Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (40)

Search Parameters:
Keywords = mandatory rotation

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
21 pages, 1172 KB  
Article
An Examination of LPWAN Security in Maritime Applications
by Zachary Larkin and Chuck Easttom
J. Cybersecur. Priv. 2026, 6(2), 65; https://doi.org/10.3390/jcp6020065 - 3 Apr 2026
Viewed by 306
Abstract
LoRaWAN’s role in global maritime logistics has allowed for efficient monitoring of ships and cargo, but it also comes with critical cybersecurity vulnerabilities. Experimental validation of three attack vectors—replay attacks, narrowband jamming and metadata inference—is conducted using a reproducible digital-twin LoRaWAN dataset reflecting [...] Read more.
LoRaWAN’s role in global maritime logistics has allowed for efficient monitoring of ships and cargo, but it also comes with critical cybersecurity vulnerabilities. Experimental validation of three attack vectors—replay attacks, narrowband jamming and metadata inference—is conducted using a reproducible digital-twin LoRaWAN dataset reflecting Rotterdam port-like operational patterns (N = 20,000 baseline transmissions). Using controlled simulations and Kolmogorov–Smirnov statistical analysis, we show that: (1) replay attacks are feasible under Activation by Personalization (ABP) configurations lacking enforced frame-counter validation and exhibit no univariate separation from legitimate traffic under Kolmogorov–Smirnov analysis (p > 0.46 for all evaluated radio features); (2) narrowband jamming leads to significant SNR degradation (p = 2.36 × 10−5) on targeted channels without inducing broad distributional anomalies across other radio features; and (3) metadata-only analysis supports elevated metadata-based re-identification susceptibility (median Rd=0.834), indicating high predictability under passive observation which can reveal operationally relevant signals even when AES-128 is employed. Our proposed layered mitigation framework consists of mandatory Over-the-Air Activation (OTAA), cryptographic key rotation, channel diversity incorporating Adaptive Data Rate (ADR), gateway hardening, and protocol-level enforcement considerations, customized for maritime LPWAN scenarios. We provide experiment-backed evidence and actionable recommendations to connect academic LPWAN security research to that of industrial maritime practice. Full article
(This article belongs to the Special Issue Building Community of Good Practice in Cybersecurity)
Show Figures

Figure 1

17 pages, 15745 KB  
Article
The Influence of Hub Purge Flow Rate on Forced Response in a Low-Pressure Turbine
by Alexander Trafford, Sina Stapelfeldt, Gustavo Lopes and Sergio Lavagnoli
Int. J. Turbomach. Propuls. Power 2026, 11(1), 12; https://doi.org/10.3390/ijtpp11010012 - 2 Mar 2026
Viewed by 303
Abstract
We present the results of a computational investigation into the influence of hub purge flow mass flow rate on the forcing amplitudes generated on a low-pressure turbine (LPT) rotor cascade by the upstream stator vane passing (SVP). Forcing of this kind is a [...] Read more.
We present the results of a computational investigation into the influence of hub purge flow mass flow rate on the forcing amplitudes generated on a low-pressure turbine (LPT) rotor cascade by the upstream stator vane passing (SVP). Forcing of this kind is a major driver of high cycle fatigue (HCF) in turbines; however, the influence of hub purge flow, which is mandatory to seal cavities between stationary and rotating rows in turbines and to protect working components from excessively high temperatures, is minimally understood. This study was carried out via time-accurate unsteady aeroelastic simulations of the SPLEEN turbine cascade and is validated against the extensive database of test results obtained for this geometry at the Von Karman Institute for Fluid Dynamics. The effect of purge mass flow rates of 0.5% and 0.9% of the main passage flow are evaluated through measurement of the blade’s unsteady pressure and modal force at the SVP and compared to the nominal ‘no purge’ case. The introduction of purge flow was shown to reduce the amplitude of the unsteady pressure signal on the blade surface at the hub. However, a change in the phase of the unsteady pressure on certain portions of the blade could still bring about an increase in modal force for certain modes. Full article
Show Figures

