceptable, and low-cost. It identifies previously unrecognized CKD at modest expense, enabling early interventions that may slow progression and reduce cardiovascular events. Scaling with follow-up should assess long-term outcomes. Full article
(This article belongs to the Special Issue Nephrology: Diagnosis and Management)
Show Figures

Figure 1

18 pages, 24399 KB  
Article
Legacy Code, Live Risk: Empirical Evidence of Malware Detection Gaps
by Gang-Cheng Huang and Tai-Hung Lai
Appl. Sci. 2025, 15(22), 11862; https://doi.org/10.3390/app152211862 - 7 Nov 2025
Viewed by 853
Abstract
Consistent detection of malicious loaders across varied programming languages and build tools remains a significant cybersecurity challenge. This study empirically measures how compiler and language choices affect the detectability of standard in-memory Windows loaders. We implement functionally equivalent loaders (allocate, copy, protect, execute) [...] Read more.
Consistent detection of malicious loaders across varied programming languages and build tools remains a significant cybersecurity challenge. This study empirically measures how compiler and language choices affect the detectability of standard in-memory Windows loaders. We implement functionally equivalent loaders (allocate, copy, protect, execute) in C, C#, Fortran, and COBOL, embedding an identical x64 test payload to isolate behavior. Our results reveal significant detection gaps: loaders compiled in legacy languages (Fortran, COBOL) consistently evade static and dynamic antivirus engines that easily flag their C and C# counterparts. We demonstrate this evasion is not due to behavioral differences, but to compiler-specific static artifacts. These artifacts, such as interleaved zero-bytes in Fortran and fragmented payload-construction logic in COBOL, effectively break common signature matching. These findings indicate that many detection tools are overly sensitive to the static build surface rather than true semantic behavior. We provide actionable guidance favoring behavior-focused analysis, such as tracking API call order and memory protection changes, to address this critical legacy code blind spot. Full article
Show Figures

Figure 1

19 pages, 4512 KB  
Article
Real-Time Cycle Slip Detection in Single-Frequency GNSS Receivers Using Dual-Index Cross-Validation and Elevation-Dependent Thresholding
by Mireia Carvajal Librado and Kwan-Dong Park
Sensors 2025, 25(19), 6162; https://doi.org/10.3390/s25196162 - 4 Oct 2025
Viewed by 1473
Abstract
Cycle slips, abrupt discontinuities in carrier-phase measurements, pose a significant challenge for single-frequency GNSS receivers, particularly in real-time applications where rapid detection is critical. Unlike dual-frequency approaches, these receivers cannot rely on redundant combinations to isolate slips from other errors. This study proposes [...] Read more.
Cycle slips, abrupt discontinuities in carrier-phase measurements, pose a significant challenge for single-frequency GNSS receivers, particularly in real-time applications where rapid detection is critical. Unlike dual-frequency approaches, these receivers cannot rely on redundant combinations to isolate slips from other errors. This study proposes a real-time cycle slip detection algorithm for single-frequency GNSS receivers based solely on short-term differencing of pseudorange and carrier-phase observables. The method employs a two-step logic: first-order differencing of code-minus-carrier and second-order differencing of carrier phase. Both steps employ satellite elevation-dependent adaptive thresholds, enabling robust detection under diverse signal conditions. The method requires no user position, receiver-generated tracking flags, or additional sensor data. Experimental results reveal that the algorithm achieves over 98% detection accuracy for slips exceeding 10 cycles, with no false positives in artificial slip testing, and 87.93% agreement with Loss of Lock Indicators (LLI) during periods in which the receiver indicated signal instability. Full article
(This article belongs to the Section Navigation and Positioning)
Show Figures

