Dan Gu, Yufeng Xie, Shulin Liu, Yuan Wei, Jiayi Shen
The high-speed motorized spindle has been wildly used in the field of aerospace processing, due to its advantages such as high speed, high precision, and high efficiency. CNC machine tools used for processing aerospace products require high machining accuracy, and once the spindle fails, it will seriously affect the quality of product processing. Thus, it is important to study the faults of the spindle, especially the faults caused by subtle errors. In this work, a dynamic model of a spindle with unbalanced mass fault and spindle inclination fault is established, and the natural frequencies and mode shapes of the motorized spindle are calculated by using the whole transfer matrix method (WTMM). The deflections of the spindle initial end in the different situations are discussed when the two faults happen independently. The results show that the spindle end deflection of the same fault has different sensitivity at different speeds. At the third order of natural frequencies, the deflection of a motorized spindle is greatest regardless of the fault that occurs. Although the motorized spindle rotates at the same speed, different faults could cause different mode shapes. At the lower speed, when the unbalanced mass fault happens, the mode shape is in an arched shape, and while the spindle inclination fault happens, the mode shape is in a concave shape.
{"title":"Dynamic Modeling of Motorized Spindle System with Unbalanced Mass and Spindle Inclination","authors":"Dan Gu, Yufeng Xie, Shulin Liu, Yuan Wei, Jiayi Shen","doi":"10.3390/app131810053","DOIUrl":"https://doi.org/10.3390/app131810053","url":null,"abstract":"The high-speed motorized spindle has been wildly used in the field of aerospace processing, due to its advantages such as high speed, high precision, and high efficiency. CNC machine tools used for processing aerospace products require high machining accuracy, and once the spindle fails, it will seriously affect the quality of product processing. Thus, it is important to study the faults of the spindle, especially the faults caused by subtle errors. In this work, a dynamic model of a spindle with unbalanced mass fault and spindle inclination fault is established, and the natural frequencies and mode shapes of the motorized spindle are calculated by using the whole transfer matrix method (WTMM). The deflections of the spindle initial end in the different situations are discussed when the two faults happen independently. The results show that the spindle end deflection of the same fault has different sensitivity at different speeds. At the third order of natural frequencies, the deflection of a motorized spindle is greatest regardless of the fault that occurs. Although the motorized spindle rotates at the same speed, different faults could cause different mode shapes. At the lower speed, when the unbalanced mass fault happens, the mode shape is in an arched shape, and while the spindle inclination fault happens, the mode shape is in a concave shape.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48618488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A number of apple trees have collapsed in South Korea due to strong winds caused by typhoons. In fact, apple trees are protected by various types of support systems. However, despite this, they have still been damaged. The reason why the trees collapsed is that the installation of a support system is based not on scientific facts but on empirical facts. The purpose of this study was to evaluate the structural safety of the anti-disaster support system of apple trees. Equivalent static tests of the support systems, i.e., fences and matrix supports, were carried out. The result of the equivalent static tests indicated that the bearing capacity of the foundation is considered an important factor for the performance of the fence support, and the elements played a major role in the case of the matrix support due to the connection of the strut wire and the mat wire. Based on this test result, design criteria and standard specifications of the apple tree support system in response to local wind speed are proposed.
