Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (283)

Search Parameters:
Keywords = SHA-256

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
22 pages, 3281 KB  
Article
A Privacy-Enhancing Image Encryption Algorithm for Securing Medical Images
by Ammar Odeh, Anas Abu Taleb, Tareq Alhajahjeh, Francisco Navarro, Aladdin Ayesh and Miad Faezipour
Symmetry 2025, 17(9), 1470; https://doi.org/10.3390/sym17091470 - 6 Sep 2025
Viewed by 357
Abstract
The growing digitization of healthcare has amplified concerns about the privacy and security of medical images, as conventional encryption methods often fail to provide sufficient protection. To address this gap, we propose a privacy-enhancing image encryption algorithm that integrates SHA-256 hashing, block-wise processing [...] Read more.
The growing digitization of healthcare has amplified concerns about the privacy and security of medical images, as conventional encryption methods often fail to provide sufficient protection. To address this gap, we propose a privacy-enhancing image encryption algorithm that integrates SHA-256 hashing, block-wise processing (16 × 16 with zero-padding), DNA encoding with XOR operations, and logistic map-driven key generation into a unified framework. This synergistic design balances efficiency and robustness by embedding data integrity verification, ensuring high sensitivity to initial conditions, and achieving strong diffusion through dynamic DNA rules. Experimental results confirm that the scheme achieves high NPCR (0.997), UACI (0.289), entropy (7.995), and PSNR (27.89 dB), outperforming comparable approaches while maintaining scalability to large image formats and robustness under compression (JPEG quality factors 90 and 70). These findings demonstrate that the proposed method offers an efficient and resilient solution for securing medical images, ensuring confidentiality, integrity, and practical applicability in real-world healthcare environments. Full article
(This article belongs to the Special Issue Symmetry/Asymmetry in Image Processing and Computer Vision)
Show Figures

Figure 1

19 pages, 4174 KB  
Article
Tetratricopeptide Repeat 2 Is a Quantitative Trait Locus That Controls Seed Size
by Zhuolun Wang, Stephanie Cara, Seung Y. Rhee and Bernard A. Hauser
Int. J. Mol. Sci. 2025, 26(17), 8310; https://doi.org/10.3390/ijms26178310 - 27 Aug 2025
Viewed by 402
Abstract
Seed size is a key trait affecting evolution and agronomic performance by influencing seedling establishment in natural populations and crop yields. The Arabidopsis thaliana Seed Size QTL1 (SSQ1) locus explains 10–15% of the variation in seed size. We report here that the causal [...] Read more.
Seed size is a key trait affecting evolution and agronomic performance by influencing seedling establishment in natural populations and crop yields. The Arabidopsis thaliana Seed Size QTL1 (SSQ1) locus explains 10–15% of the variation in seed size. We report here that the causal gene for this locus is Tetratricopeptide Repeat Protein 2 (TPR2), which encodes a co-chaperone. Expressing TPR2 across ecotypes and genotypes showed consistent dosage effects. Each additional TPR2Col-0 allele increased seed mass and volume by 10–14% with high reliability in Col-0, Sha, Tsu-1, and tsu2 genetic backgrounds. Reciprocal genetic crosses indicated that this locus acts maternally, consistent with female sporophytic or female gametophytic mutations. To elucidate how TPR2 regulates seed size, the biomass composition of seeds was measured. While oil content remained unchanged, sucrose levels were markedly elevated in TPR2Col-0 transformant lines and reduced in tpr2 mutants. Interestingly, heterologous expression of TPR2Col-0 across genetic backgrounds increased seed protein accumulation by 18% on average. Based on these changes in sucrose and protein levels, potential modes of action for TPR2 are discussed. Full article
(This article belongs to the Special Issue Molecular and Epigenetic Regulation in Seed Development)
Show Figures

