Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (694)

Search Parameters:
Keywords = leakage management

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
42 pages, 5651 KiB  
Article
Towards a Trustworthy Rental Market: A Blockchain-Based Housing System Architecture
by Ching-Hsi Tseng, Yu-Heng Hsieh, Yen-Yu Chang and Shyan-Ming Yuan
Electronics 2025, 14(15), 3121; https://doi.org/10.3390/electronics14153121 - 5 Aug 2025
Abstract
This study explores the transformative potential of blockchain technology in overhauling conventional housing rental systems. It specifically addresses persistent issues, such as information asymmetry, fraudulent listings, weak Rental Agreements, and data breaches. A comprehensive review of ten academic publications highlights the architectural frameworks, [...] Read more.
This study explores the transformative potential of blockchain technology in overhauling conventional housing rental systems. It specifically addresses persistent issues, such as information asymmetry, fraudulent listings, weak Rental Agreements, and data breaches. A comprehensive review of ten academic publications highlights the architectural frameworks, underlying technologies, and myriad benefits of decentralized rental platforms. The intrinsic characteristics of blockchain—immutability, transparency, and decentralization—are pivotal in enhancing the credibility of rental information and proactively preventing fraudulent activities. Smart contracts emerge as a key innovation, enabling the automated execution of Rental Agreements, thereby significantly boosting efficiency and minimizing reliance on intermediaries. Furthermore, Decentralized Identity (DID) solutions offer a robust mechanism for securely managing identities, effectively mitigating risks associated with data leakage, and fostering a more trustworthy environment. The suitability of platforms such as Hyperledger Fabric for developing such sophisticated rental systems is also critically evaluated. Blockchain-based systems promise to dramatically increase market transparency, bolster transaction security, and enhance fraud prevention. They also offer streamlined processes for dispute resolution. Despite these significant advantages, the widespread adoption of blockchain in the rental sector faces several challenges. These include inherent technological complexity, adoption barriers, the need for extensive legal and regulatory adaptation, and critical privacy concerns (e.g., ensuring compliance with GDPR). Furthermore, blockchain scalability limitations and the intricate balance between data immutability and the necessity for occasional data corrections present considerable hurdles. Future research should focus on developing user-friendly DID solutions, enhancing blockchain performance and cost-efficiency, strengthening smart contract security, optimizing the overall user experience, and exploring seamless integration with emerging technologies. While current challenges are undeniable, blockchain technology offers a powerful suite of tools for fundamentally improving the rental market’s efficiency, transparency, and security, exhibiting significant potential to reshape the entire rental ecosystem. Full article
(This article belongs to the Special Issue Blockchain Technologies: Emerging Trends and Real-World Applications)
Show Figures

Figure 1

27 pages, 815 KiB  
Article
Material Flow Analysis for Demand Forecasting and Lifetime-Based Inflow in Indonesia’s Plastic Bag Supply Chain
by Erin Octaviani, Ilyas Masudin, Amelia Khoidir and Dian Palupi Restuputri
Logistics 2025, 9(3), 105; https://doi.org/10.3390/logistics9030105 - 5 Aug 2025
Abstract
Background: this research presents an integrated approach to enhancing the sustainability of plastic bag supply chains in Indonesia by addressing critical issues related to ineffective post-consumer waste management and low recycling rates. The objective of this study is to develop a combined [...] Read more.
Background: this research presents an integrated approach to enhancing the sustainability of plastic bag supply chains in Indonesia by addressing critical issues related to ineffective post-consumer waste management and low recycling rates. The objective of this study is to develop a combined framework of material flow analysis (MFA) and sustainable supply chain planning to improve demand forecasting and inflow management across the plastic bag lifecycle. Method: the research adopts a quantitative method using the XGBoost algorithm for forecasting and is supported by a polymer-based MFA framework that maps material flows from production to end-of-life stages. Result: the findings indicate that while production processes achieve high efficiency with a yield of 89%, more than 60% of plastic bag waste remains unmanaged after use. Moreover, scenario analysis demonstrates that single interventions are insufficient to achieve circularity targets, whereas integrated strategies (e.g., reducing export volumes, enhancing waste collection, and improving recycling performance) are more effective in increasing recycling rates beyond 35%. Additionally, the study reveals that increasing domestic recycling capacity and minimizing dependency on exports can significantly reduce environmental leakage and strengthen local waste management systems. Conclusions: the study’s novelty lies in demonstrating how machine learning and material flow data can be synergized to inform circular supply chain decisions and regulatory planning. Full article
(This article belongs to the Section Sustainable Supply Chains and Logistics)
Show Figures