{"title":"Experiments and Design of an Anti-Disaster Support System for Apple Orchards","authors":"Hee-Du Lee, Swoo-Heon Lee, K. Shin, Jun-seop Lee","doi":"10.3390/app131810033","DOIUrl":"https://doi.org/10.3390/app131810033","url":null,"abstract":"A number of apple trees have collapsed in South Korea due to strong winds caused by typhoons. In fact, apple trees are protected by various types of support systems. However, despite this, they have still been damaged. The reason why the trees collapsed is that the installation of a support system is based not on scientific facts but on empirical facts. The purpose of this study was to evaluate the structural safety of the anti-disaster support system of apple trees. Equivalent static tests of the support systems, i.e., fences and matrix supports, were carried out. The result of the equivalent static tests indicated that the bearing capacity of the foundation is considered an important factor for the performance of the fence support, and the elements played a major role in the case of the matrix support due to the connection of the strut wire and the mat wire. Based on this test result, design criteria and standard specifications of the apple tree support system in response to local wind speed are proposed.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46713630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Carlos A. Rovetto, Edmanuel Cruz, Ivonne Nuñez, Keyla Santana, Andrzej Smolarz, José Rangel, E. Cano
The paper presents a proposed queuing model based on Kendall’s notation for the intersection of two streets in Panama City (53 East and 56 East). The proposed model is based on a set of traffic lights that controls the flow of vehicles at the intersection according to a predetermined schedule. The model analyzes the stability of the system and simulations are performed to evaluate its performance. The main objective of the paper is to optimize the vehicle flow by minimizing the waiting time for passage. In the study, it was observed that the current traffic light system on Calle 50 (50th Street) is unstable and oversaturated during weekdays, which generates large vehicle queues with no estimated exit times. It was proposed to increase the system capacity to 1300 vehicles per hour to achieve reasonable stability and provide a solution to improve traffic signal timing on 50th Street. The need to increase the system capacity has been demonstrated and an optimal value has been suggested. The evaluation of other models and the use of AI can further strengthen the system and improve the prediction accuracy in different traffic scenarios.
{"title":"Minimizing Intersection Waiting Time: Proposal of a Queue Network Model Using Kendall’s Notation in Panama City","authors":"Carlos A. Rovetto, Edmanuel Cruz, Ivonne Nuñez, Keyla Santana, Andrzej Smolarz, José Rangel, E. Cano","doi":"10.3390/app131810030","DOIUrl":"https://doi.org/10.3390/app131810030","url":null,"abstract":"The paper presents a proposed queuing model based on Kendall’s notation for the intersection of two streets in Panama City (53 East and 56 East). The proposed model is based on a set of traffic lights that controls the flow of vehicles at the intersection according to a predetermined schedule. The model analyzes the stability of the system and simulations are performed to evaluate its performance. The main objective of the paper is to optimize the vehicle flow by minimizing the waiting time for passage. In the study, it was observed that the current traffic light system on Calle 50 (50th Street) is unstable and oversaturated during weekdays, which generates large vehicle queues with no estimated exit times. It was proposed to increase the system capacity to 1300 vehicles per hour to achieve reasonable stability and provide a solution to improve traffic signal timing on 50th Street. The need to increase the system capacity has been demonstrated and an optimal value has been suggested. The evaluation of other models and the use of AI can further strengthen the system and improve the prediction accuracy in different traffic scenarios.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42490079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we propose a deterministic shift design model with task-based demand and give the corresponding stochastic version with a probability constraint such that the shift plan designed is staffed with the workforce with a certain probability of performing all given tasks. Since we currently find no suitable methods for solving this stochastic model from the literature related to solving stochastic shift design models, we developed a single-stage heuristic method based on statistics, whose main idea is to reduce the occurrence of manpower shortage by prolonging the resource occupation time of a task, but this leads to a serious waste of resources, which is common in solving resource allocation problems with uncertain durations. To reduce the cost of wastage, we also propose a two-stage heuristic approach that is a two-stage heuristic with an evolutionary strategy. The two heuristics show their effectiveness in solving the proposed stochastic model in numerical experiments, and the two-stage heuristic significantly outperforms the one-stage heuristic in cost optimization and solution time stability.
