Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (3,193)

Search Parameters:
Keywords = resources saving

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
15 pages, 913 KB  
Article
The Impact of China’s Targeted Poverty Alleviation Policy on Water Resource Utilization Pressure and Allocation in Arid Regions: A Case Study of Hotan Prefecture, Xinjiang
by Jin-Wei Huo, Fu-Qiang Xia, Rong-Qian Lu, Dan-Ni Lu, De-Gang Yang and Yang Chen
Water 2025, 17(21), 3053; https://doi.org/10.3390/w17213053 (registering DOI) - 24 Oct 2025
Abstract
Targeted poverty alleviation is a major national initiative in China. The Hotan region, located within the four prefectures of Southern Xinjiang, is one of the 14 contiguous poverty-stricken areas in China as well as a quintessential inland arid zone. Water scarcity is the [...] Read more.
Targeted poverty alleviation is a major national initiative in China. The Hotan region, located within the four prefectures of Southern Xinjiang, is one of the 14 contiguous poverty-stricken areas in China as well as a quintessential inland arid zone. Water scarcity is the primary constraint on development in the Hotan region and a major bottleneck for Northwest China as a whole. However, previous assessments of the effectiveness of poverty alleviation measures have primarily focused on industrial growth itself, lacking an analysis of the adaptability between key regional resource elements and industrial poverty alleviation measures. The core of promoting targeted poverty alleviation in arid regions is properly managing the relationships within the “industry–water resources” system and achieving a balance between resource use, environmental capacity, and economic development. Focusing on the coordinated development of industry and water resources, this study evaluates the spatio-temporal evolution of the industry–water resource relationships in the Hotan region after the implementation of the targeted poverty alleviation policy with the aim of measuring the sustainability of industrial poverty alleviation outcomes in this arid region. The results indicate the following: (1) The targeted poverty alleviation policy has reduced industrial water consumption. Following the policy’s implementation, industrial water consumption decreased by 541 million m3, driven by improvements in water use intensity and shifts in the industrial structure. The primary contributor to this reduction was enhanced water use efficiency within the primary sector. (2) The policy exacerbated the misallocation of water resources relative to industrial output across the region. The Gini coefficient for water resources versus GDP across Hotan’s eight counties and cities rose from 0.26 to 0.32, indicating a shift from a ‘relatively balanced’ to a ‘moderately imbalanced’ allocation. Therefore, achieving sustainable poverty alleviation in this arid region necessitates enhanced coordination between industrial development and water resources. Full article
(This article belongs to the Section Water Resources Management, Policy and Governance)
Show Figures

Figure 1

31 pages, 1860 KB  
Review
Integrating Artificial Intelligence into Smart Infrastructure Management for Sustainable Urban Planning
by Abdulaziz I. Almulhim
Technologies 2025, 13(11), 481; https://doi.org/10.3390/technologies13110481 (registering DOI) - 23 Oct 2025
Abstract
This paper systematically reviewed studies on the integration of Artificial Intelligence (AI) into infrastructure management to support sustainable urban planning across three primary domains: predictive maintenance and energy optimization, traffic and mobility systems, and public participation with ethical considerations. Findings from thirty peer-reviewed [...] Read more.
This paper systematically reviewed studies on the integration of Artificial Intelligence (AI) into infrastructure management to support sustainable urban planning across three primary domains: predictive maintenance and energy optimization, traffic and mobility systems, and public participation with ethical considerations. Findings from thirty peer-reviewed studies underscore how AI-driven models enhance operational efficiency, sustainability, and governance in smart cities. Effective management of AI-driven smart infrastructure can transform urban planning by optimizing resources efficiency and predictive maintenance, including 15% energy savings, 25–30% cost reductions, 25% congestion reduction, and 18% decrease in travel times. Similarly, participatory digital twins and citizen-centric approaches are found to enhance public participation and help address ethical issues. The findings further reveal that AI-based predictive maintenance frameworks improve system reliability, while deep learning and hybrid models achieve up to 92% accuracy in traffic forecasting. Nonetheless, obstacles to equitable implementation, including the digital divide, privacy infringements, and algorithmic bias, persist. Establishing ethical and participatory frameworks, anchored in responsible AI governance, is therefore vital to promote transparency, accountability, and inclusivity. This study demonstrates that AI-enabled smart infrastructure management strengthens urban planning by enhancing efficiency, sustainability, and social responsiveness. It concludes that achieving sustainable and socially accepted smart cities depends on striking a balance between technological innovation, ethical responsibility, and inclusive governance. Full article
Show Figures