Figure 1

23 pages, 4456 KiB  
Article
Assessing Climate Change Impacts on Groundwater Recharge and Storage Using MODFLOW in the Akhangaran River Alluvial Aquifer, Eastern Uzbekistan
by Azam Kadirkhodjaev, Dmitriy Andreev, Botir Akramov, Botirjon Abdullaev, Zilola Abdujalilova, Zulkhumar Umarova, Dilfuza Nazipova, Izzatullo Ruzimov, Shakhriyor Toshev, Erkin Anorboev, Nodirjon Rakhimov, Farrukh Mamirov, Inessa Gracheva and Samrit Luoma
Water 2025, 17(15), 2291; https://doi.org/10.3390/w17152291 - 1 Aug 2025
Viewed by 280
Abstract
A shallow quaternary sedimentary aquifer within the river alluvial deposits of eastern Uzbekistan is increasingly vulnerable to the impacts of climate change and anthropogenic activities. Despite its essential role in supplying water for domestic, agricultural, and industrial purposes, the aquifer system remains poorly [...] Read more.
A shallow quaternary sedimentary aquifer within the river alluvial deposits of eastern Uzbekistan is increasingly vulnerable to the impacts of climate change and anthropogenic activities. Despite its essential role in supplying water for domestic, agricultural, and industrial purposes, the aquifer system remains poorly understood. This study employed a three-dimensional MODFLOW-based groundwater flow model to assess climate change impacts on water budget components under the SSP5-8.5 scenario for 2020–2099. Model calibration yielded RMSE values between 0.25 and 0.51 m, indicating satisfactory performance. Simulations revealed that lateral inflows from upstream and side-valley alluvial deposits contribute over 84% of total inflow, while direct recharge from precipitation (averaging 120 mm/year, 24.7% of annual rainfall) and riverbed leakage together account for only 11.4%. Recharge occurs predominantly from November to April, with no recharge from June to August. Under future scenarios, winter recharge may increase by up to 22.7%, while summer recharge could decline by up to 100%. Groundwater storage is projected to decrease by 7.3% to 58.3% compared to 2010–2020, indicating the aquifer’s vulnerability to prolonged dry periods. These findings emphasize the urgent need for adaptive water management strategies and long-term monitoring to ensure sustainable groundwater use under changing climate conditions. Full article
(This article belongs to the Special Issue Climate Change Uncertainties in Integrated Water Resources Management)
Show Figures