Figure 1

18 pages, 5229 KB  
Article
HF-EdgeFormer: A Hybrid High-Order Focus and Transformer-Based Model for Oral Ulcer Segmentation
by Dragoș-Ciprian Cornoiu and Călin-Adrian Popa
Electronics 2026, 15(3), 595; https://doi.org/10.3390/electronics15030595 - 29 Jan 2026
Viewed by 406
Abstract
Precise medical segmentation of oral ulcers is mandatory and crucial for early diagnosis, but it remains a very challenging task due to rich backgrounds, overexposed or underexposed lesions, and the complex surrounding areas. Therefore, in order to address this challenge, this paper introduces [...] Read more.
Precise medical segmentation of oral ulcers is mandatory and crucial for early diagnosis, but it remains a very challenging task due to rich backgrounds, overexposed or underexposed lesions, and the complex surrounding areas. Therefore, in order to address this challenge, this paper introduces HF-EdgeFormer, a novel hybrid model for oral ulcer segmentation on the AutoOral dataset. This U-shaped transformer-like architecture is, based on publicly available models, the second documented solution for oral ulcer segmentation and it explicitly integrates high-order frequency interactions by using multi-dimensional edge cues. At the encoding stage, a HFConv (High-order Focus Convolution) module divides the feature channels into local streams and global streams, performing learnable filtering via FFT and depth-wise convolutions. After that, it fuses them through stacks of focal transformers and attention gates. In addition to the HFConv block, there are two edge-aware units: the EdgeAware Localization module (that uses eight-direction Sobel filters) and a new Precision EdgeEnhance module (channel-wise Sobel fusion), both used in order to reinforce the boundaries. Skip connections imply Multi-dilated Attention Gates, accompanied by a Spacial-Channel Attention Bridge to accentuate lesion-consistent activations. Moreover, the novel architecture employs an innovative lightweight vision transformer-based bottleneck. It consists of four SegFormerBlock modules localized at the network’s deepest point, so we can achieve global relational modeling exactly where the largest receptive field is present. The model is trained on the AutoOral dataset (introduced by the same team that developed the HF-Unet arhitecture), but due to the limited available images, it needed to be extended by using extensive geometric and photometric augmentations (like RandomAffine, flips, and rotations). This novel architecture achieves a test Dice score of almost 82% and a little over 85% sensitivity while maintaining high precision and specificity, highly valuable in medical segmentation. These results surpass prior HF-UNet baselines while maintaining the model light, with minimal inference memory gains. Full article
(This article belongs to the Special Issue Artificial Intelligence and Deep Learning Techniques for Healthcare)
Show Figures

Figure 1

12 pages, 5832 KB  
Article
The Influence of Reaming Velocity During Preparation of the Femoral Canal—An In Vitro Analysis of Two Straight Femoral Revision Stems with a Fluted Tapered Design
by Oliver E. Bischel, Jörn B. Seeger, Matthias K. Jung, Stefan Dörfler, Arnold J. Höppchen, Alexander Jahnke and Eike Jakubowitz
Bioengineering 2025, 12(9), 984; https://doi.org/10.3390/bioengineering12090984 - 16 Sep 2025
Viewed by 786
Abstract
Background: The use of tapered fluted revision stems has been shown to be reliable and safe. Primary stability is mandatory for a long-lasting fixation between bone and a prosthesis. Nevertheless, aseptic loosening due to insufficient primary stability occurs and may be related to [...] Read more.
Background: The use of tapered fluted revision stems has been shown to be reliable and safe. Primary stability is mandatory for a long-lasting fixation between bone and a prosthesis. Nevertheless, aseptic loosening due to insufficient primary stability occurs and may be related to technically improper preparation of the femoral canal. Instructions of manufacturers are heterogeneous regarding preparation of implant beds. Questions/Purposes: Does speed or the design of the reamer influence the accuracy of the implant bed and, consecutively, primary stability? Materials and Methods: A test foam with an elastic moduli and pressure resistance similar to that of cancellous bone was used. The medullary canal was prepared with the use of reamers of two different straight and tapered femoral revision devices. Three different rotational speeds were used for preparation. After preparation, primary stability was measured and fixating characteristics were derived. Results: Sufficient primary stability was achievable by all three preparation methods but fixating characteristics were different. Significantly higher micro-motions were detected near the tip of the prosthesis compared to those at all more proximal measuring points. Reaming with high velocity resulted in significantly higher micro-motions compared to that with mid- or low-speed burring. Conclusions: Different preparation methods may be one explanation for the range of reported survivorship data of the two devices with aseptic loosening as the end point. The precision of the implant bed and fixating characteristics were best after reaming with lower velocity. Superior but not significantly better fixation characteristics were achieved with the monobloc stem compared to those with the modular device. Full article
(This article belongs to the Special Issue Joint Biomechanics and Implant Design)
Show Figures