Figure 1

18 pages, 2568 KB  
Article
Transmission Network Expansion Planning Method Based on Feasible Region Description of Virtual Power Plant
by Li Guo, Guiyuan Xue, Zheng Xu, Wenjuan Niu, Chenyu Wang, Jiacheng Li, Huixiang Li and Xun Dou
World Electr. Veh. J. 2025, 16(11), 590; https://doi.org/10.3390/wevj16110590 - 23 Oct 2025
Abstract
In response to China’s “Dual Carbon” goals, this paper proposes a Transmission Network Expansion Planning (TNEP) model that explicitly incorporates the operational flexibility of Virtual Power Plants (VPPs). Unlike conventional approaches that focus mainly on transmission investment, the proposed method accounts for the [...] Read more.
In response to China’s “Dual Carbon” goals, this paper proposes a Transmission Network Expansion Planning (TNEP) model that explicitly incorporates the operational flexibility of Virtual Power Plants (VPPs). Unlike conventional approaches that focus mainly on transmission investment, the proposed method accounts for the aggregated dispatchable capability of VPPs, providing a more accurate representation of distributed resources. The VPP aggregation model is characterized by the inclusion of electric vehicles, which act not only as load-side demand but also as flexible energy storage units through vehicle-to-grid interaction. By coordinating EV charging/discharging with photovoltaics, wind generation, and other distributed resources, the VPP significantly enhances system flexibility and provides essential support for grid operation. The vertex search method is employed to delineate the boundary of the VPP’s dispatchable feasible region, from which an equivalent model is established to capture its charging, discharging, and energy storage characteristics. This model is then integrated into the TNEP framework, which minimizes the comprehensive cost, including annualized line investment and the operational costs of both the VPP and the power grid. The resulting non-convex optimization problem is solved using the Quantum Particle Swarm Optimization (QPSO) algorithm. A case study based on the Garver-6 bus and Garver-18 bus systems demonstrates the effectiveness of the approach. The results show that, compared with traditional planning methods, strategically located VPPs can save up to 6.65% in investment costs. This VPP-integrated TNEP scheme enhances system flexibility, improves economic efficiency, and strengthens operational security by smoothing load profiles and optimizing power flows, thereby offering a more reliable and sustainable planning solution. Full article
Show Figures

Figure 1

17 pages, 2618 KB  
Article
Optimizer-Aware Fine-Tuning of Whisper Small with Low-Rank Adaption: An Empirical Study of Adam and AdamW
by Hadia Arshad, Tahir Abdullah, Mariam Rehman, Afzaal Hussain, Faria Kanwal and Mehwish Parveen
Information 2025, 16(11), 928; https://doi.org/10.3390/info16110928 - 22 Oct 2025
Abstract
Whisper is a transformer-based multilingual model that has illustrated state-of-the-art behavior in numerous languages. However, the efficiency remains persistent with the limited computational resources. To address this issue, an experiment was performed on librispeech-train-clean-100 for training purposes. The test-clean set was utilized to [...] Read more.
Whisper is a transformer-based multilingual model that has illustrated state-of-the-art behavior in numerous languages. However, the efficiency remains persistent with the limited computational resources. To address this issue, an experiment was performed on librispeech-train-clean-100 for training purposes. The test-clean set was utilized to evaluate its performance. To enhance efficiency and to cater the computational needs, a parameter-efficient fine-tuning technique, i.e., Low-Rank Adaptation, was employed to add a limited number of trainable parameters into the frozen layers of the model. The results showed that Low-Rank Adaptation attained excellent Automatic Speech Recognition results while using fewer computational resources, showing its effectiveness for resource-saving adaptation. The research work emphasizes the promise of Low-Rank Adaptation as a lightweight and scalable fine-tuning strategy for large speech models using a transformer architecture. The baseline Whisper Small model achieved a word error rate of 16.7% without any parameter-efficient adaptation. In contrast, the Low-Rank Adaptation enhanced fine-tuned model achieved a lower word error rate of 6.08%, demonstrating the adaptability of the proposed parameter-efficient approach. Full article
Show Figures