Figure 1

19 pages, 1072 KiB  
Article
Efficient and Reliable Identification of Probabilistic Cloning Attacks in Large-Scale RFID Systems
by Chu Chu, Rui Wang, Nanbing Deng and Gang Li
Micromachines 2025, 16(8), 894; https://doi.org/10.3390/mi16080894 (registering DOI) - 31 Jul 2025
Viewed by 152
Abstract
Radio Frequency Identification (RFID) technology is widely applied in various scenarios, including logistics tracking, supply chain management, and target monitoring. In these contexts, the malicious cloning of legitimate tag information can lead to sensitive data leakage and disrupt the normal acquisition of tag [...] Read more.
Radio Frequency Identification (RFID) technology is widely applied in various scenarios, including logistics tracking, supply chain management, and target monitoring. In these contexts, the malicious cloning of legitimate tag information can lead to sensitive data leakage and disrupt the normal acquisition of tag information by readers, thereby threatening personal privacy and corporate security and incurring significant economic losses. Although some efforts have been made to detect cloning attacks, the presence of missing tags in RFID systems can obscure cloned ones, resulting in a significant reduction in identification efficiency and accuracy. To address these problems, we propose the block-based cloned tag identification (BCTI) protocol for identifying cloning attacks in the presence of missing tags. First, we introduce a block indicator to sort all tags systematically and design a block mechanism that enables tags to respond repeatedly within a block with minimal time overhead. Then, we design a superposition strategy to further reduce the number of verification times, thereby decreasing the execution overhead. Through an in-depth analysis of potential tag response patterns, we develop a precise method to identify cloning attacks and mitigate interference from missing tags in probabilistic cloning attack scenarios. Moreover, we perform parameter optimization of the BCTI protocol and validate its performance across diverse operational scenarios. Extensive simulation results demonstrate that the BCTI protocol meets the required identification reliability threshold and achieves an average improvement of 24.01% in identification efficiency compared to state-of-the-art solutions. Full article
Show Figures

Figure 1

39 pages, 14288 KiB  
Article
Design and Performance Study of a Magnetic Flux Leakage Pig for Subsea Pipeline Defect Detection
by Fei Qu, Shengtao Chen, Meiyu Zhang, Kang Zhang and Yongjun Gong
J. Mar. Sci. Eng. 2025, 13(8), 1462; https://doi.org/10.3390/jmse13081462 - 30 Jul 2025
Viewed by 267
Abstract
Subsea pipelines, operating in high-pressure and high-salinity conditions, face ongoing risks of leakage. Pipeline leaks can pollute the marine environment and, in severe cases, cause safety incidents, endangering human lives and property. Regular integrity inspections of subsea pipelines are critical to prevent corrosion-related [...] Read more.
Subsea pipelines, operating in high-pressure and high-salinity conditions, face ongoing risks of leakage. Pipeline leaks can pollute the marine environment and, in severe cases, cause safety incidents, endangering human lives and property. Regular integrity inspections of subsea pipelines are critical to prevent corrosion-related leaks. This study develops a magnetic flux leakage (MFL)-based pig for detecting corrosion in subsea pipelines. Using a three-dimensional finite element model, this study analyzes the effects of defect geometry, lift-off distance, and operating speed on MFL signals. It proposes a defect estimation method based on axial peak-to-valley values and radial peak spacing, with inversion accuracy validated against simulation results. This study establishes a theoretical and practical framework for subsea pipeline integrity management, providing an effective solution for corrosion monitoring. Full article
(This article belongs to the Special Issue Theoretical Research and Design of Subsea Pipelines)
Show Figures

Figure 1

23 pages, 1019 KiB  
Article
Deciphering the Environmental Consequences of Competition-Induced Cost Rationalization Strategies of the High-Tech Industry: A Synergistic Combination of Advanced Machine Learning and Method of Moments Quantile Regression Procedures
by Salih Çağrı İlkay, Harun Kınacı and Esra Betül Kınacı
Sustainability 2025, 17(15), 6867; https://doi.org/10.3390/su17156867 - 28 Jul 2025
Viewed by 520
Abstract
This study intends to portray how varying degrees of environmental policy stringency and the growing pressure of global competition reflect on high-tech (HT) sectors’ cost rationalization strategies and lead to environmental consequences in 15 G20 countries (1992–2019). Moreover, we center the pattern of [...] Read more.
This study intends to portray how varying degrees of environmental policy stringency and the growing pressure of global competition reflect on high-tech (HT) sectors’ cost rationalization strategies and lead to environmental consequences in 15 G20 countries (1992–2019). Moreover, we center the pattern of cost rationalization management regarding the opportunity cost of ecosystem service consumption and propose to test the fundamental hypothesis stating the possible transmission of competition-induced technological innovations to green economic transformation. Our new methodology estimates quantile-specific effects with MM-QR, while identifying the main interaction effects between regulatory pressure and trade competition uses an extended STIRPAT model. The results reveal a paradoxical finding: despite higher environmental policy stringency and opportunity costs of ecosystem services, HT sectors persistently adopt environmentally detrimental cost-reduction approaches. These findings carry important policy implications: (1) environmental regulations for HT sectors require complementary innovation subsidies, (2) trade agreements should incorporate clean technology transfer clauses, and (3) governments must monitor sectoral emission leakage risks. Our dual machine learning–econometric approach provides policymakers with targeted insights for different emission scenarios, highlighting the need for differentiated strategies across clean and polluting HT subsectors. Full article
Show Figures

