Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (111)

Search Parameters:
Keywords = horizontal attacks

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
34 pages, 7536 KB  
Article
Aerodynamic Performance Improvement of a Straight-Bladed Vertical Axis Wind Turbine Through a Modified NACA0012 Profile with Inclined Orifices
by Ioana-Octavia Bucur, Daniel-Eugeniu Crunțeanu and Mădălin-Constantin Dombrovschi
Inventions 2026, 11(2), 37; https://doi.org/10.3390/inventions11020037 - 3 Apr 2026
Viewed by 285
Abstract
Vertical axis wind turbines (VAWTs) are promising systems for urban wind energy applications because of their compact layout, omni-directional operation, and favorable integration potential. However, their broader deployment remains limited by poor self-starting capabilities and relatively low aerodynamic efficiency compared to horizontal axis [...] Read more.
Vertical axis wind turbines (VAWTs) are promising systems for urban wind energy applications because of their compact layout, omni-directional operation, and favorable integration potential. However, their broader deployment remains limited by poor self-starting capabilities and relatively low aerodynamic efficiency compared to horizontal axis wind turbines. In this study, a passive flow control concept for a straight-bladed VAWT is numerically investigated using a NACA0012 airfoil modified with 45° inclined perforations on the extrados. Four perforated configurations were generated and compared with the baseline profile through a two-stage computational approach. First, steady 2D computational fluid dynamics (CFD) simulations of the isolated airfoils were performed at a free stream velocity of 12 m/s over an angle of attack range of 0–180°. Subsequently, the most relevant aerodynamic trends were assessed at rotor level using transient 2D Moving Mesh simulations for a three-bladed wind turbine with tip speed ratios (TSRs) between 0.5 and 3.5. All perforated variants exhibited higher lift than the baseline airfoil, while the configuration with smaller, denser perforations distributed over the downstream two-thirds of the extrados provided the best overall aerodynamic performance. At TSR = 2.5, this geometry increased the mean moment coefficient from 0.044 to 0.0525 and the power coefficient from 0.109 to 0.131, corresponding to an increase in power output of approximately 20%. These results indicate that inclined extrados perforations constitute a promising passive strategy for improving the aerodynamic performance of small straight-bladed VAWTs, although further 3D and experimental validations are required. Full article
(This article belongs to the Special Issue Emerging Trends and Innovations in Renewable Energy)
Show Figures

Figure 1

21 pages, 4565 KB  
Article
An Array Antenna-Based Attitude Determination Method for GNSS Spoofing Mitigation in Power System Timing Applications
by Wenxin Jin, Sai Wu, Guangyao Zhang, Ruochen Si, Ling Teng, Wei Chen, Huixia Ding and Chaoyang Zhu
Appl. Sci. 2026, 16(7), 3289; https://doi.org/10.3390/app16073289 - 28 Mar 2026
Viewed by 295
Abstract
Accurate GNSS timing is fundamental to Power Time Synchronization Systems (PTSS). However, conventional substation infrastructures remain vulnerable to sophisticated spoofing attacks. In this research, a sensing-assisted array antenna-based spoofing mitigation method is proposed. The proposed architecture operates at the signal front-end and incorporates [...] Read more.
Accurate GNSS timing is fundamental to Power Time Synchronization Systems (PTSS). However, conventional substation infrastructures remain vulnerable to sophisticated spoofing attacks. In this research, a sensing-assisted array antenna-based spoofing mitigation method is proposed. The proposed architecture operates at the signal front-end and incorporates a dedicated spoofing sensing path to estimate the Direction-of-Arrival (DoA) of malicious signals, enabling adaptive null steering while preserving authentic satellite reception. To provide reliable spatial reference for DoA estimation, a unified high-precision attitude determination method is developed for compact 10 cm-scale array antennas under single-frequency and environmental error conditions. The method integrates the Constrained Least-squares AMBiguity Decorrelation Adjustment (C-LAMBDA)-based constrained ambiguity resolution, redundant antenna element-based vertical accuracy enhancement, and iterative refinement to mitigate centimeter-level environmental biases. Semi-simulated experiments demonstrate that the proposed method achieves baseline vector Root Mean Square Errors (RMSE) below 5 mm in horizontal components and approximately 10 mm in vertical components. The resulting attitude accuracies reach 2° in heading, 6° in pitch, and 4° in roll, while eliminating over 80% of systematic environmental phase errors with an average convergence within 6 iterations. These results satisfy the spatial accuracy requirements for effective spoofing suppression and front-end signal purification. Consequently, a robust technical approach is established for enhancing the anti-spoofing capabilities of PTSS without modifying existing infrastructure. Full article
(This article belongs to the Special Issue Advanced GNSS Technologies: Measurement, Analysis, and Applications)
Show Figures