Figure 1

14 pages, 1101 KB  
Article
Telemedicine-Assisted Work-Related Injuries Among Seafarers on Italian-Flagged Ships: A 13-Year Retrospective Study
by Getu Gamo Sagaro and Francesco Amenta
Healthcare 2025, 13(18), 2375; https://doi.org/10.3390/healthcare13182375 - 22 Sep 2025
Cited by 1 | Viewed by 815
Abstract
Background: Seafarers are highly susceptible to work-related injuries, which can result in serious consequences or permanent disabilities. Understanding the frequency and characteristics of occupational injuries is crucial for developing effective prevention strategies and identifying their underlying patterns and causes. This study aimed [...] Read more.
Background: Seafarers are highly susceptible to work-related injuries, which can result in serious consequences or permanent disabilities. Understanding the frequency and characteristics of occupational injuries is crucial for developing effective prevention strategies and identifying their underlying patterns and causes. This study aimed to determine the frequency and characteristics of telemedicine-assisted work-related injuries among seafarers on board Italian-flagged vessels. Methods: A retrospective descriptive study was conducted to analyze occupational injuries using medical data recorded in the Centro Internazionale Radio Medico (C.I.R.M.) database from 1 January 2010 to 31 December 2022. Injuries in the database were coded according to the 10th revision of the International Classification of Diseases (ICD-10) by the World Health Organization (WHO). Variables extracted from the database included injury type, seafarers’ age, rank, nationality, worksite, gender, date of injury, affected body region, clinical outcomes, and other demographic and occupational characteristics. Injury frequency and characteristics (e.g., location, type, and cause) were analyzed and stratified by seafarers’ rank and worksite groups. Results: The analysis included 793 seafarers who sustained injuries. Their average age was 39.15 ± 10.49 years (range: 21 to 70 years). Deck ratings and engine officers accounted for 27.9% and 20% of those who claimed injuries, respectively. 39.2% of injured seafarers were aged between 30 and 40 years. In terms of affected body parts, the most reported injuries were to the hand/wrist (33.3%), followed by the knee/lower legs (21%), and the head/eye (19%). Open wounds (38%) and burns/abrasions (14%) were the most common types of injury. Slips/falls (32%), burns/explosions (16.6%), and overexertion while lifting or carrying (14.8%) were the leading causes of injury during the study period. Nearly 35% of injuries affected workers on the deck and were due mainly to slips/falls, 19% in the engine room were due to being caught in machinery or equipment, and 32.5% in the catering department were due to burns/explosions. Conclusions: One-third of seafarers who suffered work-related injuries sustained hand and/or wrist injuries, with slips/falls being a significant cause. The results of this study emphasize the need for preventative measures in the marine sector, particularly to reduce risks associated with slips and falls, overexertion, and other injury-causing factors. Campaigns for the larger use of protective equipment are desirable to reduce occupational accidents at sea and provide better health protection for seafarers. Full article
Show Figures

Figure 1

16 pages, 1220 KB  
Article
Exploiting Marker Genes for Reliable Botanical Authentication of Bacopa monnieri Products
by Rita Biltes, Caterina Villa, Joana Costa and Isabel Mafra
Foods 2025, 14(18), 3275; https://doi.org/10.3390/foods14183275 - 21 Sep 2025
Cited by 1 | Viewed by 1324
Abstract
Bacopa monnieri, commonly known as Brahmi, is a perennial herbaceous plant used in Ayurvedic medicine owing to its nootropic properties. The increased demand for bacopa-derived herbal/food products has motivated adulteration practices through plant substitution. This work is aimed at developing a new [...] Read more.
Bacopa monnieri, commonly known as Brahmi, is a perennial herbaceous plant used in Ayurvedic medicine owing to its nootropic properties. The increased demand for bacopa-derived herbal/food products has motivated adulteration practices through plant substitution. This work is aimed at developing a new method for B. monnieri detection and quantification in herbal products. The chloroplast gene encoding the Ycf1 photosystem I assembly protein (Ycf1) and the nuclear gene coding for the flavonoid glucosyltransferase (Flag) were selected as candidate markers to develop a real-time PCR assay with EvaGreen dye for B. monnieri detection. Both markers were specific to the target species, with Ycf1 providing the best real-time PCR kinetics and highest sensitivity. Therefore, a new method targeting the Ycf1 barcode was developed, exhibiting high specificity and a sensitivity of 1 pg of bacopa DNA. Additionally, a calibration model was proposed using reference mixtures of B. monnieri in Ginkgo biloba with a linear dynamic range of 25–0.1% (w/w). The curve parameters of slope, PCR efficiency and correlation coefficient met the acceptance criteria. The method was successfully validated with blind mixtures and further applied to commercial herbal products, revealing an important level of adulteration in bacopa/Brahmi-labelled products (60%) due to absence of or reduction in bacopa content. In this work, the first quantitative real-time PCR method for the botanical authentication of B. monnieri in herbal products is proposed as a powerful tool, which can be used by quality control laboratories and regulatory authorities to ensure labelling compliance. Full article
Show Figures

