Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (47)

Search Parameters:
Keywords = sandbox experiment

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
23 pages, 60825 KB  
Article
A Compact Aperture-Slot Antipodal Vivaldi Antenna for GPR Systems
by Feng Shen, Ninghe Yang, Chao Xia, Tong Wan and Jiaheng Kang
Sensors 2026, 26(3), 810; https://doi.org/10.3390/s26030810 - 26 Jan 2026
Viewed by 213
Abstract
Compact antennas with ultra-wideband operation and stable radiation are essential for portable and airborne ground-penetrating radar (GPR), yet miniaturization in the sub 3 GHz region is strongly constrained by the wavelength-driven aperture requirement and often leads to impedance discontinuity and radiation instability. This [...] Read more.
Compact antennas with ultra-wideband operation and stable radiation are essential for portable and airborne ground-penetrating radar (GPR), yet miniaturization in the sub 3 GHz region is strongly constrained by the wavelength-driven aperture requirement and often leads to impedance discontinuity and radiation instability. This paper presents a compact aperture-slot antipodal Vivaldi antenna (AS-AVA) designed under a radiation stability-driven co-design strategy, where the miniaturization features are organized along the energy propagation path from the feed to the flared aperture. The proposed structure combines (i) aperture-slot current-path engineering with controlled meandering to extend the low-frequency edge, (ii) four tilted rectangular slots near the aperture to restrain excessive edge currents and suppress sidelobes, and (iii) back-loaded parasitic patches for coupling-based impedance refinement to eliminate residual mismatch pockets. A fabricated prototype on FR-4 (thickness 1.93 mm) occupies 111.15×156.82 mm2 and achieves a measured S11 below 10 dB from 0.63 to 2.03 GHz (fractional bandwidth 105.26%). The measured realized gain increases from 2.1 to 7.5 dBi across the operating band, with stable far-field radiation patterns; the group delay measured over 0.6–2.1 GHz remains within 4–8 ns, indicating good time-domain fidelity for stepped-frequency continuous-wave (SFCW) operation. Finally, the antenna pair is integrated into an SFCW-GPR testbed and validated in sandbox and outdoor experiments, where buried metallic targets and a subgrade void produce clear B-scan signatures after standard processing. These results confirm that the proposed AS-AVA provides a practical trade-off among miniaturization, broadband matching, and radiation robustness for compact sub 3 GHz GPR platforms. Full article
Show Figures

Figure 1

37 pages, 1125 KB  
Article
Governing Financial Innovation Through Institutional Learning: Lessons from Romania’s Fintech Innovation Hub
by Claudiu Ioan Negrea, Ela Mădălina Scarlat, Ionuț Horătău and Otilia Manta
FinTech 2025, 4(4), 67; https://doi.org/10.3390/fintech4040067 - 27 Nov 2025
Cited by 1 | Viewed by 799
Abstract
The rapid digital transformation of the financial sector has driven supervisory authorities to develop new tools for engaging with fintech innovation. Among these, Innovation Hubs have become essential mechanisms for improving regulatory dialogue, interpretive clarity, and institutional learning. This article examines the Romanian [...] Read more.
The rapid digital transformation of the financial sector has driven supervisory authorities to develop new tools for engaging with fintech innovation. Among these, Innovation Hubs have become essential mechanisms for improving regulatory dialogue, interpretive clarity, and institutional learning. This article examines the Romanian Fintech Innovation Hub (FIH), launched by the National Bank of Romania (NBR) as a consultative platform to support fintech and payment service providers operating within complex legal environments. Using a qualitative, single-case methodology (2019–2023), the study draws on internal NBR documentation, anonymized supervisory materials, and interviews with fintech founders, oversight officers, and policy specialists. The analysis evaluates the Hub’s performance across five key dimensions: stakeholder engagement, regulatory learning, policy calibration, innovation barriers, and institutional reflexivity. Findings reveal that while the Hub strengthened supervisory understanding and enhanced trust-based interaction, its influence on rulemaking and market access was limited by structural and procedural constraints, including resource gaps and the absence of a regulatory sandbox function. Nonetheless, the Romanian experience demonstrates how institutional learning can emerge even in bank-dominated markets, generating internal adaptation and improving fintech compliance readiness. Comparative insights from Hungary and Italy highlight the advantages of modular, risk-proportionate engagement models that integrate advisory and testing functions. The study contributes to the theory of adaptive regulation by proposing that innovation hubs function as feedback loop mechanisms linking market experimentation with supervisory evolution, offering a replicable model for small and emerging financial systems seeking to balance innovation facilitation with prudential soundness and legal certainty. As such, it provides generalizable insights for central banks and government policymakers on developing FinTech hubs that balance innovation facilitation with prudential soundness and legal certainty. Full article
Show Figures