Figure 1

28 pages, 3654 KB  
Article
Replacement-Based Key-Controlled Circuits: A New Lightweight Logic-Locking Technique to Prevent the SAT Attack and Its Variants
by Weizheng Wang, Luoyi Zhao and Shuo Cai
Appl. Sci. 2026, 16(2), 925; https://doi.org/10.3390/app16020925 - 16 Jan 2026
Viewed by 310
Abstract
The current trend of globalization of the supply chain in the integrated circuit (IC) industry has led to numerous security issues, such as intellectual property (IP) piracy, overbuilding, hardware Trojan (HT), and so on. Over the past decade or so, logic locking has [...] Read more.
The current trend of globalization of the supply chain in the integrated circuit (IC) industry has led to numerous security issues, such as intellectual property (IP) piracy, overbuilding, hardware Trojan (HT), and so on. Over the past decade or so, logic locking has been developed as an important method to prevent or mitigate the above security issues in ICs throughout their lifecycles. However, most published logic locking schemes are vulnerable to the SAT attack and its variants. Existing SAT-resilient locking schemes always entail a trade-off between security and effectiveness and incur significant hardware overhead. In this paper, we propose a new replacement-based key-controlled circuit (called RKC), the application of which changes the underlying framework of traditional logic locking designs, making the SAT attack and its variants infeasible in the framework. To achieve stronger functional and structural obfuscation and to validate the extensibility of the proposed method within the modified logic-locking design framework, we develop a new multi-input key-controlled circuit (called MKC) via vertical extension, also based on replacement applied to the locking design. In addition, we expand the two proposed circuits horizontally by varying the design parameter m, yielding four logic-locking design circuits. Relevant experiments performed on six selected benchmark circuits from ISCAS’85 and MCNC benchmarks show that the proposed method demonstrates superior/less hardware overhead compared to four recently published locking methods, i.e., GateLock, SKG-Lock, SKG-Lock+, and CAS-Lock. Full article
Show Figures

Figure 1

14 pages, 1457 KB  
Article
Plyometric Performance in U13 Basketball: Influence of Modified Competitions and Maturational Status with GPS Tracking
by Ricardo André Birrento Aguiar, Francisco Javier García-Angulo, Riccardo Izzo and Enrique Ortega-Toro
Sensors 2026, 26(2), 552; https://doi.org/10.3390/s26020552 - 14 Jan 2026
Viewed by 316
Abstract
The aim of this study was to analyze the effects of different competition formats on the plyometric performance of under-13 basketball players, considering the influence of maturational age and monitored through GPS devices. Thirty-seven under-13 male basketball players (age = 12.91 ± 0.57 [...] Read more.
The aim of this study was to analyze the effects of different competition formats on the plyometric performance of under-13 basketball players, considering the influence of maturational age and monitored through GPS devices. Thirty-seven under-13 male basketball players (age = 12.91 ± 0.57 years) from four southeast Spanish teams participated in two different tournaments. On the first day, the tournament was played according to the official Spanish Basketball Federation (FEB) rules for under-14 players. On the second day, the competition was held with modified rules (Modified Tournament), in which the basket height was lowered to 2.90 m and the three-point line was replaced by a rectangle located 4 m from the basket. Plyometric variables, such as number of impacts (total and in zones), number of horizontal impacts (total and in zones), number of steps, number of jumps (total and in zones) and g-force of jumps during takeoff and landing, were assessed using GPS monitoring. In addition, the moderating effect of maturational age on the intervention in each of the variables under study will be evaluated. The results showed that the modified tournament (MT) showed significant differences compared to the standard format (FEB) in playing time, steps, landings 5–8 G, and takeoffs >8 G during positional attacks, as well as in horizontal impact variables during counterattacks and effective playing time. Bayesian analysis provided moderate-to-strong evidence for several of these variables, and extreme evidence for playing time and impacts during effective time. Moreover, maturational age (%PAH) consistently moderated the intervention effects, particularly in impact loads and locomotor demands. These findings can provide useful insights for coaches and practitioners in youth basketball. Adjusting competition rules and considering maturational status may optimize player development by creating contexts that enhance plyometric performance while adapting to the physical and biological characteristics of young athletes. Full article
(This article belongs to the Special Issue Movement Biomechanics Applications of Wearable Inertial Sensors)
Show Figures