Figure 1

39 pages, 4701 KB  
Article
DCmal-2025: A Novel Routing-Based DisConnectivity Malware—Development, Impact, and Countermeasures
by Mai Abu-Jazoh, Iman Almomani and Khair Eddin Sabri
Appl. Sci. 2025, 15(18), 10219; https://doi.org/10.3390/app151810219 - 19 Sep 2025
Viewed by 3101
Abstract
Operating systems such as Windows, Linux, and macOS include built-in commands that enable administrators to perform essential tasks. These same commands can be exploited by attackers for malicious purposes that may go undetected by traditional security solutions. This research identifies an unmitigated risk [...] Read more.
Operating systems such as Windows, Linux, and macOS include built-in commands that enable administrators to perform essential tasks. These same commands can be exploited by attackers for malicious purposes that may go undetected by traditional security solutions. This research identifies an unmitigated risk of misuse of a standard command to disconnect network services on victim devices. Thus, we developed a novel Proof-of-Concept (PoC) malware named DCmal-2025 and documented every step of its lifecycle, including the core idea of the malware, its development, impact, analysis, and possible countermeasures. The proposed DCmal-2025 malware can cause a Denial-of-Service (DoS) condition without exploiting any software vulnerabilities; instead, it misuses legitimate standard commands and manipulates the routing table to achieve this. We developed two types of DCmal-2025: one that triggers a DoS immediately and another that initiates it after a predefined delay before restoring connectivity. This study evaluated 72 antivirus detection rates of two malware types (DCmal-2025 Type 1 and Type 2) written in C and Rust using VirusTotal. The source code for both types was undetected by any of the antivirus engines. However, after compiling the source code into executable files, only some Windows executables were flagged by general keywords unrelated to DCmal-2024 behaviour; Linux executables remained undetected. Rust significantly reduced detection rates compared to C—from 7.04% to 1.39% for Type 1 and from 9.72% to 4.17% for Type 2. An educational institution was chosen as a case study. The institution’s network topology was simulated using the GNS3 simulator. The result of the case study reveals that both malware types could cause a successful DoS attack by disconnecting targeted devices from all network-based services. The findings underscore the need for enhanced detection methods and heightened awareness that unexplained network disconnections may be caused by undetected malware, such as DCmal-2025. Full article
(This article belongs to the Special Issue Approaches to Cyber Attacks and Malware Detection)
Show Figures