{"title":"Two Scenario-Based Heuristics for Stochastic Shift Design Problem with Task-Based Demand","authors":"Zhiying Wu, Qing-xin Chen, Ning Mao, Guoning Xu","doi":"10.3390/app131810070","DOIUrl":"https://doi.org/10.3390/app131810070","url":null,"abstract":"In this paper, we propose a deterministic shift design model with task-based demand and give the corresponding stochastic version with a probability constraint such that the shift plan designed is staffed with the workforce with a certain probability of performing all given tasks. Since we currently find no suitable methods for solving this stochastic model from the literature related to solving stochastic shift design models, we developed a single-stage heuristic method based on statistics, whose main idea is to reduce the occurrence of manpower shortage by prolonging the resource occupation time of a task, but this leads to a serious waste of resources, which is common in solving resource allocation problems with uncertain durations. To reduce the cost of wastage, we also propose a two-stage heuristic approach that is a two-stage heuristic with an evolutionary strategy. The two heuristics show their effectiveness in solving the proposed stochastic model in numerical experiments, and the two-stage heuristic significantly outperforms the one-stage heuristic in cost optimization and solution time stability.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44746541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In hydraulic systems, energy dissipation can be significant. The pressure losses that can occur in the hydraulic circuit, which are influenced by the adopted drive architecture, result in power consumption that is often significantly higher than that required by the mechanical system. This paper presents a comparative study of the energy efficiency of five common drive architectures in industrial hydraulic axes. The analysis is applied to a variable speed and force hydraulic blanking press, a fairly common industrial system, e.g., in the manufacture of semi-finished brass products. Standard, regenerative, high–low, variable-displacement pumps and variable speed drive configurations for a fixed-displacement pump were analyzed and compared. In each case, an appropriate and optimized sizing of the different components of the system was performed, and then the energy consumption was estimated for a load cycle common to all the considered cases. The results show that the choice of the power generation architecture of the hydraulic system has a very significant impact on the energy efficiency and consequently on the operating costs and the carbon footprint. The performed quantification of the potential energy efficiency of the considered drive architectures can be very useful in helping to make energy-conscious decisions.
{"title":"Power Drive Architectures for Industrial Hydraulic Axes: Energy-Efficiency-Based Comparative Analysis","authors":"M. Tiboni","doi":"10.3390/app131810066","DOIUrl":"https://doi.org/10.3390/app131810066","url":null,"abstract":"In hydraulic systems, energy dissipation can be significant. The pressure losses that can occur in the hydraulic circuit, which are influenced by the adopted drive architecture, result in power consumption that is often significantly higher than that required by the mechanical system. This paper presents a comparative study of the energy efficiency of five common drive architectures in industrial hydraulic axes. The analysis is applied to a variable speed and force hydraulic blanking press, a fairly common industrial system, e.g., in the manufacture of semi-finished brass products. Standard, regenerative, high–low, variable-displacement pumps and variable speed drive configurations for a fixed-displacement pump were analyzed and compared. In each case, an appropriate and optimized sizing of the different components of the system was performed, and then the energy consumption was estimated for a load cycle common to all the considered cases. The results show that the choice of the power generation architecture of the hydraulic system has a very significant impact on the energy efficiency and consequently on the operating costs and the carbon footprint. The performed quantification of the potential energy efficiency of the considered drive architectures can be very useful in helping to make energy-conscious decisions.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46682358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sheroze Liaquat, Tanveer Hussain, Fadi Agha Kassab, B. Celik, Robert S. Fourney, T. Hansen
With the increase in rooftop photovoltaic (PV) systems at the residential level, customers owning such renewable resources can act as a source of generation for other consumers in the same network. Peer-to-peer (P2P) energy trading refers to a local trading platform where the residential customers having excess PV power (prosumers) can interact with their neighbors without PV resources (customers) to improve the social welfare of society. However, the performance of a P2P market depends on the power system network constraints and trading strategy adopted for local energy trading. In this paper, we compare different trading strategies, i.e., the rule-based zero intelligent (ZI) strategy and the preference-based game theory (GT) approaches, for a constrained P2P platform. Quadratic trading loss and impedance-based network utilization fee models are suggested to define the network constraints for the P2P system. Additionally, a reluctance-based prosumer-sensitive model is developed to adjust the trading behavior of the participants under the heavy distribution losses/network fee. The presented results show that the suggested trading strategies enhanced the average welfare of the participants by approximately 17%. On average, the customers saved about $33.77 monthly, whereas the average monthly earnings of the prosumers were around $28.3. The ZI strategy enhanced the average monetary advantages of all the market participants by an average of 7% for a system having small distribution losses and a network fee as compared to the GT approach. Contrarily, for a system having high losses/a utilization fee, the GT approach improved the average welfare of the prosumers by around 75% compared to the ZI strategy. However, both trading strategies yielded competitive results compared to the traditional market under the standard values of network coefficients.