Figure 1

22 pages, 1156 KiB  
Article
An Attribute-Based Proxy Re-Encryption Scheme Supporting Revocable Access Control
by Gangzheng Zhao, Weijie Tan and Changgen Peng
Electronics 2025, 14(15), 2988; https://doi.org/10.3390/electronics14152988 - 26 Jul 2025
Viewed by 259
Abstract
In the deep integration process between digital infrastructure and new economic forms, structural imbalance between the evolution rate of cloud storage technology and the growth rate of data-sharing demands has caused systemic security vulnerabilities such as blurred data sovereignty boundaries and nonlinear surges [...] Read more.
In the deep integration process between digital infrastructure and new economic forms, structural imbalance between the evolution rate of cloud storage technology and the growth rate of data-sharing demands has caused systemic security vulnerabilities such as blurred data sovereignty boundaries and nonlinear surges in privacy leakage risks. Existing academic research indicates current proxy re-encryption schemes remain insufficient for cloud access control scenarios characterized by diversified user requirements and personalized permission management, thus failing to fulfill the security needs of emerging computing paradigms. To resolve these issues, a revocable attribute-based proxy re-encryption scheme supporting policy-hiding is proposed. Data owners encrypt data and upload it to the blockchain while concealing attribute values within attribute-based encryption access policies, effectively preventing sensitive information leaks and achieving fine-grained secure data sharing. Simultaneously, proxy re-encryption technology enables verifiable outsourcing of complex computations. Furthermore, the SM3 (SM3 Cryptographic Hash Algorithm) hash function is embedded in user private key generation, and key updates are executed using fresh random factors to revoke malicious users. Ultimately, the scheme proves indistinguishability under chosen-plaintext attacks for specific access structures in the standard model. Experimental simulations confirm that compared with existing schemes, this solution delivers higher execution efficiency in both encryption/decryption and revocation phases. Full article
(This article belongs to the Topic Recent Advances in Security, Privacy, and Trust)
Show Figures

Figure 1

19 pages, 9109 KiB  
Article
Metformin Enhances Doxycycline Efficacy Against Pasteurella multocida: Evidence from In Vitro, In Vivo, and Morphological Studies
by Nansong Jiang, Weiwei Wang, Qizhang Liang, Qiuling Fu, Rongchang Liu, Guanghua Fu, Chunhe Wan, Longfei Cheng, Yu Huang and Hongmei Chen
Microorganisms 2025, 13(8), 1724; https://doi.org/10.3390/microorganisms13081724 - 23 Jul 2025
Viewed by 252
Abstract
Pasteurella multocida (Pm) is a zoonotic pathogen that poses a significant threat to animal health and causes substantial economic losses, further aggravated by rising tetracycline resistance. To restore the efficacy of tetracyclines to Pm, we evaluated the synergistic antibacterial activity [...] Read more.
Pasteurella multocida (Pm) is a zoonotic pathogen that poses a significant threat to animal health and causes substantial economic losses, further aggravated by rising tetracycline resistance. To restore the efficacy of tetracyclines to Pm, we evaluated the synergistic antibacterial activity of doxycycline combined with metformin, an FDA-approved antidiabetic agent. Among several non-antibiotic adjuvant candidates, metformin exhibited the most potent in vitro synergy with doxycycline, especially against capsular serogroup A strain (PmA). The combination demonstrated minimal cytotoxicity and hemolysis in both mammalian and avian cells and effectively inhibited resistance development under doxycycline pressure. At 50 mg/kg each, the combination of metformin and doxycycline significantly reduced mortality in mice and ducks acutely infected with PmA (from 100% to 60%), decreased pulmonary bacterial burdens, and alleviated tissue inflammation and damage. Mechanistic validation confirmed that metformin enhances membrane permeability in Pm without compromising membrane integrity, dissipates membrane potential, increases intracellular doxycycline accumulation, and downregulates the transcription of the tetracycline efflux gene tet(B). Morphological analyses further revealed pronounced membrane deformation and possible leakage of intracellular contents. These findings highlight metformin as a potent, low-toxicity tetracycline adjuvant with cross-species efficacy, offering a promising therapeutic approach for managing tetracycline-resistant Pm infections. Full article
(This article belongs to the Section Veterinary Microbiology)
Show Figures