Figure 1

18 pages, 749 KB  
Article
Performance-Based Maintenance and Operation of Multi-Campus Critical Infrastructure Facilities Using Supply Chain Multi-Choice Goal Programming
by Igal M. Shohet, Shlomi Levi, Reem Zeibak-Shini and Fadi Shahin
Appl. Sci. 2025, 15(20), 11161; https://doi.org/10.3390/app152011161 - 17 Oct 2025
Viewed by 169
Abstract
Building maintenance is a critical component of ensuring long-term performance, safety, and cost-efficiency in both conventional and critical infrastructures. While traditional contracting approaches have often led to inefficiencies and rigid procurement systems, recent developments in performance-based maintenance, digital technologies, and multi-objective optimization provide [...] Read more.
Building maintenance is a critical component of ensuring long-term performance, safety, and cost-efficiency in both conventional and critical infrastructures. While traditional contracting approaches have often led to inefficiencies and rigid procurement systems, recent developments in performance-based maintenance, digital technologies, and multi-objective optimization provide opportunities to enhance both operational reliability and energy performance. From a resilience perspective, the ability to sustain functionality, adapt maintenance intensity, and recover performance under resource or operational stress is essential for ensuring infrastructure continuity and resilience. This study develops and validates an optimization model for the operation and maintenance of large campus infrastructures, addressing the persistent imbalance between over-maintenance, where costs exceed optimal levels by up to 300%, and under-maintenance, which compromises performance continuity and weakens resilience over time. The model integrates maintenance efficiency indicators, building performance indices, and energy-efficiency retrofits, particularly LED-based lighting upgrades, within a multi-choice goal programming framework. Using datasets from 15 campuses comprising over 2000 buildings, the model was tested through case studies, sensitivity analyses, and simulations under varying facility life cycle expectancies. The facilities were analyzed for alternative life cycles of 25, 50, 75, and 90 years, and the design life cycle was set for 50 years. The results show that the optimized approach can reduce maintenance costs by an average of 34%, with savings ranging from 1% to 55% across campuses. Additionally, energy retrofit strategies such as LED replacement yielded significant economic and environmental benefits, with payback periods of approximately 2–2.5 years. The findings demonstrate that integrated maintenance and energy-efficiency planning can simultaneously enhance building performance, reduce costs, and support sustainability objectives, offering a practical decision-support tool for managing large-scale campus infrastructures. Full article
(This article belongs to the Special Issue Infrastructure Resilience Analysis)
Show Figures

Figure 1

29 pages, 5676 KB  
Article
OCM: An Overcapacity Mapping-Based Virtual Disk Approach for Large-Scale Storage
by Songfu Tan and Ligu Zhu
Electronics 2025, 14(20), 4091; https://doi.org/10.3390/electronics14204091 - 17 Oct 2025
Viewed by 290
Abstract
In large-scale distributed storage simulations, disk simulation plays a critical role in evaluating system reliability, scalability, and performance. However, the existing virtual disk technologies face challenges in supporting ultra-large capacities and high-concurrency workloads under constrained physical resources. To address this limitation, we propose [...] Read more.
In large-scale distributed storage simulations, disk simulation plays a critical role in evaluating system reliability, scalability, and performance. However, the existing virtual disk technologies face challenges in supporting ultra-large capacities and high-concurrency workloads under constrained physical resources. To address this limitation, we propose an overcapacity mapping (OCM) virtual disk technology that substantially reduces simulation costs while preserving functionality similar to real physical disks. OCM integrates thin provisioning and data deduplication at the Linux Device Mapper layer to construct virtual disks whose logical capacities greatly exceed their physical capacities. We further introduce an SSD-based tiered asynchronous I/O strategy to mitigate performance bottlenecks under high-concurrency random read/write workloads. Our experimental results show that OCM achieves substantial space savings in scenarios with data duplication. In high-concurrency workloads involving small-block random I/O, cache acceleration yields up to 7.8× write speedup and 248.2× read speedup. Moreover, we deploy OCM in a Kubernetes environment to construct a Ceph system with 3 PB logical capacity using only 8.8 TB of physical resources, achieving 98.36% disk cost savings. Full article
(This article belongs to the Topic Recent Advances in Security, Privacy, and Trust)
Show Figures