Figure 1

21 pages, 14035 KB  
Article
Structural Evolution and Its Controlling Mechanisms of the Eastern Sag of the Liaohe Depression, Bohai Bay Basin, China
by Xuefeng Yu, Fusheng Yu, Guanjian Duan, Irene Cantarero and Anna Travé
Minerals 2025, 15(11), 1174; https://doi.org/10.3390/min15111174 - 7 Nov 2025
Viewed by 556
Abstract
The Eastern Sag of the Liaohe Depression, situated in the Bohai Bay Basin, represents a key area for hydrocarbon exploration in northeastern China. Despite decades of research, the mechanisms governing its complex structural evolution remain unclear, largely due to multiple tectonic reactivations associated [...] Read more.
The Eastern Sag of the Liaohe Depression, situated in the Bohai Bay Basin, represents a key area for hydrocarbon exploration in northeastern China. Despite decades of research, the mechanisms governing its complex structural evolution remain unclear, largely due to multiple tectonic reactivations associated with the Tan–Lu Fault Zone. In this study, newly acquired deep seismic reflection data were used to interpret representative structural profiles across the sag. Complementary sandbox modeling experiments were conducted to reconstruct the basin’s prototype and to verify the structural kinematics inferred from the seismic data. Integration of seismic interpretation, physical modeling, and thin-section microstructural observations of fault-related cores allowed us to establish a comprehensive Cenozoic evolutionary model of the sag. The results reveal three main tectonic evolution stages: (1) an extensional fault-depression stage during the Shahejie period, (2) a strike-slip modification phase during the Dongying period, and (3) a subsequent thermal-subsidence stage in the Guantao period. Pre-existing basement faults exerted a significant control on fault geometry, subsidence patterns, and the segmentation of four sub-sags. Moreover, transtensional and transpressional deformation during the late stages reshaped the basin architecture and fault linkage systems. These findings provide new insights into the structural evolution and controlling mechanisms of the Eastern Sag, offering valuable guidance for deep hydrocarbon exploration in the Bohai Bay Basin. Full article
(This article belongs to the Section Mineral Exploration Methods and Applications)
Show Figures

Figure 1

22 pages, 19937 KB  
Article
Development and Evaluation of a Two-Dimensional Extension/Contraction-Driven Rover for Sideslip Suppression During Slope Traversal
by Kenta Sagara, Daisuke Fujiwara and Kojiro Iizuka
Aerospace 2025, 12(8), 699; https://doi.org/10.3390/aerospace12080699 - 6 Aug 2025
Viewed by 709
Abstract
Wheeled rovers are widely used in lunar and planetary exploration missions owing to their mechanical simplicity and energy efficiency. However, they face serious mobility challenges on sloped soft terrain, especially in terms of sideslip and loss of attitude angle when traversing across slopes. [...] Read more.
Wheeled rovers are widely used in lunar and planetary exploration missions owing to their mechanical simplicity and energy efficiency. However, they face serious mobility challenges on sloped soft terrain, especially in terms of sideslip and loss of attitude angle when traversing across slopes. Previous research proposed using wheelbase extension/contraction and intentionally sinking wheels into the ground, thereby increasing shear resistance and reducing sideslip. Building upon this concept, this study proposes a novel recovery method that integrates beam extension/contraction and Archimedean screw-shaped wheels to enable lateral movement without rotating the rover body. The beam mechanism allows for independent wheel movement, maintaining stability by anchoring stationary wheels during recovery. Meanwhile, the helical structure of the screw wheels helps reduce lateral earth pressure by scraping soil away from the sides, improving lateral drivability. Driving experiments on a sloped sandbox test bed confirmed that the proposed 2DPPL (two-dimensional push-pull locomotion) method significantly reduces sideslip and prevents a drop in attitude angle during slope traversal. Full article
Show Figures