Figure 1

28 pages, 10398 KB  
Article
CFD Simulation and Experimental Investigation of Water Distribution Patterns in Transitional Attack
by Hui Xu, Jianan Men, Tianze Zhang, Zhen Liu, Qiang Liang and Xiaopo Wang
Fire 2026, 9(1), 14; https://doi.org/10.3390/fire9010014 - 25 Dec 2025
Viewed by 832
Abstract
Transitional attack represents a pivotal tactic in modern firefighting, whose efficacy is profoundly contingent upon the impact characteristics of water streams and their subsequent distribution patterns. This study integrates computational fluid dynamics (CFD) simulations with experimental validation to develop a momentum decomposition model [...] Read more.
Transitional attack represents a pivotal tactic in modern firefighting, whose efficacy is profoundly contingent upon the impact characteristics of water streams and their subsequent distribution patterns. This study integrates computational fluid dynamics (CFD) simulations with experimental validation to develop a momentum decomposition model for jet impingement on a ceiling. The model analyzes the dominant mechanisms of tangential spread and normal rebound on water distribution and optimizes water application strategies. Theoretical analysis reveals that upon ceiling impact, the normal velocity component of the stream undergoes rapid attenuation, causing the flow to be predominantly governed by tangential diffusion. This phenomenon results in an asymmetrically elliptical ground distribution, characterized by a significant concentration of water volume at the terminus of the diffusion path, while wall boundaries induce further water accumulation. A comparative analysis of the stream impact process and water distribution demonstrates a high degree of concordance between experimental and simulation results, thereby substantiating the reliability of the proposed model. Numerical simulations demonstrate that an increased jet angle markedly improves both coverage area and flux density. Higher water pressure enhances jet kinetic energy, leading to improved distribution uniformity. Appropriately extending the horizontal projection distance of the water jet further contributes to broadening the effective coverage. The parametric combination of a 49° jet angle, water pressure of 0.2–0.25 MPa, and a relative horizontal distance of 1.5–2.0 m is identified as optimal for overall performance. This research provides a scientific foundation and practical operational guidelines for enhancing the efficiency and safety of the transitional attack methodology. Full article
Show Figures

Figure 1

15 pages, 3566 KB  
Article
Passive Control of Boundary-Layer Separation on a Wind Turbine Blade Using Varying-Parameter Flow Deflector
by Xin Chen, Jiaqian Qiu, Junwei Zhong, Chaolei Zhang and Yufeng Gan
Fluids 2025, 10(10), 270; https://doi.org/10.3390/fluids10100270 - 16 Oct 2025
Cited by 1 | Viewed by 774
Abstract
Horizontal-axis wind turbines are widely used for wind energy harvesting, but they often encounter flow separation near the blade root, leading to power loss and structural fatigue. A varying-parameter flow deflector (FD) is proposed as a passive flow control method. The FD adopts [...] Read more.
Horizontal-axis wind turbines are widely used for wind energy harvesting, but they often encounter flow separation near the blade root, leading to power loss and structural fatigue. A varying-parameter flow deflector (FD) is proposed as a passive flow control method. The FD adopts varying parameters along the blade spanwise direction to match the varying local angle of attack. Numerical simulation using the transition SST k-ω turbulence model combined with the response-surface methodology are used to investigate the effect of the varying-parameter FD on the flow structure and aerodynamic performance of the NREL Phase VI wind turbine. The results indicate that optimal performance can be achieved when the normal position of the FD increases from the blade root to the tip, and the install angle of the FD should be greater than 62° at blade section of r/R = 63.1%. Furthermore, response-surface methodology was employed to optimize the deflector parameters, with analysis of variance revealing the relative significance of geometric factors (l1 > l2 > θ1 > θ2). Compared with the original blade, the shaft torque of the controlled blade with the optimal FD is improved by 24.7% at 10 m/s. Full article
(This article belongs to the Special Issue Industrial CFD and Fluid Modelling in Engineering, 3rd Edition)
Show Figures