Figure 1

12 pages, 5055 KB  
Proceeding Paper
Comprehensive Analysis of Cryptographic Algorithms: Implementation and Security Insights
by Rashid Muhenga, Fatima Sapundzhi, Metodi Popstoilov, Slavi Georgiev and Venelin Todorov
Eng. Proc. 2025, 104(1), 43; https://doi.org/10.3390/engproc2025104043 - 27 Aug 2025
Viewed by 1416
Abstract
This study surveys some cryptographic algorithms in a detailed manner; it mainly focuses on symmetric key cryptography and asymmetric key cryptography with hash functions following them. Regarding the importance of cryptography for securing communications and data integrity in the digital era, we show—using [...] Read more.
This study surveys some cryptographic algorithms in a detailed manner; it mainly focuses on symmetric key cryptography and asymmetric key cryptography with hash functions following them. Regarding the importance of cryptography for securing communications and data integrity in the digital era, we show—using practical examples with Python 3.10 and Crypto 2 tool—how a few implementations of such encryption techniques work. To clarify this further, Caesar Cipher represents a very simple varying key, and each round of stream ciphers or block ciphers exhibits highly advanced symmetric techniques. Then, we discuss asymmetric cryptography using RSA encryption with public–private key pairs for a secure communication. Furthermore, research has been conducted into the hash functions SHA-1 and SHA-2, which form unique digital fingerprints of the information provided. This approach allows us to highlight all the positive and negative aspects of the above tools and to identify the comparative characteristics of their degree of security. This fact is highly important in determining the applicability of the security tools described above, depending on the conditions of work and threats. Full article
Show Figures

Figure 1

30 pages, 5210 KB  
Article
Highly Efficient and Secure Metadata-Driven Integrity Measurement for Containers
by Li Zhang, Shu-Pan Li, Jing-Pu Zhang, Guang-Jun Qin and Yu-An Tan
Electronics 2025, 14(17), 3393; https://doi.org/10.3390/electronics14173393 - 26 Aug 2025
Viewed by 323
Abstract
The integrity measurement mechanism (IMM) is key to creating a trusted execution environment (TEE) for containers. It ensures that files inside containers are real and have not been tampered with. However, traditional IMMs are inefficient. This is because they rely on message-digest algorithms [...] Read more.
The integrity measurement mechanism (IMM) is key to creating a trusted execution environment (TEE) for containers. It ensures that files inside containers are real and have not been tampered with. However, traditional IMMs are inefficient. This is because they rely on message-digest algorithms (MDAs), which require a lot of time and space. This makes them hard to use in environments where resources are limited. To solve these problems, we present two novel metadata-driven IMMs, the Overlay2 IMM and the Btrfs IMM, which use the built-in metadata structures of the Overlay2 and Btrfs filesystems, respectively. Compared to MDA-based IMMs, these new IMMs are much more efficient in operation. They are also more secure because they use an external validation mechanism that does not depend on the container’s running state. This effectively reduces security risks in dynamic environments. We built complete prototypes of these new IMMs. We tested them on edge servers with Intel CPUs and embedded devices with ARM CPUs. When we compared them with traditional MDA-based methods (including MD5 and SHA256), we found significant improvements. Our methods are more efficient in computation. They reduce the need for space and time by using filesystem metadata instead of hashing entire files. This makes them suitable for environments with limited resources. They run outside the container, so malicious actors inside the container cannot detect them, ensuring robust protection. In addition, they can check file integrity consistently no matter the container’s state (running, paused, or stopped). This is because they use metadata from the container image, which improves the overall reliability and consistency of the integrity measurement process. Full article
(This article belongs to the Section Networks)
Show Figures

Figure 1

18 pages, 3021 KB  
Article
Secure LoRa Drone-to-Drone Communication for Public Blockchain-Based UAV Traffic Management
by Jing Huey Khor, Michail Sidorov and Melissa Jia Ying Chong
Sensors 2025, 25(16), 5087; https://doi.org/10.3390/s25165087 - 15 Aug 2025
Viewed by 716
Abstract
Unmanned Aerial Vehicles (UAVs) face collision risks due to Beyond Visual Line of Sight operations. Therefore, UAV Traffic Management (UTM) systems are used to manage and monitor UAV flight paths. However, centralized UTM systems are susceptible to various security attacks and are inefficient [...] Read more.
Unmanned Aerial Vehicles (UAVs) face collision risks due to Beyond Visual Line of Sight operations. Therefore, UAV Traffic Management (UTM) systems are used to manage and monitor UAV flight paths. However, centralized UTM systems are susceptible to various security attacks and are inefficient in managing flight data from different service providers. It further fails to provide low-latency communication required for UAV real-time operations. Thus, this paper proposes to integrate Drone-to-Drone (D2D) communication protocol into a secure public blockchain-based UTM system to enable direct communication between UAVs for efficient collision avoidance. The D2D protocol is designed using SHA256 hash function and bitwise XOR operations. A proof of concept has been built to verify that the UTM system is secure by enabling authorized service providers to view sensitive flight data only using legitimate secret keys. The security of the protocol has been analyzed and has been proven to be secure from key disclosure, adversary-in-the-middle, replay, and tracking attacks. Its performance has been evaluated and is proven to outperform existing studies by having the lowest computation cost of 0.01 ms and storage costs of 544–800 bits. Full article
(This article belongs to the Section Communications)
Show Figures