Figure 1

27 pages, 2898 KB  
Review
A Review on Augmented Reality in Education and Geography: State of the Art and Perspectives
by Bogdan-Alexandru Rus and Ioan Valentin Sita
Appl. Sci. 2025, 15(13), 7574; https://doi.org/10.3390/app15137574 - 6 Jul 2025
Cited by 1 | Viewed by 3481
Abstract
Augmented Reality (AR) is an innovative tool in education, enhancing learning experiences across multiple domains. This literature review explores the application of AR in education, with a particular focus on geographical learning. The study begins by tracing the historical development of AR, distinguishing [...] Read more.
Augmented Reality (AR) is an innovative tool in education, enhancing learning experiences across multiple domains. This literature review explores the application of AR in education, with a particular focus on geographical learning. The study begins by tracing the historical development of AR, distinguishing it from Virtual Reality (VR) and highlighting its advantages in an educational context. The integration of AR into learning environments has been shown to improve engagement, comprehension of abstract concepts, and collaboration among students. The use of AR in geographical education through interactive applications, such as GeoAR and AR Sandbox, improves the exploration of spatial relationships, topographic maps, and environmental changes. Studies demonstrate that AR enhances students’ ability to recall information and understand geographical processes more effectively than with traditional methods. Furthermore, AR Sandbox implementations, including Illuminating Clay, SandScape, and AR Sandbox, are analyzed and compared. The paper also discusses future developments in AR for geography education for AR Sandbox, such as the integration of a mobile application for extended learning and improving computing solutions through Raspberry Pi. These advancements aim to make AR systems more accessible and to increase the benefits to both students and professors. Full article
Show Figures

Figure 1

21 pages, 12314 KB  
Article
Modeling and Validating Saltwater Intrusion Dynamics by Self-Potential: A Laboratory Perspective
by Meryem Fanidi, Yi-An Cui, Jing Xie, Ahmed Abdelreheem Khalil and Syed Muzyan Shahzad
Water 2025, 17(7), 941; https://doi.org/10.3390/w17070941 - 24 Mar 2025
Viewed by 1454
Abstract
Saltwater intrusion (SWI) in coastal aquifers poses a significant threat to freshwater resources, exacerbated by climate change and rising sea levels. This study investigates SWI dynamics using laboratory experiments, geophysical monitoring with the self-potential (SP) method, and numerical simulations to assess the impact [...] Read more.
Saltwater intrusion (SWI) in coastal aquifers poses a significant threat to freshwater resources, exacerbated by climate change and rising sea levels. This study investigates SWI dynamics using laboratory experiments, geophysical monitoring with the self-potential (SP) method, and numerical simulations to assess the impact of varying salt concentrations (7 g/L and 35 g/L) on intrusion rates and electrochemical responses. Laboratory experiments were conducted in a custom-designed sandbox model, with SP data collected in real time using a 192-electrode system. Numerical simulations were performed to replicate experimental conditions and validate the model’s predictions. Results show that salt concentration significantly influences intrusion rates and SP responses. In low-salinity systems (7 g/L), SP values increased gradually from 0 mV to 20 mV, with a slow intrusion rate of 0.034 m/h. In contrast, moderate-salinity systems (35 g/L) exhibited rapid SP changes (0 mV to 5 mV) and a faster intrusion rate of 0.1 m/h. Sharp SP anomalies near the intrusion source, with values dropping from 10 mV to −40 mV, were observed in low-salinity systems, highlighting localized charge imbalances. The model’s performance was evaluated using relative RMSE, showing a good fit in Experiment (1) (RMSE = 5.00%) and acceptable results for Experiment (2) (RMSE = 23.45%). These findings demonstrate the potential of the SP method for real-time monitoring of SWI and provide insights for improving management strategies in coastal aquifers. Full article
(This article belongs to the Section Water Quality and Contamination)
Show Figures