Figure 1

25 pages, 2349 KB  
Article
Development of a Method for Determining Password Formation Rules Using Neural Networks
by Leila Rzayeva, Alissa Ryzhova, Merei Zhaparkhanova, Ali Myrzatay, Olzhas Konakbayev, Abilkair Imanberdi, Yussuf Ahmed and Zhaksylyk Kozhakhmet
Information 2025, 16(8), 655; https://doi.org/10.3390/info16080655 - 31 Jul 2025
Viewed by 3142
Abstract
According to the latest Verizon DBIR report, credential abuse, including password reuse and human factors in password creation, remains the leading attack vector. It was revealed that most users change their passwords only when they forget them, and 35% of respondents find mandatory [...] Read more.
According to the latest Verizon DBIR report, credential abuse, including password reuse and human factors in password creation, remains the leading attack vector. It was revealed that most users change their passwords only when they forget them, and 35% of respondents find mandatory password rotation policies inconvenient. These findings highlight the importance of combining technical solutions with user-focused education to strengthen password security. In this research, the “human factor in the creation of usernames and passwords” is considered a vulnerability, as identifying the patterns or rules used by users in password generation can significantly reduce the number of possible combinations that attackers need to try in order to gain access to personal data. The proposed method based on an LSTM model operates at a character level, detecting recurrent structures and generating generalized masks that reflect the most common components in password creation. Open datasets of 31,000 compromised passwords from real-world leaks were used to train the model and it achieved over 90% test accuracy without signs of overfitting. A new method of evaluating the individual password creation habits of users and automatically fetching context-rich keywords from a user’s public web and social media footprint via a keyword-extraction algorithm is developed, and this approach is incorporated into a web application that allows clients to locally fine-tune an LSTM model locally, run it through ONNX, and carry out all inference on-device, ensuring complete data confidentiality and adherence to privacy regulations. Full article
Show Figures

Figure 1

38 pages, 737 KB  
Article
To Hide Behind the Mask of Mandates: Disguised Opinion Shopping Under Mandatory Audit Firm Rotation and Retention in Korea
by Beu Lee
J. Risk Financial Manag. 2025, 18(8), 410; https://doi.org/10.3390/jrfm18080410 - 25 Jul 2025
Viewed by 2986
Abstract
This study investigates whether audit tenure mandates—designed to curb managerial discretion—may unintentionally enable disguised opinion shopping. Specifically, it examines whether firms benefit from observed mandates that align with their unobservable preferences, despite appearing to comply with mandatory audit firm rotation or retention rules. [...] Read more.
This study investigates whether audit tenure mandates—designed to curb managerial discretion—may unintentionally enable disguised opinion shopping. Specifically, it examines whether firms benefit from observed mandates that align with their unobservable preferences, despite appearing to comply with mandatory audit firm rotation or retention rules. A counterfactual framework is developed to estimate firms’ preference for switching or retention in the absence of regulation, allowing identification of strategic alignment under constraint. Empirical analysis using Korean data from 2000 to 2009 reveals that firms classified as disguised opinion shoppers are more likely to receive unmodified audit opinions and exhibit lower audit quality, as indicated by higher discretionary accruals and more frequent reporting irregularities. These effects are concentrated under mandatory retention and not observed under rotation, suggesting that forced auditor turnover weakens firms’ ability to secure favorable outcomes. Additional evidence shows that these firms are more likely to retain the same auditor after mandates expire, consistent with a reward-for-accommodation mechanism. Thus, this study not only provides empirical evidence that opinion shopping can persist under auditor tenure mandates, but also introduces a novel method for identifying such behavior when traditional signals—such as voluntary dismissals—are unavailable. These findings inform ongoing regulatory debates on the effectiveness of tenure-based reforms. Full article
(This article belongs to the Section Risk)
Show Figures