Figure 1

16 pages, 1886 KB  
Article
Game Analysis on Energy-Saving Behavior of University Students Under the “Carbon Peaking and Carbon Neutrality” Goals
by Qunli Zhang and Chaojie Zhang
Sustainability 2025, 17(20), 9209; https://doi.org/10.3390/su17209209 - 17 Oct 2025
Viewed by 287
Abstract
With the continuous increase in the number of university students and the improvement of living standards, energy waste in universities has become a significant challenge, hindering progress toward Carbon Peaking and Carbon Neutrality (CPCN) goals. As universities serve as the final educational stage [...] Read more.
With the continuous increase in the number of university students and the improvement of living standards, energy waste in universities has become a significant challenge, hindering progress toward Carbon Peaking and Carbon Neutrality (CPCN) goals. As universities serve as the final educational stage before students enter society, effectively integrating disciplinary research with energy-saving education has become a crucial topic in today’s world. The evolutionary game analysis reveals that three key factors—the severity of resource waste, the reputational benefits from sustainable education, and the enhancement of students’ self-quality—significantly drive the game equilibrium toward a positive outcome. Conversely, university indifference to energy-saving education and high behavioral constraint costs for students lead the equilibrium toward a negative state. Based on this, this paper puts forward corresponding suggestions to promote the sustainable development of universities and help realize the CPCN goals. These suggestions are aimed at enhancing the importance of energy-saving education in universities, optimizing energy-saving management strategies and encouraging students to actively participate in energy-saving behavior, to provide practical reference for universities to promote social sustainable development. Full article
(This article belongs to the Section Sustainable Education and Approaches)
Show Figures

Figure 1

14 pages, 1052 KB  
Proceeding Paper
Artificial Intelligence Models for Balancing Energy Consumption and Security in 5G Networks
by Hammad Lazrek, Hassan El Ferindi, Meryam El Mouhtadi, Mohammed Zouiten and Aniss Moumen
Eng. Proc. 2025, 112(1), 23; https://doi.org/10.3390/engproc2025112023 - 14 Oct 2025
Viewed by 284
Abstract
Fifth-generation (5G) networks represent a paradigm shift in telecommunications, offering ultra-reliable low-latency communication, massive connectivity of devices, and unparalleled data rates. While these advantages also present significant complications surrounding energy consumption and cybersecurity, requiring new approaches to maintain operational effectiveness and network fidelity. [...] Read more.
Fifth-generation (5G) networks represent a paradigm shift in telecommunications, offering ultra-reliable low-latency communication, massive connectivity of devices, and unparalleled data rates. While these advantages also present significant complications surrounding energy consumption and cybersecurity, requiring new approaches to maintain operational effectiveness and network fidelity. This study proposes a new hybrid artificial intelligence (AI) framework consisting of explainable AI (XAI) for transparent resource allocation, convolutional neural networks (CNNs) for real-time anomaly detection, and recurrent neural networks (RNNs) for predictive energy optimization. Experiments and real-world case studies illustrate this framework’s scalability and efficiency by achieving improved network resource management, a detection accuracy of 99.7% for anomalies, and energy savings of up to 65%. Full article
Show Figures

Figure 1

19 pages, 1196 KB  
Article
Fixed-Time Formation Control for MAV/UAVs with Switching Threshold Event-Triggered Strategy
by Xueyan Han, Maolong Lv, Di Shen, Yuyuan Shi, Boyang Zhang and Peng Yu
Drones 2025, 9(10), 710; https://doi.org/10.3390/drones9100710 - 14 Oct 2025
Viewed by 164
Abstract
The cooperative flight of manned and unmanned aerial vehicles (MAV/UAVs) has recently become a focus in the research of civilian and humanitarian fields, in which formation control is crucial. This paper takes the improvement of convergence performance and resource conservation as the entry [...] Read more.
The cooperative flight of manned and unmanned aerial vehicles (MAV/UAVs) has recently become a focus in the research of civilian and humanitarian fields, in which formation control is crucial. This paper takes the improvement of convergence performance and resource conservation as the entry point to study control problems of cooperative formation configuration of MAV/UAVs. Following the backstepping recursive design procedures, an event-triggered fixed-time formation control strategy for MAV/UAVs operating under modeling uncertainties and external disturbances is presented. Moreover, a novel switching threshold event-triggered mechanism is introduced, which dynamically adjusts control signal updates based on system states. Compared with periodic sampling control (Controller 1), fixed threshold strategies (Controller 2) and relative threshold strategies (Controller 3), this mechanism enhances resource efficiency and prevents Zeno behavior. On the basis of Lyapunov stability theory, the closed-loop system is shown to be stable in the sense of the fixed-time concept. Numerical simulations are carried out in Simulink to validate the effectiveness of the theoretical findings. The results show that compared with the three comparison methods, the proposed control method saves 86%, 34%, and 43% of control transmission burden respectively, which significantly reduces the number of triggered events. Full article
Show Figures