Figure 1

20 pages, 2824 KB  
Article
Hydrakon, a Framework for Measuring Indicators of Deception in Emulated Monitoring Systems
by Kon Papazis and Naveen Chilamkurti
Future Internet 2024, 16(12), 455; https://doi.org/10.3390/fi16120455 - 4 Dec 2024
Cited by 2 | Viewed by 1313
Abstract
The current cybersecurity ecosystem is proving insufficient in today’s increasingly sophisticated cyber attacks. Malware authors and intruders have pursued innovative avenues to circumvent emulated monitoring systems (EMSs) such as honeypots, virtual machines, sandboxes and debuggers to continue with their malicious activities while remaining [...] Read more.
The current cybersecurity ecosystem is proving insufficient in today’s increasingly sophisticated cyber attacks. Malware authors and intruders have pursued innovative avenues to circumvent emulated monitoring systems (EMSs) such as honeypots, virtual machines, sandboxes and debuggers to continue with their malicious activities while remaining inconspicuous. Cybercriminals are improving their ability to detect EMS, by finding indicators of deception (IoDs) to expose their presence and avoid detection. It is proving a challenge for security analysts to deploy and manage EMS to evaluate their deceptive capability. In this paper, we introduce the Hydrakon framework, which is composed of an EMS controller and several Linux and Windows 10 clients. The EMS controller automates the deployment and management of the clients and EMS for the purpose of measuring EMS deceptive capabilities. Experiments were conducted by applying custom detection vectors to client real machines, virtual machines and sandboxes, where various artifacts were extracted and stored as csv files on the EMS controller. The experiment leverages the cosine similarity metric to compare and identify similar artifacts between a real system and a virtual machine or sandbox. Our results show that Hydrakon offers a valid approach to assess the deceptive capabilities of EMS without the need to target specific IoD within the target system, thereby fostering more robust and effective emulated monitoring systems. Full article
Show Figures

Figure 1

20 pages, 5123 KB  
Article
Research on the Patterns of Seawater Intrusion in Coastal Aquifers Induced by Sea Level Rise Under the Influence of Multiple Factors
by Xinzhe Cao, Qiaona Guo and Wenheng Liu
Water 2024, 16(23), 3457; https://doi.org/10.3390/w16233457 - 1 Dec 2024
Cited by 6 | Viewed by 3391
Abstract
In the context of global warming, rising sea levels are intensifying seawater intrusion in coastal areas. Due to the complex hydrodynamic conditions and increasing groundwater over-extraction in these regions, understanding the patterns of seawater intrusion is crucial for effective prevention and control. This [...] Read more.
In the context of global warming, rising sea levels are intensifying seawater intrusion in coastal areas. Due to the complex hydrodynamic conditions and increasing groundwater over-extraction in these regions, understanding the patterns of seawater intrusion is crucial for effective prevention and control. This study employed a sandbox model to investigate both vertical and horizontal seawater intrusion into a coastal unconfined aquifer with an impermeable dam under varying conditions of sea level rise, coastal slope, and groundwater pumping rate. Additionally, a two-dimensional SEAWAT model was developed to simulate seawater intrusion under these experimental conditions. The results indicate that sea level rise significantly increases the extent and intensity of seawater intrusion. When sea level rises by 3.5 cm, 4.5 cm, and 5.5 cm, the areas of the saline wedge reached 362 cm2, 852 cm2, and 1240 cm2, respectively, with both horizontal and vertical intrusion ranges expanding considerably. When groundwater extraction is superimposed, vertical seawater intrusion is notably intensified. At an extraction rate of 225 cm3/min, the vertical intrusion areas corresponding to sea level rises of 3.5 cm, 4.5 cm, and 5.5 cm were 495 cm2, 1035 cm2, and 1748 cm2, respectively, showing significant expansion, and this expansion becomes more pronounced as sea levels rise. In contrast, slope variations had a significant impact only on vertical seawater intrusion. As the slope decreased from tanα = 1/5 to tanα = 1/9, the upper saline wedge area expanded from 525 cm2 to 846 cm2, considerably increasing the vertical intrusion range. Finally, the combined effects of groundwater extraction and sea level rise exacerbate seawater intrusion more severely than either factor alone, presenting greater challenges for coastal water resource management. Full article
(This article belongs to the Section Oceans and Coastal Zones)
Show Figures