Figure 1

19 pages, 7225 KB  
Article
Utilization of MCU and Real-Time Simulator for Identifying Beatless Control for Six-Step Operation of Three-Phase Inverter
by Yongsu Han
Electronics 2025, 14(5), 1030; https://doi.org/10.3390/electronics14051030 - 5 Mar 2025
Viewed by 1213
Abstract
In industries dealing with motor drive systems, the use of real-time simulators for validating control codes is becoming increasingly mandatory. This is particularly essential for systems with advanced control codes or complex microcontroller unit (MCU) register configurations, as this validation process helps prevent [...] Read more.
In industries dealing with motor drive systems, the use of real-time simulators for validating control codes is becoming increasingly mandatory. This is particularly essential for systems with advanced control codes or complex microcontroller unit (MCU) register configurations, as this validation process helps prevent accidents and shorten development time. This study presents a validation process using a real-time simulator for the beatless control of six-step operation. Six-step operation, when applied to high-speed drives, has a limitation on the number of samples per electrical rotation, which causes voltage errors. A representative of these voltage error phenomena is the beat phenomenon, resulting in torque ripple at the first harmonic and high current ripple. To mitigate this beat phenomenon, a synchronous PWM method is sometimes used. However, in practical industrial systems, it may not be feasible to synchronously adjust the inverter’s switching frequency with the rotation speed. This study proposes a beatless control method to eliminate the voltage errors caused by the beat phenomenon during six-step operation at a fixed switching frequency. The specific implementation of this control method is explained based on MCU timer register settings. While previous studies have only proposed beatless control methods, this paper goes further by implementing the proposed beatless method using the MCU (TMS320F28335) to generate gating signals and validating the implementation through simulation on a permanent magnet synchronous motor using a real-time simulator (Typhoon HIL). Full article
Show Figures

Figure 1

28 pages, 781 KB  
Article
The Effects of Regulated Auditor Tenure on Opinion Shopping: Evidence from the Korean Market
by Beu Lee, George Gamble, Thomas Noland and Yuping Zhao
J. Risk Financial Manag. 2024, 17(11), 503; https://doi.org/10.3390/jrfm17110503 - 8 Nov 2024
Cited by 2 | Viewed by 3656
Abstract
We examine the impact of regulated auditor tenure on the shopping for favorable audit reports. We predict that these regulations may affect auditors’ willingness to acquiesce and clients’ incentives to engage in opinion shopping. We draw from the unique Korean setting where both [...] Read more.
We examine the impact of regulated auditor tenure on the shopping for favorable audit reports. We predict that these regulations may affect auditors’ willingness to acquiesce and clients’ incentives to engage in opinion shopping. We draw from the unique Korean setting where both mandatory audit firm retention and mandatory rotation were implemented for all public firms in a staggered manner. Based on hand-collected audit reports, we identify harmful language in explanatory paragraphs. We define favorable audit reports as those with unqualified opinions and without any harmful explanatory language. We find that opinion shopping for favorable audit reports appears to subside after mandatory retention but increases after mandatory rotation, with the positive impact of mandatory retention offset by the negative impact of mandatory rotation. We add to the literature by examining the impact of regulated auditor tenure on opinion shopping and highlighting the potential unintended consequences of these regulatory attempts. Full article
(This article belongs to the Special Issue Financial Reporting and Auditing)
Show Figures

Figure 1

25 pages, 8852 KB  
Article
Diabetic Retinopathy Features Segmentation without Coding Experience with Computer Vision Models YOLOv8 and YOLOv9
by Nicola Rizzieri, Luca Dall’Asta and Maris Ozoliņš
Vision 2024, 8(3), 48; https://doi.org/10.3390/vision8030048 - 23 Aug 2024
Cited by 22 | Viewed by 5336
Abstract
Computer vision is a powerful tool in medical image analysis, supporting the early detection and classification of eye diseases. Diabetic retinopathy (DR), a severe eye disease secondary to diabetes, accompanies several early signs of eye-threatening conditions, such as microaneurysms (MAs), hemorrhages (HEMOs), and [...] Read more.
Computer vision is a powerful tool in medical image analysis, supporting the early detection and classification of eye diseases. Diabetic retinopathy (DR), a severe eye disease secondary to diabetes, accompanies several early signs of eye-threatening conditions, such as microaneurysms (MAs), hemorrhages (HEMOs), and exudates (EXs), which have been widely studied and targeted as objects to be detected by computer vision models. In this work, we tested the performances of the state-of-the-art YOLOv8 and YOLOv9 architectures on DR fundus features segmentation without coding experience or a programming background. We took one hundred DR images from the public MESSIDOR database, manually labelled and prepared them for pixel segmentation, and tested the detection abilities of different model variants. We increased the diversity of the training sample by data augmentation, including tiling, flipping, and rotating the fundus images. The proposed approaches reached an acceptable mean average precision (mAP) in detecting DR lesions such as MA, HEMO, and EX, as well as a hallmark of the posterior pole of the eye, such as the optic disc. We compared our results with related works in the literature involving different neural networks. Our results are promising, but far from being ready for implementation into clinical practice. Accurate lesion detection is mandatory to ensure early and correct diagnoses. Future works will investigate lesion detection further, especially MA segmentation, with improved extraction techniques, image pre-processing, and standardized datasets. Full article
Show Figures