Graphical abstract

21 pages, 2365 KB  
Article
Development of an Optimization Algorithm for Designing Low-Carbon Concrete Materials Standardization with Blockchain Technology and Ensemble Machine Learning Methods
by Zilefac Ebenezer Nwetlawung and Yi-Hsin Lin
Buildings 2025, 15(16), 2809; https://doi.org/10.3390/buildings15162809 - 8 Aug 2025
Viewed by 628
Abstract
This study presents SmartMix Web3, a framework combining ensemble machine learning and blockchain technology to optimize low-carbon concrete design. It addresses two key challenges: (1) the limitations of conventional models in predicting concrete performance, and (2) ensuring data reliability and overcoming collaboration issues [...] Read more.
This study presents SmartMix Web3, a framework combining ensemble machine learning and blockchain technology to optimize low-carbon concrete design. It addresses two key challenges: (1) the limitations of conventional models in predicting concrete performance, and (2) ensuring data reliability and overcoming collaboration issues in AI-driven sustainable construction. Validated with 61 real-world experiments in Cameroon and 752 mix designs, the framework shows major improvements in predictive accuracy and decentralized trust. To address the first research question, a stacked ensemble model comprising Extreme Gradient Boosting (XGBoost)–Random Forest and a Convolutional Neural Network (CNN) was developed, achieving a 22% reduction in Root Mean Square Error (RMSE) for compressive strength prediction and embodied carbon estimation compared to traditional methods. The 29% reduction in Mean Absolute Error (MAE) results confirms the superiority of Extreme Learning Machine (EML) in low-carbon concrete performance prediction. For the second research question, SmartMix Web3 employs blockchain to ensure tamper-proof traceability and promote collaboration. Deployed on Ethereum, it automates verification of tokenized Environmental Product Declarations via smart contracts, reducing disputes and preserving data integrity. Federated learning supports decentralized training across nine batching plants, with Secure Hash Algorithm (SHA)-256 checks ensuring privacy. Field implementation in Cameroon yielded annual cost savings of FCFA 24.3 million and a 99.87 kgCO2/m3 reduction per mix design. By uniting EML precision with blockchain transparency, SmartMix Web3 offers practical and scalable benefits for sustainable construction in developing economies. Full article
(This article belongs to the Section Building Materials, and Repair & Renovation)
Show Figures

Figure 1

19 pages, 2250 KB  
Article
Enhancing Image Super-Resolution Models with Shift Operations and Hybrid Attention Mechanisms
by Hsin-Ming Tseng, Wei-Ming Tseng, Jhe-Wei Lin, Guan-Lin Tan and Hsueh-Ting Chu
Electronics 2025, 14(15), 2974; https://doi.org/10.3390/electronics14152974 - 25 Jul 2025
Viewed by 535
Abstract
This study proposes an optimized approach to address the high computational demands and significant GPU memory consumption commonly associated with Transformer-based models. Building upon the HAT framework, a shallow feature extraction module is enhanced to improve local feature representation, thereby achieving a better [...] Read more.
This study proposes an optimized approach to address the high computational demands and significant GPU memory consumption commonly associated with Transformer-based models. Building upon the HAT framework, a shallow feature extraction module is enhanced to improve local feature representation, thereby achieving a better balance between computational efficiency and model performance. Furthermore, inspired by self-supervised learning (SSL) techniques and incorporating shift operations, the proposed method effectively reduces both the number of parameters and the overall computational load. The resulting ISR-SHA model is trained and evaluated on the DF2K dataset, achieving approximately a 30% reduction in FLOPs and parameter count compared to the original HAT model, with only marginal declines in PSNR (0.02) and SSIM (0.0006). Experimental results confirm that ISR-SHA outperforms most existing super-resolution models in terms of performance while significantly enhancing computational efficiency without compromising output quality. Full article
Show Figures