Figure 1

15 pages, 1777 KB  
Article
Going beyond API Calls in Dynamic Malware Analysis: A Novel Dataset
by Slaviša Ilić, Milan Gnjatović, Ivan Tot, Boriša Jovanović, Nemanja Maček and Marijana Gavrilović Božović
Electronics 2024, 13(17), 3553; https://doi.org/10.3390/electronics13173553 - 6 Sep 2024
Cited by 8 | Viewed by 4621
Abstract
Automated sandbox-based analysis systems are dominantly focused on sequences of API calls, which are widely acknowledged as discriminative and easily extracted features. In this paper, we argue that an extension of the feature set beyond API calls may improve the malware detection performance. [...] Read more.
Automated sandbox-based analysis systems are dominantly focused on sequences of API calls, which are widely acknowledged as discriminative and easily extracted features. In this paper, we argue that an extension of the feature set beyond API calls may improve the malware detection performance. For this purpose, we apply the Cuckoo open-source sandbox system, carefully configured for the production of a novel dataset for dynamic malware analysis containing 22,200 annotated samples (11,735 benign and 10,465 malware). Each sample represents a full-featured report generated by the Cuckoo sandbox when a corresponding binary file is submitted for analysis. To support our position that the discriminative power of the full-featured sandbox reports is greater than the discriminative power of just API call sequences, we consider samples obtained from binary files whose execution induced API calls. In addition, we derive an additional dataset from samples in the full-featured dataset, whose samples contain only information on API calls. In a three-way factorial design experiment (considering the feature set, the feature representation technique, and the random forest model hyperparameter settings), we trained and tested a set of random forest models in a two-class classification task. The obtained results demonstrate that resorting to full-featured sandbox reports improves malware detection performance. The accuracy of 95.56 percent obtained for API call sequences was increased to 99.74 percent when full-featured sandbox reports were considered. Full article
(This article belongs to the Special Issue Intelligent Solutions for Network and Cyber Security)
Show Figures

Figure 1

16 pages, 466 KB  
Article
ESFuzzer: An Efficient Way to Fuzz WebAssembly Interpreter
by Jideng Han, Zhaoxin Zhang, Yuejin Du, Wei Wang and Xiuyuan Chen
Electronics 2024, 13(8), 1498; https://doi.org/10.3390/electronics13081498 - 15 Apr 2024
Cited by 2 | Viewed by 2534
Abstract
WebAssembly code is designed to run in a sandboxed environment, such as a web browser, providing a high level of security and isolation from the underlying operating system and hardware. This enables the execution of untrusted code in a web browser without compromising [...] Read more.
WebAssembly code is designed to run in a sandboxed environment, such as a web browser, providing a high level of security and isolation from the underlying operating system and hardware. This enables the execution of untrusted code in a web browser without compromising the security and integrity of the user’s system. This paper discusses the challenges associated with using fuzzing tools to identify vulnerabilities or bugs in WebAssembly interpreters. Our approach, known as ESFuzzer, introduces an efficient method for fuzzing WebAssembly interpreters using an Equivalent-Statement concept and the Stack Repair Algorithm. The samples generated by our approach successfully passed code validation. In addition, we developed effective mutation strategies to enhance the efficacy of our approach. ESFuzzer has demonstrated its ability to generate code that achieves 100% WebAssembly validation testing and achieves code coverage that is more than twice that of libFuzzer. Furthermore, the 24-h experiment results show that ESFuzzer performs ten times more efficiently than libFuzzer. Full article
(This article belongs to the Special Issue Image Processing Based on Convolution Neural Network)
Show Figures

Figure 1

41 pages, 1024 KB  
Review
Virtual Worlds for Learning in Metaverse: A Narrative Review
by Robertas Damaševičius and Tatjana Sidekerskienė
Sustainability 2024, 16(5), 2032; https://doi.org/10.3390/su16052032 - 29 Feb 2024
Cited by 93 | Viewed by 15045
Abstract
As digital technologies continue to evolve, they offer unprecedented opportunities to transform traditional educational paradigms. Virtual worlds offer a dynamic and immersive platform for fostering sustainability education, bridging the gap between theoretical knowledge and practical application. In these interactive environments, students can engage [...] Read more.
As digital technologies continue to evolve, they offer unprecedented opportunities to transform traditional educational paradigms. Virtual worlds offer a dynamic and immersive platform for fostering sustainability education, bridging the gap between theoretical knowledge and practical application. In these interactive environments, students can engage with complex ecological systems and sustainability challenges in a risk-free setting, allowing for experimentation and exploration that would be impractical or impossible in the real world. This study aims to investigate the application of various types of virtual worlds in educational settings, examine their characteristics and potential, and explore how they foster critical 21st-century skills like critical thinking, creativity, communication, and collaboration. This paper comprehensively explores various types of virtual worlds—Adventure World, Simulation World, Creative World, Role-Playing World, and Collaborative World—assessing their impact on educational processes and outcomes. Adventure Worlds, with narrative-driven quests, engage students in exploratory learning within a story context. Simulation Worlds replicate real-world environments, allowing students to practice and hone practical skills in a risk-free setting. Creative Worlds provide open-ended, sandbox-like environments where innovation and imagination are paramount. Role-Playing Worlds facilitate empathy and perspective-taking through character-driven scenarios, while Collaborative Worlds emphasize teamwork and problem-solving in group projects. The narrative review methodology was adopted for the comprehensive analysis and synthesis of the literature to assess the impact and integration of virtual worlds in education, focusing on identifying trends, challenges, and opportunities within this domain. The evaluation methodology used in this study incorporates a mix of the Theory of Inventive Problem Solving (TRIZ), Concept-Knowledge (C-K) theory, Structure-behavior-function (SBF) modeling, the Framework for 21st Century Learning (P21), and Universal Design for Learning (UDL) to evaluate the characteristics and educational potential of different virtual world types. Findings indicate that virtual worlds effectively support critical thinking, creativity, communication, and collaboration skills, presenting a comprehensive analysis of how these environments can support, supplement, or transform traditional educational models. The main outcome of the study is the comprehensive exploration of various types of virtual worlds—Adventure World, Simulation World, Creative World, Role-Playing World, and Collaborative World—in education, demonstrating their significant potential to enhance learning experiences and outcomes through immersive, interactive environments that foster critical thinking, creativity, communication, and collaboration skills. Full article
Show Figures