Figure 1

24 pages, 10285 KB  
Article
Angle of Attack Effects on Boundary Layer Transition over a Flared Cone–Swept Fin Configuration
by Qingdong Meng, Juanmian Lei, Song Wu, Chaokai Yuan, Jiang Yu and Ling Zhou
Aerospace 2025, 12(9), 824; https://doi.org/10.3390/aerospace12090824 - 12 Sep 2025
Cited by 1 | Viewed by 981
Abstract
In our previous study, the transition behavior of a flared cone–swept fin configuration was investigated under an angle of attack (AoA) of 0°. To further explore the role of AoA in complex three-dimensional geometries with strong fin–body interactions, wind tunnel experiments [...] Read more.
In our previous study, the transition behavior of a flared cone–swept fin configuration was investigated under an angle of attack (AoA) of 0°. To further explore the role of AoA in complex three-dimensional geometries with strong fin–body interactions, wind tunnel experiments were conducted at Ma = 9.3, Re = 1.36 × 107/m, with AoA ranging from −6° to 6°. Global surface temperature distributions were obtained using temperature-sensitive paint (TSP), while localized heat flux and pressure fluctuations were captured using thin-film thermocouples and high-frequency pressure sensors. The results show that varying AoA shifts the location of high heat flux between the upper and lower surfaces of the flared cone and induces a switch from streamwise to separation vortices. The windward side exhibits stronger disturbance responses than the leeward side. The junction region between the flared cone and the near-horizontal surface is highly sensitive to AoA variations, consistently exhibiting pronounced second-mode instabilities. These findings provide experimental support for understanding transition mechanisms under the combined effects of shock/boundary layer interaction (SBLI), crossflow, and adverse pressure gradients, with implications for transition prediction and thermal protection system design. Full article
Show Figures

Figure 1

32 pages, 14643 KB  
Article
Image Encryption Algorithm Based on Dynamic Rhombus Transformation and Digital Tube Model
by Xiaoqiang Zhang, Yupeng Song and Ke Huang
Entropy 2025, 27(8), 874; https://doi.org/10.3390/e27080874 - 18 Aug 2025
Cited by 2 | Viewed by 1272
Abstract
With the rapid advancement of information technology, as critical information carriers, images are confronted with significant security risks. To ensure the image security, this paper proposes an image encryption algorithm based on a dynamic rhombus transformation and digital tube model. Firstly, a two-dimensional [...] Read more.
With the rapid advancement of information technology, as critical information carriers, images are confronted with significant security risks. To ensure the image security, this paper proposes an image encryption algorithm based on a dynamic rhombus transformation and digital tube model. Firstly, a two-dimensional hyper-chaotic system is constructed by combining the Sine map, Cubic map and May map. The analysis results demonstrate that the constructed hybrid chaotic map exhibits superior chaotic characteristics in terms of bifurcation diagrams, Lyapunov exponents, sample entropy, etc. Secondly, a dynamic rhombus transformation is proposed to scramble pixel positions, and chaotic sequences are used to dynamically select transformation centers and traversal orders. Finally, a digital tube model is designed to diffuse pixel values, which utilizes chaotic sequences to dynamically control the bit reversal and circular shift operations, and the exclusive OR operation to diffuse pixel values. The performance analyses show that the information entropy of the cipher image is 7.9993, and the correlation coefficients in horizontal, vertical, and diagonal directions are 0.0008, 0.0001, and 0.0005, respectively. Moreover, the proposed algorithm has strong resistance against noise attacks, cropping attacks, and exhaustive attacks, effectively ensuring the security of images during storage and transmission. Full article
(This article belongs to the Section Signal and Data Analysis)
Show Figures