Figure 1

25 pages, 3571 KB  
Article
GenAI Technology Approach for Sustainable Warehouse Management Operations: A Case Study from the Automative Sector
by Sorina Moica, Tripon Lucian, Vassilis Kostopoulos, Adrian Gligor and Noha A. Mostafa
Sustainability 2025, 17(20), 9081; https://doi.org/10.3390/su17209081 - 14 Oct 2025
Viewed by 437
Abstract
The emergence of Generative Artificial Intelligence (GenAI) is reshaping logistics and supply chain operations, offering new opportunities to improve efficiency, accuracy, and responsiveness. In the automotive manufacturing sector, where high-volume throughput and precision are critical, the integration of AI technologies into warehouse management [...] Read more.
The emergence of Generative Artificial Intelligence (GenAI) is reshaping logistics and supply chain operations, offering new opportunities to improve efficiency, accuracy, and responsiveness. In the automotive manufacturing sector, where high-volume throughput and precision are critical, the integration of AI technologies into warehouse management represents a strategic advancement. This study presents a case analysis of the implementation of AI-driven reception processes at an Automotive facility in Blaj, Romania. The research focuses on the transition from manual operations to automated recognition using industrial-grade imaging systems integrated with enterprise resource planning platforms. The integrated approach used combines Value Stream Mapping, quantitative performance analysis, and statistical validation using the Wilcoxon Signed-Rank Test. The results reveal a substantial reduction in reception time up to 79% and significant cost savings across various operational scales with improved data accuracy and minimized logistics failures. To support broader industry adoption, the study proposes a Cleaner Logistics and Supply Chain Model, incorporating principles of sustainability, ethical compliance, and continuous improvement. This model serves as a strategic framework for organizations seeking to align AI adoption with long-term operational resilience and environmental responsibility. The findings validate the operational and financial advantages of AI-enabled warehousing management in achieving sustainable digital transformation in logistics. Full article
Show Figures

Figure 1

20 pages, 425 KB  
Article
Data-Driven Event-Triggering Control of Discrete Time-Delay Systems
by Yifan Gong, Zhicheng Li and Yang Wang
Information 2025, 16(10), 893; https://doi.org/10.3390/info16100893 - 14 Oct 2025
Viewed by 235
Abstract
This paper investigates the data-driven event-triggering control of discrete time-delay systems. When there is enough data available, the system parameters can be determined by identified methods, and the model-based controller design can be implemented. However, with little data, this method does not result [...] Read more.
This paper investigates the data-driven event-triggering control of discrete time-delay systems. When there is enough data available, the system parameters can be determined by identified methods, and the model-based controller design can be implemented. However, with little data, this method does not result in an accurate system. The data-driven control method is introduced to address this issue. This paper classifies discrete-time systems with time delays into those with known delays and those with unknown delays. Controllers for systems with known delays and unknown delays are designed based on limited data, and stability is ensured by constructing improved Lyapunov functions. Two analyses are introduced: For the known delay condition, the lifting model method is presented to raise order and change the time-delay system to a delay-free system. Further, the stabilization criterion is presented. For the unknown time-delay system, according to the basic data-driven assumption, the data-driven stabilization criterion is presented. Also, the introduction of a dynamic event-triggering scheme and the discussion in this paper on how its parameters can be chosen can save more computational resources. Based on the two methods, the Lyapunov function is constructed separately, and the controller is derived through Linear Matrix Inequality. Finally, a discrete time-delay system is used as an example to show the effectiveness of these two methods. In addition, the dynamic event-triggering scheme proposed in this paper is compared with other articles to show that the parameter selection method proposed in this paper has better performance. Full article
Show Figures