Graphical abstract

20 pages, 614 KB  
Article
JITScanner: Just-in-Time Executable Page Check in the Linux Operating System
by Pasquale Caporaso, Giuseppe Bianchi and Francesco Quaglia
Appl. Sci. 2024, 14(5), 1912; https://doi.org/10.3390/app14051912 - 26 Feb 2024
Viewed by 1861
Abstract
Modern malware poses a severe threat to cybersecurity, continually evolving in sophistication. To combat this threat, researchers and security professionals continuously explore advanced techniques for malware detection and analysis. Dynamic analysis, a prevalent approach, offers advantages over static analysis by enabling observation of [...] Read more.
Modern malware poses a severe threat to cybersecurity, continually evolving in sophistication. To combat this threat, researchers and security professionals continuously explore advanced techniques for malware detection and analysis. Dynamic analysis, a prevalent approach, offers advantages over static analysis by enabling observation of runtime behavior and detecting obfuscated or encrypted code used to evade detection. However, executing programs within a controlled environment can be resource-intensive, often necessitating compromises, such as limiting sandboxing to an initial period. In our article, we propose an alternative method for dynamic executable analysis: examining the presence of malicious signatures within executable virtual pages precisely when their current content, including any updates over time, is accessed for instruction fetching. Our solution, named JITScanner, is developed as a Linux-oriented package built upon a Loadable Kernel Module (LKM). It integrates a user-level component that communicates efficiently with the LKM using scalable multi-processor/core technology. JITScanner’s effectiveness in detecting malware programs and its minimal intrusion in normal runtime scenarios have been extensively tested, with the experiment results detailed in this article. These experiments affirm the viability of our approach, showcasing JITScanner’s capability to effectively identify malware while minimizing runtime overhead. Full article
(This article belongs to the Collection Innovation in Information Security)
Show Figures

Figure 1

22 pages, 6963 KB  
Article
Combining Electrical Resistivity, Induced Polarization, and Self-Potential for a Better Detection of Ore Bodies
by Zhaoyang Su, André Revil, Ahmad Ghorbani, Xin Zhang, Xiang Zhao and Jessy Richard
Minerals 2024, 14(1), 12; https://doi.org/10.3390/min14010012 - 20 Dec 2023
Cited by 10 | Viewed by 4909
Abstract
Electrical resistivity (ER), induced polarization (IP), and self-potential (SP) are three geophysical methods that have been broadly used in the realm of mineral exploration. These geophysical methods provide complementary information, each exhibiting a distinct sensitivity to various types of mineral deposits. Considering the [...] Read more.
Electrical resistivity (ER), induced polarization (IP), and self-potential (SP) are three geophysical methods that have been broadly used in the realm of mineral exploration. These geophysical methods provide complementary information, each exhibiting a distinct sensitivity to various types of mineral deposits. Considering the relationship among these three methods, we propose an integrated approach that merges their respective information to offer an improved localization technique for ore bodies. First, we invert the electrical conductivity distribution through electrical resistance tomography (ERT). Then, we use the inverted conductivity distribution to invert the IP and SP data in terms of chargeability and source current density distributions. Then, we normalize the inverted chargeability and source current density distributions and we combine them to obtain an ore body index (ORI) χ used to delineate the potential locations of ore deposits. We design this index to be sensitive to the presence of ore bodies, which are reflected by either strong and localized source current density (SP) and/or strong chargeability values (IP). The proposed method is first validated using a synthetic model with two distinct anomalies characterized by different properties. The results show the limitation of individual inversion, as each method exclusively detects one of these anomalies. The combined approach allows a better characterization of the target. Then, the approach is applied to a sandbox experiment in which two metallic bodies are buried in water-saturated sand used as the background. Again, the proposed methodology is successfully applied to the detection of the metallic targets, improving their localization compared with individual methods. Full article
Show Figures