{"title":"Comparative Analysis of Peer-to-Peer PV Trading Strategies under the Influence of Network Constraints with Prosumer Sensitivity towards Network Coefficients","authors":"Sheroze Liaquat, Tanveer Hussain, Fadi Agha Kassab, B. Celik, Robert S. Fourney, T. Hansen","doi":"10.3390/app131810044","DOIUrl":"https://doi.org/10.3390/app131810044","url":null,"abstract":"With the increase in rooftop photovoltaic (PV) systems at the residential level, customers owning such renewable resources can act as a source of generation for other consumers in the same network. Peer-to-peer (P2P) energy trading refers to a local trading platform where the residential customers having excess PV power (prosumers) can interact with their neighbors without PV resources (customers) to improve the social welfare of society. However, the performance of a P2P market depends on the power system network constraints and trading strategy adopted for local energy trading. In this paper, we compare different trading strategies, i.e., the rule-based zero intelligent (ZI) strategy and the preference-based game theory (GT) approaches, for a constrained P2P platform. Quadratic trading loss and impedance-based network utilization fee models are suggested to define the network constraints for the P2P system. Additionally, a reluctance-based prosumer-sensitive model is developed to adjust the trading behavior of the participants under the heavy distribution losses/network fee. The presented results show that the suggested trading strategies enhanced the average welfare of the participants by approximately 17%. On average, the customers saved about $33.77 monthly, whereas the average monthly earnings of the prosumers were around $28.3. The ZI strategy enhanced the average monetary advantages of all the market participants by an average of 7% for a system having small distribution losses and a network fee as compared to the GT approach. Contrarily, for a system having high losses/a utilization fee, the GT approach improved the average welfare of the prosumers by around 75% compared to the ZI strategy. However, both trading strategies yielded competitive results compared to the traditional market under the standard values of network coefficients.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48197996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Stylianos Karagiannis, E. Magkos, Christoforos Ntantogian, Ricardo Cabecinha, Theo Fotis
Medical imaging plays a crucial role in modern healthcare, providing essential information for accurate diagnosis and treatment planning. The Digital Imaging and Communications in Medicine (DICOM) standard has revolutionized the storage, transmission, and sharing of medical images and related data. Despite its advantages, implementation and deployment of the DICOM protocol often suffers from incomplete understanding, leading to vulnerabilities within the healthcare ecosystem. This research paper presents an implementation of DICOM communication and the development of a practical demonstration for simulation purposes The simulation can be used for conducting cybersecurity tests in the context of DICOM communication. Overall, the simulation provides a digital environment that can help in retrieving valuable insights into the practical aspects of DICOM communication and PACS integration, serving as a valuable resource for medical imaging professionals, researchers, and developers. These research results provide practical insights, and the DICOM simulation can be used in realistic contexts to showcase a variety of security scenarios.
{"title":"Cybersecurity and Medical Imaging: A Simulation-Based Approach to DICOM Communication","authors":"Stylianos Karagiannis, E. Magkos, Christoforos Ntantogian, Ricardo Cabecinha, Theo Fotis","doi":"10.3390/app131810072","DOIUrl":"https://doi.org/10.3390/app131810072","url":null,"abstract":"Medical imaging plays a crucial role in modern healthcare, providing essential information for accurate diagnosis and treatment planning. The Digital Imaging and Communications in Medicine (DICOM) standard has revolutionized the storage, transmission, and sharing of medical images and related data. Despite its advantages, implementation and deployment of the DICOM protocol often suffers from incomplete understanding, leading to vulnerabilities within the healthcare ecosystem. This research paper presents an implementation of DICOM communication and the development of a practical demonstration for simulation purposes The simulation can be used for conducting cybersecurity tests in the context of DICOM communication. Overall, the simulation provides a digital environment that can help in retrieving valuable insights into the practical aspects of DICOM communication and PACS integration, serving as a valuable resource for medical imaging professionals, researchers, and developers. These research results provide practical insights, and the DICOM simulation can be used in realistic contexts to showcase a variety of security scenarios.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43053940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Retail transactions have become an integral part of the economic cycle of every country and even on a global scale. Retail transactions are a trade sector that has the potential to be developed continuously in the future. This research focused on building a specified and data-driven recommendation system based on customer-purchasing and product-selling behavior. Modified RFM analysis was used by adding two variables, namely periodicity and customer engagement index; clustering algorithm such as K-means clustering and Ward’s method; and association rules to determine the pattern of the cause–effect relationship on each transaction and four types of classifiers to apply and to validate the recommendation system. The results showed that based on customer behavior, it should be split into two groups: loyal and potential customers. In contrast, for product behavior, it also comprised three groups: bestseller, profitable, and VIP product groups. Based on the result, K-nearest neighbor is the most suitable classifier with a low chance of overfitting and a higher performance index.