Figure 1

19 pages, 8308 KB  
Article
Combining Artificial Neural Network and Response Surface Methodology to Optimize the Drilling Operating Parameters of MDF Panels
by Bogdan Bedelean, Mihai Ispas and Sergiu Răcășan
Forests 2023, 14(11), 2254; https://doi.org/10.3390/f14112254 - 16 Nov 2023
Cited by 12 | Viewed by 2082
Abstract
Most of the parts of furniture made of medium density fiberboards (MDF) require at least one hole to be assembled. The drilling technological parameters influence the quality of holes. Factors such as tip angle of the drill bit, feed rate, type and diameter [...] Read more.
Most of the parts of furniture made of medium density fiberboards (MDF) require at least one hole to be assembled. The drilling technological parameters influence the quality of holes. Factors such as tip angle of the drill bit, feed rate, type and diameter of the drill bit, and spindle rotational speed could affect the drilling process. Therefore, the right choosing of drilling parameters is a mandatory condition to improve the drilling efficiency that is expressed through tool durability, cost, and quality of the drilling. Thus, in this work, we are proposed an approach that consists in combining two modelling techniques, which were successfully applied in various fields, namely artificial neural network (ANN) and response surface methodology (RSM), to analyze and optimize the drilling process of MDF boards. Four artificial neural network models with a reasonable accuracy were developed to predict the analyzed responses, namely delamination factor at inlet, delamination factor at outlet, thrust force, and drilling torque. These models were used to complete the experimental design that was requested by the RSM. The optimum values of the selected factors and their influence on the drilling process of the MDF boards were revealed. A part of optimum combinations among analyzed factors could be used both during the drilling of the MDF boards and prelaminated wood particleboards. Full article
(This article belongs to the Special Issue Wood Quality and Wood Processing)
Show Figures

Figure 1

15 pages, 3073 KB  
Article
A Diagonal Movement Pattern of Arm Elevation and Depression in Overhead Throwing Athletes: An Exploratory Kinematic Analysis for Clinical Application
by Nuno Morais, Joana Ferreira, Jéssica Gordo, João Paulo Vilas-Boas and Augusto G. Pascoal
Appl. Sci. 2023, 13(19), 10691; https://doi.org/10.3390/app131910691 - 26 Sep 2023
Cited by 2 | Viewed by 4470
Abstract
Assessing scapular position and motion during functional arm movement patterns may add relevant information to the evaluation of the clinical status and athletic performance of overhead sports athletes’ shoulders. This study aimed to examine the three-dimensional scapular kinematics of elite volleyball players with [...] Read more.
Assessing scapular position and motion during functional arm movement patterns may add relevant information to the evaluation of the clinical status and athletic performance of overhead sports athletes’ shoulders. This study aimed to examine the three-dimensional scapular kinematics of elite volleyball players with (n = 11) and without scapular dyskinesis (n = 11) in comparison to non-athletes (n = 27). Four distinct arm elevation/depression tasks were assessed: shoulder abduction/adduction, flexion/extension, scaption, and a diagonal movement pattern mimicking throwing (proprioceptive neuromuscular facilitation diagonal 2 for flexion/extension or PNF–D2–flx/ext). Kinematic data was recorded from the spiking/dominant shoulder using an electromagnetic system (FASTRAK, Polhemus Inc., Colchester, VT, USA); MotionMonitor v9 software, Innovative Sports Training, Inc., Chicago, IL, USA). The study compared scapular rotations at 15° intervals of humero-thoracic (HT) angles, ranging from minimum to 120°. Significantly different 3D scapular kinematics were observed between traditional arm motion tasks and PNF–D2 arm motion task (HT angle × task interaction effect, p < 0.001, 0.275 ≤ ηp2 ≤ 0.772). However, when considering the combined influence of phase, HT angle, task, and group factors, no differences were found between groups (phase × HT angle × task × group, p ≥ 0.161, 0.032 ≤ ηp2 ≤ 0.058). The inclusion of a functional arm movement pattern when evaluating scapular position and movement in overhead athletes does not appear to be mandatory. However, these findings are preliminary and highlight the need for more research in this area. Full article
(This article belongs to the Special Issue Joint Kinematics Analysis and Injuries Recovery)
Show Figures