Figure 1

23 pages, 22555 KB  
Article
Citrate Transporter Expression and Localization: The Slc13a5Flag Mouse Model
by Jan C.-C. Hu, Tian Liang, Hong Zhang, Yuanyuan Hu, Yasuo Yamakoshi, Ryuji Yamamoto, Chuhua Zhang, Hui Li, Charles E. Smith and James P. Simmer
Int. J. Mol. Sci. 2025, 26(14), 6707; https://doi.org/10.3390/ijms26146707 - 12 Jul 2025
Cited by 1 | Viewed by 1254
Abstract
The sodium–citrate cotransporter (NaCT) plays a crucial role in citrate transport during amelogenesis. Mutations in the SLC13A5 gene, which encodes the NaCT, cause early infantile epileptic encephalopathy 25 and amelogenesis imperfecta. We analyzed developing pig molars and determined that the citrate concentrations in [...] Read more.
The sodium–citrate cotransporter (NaCT) plays a crucial role in citrate transport during amelogenesis. Mutations in the SLC13A5 gene, which encodes the NaCT, cause early infantile epileptic encephalopathy 25 and amelogenesis imperfecta. We analyzed developing pig molars and determined that the citrate concentrations in secretory- and maturation-stage enamel are both 5.3 µmol/g, with about 95% of the citrate being bound to mineral. To better understand how citrate might enter developing enamel, we developed Slc13a5Flag reporter mice that express NaCT with a C-terminal Flag-tag (DYKDDDDK) that can be specifically and accurately recognized by commercially available anti-Flag antibodies. The 24-base Flag coding sequence was located immediately upstream of the natural translation termination codon (TAG) and was validated by Sanger sequencing. The general development, physical activities, and reproductive outcomes of this mouse strain were comparable to those of the C57BL/6 mice. No differences were detected between the Slc13a5Flag and wild-type mice. Tooth development was extensively characterized using dissection microscopy, bSEM, light microscopy, in situ hybridization, and immunohistochemistry. Tooth formation was not altered in any detectable way by the introduction of the Flag. The Slc13a5Flag citrate transporter was observed on all outer membranes of secretory ameloblasts (distal, lateral, and proximal), with the strongest signal on the Tomes process, and was detectable in all but the distal membrane of maturation-stage ameloblasts. The papillary layer also showed positive immunostaining for Flag. The outer membrane of odontoblasts stained stronger than ameloblasts, except for the odontoblastic processes, which did not immunostain. As NaCT is thought to only facilitate citrate entry into the cell, we performed in situ hybridization that showed Ank is not expressed by secretory- or maturation-stage ameloblasts, ruling out that ANK can transport citrate into enamel. In conclusion, we developed Slc13a5Flag reporter mice that provide specific and sensitive localization of a fully functional NaCT-Flag protein. The localization of the Slc13a5Flag citrate transporter throughout the ameloblast membrane suggests that either citrate enters enamel by a paracellular route or NaCT can transport citrate bidirectionally (into or out of ameloblasts) depending upon local conditions. Full article
(This article belongs to the Special Issue Molecular Metabolism of Ameloblasts in Tooth Development)
Show Figures

Figure 1

24 pages, 1871 KB  
Article
Multi-Agent Framework Utilizing Large Language Models for Solving Capture-the-Flag Challenges in Cybersecurity Competitions
by Zewen Huang, Jinjing Zhuge and Jianwei Zhuge
Appl. Sci. 2025, 15(13), 7159; https://doi.org/10.3390/app15137159 - 25 Jun 2025
Viewed by 4148
Abstract
Capture the Flag (CTF) is an important form of competition in cybersecurity, which tests participants’ knowledge and problem-solving abilities. We propose a multi-agent framework based on large language models to simulate human participants and attempt to automate the solutions of common CTF problems, [...] Read more.
Capture the Flag (CTF) is an important form of competition in cybersecurity, which tests participants’ knowledge and problem-solving abilities. We propose a multi-agent framework based on large language models to simulate human participants and attempt to automate the solutions of common CTF problems, especially in cryptographic and miscellaneous challenges. We implement the collaboration of multiple expert agents and access external tools to give the language model a basic level of practical competence in the field of cybersecurity. We primarily test two capabilities of the large model: to analyze, reason, and determine solutions to CTF problems, and to assist with problem-solving by generating code or utilizing unannotated existing external tools. We construct a benchmark based on the puzzles from the book “Ghost in the Wires” and the THUCTF competition. The experiment results showed that our agents performed well on the former and were significantly improved with some human hints, compared with related work. We also discuss the challenges that language models face in cybersecurity challenges and the effect of leveraging reasoning models. Full article
(This article belongs to the Special Issue Security, Privacy and Application in New Intelligence Techniques)
Show Figures