{"title":"Enhancing Retail Transactions: A Data-Driven Recommendation Using Modified RFM Analysis and Association Rules Mining","authors":"Angela Hsiang-Ling Chen, Sebastian Gunawan","doi":"10.3390/app131810057","DOIUrl":"https://doi.org/10.3390/app131810057","url":null,"abstract":"Retail transactions have become an integral part of the economic cycle of every country and even on a global scale. Retail transactions are a trade sector that has the potential to be developed continuously in the future. This research focused on building a specified and data-driven recommendation system based on customer-purchasing and product-selling behavior. Modified RFM analysis was used by adding two variables, namely periodicity and customer engagement index; clustering algorithm such as K-means clustering and Ward’s method; and association rules to determine the pattern of the cause–effect relationship on each transaction and four types of classifiers to apply and to validate the recommendation system. The results showed that based on customer behavior, it should be split into two groups: loyal and potential customers. In contrast, for product behavior, it also comprised three groups: bestseller, profitable, and VIP product groups. Based on the result, K-nearest neighbor is the most suitable classifier with a low chance of overfitting and a higher performance index.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45662579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Autonomous vehicles can reduce labor power during cargo transportation, and then improve transportation efficiency, for example, the automated guided vehicle (AGV) in the warehouse can improve the operation efficiency. To overcome the limitations of traditional path planning algorithms in unknown environments, such as reliance on high-precision maps, lack of generalization ability, and obstacle avoidance capability, this study focuses on investigating the Deep Q-Network and its derivative algorithm to enhance network and algorithm structures. A new algorithm named APF-D3QNPER is proposed, which combines the action output method of artificial potential field (APF) with the Dueling Double Deep Q Network algorithm, and experience sample rewards are considered in the experience playback portion of the traditional Deep Reinforcement Learning (DRL) algorithm, which enhances the convergence ability of the traditional DRL algorithm. A long short-term memory (LSTM) network is added to the state feature extraction network part to improve its adaptability in unknown environments and enhance its spatiotemporal sensitivity to the environment. The APF-D3QNPER algorithm is compared with mainstream deep reinforcement learning algorithms and traditional path planning algorithms using a robot operating system and the Gazebo simulation platform by conducting experiments. The results demonstrate that the APF-D3QNPER algorithm exhibits excellent generalization abilities in the simulation environment, and the convergence speed, the loss value, the path planning time, and the path planning length of the APF-D3QNPER algorithm are all less than for other algorithms in diverse scenarios.