Figure 1

13 pages, 1373 KiB  
Article
A Comparative Plant Growth Study of a Sprayable, Degradable Polyester–Urethane–Urea Mulch and Two Commercial Plastic Mulches
by Cuyler Borrowman, Karen Little, Raju Adhikari, Kei Saito, Stuart Gordon and Antonio F. Patti
Agriculture 2025, 15(15), 1581; https://doi.org/10.3390/agriculture15151581 - 23 Jul 2025
Viewed by 317
Abstract
The practice in agriculture of spreading polyethylene (PE) film over the soil surface as mulch is a common, global practice that aids in conserving water, increasing crop yields, suppressing weed growth, and decreasing growing time. However, these films are typically only used for [...] Read more.
The practice in agriculture of spreading polyethylene (PE) film over the soil surface as mulch is a common, global practice that aids in conserving water, increasing crop yields, suppressing weed growth, and decreasing growing time. However, these films are typically only used for a single growing season, and thus, their use and non-biodegradability come with some serious environmental consequences due to their persistence in the soil and potential for microplastic pollution, particularly when retrieval and disposal options are poor. On the microscale, particles < 5 mm from degraded films have been observed to disrupt soil structure, impede water and nutrient cycling, and affect soil organisms and plant health. On the macroscale, there are obvious and serious environmental consequences associated with the burning of plastic film and its leakage from poorly managed landfills. To maintain the crop productivity afforded by mulching with PE film while avoiding the environmental downsides, the development and use of biodegradable polymer technologies is being explored. Here, the efficacy of a newly developed, water-dispersible, sprayable, and biodegradable polyester–urethane–urea (PEUU)-based polymer was compared with two commercial PE mulches, non-degradable polyethylene (NPE) and OPE (ox-degradable polyethylene), in a greenhouse tomato growth trial. Water savings and the effects on plant growth and soil characteristics were studied. It was found that PEUU provided similar water savings to the commercial PE-based mulches, up to 30–35%, while showing no deleterious effects on plant growth. The results should be taken as preliminary indications that the sprayable, biodegradable PEUU shows promise as a replacement for PE mulch, with further studies under outside field conditions warranted to assess its cost effectiveness in improving crop yields and, importantly, its longer-term impacts on soil and terrestrial fauna. Full article
Show Figures