Figure 1

30 pages, 2764 KB  
Article
A Cloud Integrity Verification and Validation Model Using Double Token Key Distribution Model
by V. N. V. L. S. Swathi, G. Senthil Kumar and A. Vani Vathsala
Math. Comput. Appl. 2025, 30(5), 114; https://doi.org/10.3390/mca30050114 - 13 Oct 2025
Viewed by 266
Abstract
Numerous industries have begun using cloud computing. Among other things, this presents a plethora of novel security and dependability concerns. Thoroughly verifying cloud solutions to guarantee their correctness is beneficial, just like with any other computer system that is security- and correctness-sensitive. While [...] Read more.
Numerous industries have begun using cloud computing. Among other things, this presents a plethora of novel security and dependability concerns. Thoroughly verifying cloud solutions to guarantee their correctness is beneficial, just like with any other computer system that is security- and correctness-sensitive. While there has been much research on distributed system validation and verification, nobody has looked at whether verification methods used for distributed systems can be directly applied to cloud computing. To prove that cloud computing necessitates a unique verification model/architecture, this research compares and contrasts the verification needs of distributed and cloud computing. Distinct commercial, architectural, programming, and security models necessitate distinct approaches to verification in cloud and distributed systems. The importance of cloud-based Service Level Agreements (SLAs) in testing is growing. In order to ensure service integrity, users must upload their selected services and registered services to the cloud. Not only does the user fail to update the data when they should, but external issues, such as the cloud service provider’s data becoming corrupted, lost, or destroyed, also contribute to the data not becoming updated quickly enough. The data saved by the user on the cloud server must be complete and undamaged for integrity checking to be effective. Damaged data can be recovered if incomplete data is discovered after verification. A shared resource pool with network access and elastic extension is realized by optimizing resource allocation, which provides computer resources to consumers as services. The development and implementation of the cloud platform would be greatly facilitated by a verification mechanism that checks the data integrity in the cloud. This mechanism should be independent of storage services and compatible with the current basic service architecture. The user can easily see any discrepancies in the necessary data. While cloud storage does make data outsourcing easier, the security and integrity of the outsourced data are often at risk when using an untrusted cloud server. Consequently, there is a critical need to develop security measures that enable users to verify data integrity while maintaining reasonable computational and transmission overheads. A cryptography-based public data integrity verification technique is proposed in this research. In addition to protecting users’ data from harmful attacks like replay, replacement, and forgery, this approach enables third-party authorities to stand in for users while checking the integrity of outsourced data. This research proposes a Cloud Integrity Verification and Validation Model using the Double Token Key Distribution (CIVV-DTKD) model for enhancing cloud quality of service levels. The proposed model, when compared with the traditional methods, performs better in verification and validation accuracy levels. Full article
Show Figures

Figure 1

18 pages, 2778 KB  
Article
Prediction Modeling of External Heat Exchangers in a 660 MW Ultra-Supercritical Circulating Fluidized Bed Boiler Based on Model Reduction
by Qiang Zhang, Chen Yang, Xiangyu Tao and Zonglong Zhang
Energies 2025, 18(20), 5390; https://doi.org/10.3390/en18205390 - 13 Oct 2025
Viewed by 161
Abstract
To ensure the safe operation of the external heat exchanger (EHE) in a circulating fluidized bed (CFB) boiler, it is essential to obtain real-time information on the flow conditions within the bed. This paper establishes a predictive model for the external heat exchanger [...] Read more.
To ensure the safe operation of the external heat exchanger (EHE) in a circulating fluidized bed (CFB) boiler, it is essential to obtain real-time information on the flow conditions within the bed. This paper establishes a predictive model for the external heat exchanger of the high-temperature reheater in an ultra-supercritical CFB boiler by combining computational fluid dynamics (CFD) with model order reduction and artificial neural networks. The model enables rapid prediction of the solid volume fraction, solid temperature, and gas temperature within the external heat exchanger. The results show that the three predictive models can accurately forecast flow field information under unknown operating conditions. For inlet velocities of 0.225 m/s and 0.325 m/s, the calculation errors are 2.89%, 1.04%, 1.03% and 2.99%, 1.08%, 1.09%, respectively. The predictive models significantly save computational resources, reducing the computation time from 6000 min for the full-order model to approximately 1 s. This lays the foundation for real-time monitoring of the external heat exchanger. Full article
(This article belongs to the Section J1: Heat and Mass Transfer)
Show Figures