Figure 1

22 pages, 2003 KB  
Article
ChipletQuake: On-Die Digital Impedance Sensing for Chiplet and Interposer Verification
by Saleh Khalaj Monfared, Maryam Saadat Safa and Shahin Tajik
Sensors 2025, 25(15), 4861; https://doi.org/10.3390/s25154861 - 7 Aug 2025
Viewed by 1872
Abstract
The increasing complexity and cost of manufacturing monolithic chips have driven the semiconductor industry toward chiplet-based designs, where smaller, modular chiplets are integrated onto a single interposer. While chiplet architectures offer significant advantages, such as improved yields, design flexibility, and cost efficiency, they [...] Read more.
The increasing complexity and cost of manufacturing monolithic chips have driven the semiconductor industry toward chiplet-based designs, where smaller, modular chiplets are integrated onto a single interposer. While chiplet architectures offer significant advantages, such as improved yields, design flexibility, and cost efficiency, they introduce new security challenges in the horizontal hardware manufacturing supply chain. These challenges include risks of hardware Trojans, cross-die side-channel and fault injection attacks, probing of chiplet interfaces, and intellectual property theft. To address these concerns, this paper presents ChipletQuake, a novel on-chiplet framework for verifying the physical security and integrity of adjacent chiplets during the post-silicon stage. By sensing the impedance of the power delivery network (PDN) of the system, ChipletQuake detects tamper events in the interposer and neighboring chiplets without requiring any direct signal interface or additional hardware components. Fully compatible with the digital resources of FPGA-based chiplets, this framework demonstrates the ability to identify the insertion of passive and subtle malicious circuits, providing an effective solution to enhance the security of chiplet-based systems. To validate our claims, we showcase how our framework detects hardware Trojans and interposer tampering. Full article
(This article belongs to the Special Issue Sensors in Hardware Security)
Show Figures

Figure 1

27 pages, 2960 KB  
Article
(H-DIR)2: A Scalable Entropy-Based Framework for Anomaly Detection and Cybersecurity in Cloud IoT Data Centers
by Davide Tosi and Roberto Pazzi
Sensors 2025, 25(15), 4841; https://doi.org/10.3390/s25154841 - 6 Aug 2025
Viewed by 1504
Abstract
Modern cloud-based Internet of Things (IoT) infrastructures face increasingly sophisticated and diverse cyber threats that challenge traditional detection systems in terms of scalability, adaptability, and explainability. In this paper, we present (H-DIR)2, a hybrid entropy-based framework designed to detect and mitigate [...] Read more.
Modern cloud-based Internet of Things (IoT) infrastructures face increasingly sophisticated and diverse cyber threats that challenge traditional detection systems in terms of scalability, adaptability, and explainability. In this paper, we present (H-DIR)2, a hybrid entropy-based framework designed to detect and mitigate anomalies in large-scale heterogeneous networks. The framework combines Shannon entropy analysis with Associated Random Neural Networks (ARNNs) and integrates semantic reasoning through RDF/SPARQL, all embedded within a distributed Apache Spark 3.5.0 pipeline. We validate (H-DIR)2 across three critical attack scenarios—SYN Flood (TCP), DAO-DIO (RPL), and NTP amplification (UDP)—using real-world datasets. The system achieves a mean detection latency of 247 ms and an AUC of 0.978 for SYN floods. For DAO-DIO manipulations, it increases the packet delivery ratio from 81.2% to 96.4% (p < 0.01), and for NTP amplification, it reduces the peak load by 88%. The framework achieves vertical scalability across millions of endpoints and horizontal scalability on datasets exceeding 10 TB. All code, datasets, and Docker images are provided to ensure full reproducibility. By coupling adaptive neural inference with semantic explainability, (H-DIR)2 offers a transparent and scalable solution for cloud–IoT cybersecurity, establishing a robust baseline for future developments in edge-aware and zero-day threat detection. Full article
(This article belongs to the Special Issue Privacy and Cybersecurity in IoT-Based Applications)
Show Figures

Figure 1

22 pages, 4482 KB  
Article
RCS Special Analysis Method for Non-Cooperative Aircraft Based on Inverse Reconfiguration Coupled with Aerodynamic Optimization
by Guoxu Feng, Chuan Wei, Jie Huang, Juyi Long and Yang Bai
Aerospace 2025, 12(7), 573; https://doi.org/10.3390/aerospace12070573 - 24 Jun 2025
Viewed by 1183
Abstract
To address the challenge of evaluating a radar cross-section (RCS) for a non-cooperative aircraft with limited aerodynamic shape information, this paper presents a multi-source, data-driven inverse reconstruction method. This approach integrates data fusion techniques to facilitate an initial shape reconstruction, followed by an [...] Read more.
To address the challenge of evaluating a radar cross-section (RCS) for a non-cooperative aircraft with limited aerodynamic shape information, this paper presents a multi-source, data-driven inverse reconstruction method. This approach integrates data fusion techniques to facilitate an initial shape reconstruction, followed by an iterative optimization process that utilizes computational fluid dynamics (CFD) to enhance the shape, accounting for the aerodynamic performance. Additionally, an inverse deduction analysis is effectively employed to ascertain the characteristics of the power system, leading to the design of a double S-curved tail nozzle layout with stealth capabilities. An aerodynamic analysis demonstrates that at Mach 0.6, the lift-to-drag ratio peaks at 27.3 for the attack angle of 4°, after which it declines as the angle increases. At higher angles of attack, complex flow separation occurs and expands with the increasing angle. The electromagnetic simulation results indicate that under vertical polarization, the omnidirectional RCS reaches its peak as the incident angle is deflected downward by 10° and reduces with the growth of the angle, demonstrating angular robustness. Conversely, under horizontal polarization, the RCS is more sensitive to edge-induced rounding. The findings illustrate that this methodology enables accurate shape modeling for non-cooperative targets, thereby providing a fairly solid basis for stealth performance evaluation and the assessment of surprise effectiveness. Full article
(This article belongs to the Section Aeronautics)
Show Figures