Figure 1

23 pages, 2071 KB  
Systematic Review
Creating Value in Metaverse-Driven Global Value Chains: Blockchain Integration and the Evolution of International Business
by Sina Mirzaye Shirkoohi and Muhammad Mohiuddin
J. Theor. Appl. Electron. Commer. Res. 2025, 20(2), 126; https://doi.org/10.3390/jtaer20020126 - 2 Jun 2025
Cited by 5 | Viewed by 2780
Abstract
The convergence of blockchain and metaverse technologies is poised to redefine how Global Value Chains (GVCs) create, capture, and distribute value, yet scholarly insight into their joint impact remains scattered. Addressing this gap, the present study aims to clarify where, how, and under [...] Read more.
The convergence of blockchain and metaverse technologies is poised to redefine how Global Value Chains (GVCs) create, capture, and distribute value, yet scholarly insight into their joint impact remains scattered. Addressing this gap, the present study aims to clarify where, how, and under what conditions blockchain-enabled transparency and metaverse-enabled immersion enhance GVC performance. A systematic literature review (SLR), conducted according to PRISMA 2020 guidelines, screened 300 articles from ABI Global, Business Source Premier, and Web of Science records, yielding 65 peer-reviewed articles for in-depth analysis. The corpus was coded thematically and mapped against three theoretical lenses: transaction cost theory, resource-based view, and network/ecosystem perspectives. Key findings reveal the following: 1. digital twins anchored in immersive platforms reduce planning cycles by up to 30% and enable real-time, cross-border supply chain reconfiguration; 2. tokenized assets, micro-transactions, and decentralized finance (DeFi) are spawning new revenue models but simultaneously shift tax triggers and compliance burdens; 3. cross-chain protocols are critical for scalable trust, yet regulatory fragmentation—exemplified by divergent EU, U.S., and APAC rules—creates non-trivial coordination costs; and 4. traditional IB theories require extension to account for digital-capability orchestration, emerging cost centers (licensing, reserve backing, data audits), and metaverse-driven network effects. Based on these insights, this study recommends that managers adopt phased licensing and geo-aware tax engines, embed region-specific compliance flags in smart-contract metadata, and pilot digital-twin initiatives in sandbox-friendly jurisdictions. Policymakers are urged to accelerate work on interoperability and reporting standards to prevent systemic bottlenecks. Finally, researchers should pursue multi-case and longitudinal studies measuring the financial and ESG outcomes of integrated blockchain–metaverse deployments. By synthesizing disparate streams and articulating a forward agenda, this review provides a conceptual bridge for international business scholarship and a practical roadmap for firms navigating the next wave of digital GVC transformation. Full article
(This article belongs to the Section FinTech, Blockchain, and Digital Finance)
Show Figures

Figure 1

13 pages, 2706 KB  
Article
In Situ Contact-Separation TENG for High-Speed Rail Wind Monitoring
by Guangzheng Wang, Depeng Fu, Yuankun Li and Xiaoxiong Wang
Nanomaterials 2025, 15(11), 839; https://doi.org/10.3390/nano15110839 - 30 May 2025
Viewed by 859
Abstract
Triboelectric nanogenerators have attracted extensive attention as they can complete sensing during energy conversion, triggering a series of self-powered designs. Traditional TENG bipolar independent fabrication technology requires secondary motion control, which limits its application scenarios. In this work, we propose a flag-type TENG [...] Read more.
Triboelectric nanogenerators have attracted extensive attention as they can complete sensing during energy conversion, triggering a series of self-powered designs. Traditional TENG bipolar independent fabrication technology requires secondary motion control, which limits its application scenarios. In this work, we propose a flag-type TENG prepared using in situ electrospinning technology, in which the connecting region is obtained by electrospinning deposition of PVDF on nylon as the receiving electrode. The active area is isolated with silicone oil paper. After electrospinning, the silicone oil paper was removed, and the distance between the nylon and PVDF is far beyond the van der Waals range. Thus, contact separation can be effectively carried out under the action of wind. The device has been proven to be able to be used for monitoring wind conditions at high-speed rail stations and enables completely self-powered monitoring of the wind level using self-powered LED coding. The device no longer relies on additional batteries or wires to work, providing additional ideas for future self-powered system design. Full article
(This article belongs to the Section Nanoelectronics, Nanosensors and Devices)
Show Figures