Figure 1

18 pages, 2960 KiB  
Article
Early Leak and Burst Detection in Water Pipeline Networks Using Machine Learning Approaches
by Kiran Joseph, Jyoti Shetty, Rahul Patnaik, Noel S. Matthew, Rudi Van Staden, Wasantha P. Liyanage, Grant Powell, Nathan Bennett and Ashok K. Sharma
Water 2025, 17(14), 2164; https://doi.org/10.3390/w17142164 - 21 Jul 2025
Viewed by 484
Abstract
Leakages in water distribution networks pose a formidable challenge, often leading to substantial water wastage and escalating operational costs. Traditional methods for leak detection often fall short, particularly when dealing with complex or subtle data patterns. To address this, a comprehensive comparison of [...] Read more.
Leakages in water distribution networks pose a formidable challenge, often leading to substantial water wastage and escalating operational costs. Traditional methods for leak detection often fall short, particularly when dealing with complex or subtle data patterns. To address this, a comprehensive comparison of fourteen machine learning algorithms was conducted, with evaluation based on key performance metrics such as multi-class classification metrics, micro and macro averages, accuracy, precision, recall, and F1-score. The data, collected from an experimental site under leak, major leak, and no-leak scenarios, was used to perform multi-class classification. The results highlight the superiority of models such as Random Forest, K-Nearest Neighbours, and Decision Tree in detecting leaks with high accuracy and robustness. Multiple models effectively captured the nuances in the data and accurately predicted the presence of a leak, burst, or no leak, thus automating leak detection and contributing to water conservation efforts. This research demonstrates the practical benefits of applying machine learning models in water distribution systems, offering scalable solutions for real-time leak detection. Furthermore, it emphasises the role of machine learning in modernising infrastructure management, reducing water losses, and promoting the sustainability of water resources, while laying the groundwork for future advancements in predictive maintenance and resilience of water infrastructure. Full article
(This article belongs to the Special Issue Urban Water Resources: Sustainable Management and Policy Needs)
Show Figures

Figure 1

30 pages, 1042 KiB  
Article
A Privacy-Preserving Polymorphic Heterogeneous Security Architecture for Cloud–Edge Collaboration Industrial Control Systems
by Yukun Niu, Xiaopeng Han, Chuan He, Yunfan Wang, Zhigang Cao and Ding Zhou
Appl. Sci. 2025, 15(14), 8032; https://doi.org/10.3390/app15148032 - 18 Jul 2025
Viewed by 249
Abstract
Cloud–edge collaboration industrial control systems (ICSs) face critical security and privacy challenges that existing dynamic heterogeneous redundancy (DHR) architectures inadequately address due to two fundamental limitations: event-triggered scheduling approaches that amplify common-mode escape impacts in resource-constrained environments, and insufficient privacy-preserving arbitration mechanisms for [...] Read more.
Cloud–edge collaboration industrial control systems (ICSs) face critical security and privacy challenges that existing dynamic heterogeneous redundancy (DHR) architectures inadequately address due to two fundamental limitations: event-triggered scheduling approaches that amplify common-mode escape impacts in resource-constrained environments, and insufficient privacy-preserving arbitration mechanisms for sensitive industrial data processing. In contrast to existing work that treats scheduling and privacy as separate concerns, this paper proposes a unified polymorphic heterogeneous security architecture that integrates hybrid event–time triggered scheduling with adaptive privacy-preserving arbitration, specifically designed to address the unique challenges of cloud–edge collaboration ICSs where both security resilience and privacy preservation are paramount requirements. The architecture introduces three key innovations: (1) a hybrid event–time triggered scheduling algorithm with credibility assessment and heterogeneity metrics to mitigate common-mode escape scenarios, (2) an adaptive privacy budget allocation mechanism that balances privacy protection effectiveness with system availability based on attack activity levels, and (3) a unified framework that organically integrates privacy-preserving arbitration with heterogeneous redundancy management. Comprehensive evaluations using natural gas pipeline pressure control and smart grid voltage control systems demonstrate superior performance: the proposed method achieves 100% system availability compared to 62.57% for static redundancy and 86.53% for moving target defense, maintains 99.98% availability even under common-mode attacks (102 probability), and consistently outperforms moving target defense methods integrated with state-of-the-art detection mechanisms (99.7790% and 99.6735% average availability when false data deviations from true values are 5% and 3%, respectively) across different attack detection scenarios, validating its effectiveness in defending against availability attacks and privacy leakage threats in cloud–edge collaboration environments. Full article
Show Figures