Figure 1

25 pages, 8051 KB  
Article
Biological Rotation Age of Community Teak (Tectona grandis) Plantation Based on the Volume, Biomass, and Price Growth Curve Determined through the Analysis of Its Tree Ring Digitization
by Effendi Tri Bahtiar, Nam-Hun Kim and Apri Heri Iswanto
Forests 2023, 14(10), 1944; https://doi.org/10.3390/f14101944 - 25 Sep 2023
Cited by 5 | Viewed by 8055
Abstract
Teak (Tectona grandis) is a deciduous tree producing a popular, expensive, fancy timber with versatile utilization. The teak population and its habitats in the natural forest have been decreasing consistently; thus, the IUCN Red List classifies it as an endangered species. [...] Read more.
Teak (Tectona grandis) is a deciduous tree producing a popular, expensive, fancy timber with versatile utilization. The teak population and its habitats in the natural forest have been decreasing consistently; thus, the IUCN Red List classifies it as an endangered species. Teak tree logging from its native natural forest is banned, and commercial teak timber can only be harvested from the plantation. People plant teak on their private lands or in the community forest to meet the increasing demand. This study analyzed the annual tree rings of a teak disk taken from the community plantation and aimed to determine its biological rotation age. Tree ring interpretation provides the increment and growth that are mandatory fundamental components of knowledge in sustainable forest management. It may also decipher the tree’s biography, which contains information about past climate and future predictions responding to climate change. All of the disk’s annual tree rings were digitized, transformed, and then curve-fitted using an elliptical polar form of non-linear regression. The best-fitted curve estimation of every annual tree ring was employed to determine their age-related diameter and basal area, and then allometric equations estimated the above-ground biomass and clear-bole volume. The continuous and discrete formula fit the growth curve well, and this study determined that Chapman-Richards is the best fit among others. The growth curve, current annual increment (CAI), and mean annual increment (MAI) were graphed based on the clear-bole volume, above-ground biomass, and log timber price. The CAI and MAI intersections result in 28, 30, and 86 years of optimum harvesting periods when the growth calculation is based on volume, above-ground biomass, and log timber price, respectively. These results identified that the teak plantation is a sustainable and highly valuable asset to inherit with long-term positive benefits. The sociocultural provision of teak plants as an inheritance gift for the next generation has proven to be economically and ecologically beneficial. Full article
(This article belongs to the Section Forest Ecology and Management)
Show Figures

Figure 1

14 pages, 2156 KB  
Review
Laparoscopic Surgery: A Systematic Review of Loop and Knot Security, Varying with the Suture and Sequences, Throws, Rotation and Destabilization of Half-Knots or Half-Hitches
by Philippe R. Koninckx, Anastasia Ussia, Arnaud Wattiez, William Kondo and Armando Romeo
J. Clin. Med. 2023, 12(19), 6166; https://doi.org/10.3390/jcm12196166 - 24 Sep 2023
Cited by 6 | Viewed by 5069
Abstract
Surgical knots are sequences of half-knots (H) or half-hitches (S), defined by their number of throws, by an opposite or similar rotation compared with the previous one, and for half-hitches whether they are sliding (s) or blocking (b). Opposite rotation results in (more [...] Read more.
Surgical knots are sequences of half-knots (H) or half-hitches (S), defined by their number of throws, by an opposite or similar rotation compared with the previous one, and for half-hitches whether they are sliding (s) or blocking (b). Opposite rotation results in (more secure) symmetric (s) knots, similar rotation in asymmetric (a) knots, and changing the active and passive ends has the same effect as changing the rotation. Loop security is the force to keep tissue together after a first half-knot or sliding half-hitches. With polyfilament sutures, H2, H3, SSs, and SSsSsSs have a loop security of 10, 18, 28, and 48 Newton (N), respectively. With monofilament sutures, they are only 7, 16, 18, and 25 N. Since many knots can reorganize, the definition of knot security as the force at which the knot opens or the suture breaks should be replaced by the clinically more relevant percentage of clinically dangerous and insecure knots. Secure knots with polyfilament sutures require a minimum of four or five throws, but the risk of destabilization is high. With monofilament sutures, only two symmetric+4 asymmetric blocking half-hitches are secure. In conclusion, in gynecology and in open and laparoscopic surgery, half-hitch sequences are recommended because they are mandatory for monofilament sutures, adding flexibility for loop security with less risk of destabilization. Full article
(This article belongs to the Section Obstetrics & Gynecology)
Show Figures