Graphical abstract

17 pages, 3658 KB  
Article
Efficient and Real-Time Compression Schemes of Multi-Dimensional Data from Ocean Buoys Using Golomb-Rice Coding
by Quan Liu, Ziling Huang, Kun Chen and Jianmin Xiao
Mathematics 2025, 13(3), 366; https://doi.org/10.3390/math13030366 - 23 Jan 2025
Cited by 2 | Viewed by 1168
Abstract
The energy supply of ocean monitoring buoys is a major challenge, especially for long-term, low-power applications. Data compression can reduce transmission energy and extend system lifespan. In particular, the algorithm cannot introduce delays to ensure real-time monitoring. In this scenario, we propose an [...] Read more.
The energy supply of ocean monitoring buoys is a major challenge, especially for long-term, low-power applications. Data compression can reduce transmission energy and extend system lifespan. In particular, the algorithm cannot introduce delays to ensure real-time monitoring. In this scenario, we propose an efficient real-time compression scheme for lossless data compression (ERCS_Lossless) based on Golomb-Rice coding to efficiently compress each dimensional data independently. Additionally, we propose an efficient real-time compression scheme for lossy data compression with a flag mechanism (ERCS_Lossy_Flag), which incorporates a flag bit for each dimension, indicating if the prediction error exceeds a threshold, followed by further compression using Golomb-Rice coding. We conducted experiments on 24-dimensional weather and wave element data from a single buoy, and the results show that ERCS_Lossless achieves an average compression rate of 47.40%. In real communication scenarios, splicing and byte alignment operations are performed on multidimensional data, and the results show that the variance of the payload increases but the mean decreases after compression, realizing a 38.60% transmission energy saving, which is better than existing real-time lossless compression methods. In addition, ERCS_Lossy_Flag further reduces the amount of data and improves energy efficiency when lower data accuracy is acceptable. Full article
(This article belongs to the Section E2: Control Theory and Mechanics)
Show Figures

Figure 1

21 pages, 7222 KB  
Article
Design of Multi-Time Programmable Intellectual Property with Built-In Error Correction Code Function Based on Bipolar–CMOS–DMOS Process
by Longhua Li, Soonwoo Kwon, Dohoon Kim, Dongseob Kim, Panbong Ha, Doojin Lee and Younghee Kim
Electronics 2025, 14(1), 68; https://doi.org/10.3390/electronics14010068 - 27 Dec 2024
Viewed by 1946
Abstract
The coupling capacitor of the MTP cell used in this paper is an NCAP-type capacitor that has only a source contact, and the layout size of the unit cell is 6.184 μm × 6.295 μm (=38.93 μm2), which is 0.44% smaller [...] Read more.
The coupling capacitor of the MTP cell used in this paper is an NCAP-type capacitor that has only a source contact, and the layout size of the unit cell is 6.184 μm × 6.295 μm (=38.93 μm2), which is 0.44% smaller than the MTP cell that uses the coupling capacitor of the conventional NMOS transistor type that has both a source contact and a drain contact. In addition, a 4 Kb MTP IP with a built-in ECC function using an extended Hamming code capable of single-error correction and double-error detection was designed for safety considerations. In this paper, a new test algorithm is proposed to test whether the ECC function operates normally in the MTP IP with a built-in ECC function, and it is confirmed through a test using logic tester equipment that the output data DOUT[7:0] and the error flag ERROR_FLAG[1:0] are exactly the same in the cases of no error, a single-bit error, and a double-bit error. In addition, by sharing a current-controlled ring oscillator circuit that uses a current-starved inverter in the VPP, VNN, and VNNL charge pumping circuits that share a single ring oscillator in the erase and program operation modes of the MTP IP and using the regulated VPVR as power, the pumping capacitor size is reduced, and a new technology to reduce ripple voltage variation is proposed. Meanwhile, in the VNN level detector circuit that detects whether the VNN has reached the target voltage, a folded-cascode CMOS OP-AMP whose output swing voltage is almost VDD is used instead of a differential amplifier circuit with a PMOS differential input pair to ensure that normal VNN level detection operation occurs. Full article
Show Figures