Figure 1

22 pages, 7778 KiB  
Article
Gas Leak Detection and Leakage Rate Identification in Underground Utility Tunnels Using a Convolutional Recurrent Neural Network
by Ziyang Jiang, Canghai Zhang, Zhao Xu and Wenbin Song
Appl. Sci. 2025, 15(14), 8022; https://doi.org/10.3390/app15148022 - 18 Jul 2025
Viewed by 289
Abstract
An underground utility tunnel (UUT) is essential for the efficient use of urban underground space. However, current maintenance systems rely on patrol personnel and professional equipment. This study explores industrial detection methods for identifying and monitoring natural gas leaks in UUTs. Via infrared [...] Read more.
An underground utility tunnel (UUT) is essential for the efficient use of urban underground space. However, current maintenance systems rely on patrol personnel and professional equipment. This study explores industrial detection methods for identifying and monitoring natural gas leaks in UUTs. Via infrared thermal imaging gas experiments, data were acquired and a dataset established. To address the low-resolution problem of existing imaging devices, video super-resolution (VSR) was used to improve the data quality. Based on a convolutional recurrent neural network (CRNN), the image features at each moment were extracted, and the time series data were modeled to realize the risk-level classification mechanism based on the automatic classification of the leakage rate. The experimental results show that when the sliding window size was set to 10 frames, the classification accuracy of the CRNN was the highest, which could reach 0.98. This method improves early warning precision and response efficiency, offering practical technical support for UUT maintenance management. Full article
(This article belongs to the Special Issue Applications of Artificial Intelligence in Industrial Engineering)
Show Figures

Figure 1

21 pages, 1500 KiB  
Article
Concurrent Acute Appendicitis and Cholecystitis: A Systematic Literature Review
by Adem Tuncer, Sami Akbulut, Emrah Sahin, Zeki Ogut and Ertugrul Karabulut
J. Clin. Med. 2025, 14(14), 5019; https://doi.org/10.3390/jcm14145019 - 15 Jul 2025
Viewed by 483
Abstract
Background: This systematic review aimed to comprehensively evaluate the clinical, diagnostic, and therapeutic features of synchronous acute cholecystitis (AC) and acute appendicitis (AAP). Methods: The review protocol was prospectively registered in PROSPERO (CRD420251086131) and conducted in accordance with PRISMA 2020 guidelines. [...] Read more.
Background: This systematic review aimed to comprehensively evaluate the clinical, diagnostic, and therapeutic features of synchronous acute cholecystitis (AC) and acute appendicitis (AAP). Methods: The review protocol was prospectively registered in PROSPERO (CRD420251086131) and conducted in accordance with PRISMA 2020 guidelines. A systematic search was performed across PubMed, MEDLINE, Web of Science, Scopus, Google Scholar, and Google databases for studies published from January 1975 to May 2025. Search terms included variations of “synchronous,” “simultaneous,” “concurrent,” and “coexistence” combined with “appendicitis,” “appendectomy,” “cholecystitis,” and “cholecystectomy.” Reference lists of included studies were screened. Studies reporting human cases with sufficient patient-level clinical data were included. Data extraction and quality assessment were performed independently by pairs of reviewers, with discrepancies resolved through consensus. No meta-analysis was conducted due to the descriptive nature of the data. Results: A total of 44 articles were included in this review. Of these, thirty-four were available in full text, one was accessible only as an abstract, and one was a literature review, while eight articles were inaccessible. Clinical data from forty patients, including two from our own cases, were evaluated, with a median age of 41 years. The gender distribution was equal, with a median age of 50 years among male patients and 36 years among female patients. Leukocytosis was observed in 25 of 33 patients with available laboratory data. Among 37 patients with documented diagnostic methods, ultrasonography and computed tomography were the most frequently utilized modalities, followed by physical examination. Twenty-seven patients underwent laparoscopic cholecystectomy and appendectomy. The remaining patients were managed with open surgery or conservative treatment. Postoperative complications occurred in five patients, including sepsis, perforation, leakage, diarrhea, and wound infections. Histopathological analysis revealed AAP in 25 cases and AC in 14. Additional findings included gangrenous inflammation and neoplastic lesions. Conclusions: Synchronous AC and AAP are rare and diagnostically challenging conditions. Early recognition via imaging and clinical evaluation is critical. Laparoscopic management remains the preferred approach. Histopathological examination of surgical specimens is essential for identifying unexpected pathology, thereby guiding appropriate patient management. Full article
(This article belongs to the Section Gastroenterology & Hepatopancreatobiliary Medicine)
Show Figures