Graphical abstract

18 pages, 680 KB  
Article
Educational Pathways, Spatial Skills, and Academic Achievement in Graphic Expression in First Year of Engineering
by José Sebastián Velázquez, Francisco Cavas, María Castillo Fuentes and Rafael García-Ros
Educ. Sci. 2023, 13(7), 756; https://doi.org/10.3390/educsci13070756 - 24 Jul 2023
Cited by 5 | Viewed by 2689
Abstract
The subject of Graphic Expression, which is mandatory in the first year of engineering studies, showed poor academic results in recent years. This study analyzes the relationship and predictive capacity of various variables that previous research highlighted as relevant: prior academic preparedness, educational [...] Read more.
The subject of Graphic Expression, which is mandatory in the first year of engineering studies, showed poor academic results in recent years. This study analyzes the relationship and predictive capacity of various variables that previous research highlighted as relevant: prior academic preparedness, educational itinerary followed, mental rotation skills, videogame usage, as well as the gender and age of the students. A total of 161 first-year engineering students from a technical university in southern Europe participated in the study. Their spatial rotation skills were evaluated using the MRT-A, gathering information about the rest of the relevant variables and obtaining their academic results at the end of the course. The predictive capacity of the variables on academic performance was determined through linear regression techniques (grade in the subject, on a 0–10 scale) and logistic regression (pass/fail). All variables are significantly related to academic results in the expected direction, except for videogame usage and gender. No significant differences in spatial skills were found between genders, although differences were observed in videogame usage. The best predictors of performance are prior preparation and the educational itinerary followed. The results are discussed considering previous research, highlighting measures to improve results in Graphic Expression, with emphasis on training in spatial skills. Full article
(This article belongs to the Special Issue Teaching and Learning in Engineering Education)
Show Figures

Figure 1

21 pages, 2154 KB  
Review
A Review on Vibration Monitoring Techniques for Predictive Maintenance of Rotating Machinery
by Marcelo Romanssini, Paulo César C. de Aguirre, Lucas Compassi-Severo and Alessandro G. Girardi
Eng 2023, 4(3), 1797-1817; https://doi.org/10.3390/eng4030102 - 26 Jun 2023
Cited by 114 | Viewed by 31197
Abstract
Machine failure in modern industry leads to lost production and reduced competitiveness. Maintenance costs represent between 15% and 60% of the manufacturing cost of the final product, and in heavy industry, these costs can be as high as 50% of the total production [...] Read more.
Machine failure in modern industry leads to lost production and reduced competitiveness. Maintenance costs represent between 15% and 60% of the manufacturing cost of the final product, and in heavy industry, these costs can be as high as 50% of the total production cost. Predictive maintenance is an efficient technique to avoid unexpected maintenance stops during production in industry. Vibration measurement is the main non-invasive method for locating and predicting faults in rotating machine components. This paper reviews the techniques and tools used to collect and analyze vibration data, as well as the methods used to interpret and diagnose faults in rotating machinery. The main steps of this technique are discussed, including data acquisition, data transmission, signal processing, and fault detection. Predictive maintenance through vibration analysis is a key strategy for cost reduction and a mandatory application in modern industry. Full article
(This article belongs to the Special Issue Feature Papers in Eng 2023)
Show Figures

Figure 1

Back to TopTop