Figure 1

11 pages, 257 KB  
Article
Respiratory Diseases with High Occupational Fraction in Italy: Results from the Italian Hospital Discharge Registry (2010–2021)
by Pierpaolo Ferrante
Healthcare 2024, 12(24), 2565; https://doi.org/10.3390/healthcare12242565 - 20 Dec 2024
Viewed by 1861
Abstract
Objectives: Occupational respiratory diseases represent a major public health concern worldwide. This study analyses the hospitalization costs and characteristics of four major occupational respiratory diseases: malignant mesothelioma (MM), sinonasal cancer (SNC), pneumoconiosis (PN), and hypersensitivity pneumonitis (HP). The findings are situated within the [...] Read more.
Objectives: Occupational respiratory diseases represent a major public health concern worldwide. This study analyses the hospitalization costs and characteristics of four major occupational respiratory diseases: malignant mesothelioma (MM), sinonasal cancer (SNC), pneumoconiosis (PN), and hypersensitivity pneumonitis (HP). The findings are situated within the context of Italy’s population trends and healthcare system, offering insights into the economic and clinical burden of these diseases. Study Design: This retrospective, population-based study examines Italian hospitalizations for MM, SNC, PN, and HP during the period 2010–2021. The primary outcomes were the number of hospitalizations, length of stay, and associated cost. Costs were derived from charges linked to diagnosis-related groups (version 24) and major diagnostic category coding systems. Results: Though the Italian population is rapidly aging, the annual number and rate of hospitalizations declined by 35% over the study period. SNC hospitalizations aligned with the overall trend, PN and MM experienced faster declines, whereas HP admissions remained steady. MM emerged as the most resource-intensive (EUR 25 million yearly, with 86% attributable to occupation), followed by PN (EUR 10 million, entirely occupational), SNC (EUR 5 million, with EUR 650,000 occupational), and HP (EUR 2 million, with EUR 370,000 occupational). All studied diseases had an average length of stay exceeding the national one. The SNC admissions were the shortest (6.5 days) and least expensive (EUR 3647). In contrast, MM, PN, and HP had a mean length of stay exceeding 10 days, with admission costs averaging EUR 4700 for MM and EUR 4000 for PN and HP. The median age was the highest for PN (78 years) and MM (71 years), while SNC and HP patients had a median age of approximately 65 years. Conclusions: Consistent with their anticipated benefits, Italian workplace health regulations over the last three decades, including the 1992 asbestos ban and D.lgs. 81/2008, are associated with significant reductions in the hospitalization burden and an increased median age at discharge for MM and PN. In contrast, fewer conclusions can be drawn for SNC and HP due to their lower occupational fractions (10–20%). This finding suggests adding an occupational exposure flag in hospital records for acknowledged occupational diseases to enhance surveillance. Finally, this study provides the first estimate of the occupational fraction of hospitalization costs for the studied diseases in Italy. Full article
(This article belongs to the Section Environmental Factors and Global Health)
Back to TopTop