Figure 1

27 pages, 3950 KiB  
Review
Termite Detection Techniques in Embankment Maintenance: Methods and Trends
by Xiaoke Li, Xiaofei Zhang, Shengwen Dong, Ansheng Li, Liqing Wang and Wuyi Ming
Sensors 2025, 25(14), 4404; https://doi.org/10.3390/s25144404 - 15 Jul 2025
Viewed by 464
Abstract
Termites pose significant threats to the structural integrity of embankments due to their nesting and tunneling behavior, which leads to internal voids, water leakage, or even dam failure. This review systematically classifies and evaluates current termite detection techniques in the context of embankment [...] Read more.
Termites pose significant threats to the structural integrity of embankments due to their nesting and tunneling behavior, which leads to internal voids, water leakage, or even dam failure. This review systematically classifies and evaluates current termite detection techniques in the context of embankment maintenance, focusing on physical sensing technologies and biological characteristic-based methods. Physical sensing methods enable non-invasive localization of subsurface anomalies, including ground-penetrating radar, acoustic detection, and electrical resistivity imaging. Biological characteristic-based methods, such as electronic noses, sniffer dogs, visual inspection, intelligent monitoring, and UAV-based image analysis, are capable of detecting volatile compounds and surface activity signs associated with termites. The review summarizes key principles, application scenarios, advantages, and limitations of each technique. It also highlights integrated multi-sensor frameworks and artificial intelligence algorithms as emerging solutions to enhance detection accuracy, adaptability, and automation. The findings suggest that future termite detection in embankments will rely on interdisciplinary integration and intelligent monitoring systems to support early warning, rapid response, and long-term structural resilience. This work provides a scientific foundation and practical reference for advancing termite management and embankment safety strategies. Full article
(This article belongs to the Section Physical Sensors)
Show Figures

Figure 1

9 pages, 2589 KiB  
Case Report
Hit and Miss: Trauma Pancreatoduodenectomy in the Setting of Penetrating Vascular Injury
by Jessica Falon, Krishna Kotecha, Wafa Araz Mokari, Anubhav Mittal and Jaswinder Samra
Trauma Care 2025, 5(3), 17; https://doi.org/10.3390/traumacare5030017 - 14 Jul 2025
Viewed by 226
Abstract
This case report describes index pancreatoduodenectomy in a 32-year-old male following a close-range gunshot wound to the abdomen, with consequent 4 cm pancreatic head defect, duodenal and common bile duct perforation, right kidney laceration, and through-and-through inferior vena cava (IVC) injury. Although standard [...] Read more.
This case report describes index pancreatoduodenectomy in a 32-year-old male following a close-range gunshot wound to the abdomen, with consequent 4 cm pancreatic head defect, duodenal and common bile duct perforation, right kidney laceration, and through-and-through inferior vena cava (IVC) injury. Although standard trauma protocols often favor damage control surgery (DCS) with delayed reconstruction in unstable patients, this patient’s hemodynamic stability—attributed to retroperitoneal self-tamponade—enabled a single-stage definitive approach. The rationale for immediate reconstruction was to prevent the risks associated with delayed management, such as ongoing pancreatic and biliary leakage, chemical peritonitis, and subsequent sepsis or hemorrhage. This case highlights that, in select stable patients with severe pancreaticoduodenal trauma, immediate pancreatoduodenectomy may be preferable to DCS, provided care is delivered in a high-volume hepatopancreaticobiliary (HPB) center with appropriate expertise and resources. Full article
Show Figures

Figure 1

Back to TopTop