Figure 1

21 pages, 11474 KB  
Article
Study on Aeolian Sand-Box Backfill Geomechanical Characteristics and Overlying Strata Control Effects
by Bo Zhao, Zhiyi Zhang, Xiaoping Gong, Wei Wang, Xiaoyong Tong, Hui Chen, Weiming Guan, Xin Li, Shuo Feng, Dezhi Yang, Lubo Huang and Yuhang Zhao
Minerals 2023, 13(12), 1556; https://doi.org/10.3390/min13121556 - 18 Dec 2023
Cited by 1 | Viewed by 2329
Abstract
The aeolian sand-box backfilling method proves effective for environmentally friendly coal extraction in northwestern regions, including Xinjiang. This study investigated the geomechanical characteristics of aeolian sand-box backfill material and its control effects on overlying strata through indoor experiments, mechanical analysis, and numerical simulations. [...] Read more.
The aeolian sand-box backfilling method proves effective for environmentally friendly coal extraction in northwestern regions, including Xinjiang. This study investigated the geomechanical characteristics of aeolian sand-box backfill material and its control effects on overlying strata through indoor experiments, mechanical analysis, and numerical simulations. Uniaxial compression tests on models with varying mesh sizes, wire diameters, and dimensions revealed that larger mesh sizes and wire diameters increased the bearing capacity of the aeolian sand-box backfill material, while increasing dimensions had the opposite effect. A mechanical analysis of the metal mesh box deformation produced equations describing its restraining force. Subsequent experiments and simulations on models of different dimensions consistently demonstrated the material’s mechanical properties, with stress-displacement curves closely aligned. 3DEC5.2 software simulations highlighted the effectiveness of aeolian sand-box backfill material in controlling displacement and stress variations in goaf areas. Notably, smaller-sized backfill material exhibited a more pronounced impact on controlling overlying strata displacement and stress development. Full article
(This article belongs to the Special Issue Backfilling Materials for Underground Mining, Volume III)
Show Figures

Figure 1

16 pages, 5991 KB  
Article
Wind Field Digital Twins Sandbox System for Transmission Towers
by Chenshuo Zhang, Yunpeng Li, Chun Feng and Yiming Zhang
Sensors 2023, 23(21), 8657; https://doi.org/10.3390/s23218657 - 24 Oct 2023
Cited by 1 | Viewed by 2312
Abstract
Given the digitalization trends within the field of engineering, we propose a practical approach to engineering digitization. This method is established based on a physical sandbox model, camera equipment and simulation technology. We propose an image processing modeling method to establish high-precision continuous [...] Read more.
Given the digitalization trends within the field of engineering, we propose a practical approach to engineering digitization. This method is established based on a physical sandbox model, camera equipment and simulation technology. We propose an image processing modeling method to establish high-precision continuous mathematical models of transmission towers. The calculation of the wind field is realized by using wind speed calculations, a load-wind-direction-time algorithm and the Continuum-Discontinuum Element Method (CDEM). The sensitivity analysis of displacement- and acceleration-controlled transmission tower loads under two different wind direction conditions is conducted. The results show that the digital model exhibits a proportional relationship with the physical dimensions of the transmission tower model. The error between the numerical simulation results and the experimental results falls within a reasonable range. Nodes at higher positions of the transmission tower experience significantly higher forces compared to those at lower positions, and the structural forms with larger windward projected areas yield similar simulation results. The proposed digital twin system can help monitor the performance of structural bodies and assess the disaster degree in extreme conditions. It can guide specific maintenance and repair tasks. Full article
Show Figures

Figure 1

Back to TopTop