{"title":"Path Planning for Autonomous Vehicles in Unknown Dynamic Environment Based on Deep Reinforcement Learning","authors":"Hui Hu, Yuge Wang, Wenjie Tong, Jiao Zhao, Yulei Gu","doi":"10.3390/app131810056","DOIUrl":"https://doi.org/10.3390/app131810056","url":null,"abstract":"Autonomous vehicles can reduce labor power during cargo transportation, and then improve transportation efficiency, for example, the automated guided vehicle (AGV) in the warehouse can improve the operation efficiency. To overcome the limitations of traditional path planning algorithms in unknown environments, such as reliance on high-precision maps, lack of generalization ability, and obstacle avoidance capability, this study focuses on investigating the Deep Q-Network and its derivative algorithm to enhance network and algorithm structures. A new algorithm named APF-D3QNPER is proposed, which combines the action output method of artificial potential field (APF) with the Dueling Double Deep Q Network algorithm, and experience sample rewards are considered in the experience playback portion of the traditional Deep Reinforcement Learning (DRL) algorithm, which enhances the convergence ability of the traditional DRL algorithm. A long short-term memory (LSTM) network is added to the state feature extraction network part to improve its adaptability in unknown environments and enhance its spatiotemporal sensitivity to the environment. The APF-D3QNPER algorithm is compared with mainstream deep reinforcement learning algorithms and traditional path planning algorithms using a robot operating system and the Gazebo simulation platform by conducting experiments. The results demonstrate that the APF-D3QNPER algorithm exhibits excellent generalization abilities in the simulation environment, and the convergence speed, the loss value, the path planning time, and the path planning length of the APF-D3QNPER algorithm are all less than for other algorithms in diverse scenarios.","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48441487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. A. Adebimpe, Ian Ouii Ng, Mohd Yamani Idna Idris, Mohammed Okmi, Chin Soon Ku, T. F. Ang, L. Y. Por
The rapid advancement of information technology (IT) has given rise to a new era of efficient and fast communication and transactions. However, the increasing adoption of and reliance on IT has led to the exposure of personal and sensitive information online. Safeguarding this information against unauthorized access remains a persistent challenge, necessitating the implementation of improved computer security measures. The core objective of computer security is to ensure the confidentiality, availability, and integrity of data and services. Among the mechanisms developed to counter security threats, authentication stands out as a pivotal defense strategy. Graphical passwords have emerged as a popular authentication approach, yet they face vulnerability to shoulder-surfing attacks, wherein an attacker can clandestinely observe a victim’s actions. Shoulder-surfing attacks present a significant security challenge within the realm of graphical password authentication. These attacks occur when an unauthorized individual covertly observes the authentication process of a legitimate user by shoulder surfing the user or capturing the interaction through a video recording. In response to this challenge, various methods have been proposed to thwart shoulder-surfing attacks, each with distinct advantages and limitations. This study thus centers on reviewing the resilience of existing recognition-based graphical password techniques against shoulder-surfing attacks by conducting a comprehensive examination and evaluation of their benefits, strengths, and weaknesses. The evaluation process entailed accessing pertinent academic resources through renowned search engines, including Web of Science, Science Direct, IEEE Xplore, ProQuest, Scopus, Springer, Wiley Online Library, and EBSCO. The selection criteria were carefully designed to prioritize studies that focused on recognition-based graphical password methods. Through this rigorous approach, 28 studies were identified and subjected to a thorough review. The results show that fourteen of them adopted registered objects as pass-objects, bolstering security through object recognition. Additionally, two methods employed decoy objects as pass-objects, enhancing obfuscation. Notably, one technique harnessed both registered and decoy objects, amplifying the security paradigm. The results also showed that recognition-based graphical password techniques varied in their resistance to different types of shoulder-surfing attacks. Some methods were effective in preventing direct observation attacks, while others were vulnerable to video-recorded and multiple-observation attacks. This vulnerability emerged due to attackers potentially extracting key information by analyzing user interaction patterns in each challenge set. Notably, one method stood out as an exception, demonstrating resilience against all three types of shoulder-surfing attacks. In conclusion, this study contributes to a comprehensive understanding of the ef