Figure 1

21 pages, 4356 KB  
Article
Horizontal Attack Against EC kP Accelerator Under Laser Illumination
by Dmytro Petryk, Ievgen Kabin, Peter Langendoerfer and Zoya Dyka
Electronics 2025, 14(10), 2072; https://doi.org/10.3390/electronics14102072 - 20 May 2025
Viewed by 805
Abstract
Devices employing cryptographic approaches have to be resistant to physical attacks. Side-Channel Analysis (SCA) and Fault Injection (FI) attacks are frequently used to reveal cryptographic keys. In this paper, we present a combined SCA and laser illumination attack against an Elliptic Curve Scalar [...] Read more.
Devices employing cryptographic approaches have to be resistant to physical attacks. Side-Channel Analysis (SCA) and Fault Injection (FI) attacks are frequently used to reveal cryptographic keys. In this paper, we present a combined SCA and laser illumination attack against an Elliptic Curve Scalar Multiplication accelerator, while using different equipment for the measurement of its power traces, i.e., we performed the measurements using a current probe from Riscure and a differential probe from Teledyne LeCroy, with an attack success of 70% and 90%, respectively. Our experiments showed that laser illumination increased the power consumption of the chip, especially its static power consumption, but the success of the horizontal power analysis attacks changed insignificantly. After applying 100% of the laser beam output power and illuminating the smallest area of 143 µm2, we observed an offset of 17 mV in the measured trace. We assume that using a laser with a high laser beam power, as well as concentrating on measuring and analysing only static current, can significantly improve the attack’s success. The attacks exploiting the Static Current under Laser Illumination (SCuLI attacks) are novel, and their potential has not yet been fully investigated. These attacks can be especially dangerous against cryptographic chips manufactured in downscaling technologies. If such attacks are feasible, appropriate countermeasures have to be proposed in the future. Full article
(This article belongs to the Special Issue Advances in Hardware Security Research)
Show Figures

Figure 1

21 pages, 5859 KB  
Article
Internet of Things-Based Anomaly Detection Hybrid Framework Simulation Integration of Deep Learning and Blockchain
by Ahmad M. Almasabi, Ahmad B. Alkhodre, Maher Khemakhem, Fathy Eassa, Adnan Ahmed Abi Sen and Ahmed Harbaoui
Information 2025, 16(5), 406; https://doi.org/10.3390/info16050406 - 15 May 2025
Cited by 6 | Viewed by 3209
Abstract
IoT environments have introduced diverse logistic support services into our lives and communities, in areas such as education, medicine, transportation, and agriculture. However, with new technologies and services, the issue of privacy and data security has become more urgent. Moreover, the rapid changes [...] Read more.
IoT environments have introduced diverse logistic support services into our lives and communities, in areas such as education, medicine, transportation, and agriculture. However, with new technologies and services, the issue of privacy and data security has become more urgent. Moreover, the rapid changes in IoT and the capabilities of attacks have highlighted the need for an adaptive and reliable framework. In this study, we applied the proposed simulation to the proposed hybrid framework, making use of deep learning to continue monitoring IoT data; we also used the blockchain association in the framework to log, tackle, manage, and document all of the IoT sensor’s data points. Five sensors were run in a SimPy simulation environment to check and examine our framework’s capability in a real-time IoT environment; deep learning (ANN) and the blockchain technique were integrated to enhance the efficiency of detecting certain attacks (benign, part of a horizontal port scan, attack, C&C, Okiru, DDoS, and file download) and to continue logging all of the IoT sensor data, respectively. The comparison of different machine learning (ML) models showed that the DL outperformed all of them. Interestingly, the evaluation results showed a mature and moderate level of accuracy and precision and reached 97%. Moreover, the proposed framework confirmed superior performance under varied conditions like diverse attack types and network sizes comparing to other approaches. It can improve its performance over time and can detect anomalies in real-time IoT environments. Full article
(This article belongs to the Special Issue Machine Learning for the Blockchain)
Show Figures