Figure 1

25 pages, 672 KB  
Review
Damage Control Surgery in Obstetrics and Gynecology: Abdomino-Pelvic Packing in Multimodal Hemorrhage Management
by Stoyan Kostov, Yavor Kornovski, Angel Yordanov, Stanislav Slavchev, Yonka Ivanova, Ibrahim Alkatout and Rafał Watrowski
J. Clin. Med. 2025, 14(20), 7207; https://doi.org/10.3390/jcm14207207 - 13 Oct 2025
Viewed by 390
Abstract
Damage control surgery (DCS) is a staged surgical strategy for rapid control of life-threatening bleeding, followed by physiological stabilization and delayed definitive repair. Abdomino-pelvic packing (APP)—placing compressive material within the pelvis and/or abdomen to tamponade bleeding—is a cornerstone of DCS as a temporizing [...] Read more.
Damage control surgery (DCS) is a staged surgical strategy for rapid control of life-threatening bleeding, followed by physiological stabilization and delayed definitive repair. Abdomino-pelvic packing (APP)—placing compressive material within the pelvis and/or abdomen to tamponade bleeding—is a cornerstone of DCS as a temporizing measure to achieve hemostasis and stabilization in critically unstable patients. This narrative review synthesizes current evidence on DCS with a focus on APP—a technique historically developed in trauma and orthopedic surgery for exsanguinating pelvic bleeding but adaptable to gynecologic and obstetric emergencies. We outline the historical evolution, physiological basis, and stepwise protocol of DCS, adapted to specialty-specific conditions such as postpartum hemorrhage, placenta accreta spectrum, uterine rupture, and hepatic rupture in HELLP syndrome, as well as oncologic surgeries (debulking, exenteration, lymphadenectomy) and benign procedures (trocar-entry injuries in laparoscopy, presacral bleeding in sacrocolpopexy, and retroperitoneal hemorrhage in deep-infiltrating endometriosis). Modern adjuncts—including early tranexamic acid, topical hemostatic agents, and multidisciplinary coordination—have transformed packing from a last-resort maneuver into an integrated component of staged hemorrhage control. In OB/GYN, APP allows for successful hemostasis in 75–90% of cases, with significantly lower mortality rates than trauma surgery. In conclusion, APP as a potentially life-saving maneuver within DCS requires integration into standardized, institution-wide hemorrhage protocols in OB/GYN. Training, simulation, and guideline adoption are critical, particularly in resource-limited settings where advanced interventions for catastrophic bleeding are inaccessible. Full article
(This article belongs to the Section Obstetrics & Gynecology)
Show Figures

Figure 1

32 pages, 1864 KB  
Review
Rare Earth Elements: A Review of Primary Sources, Applications, Business Investment, and Characterization Techniques
by Fabiano Ferreira de Medeiros, Alexandre Pereira Wentz, Beatriz Almeida Santos Castro, Fabricio Dias Rodrigues, Sara Silva Alves, Maria das Graças Andrade Korn, Jefferson Bettini, Jeancarlo Pereira dos Anjos and Lílian Lefol Nani Guarieiro
Appl. Sci. 2025, 15(20), 10949; https://doi.org/10.3390/app152010949 - 12 Oct 2025
Viewed by 431
Abstract
Minerals bearing rare earth elements (REEs) are formed through long geological processes, among which monazite, bastnasite, xenotime, and ionic adsorption clays are the most economically exploited. Although Brazil has one of the largest reserves of REEs on the planet, its production is still [...] Read more.
Minerals bearing rare earth elements (REEs) are formed through long geological processes, among which monazite, bastnasite, xenotime, and ionic adsorption clays are the most economically exploited. Although Brazil has one of the largest reserves of REEs on the planet, its production is still not significant on the world stage. China remains dominant, with the largest reserves of REEs and controlling more than half of world production. Due to their important application in advanced clean and low-carbon energy technologies, REEs have become fundamental to the energy transition process. Technological applications related to catalyst synthesis, ceramics production, and metallurgy have been explored. Furthermore, the use of REEs in devices of great demand today, such as computer memory, rechargeable batteries, and mobile phones, has been cited. With the growing demand for these critical minerals, large mining companies are seeking to implement cleaner production policies in their processes and save natural resources to minimize the environmental impacts of the exploration. Robust analytical techniques have made it possible to characterize these elements in multi-element geological matrices, with the increasing exploration and identification of new REE mineral reserves. Full article
(This article belongs to the Special Issue Recent Advances in Prospecting Geology)
Show Figures

Figure 1

Back to TopTop