信息技术的飞速发展带来了一个高效快捷的通信和交易的新时代。然而,对信息技术的日益采用和依赖导致个人和敏感信息在网上暴露。保护这些资料不受未经授权的查阅,仍是一项长期的挑战,因此必须实施更完善的电脑保安措施。计算机安全的核心目标是确保数据和服务的机密性、可用性和完整性。在为应对安全威胁而开发的机制中,身份验证作为一种关键的防御策略脱颖而出。图形密码已经成为一种流行的身份验证方法,但它们面临着肩冲浪攻击的脆弱性,攻击者可以秘密地观察受害者的行为。肩冲浪攻击在图形密码身份验证领域提出了重大的安全挑战。当未经授权的个人暗中观察合法用户的身份验证过程时,就会发生这些攻击,方法是通过肩部浏览用户或通过视频记录捕获交互。为了应对这一挑战,人们提出了各种方法来阻止肩部冲浪攻击,每种方法都有不同的优点和局限性。因此,本研究的重点是通过对现有的基于识别的图形密码技术的优点、优点和缺点进行全面的检查和评估,来审查其抗肩冲浪攻击的弹性。评估过程需要通过著名的搜索引擎访问相关的学术资源,包括Web of Science、Science Direct、IEEE Xplore、ProQuest、Scopus、施普林格、Wiley Online Library和EBSCO。选择标准经过精心设计,以优先考虑基于识别的图形密码方法的研究。通过这种严格的方法,确定了28项研究并对其进行了彻底审查。结果表明,其中14个采用注册对象作为通过对象,通过对象识别增强了安全性。另外,两种方法采用诱饵对象作为传递对象,增强了混淆。值得注意的是,有一种技术同时利用了注册对象和诱饵对象,从而放大了安全性范例。研究结果还表明,基于识别的图形密码技术在抵御不同类型的肩冲浪攻击方面存在差异。一些方法在防止直接观察攻击方面是有效的,而另一些方法则容易受到视频记录和多重观察攻击。此漏洞的出现是由于攻击者可能通过分析每个挑战集中的用户交互模式来提取关键信息。值得注意的是,有一种方法作为例外脱颖而出,展示了对所有三种类型的肩部冲浪攻击的弹性。总之,本研究通过分析这些方法采用的不同策略并揭示其优缺点,有助于全面了解基于识别的图形密码方法在对抗肩部冲浪攻击中的功效。
{"title":"Systemic Literature Review of Recognition-Based Authentication Method Resistivity to Shoulder-Surfing Attacks","authors":"L. A. Adebimpe, Ian Ouii Ng, Mohd Yamani Idna Idris, Mohammed Okmi, Chin Soon Ku, T. F. Ang, L. Y. Por","doi":"10.3390/app131810040","DOIUrl":"https://doi.org/10.3390/app131810040","url":null,"abstract":"The rapid advancement of information technology (IT) has given rise to a new era of efficient and fast communication and transactions. However, the increasing adoption of and reliance on IT has led to the exposure of personal and sensitive information online. Safeguarding this information against unauthorized access remains a persistent challenge, necessitating the implementation of improved computer security measures. The core objective of computer security is to ensure the confidentiality, availability, and integrity of data and services. Among the mechanisms developed to counter security threats, authentication stands out as a pivotal defense strategy. Graphical passwords have emerged as a popular authentication approach, yet they face vulnerability to shoulder-surfing attacks, wherein an attacker can clandestinely observe a victim’s actions. Shoulder-surfing attacks present a significant security challenge within the realm of graphical password authentication. These attacks occur when an unauthorized individual covertly observes the authentication process of a legitimate user by shoulder surfing the user or capturing the interaction through a video recording. In response to this challenge, various methods have been proposed to thwart shoulder-surfing attacks, each with distinct advantages and limitations. This study thus centers on reviewing the resilience of existing recognition-based graphical password techniques against shoulder-surfing attacks by conducting a comprehensive examination and evaluation of their benefits, strengths, and weaknesses. The evaluation process entailed accessing pertinent academic resources through renowned search engines, including Web of Science, Science Direct, IEEE Xplore, ProQuest, Scopus, Springer, Wiley Online Library, and EBSCO. The selection criteria were carefully designed to prioritize studies that focused on recognition-based graphical password methods. Through this rigorous approach, 28 studies were identified and subjected to a thorough review. The results show that fourteen of them adopted registered objects as pass-objects, bolstering security through object recognition. Additionally, two methods employed decoy objects as pass-objects, enhancing obfuscation. Notably, one technique harnessed both registered and decoy objects, amplifying the security paradigm. The results also showed that recognition-based graphical password techniques varied in their resistance to different types of shoulder-surfing attacks. Some methods were effective in preventing direct observation attacks, while others were vulnerable to video-recorded and multiple-observation attacks. This vulnerability emerged due to attackers potentially extracting key information by analyzing user interaction patterns in each challenge set. Notably, one method stood out as an exception, demonstrating resilience against all three types of shoulder-surfing attacks. In conclusion, this study contributes to a comprehensive understanding of the ef","PeriodicalId":48760,"journal":{"name":"Applied Sciences-Basel","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47735022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}