Figure 1

25 pages, 13569 KB  
Article
Enhancing Aerodynamic Performance of Horizontal Axis Wind Turbine Blade Aerodynamic Performance Under Rough Wall Condition Using Vortex Generators
by Yingjian Yang, Dian Wang, Hairui Zhang, Rongyu Zha, Guangxing Wu, Chang Cai, Jianhua Zhang and Qing’an Li
J. Mar. Sci. Eng. 2025, 13(3), 397; https://doi.org/10.3390/jmse13030397 - 21 Feb 2025
Cited by 4 | Viewed by 2101
Abstract
In the complex and harsh working environment of wind turbines, the horizontal axis wind turbine blade is increasingly confronted with the issue of surface roughening. It leads to a decrease and instability in the output power of the horizontal axis wind turbine. Vortex [...] Read more.
In the complex and harsh working environment of wind turbines, the horizontal axis wind turbine blade is increasingly confronted with the issue of surface roughening. It leads to a decrease and instability in the output power of the horizontal axis wind turbine. Vortex generator have emerged as a potential solution to this problem by regulating the flow patterns on the blade surface. This research focuses on exploring the impact of vortex generator on the aerodynamic performance of blades under rough wall condition by wind tunnel experiment and computational fluid dynamics simulation. It is important to improve the aerodynamic performance of horizontal axis wind turbine under rough condition. The results show that vortex generator changes the airfoil aerodynamic performance by slowing the stall angle of attack and increasing the ratio of lift-drag in some angles of attack. vortex generator delays the flow separation of the suction surface under the rough wall condition. It is able to counteract the reduction in the aerodynamic performance of blade under rough wall condition. At tip speed ratio is 5.83, vortex generator increased power coefficient by 47.8% under rough wall condition by reducing the flow separation area of 33% radius and weakening the spanwise flow. The study found that the vortex generator effectively eliminated the negative effects of blade surface roughening on aerodynamic performance, improved the roughness insensitivity of the blade, and has good potential for future applications. Full article
(This article belongs to the Section Ocean Engineering)
Show Figures

Figure 1

21 pages, 12530 KB  
Article
Optimization of Configuration Design for Underwater Dam Defect Detection Vehicles
by Hong-Xia Cheng, Mei-Jie Cao, Peng-Fei Xu, Yan Kai, Zi-Peng Wang, Gang Wan and Qiao Hu
J. Mar. Sci. Eng. 2025, 13(2), 192; https://doi.org/10.3390/jmse13020192 - 21 Jan 2025
Cited by 3 | Viewed by 1509
Abstract
Hydropower stations and dams play a crucial role in water management, ecology, and energy. To meet the requirements of underwater dam defect detection, this study develops a streamlined underwater vehicle design and operational framework inspired by bionic principles. A parametric modeling approach was [...] Read more.
Hydropower stations and dams play a crucial role in water management, ecology, and energy. To meet the requirements of underwater dam defect detection, this study develops a streamlined underwater vehicle design and operational framework inspired by bionic principles. A parametric modeling approach was employed to propose the vehicle’s streamlined configuration. Using CFD simulations, hydrodynamic coefficients were calculated and validated through towing experiments in a pool. The hydrodynamic stability of the vehicle was assessed and verified through these analyses. Additionally, various configurations were generated using a free deformation method. An optimization function was established with resistance and stability as the objectives, and the optimal result was derived based on the function’s calculation outcomes. The study designed a high-metacentric underwater vehicle, inspired by the seahorse’s shape, and introduced a novel stability evaluation method. Simulations were conducted to analyze the vehicle’s variable attack angle, drift angle, pitching, and rotational motion at a forward three-throttle speed. The results demonstrate that the vehicle achieves static stability in both the horizontal and vertical planes, as well as dynamic stability in the vertical plane, but exhibits limited dynamic stability in the horizontal plane. After optimizing the original configuration, the forward resistance was reduced by 2.15%, while the horizontal plane dynamic stability criterion CH was improved by 35.29%. Full article
Show Figures

Figure 1

Back to TopTop