Figure 1

17 pages, 1391 KB  
Article
High-Throughput Post-Quantum Cryptographic System: CRYSTALS-Kyber with Computational Scheduling and Architecture Optimization
by Shih-Hsiang Chou, Yu-Hua Yang, Wen-Long Chin, Ci Chen, Cheng-Yu Tsao and Pin-Luen Tung
Electronics 2025, 14(15), 2969; https://doi.org/10.3390/electronics14152969 - 24 Jul 2025
Viewed by 681
Abstract
With the development of a quantum computer in the near future, classical public-key cryptography will face the challenge of being vulnerable to quantum algorithms, such as Shor’s algorithm. As communication technology advances rapidly, a great deal of personal information is being transmitted over [...] Read more.
With the development of a quantum computer in the near future, classical public-key cryptography will face the challenge of being vulnerable to quantum algorithms, such as Shor’s algorithm. As communication technology advances rapidly, a great deal of personal information is being transmitted over the Internet. Based on our observation that the Kyber algorithm exhibits a significant number of idle cycles during execution when implemented following the conventional software procedure, this paper proposes a high-throughput scheduling for Kyber by parallelizing the SHA-3 function, the sampling algorithm, and the NTT computations to improve hardware utilization and reduce latency. We also introduce the 8-stage pipelined SHA-3 architecture and multi-mode polynomial arithmetic module to increase area efficiency. By also optimizing the hardware architecture of the various computational modules used by Kyber, according to the implementation result, an aggregate throughput of 877.192 kOPS in Kyber KEM can be achieved on TSMC 40 nm. In addition, our design not only achieves the highest throughput among existing studies but also improves the area and power efficiencies. Full article
Show Figures

Figure 1

20 pages, 5416 KB  
Article
A Novel One-Dimensional Chaotic System for Image Encryption Through the Three-Strand Structure of DNA
by Yingjie Su, Han Xia, Ziyu Chen, Han Chen and Linqing Huang
Entropy 2025, 27(8), 776; https://doi.org/10.3390/e27080776 - 23 Jul 2025
Cited by 1 | Viewed by 468
Abstract
Digital images have been widely applied in fields such as mobile devices, the Internet of Things, and medical imaging. Although significant progress has been made in image encryption technology, it still faces many challenges, such as attackers using powerful computing resources and advanced [...] Read more.
Digital images have been widely applied in fields such as mobile devices, the Internet of Things, and medical imaging. Although significant progress has been made in image encryption technology, it still faces many challenges, such as attackers using powerful computing resources and advanced algorithms to crack encryption systems. To address these challenges, this paper proposes a novel image encryption algorithm based on one-dimensional sawtooth wave chaotic system (1D-SAW) and the three-strand structure of DNA. Firstly, a new 1D-SAW chaotic system was designed. By introducing nonlinear terms and periodic disturbances, this system is capable of generating chaotic sequences with high randomness and initial value sensitivity. Secondly, a new diffusion rule based on the three-strand structure of DNA is proposed. Compared with the traditional DNA encoding and XOR operation, this rule further enhances the complexity and anti-attack ability of the encryption process. Finally, the security and randomness of the 1D-SAW and image encryption algorithms were verified through various tests. Results show that this method exhibits better performance in resisting statistical attacks and differential attacks. Full article
(This article belongs to the Topic Recent Trends in Nonlinear, Chaotic and Complex Systems)
Show Figures

Figure 1

20 pages, 2206 KB  
Article
Parallelization of Rainbow Tables Generation Using Message Passing Interface: A Study on NTLMv2, MD5, SHA-256 and SHA-512 Cryptographic Hash Functions
by Mark Vainer, Arnas Kačeniauskas and Nikolaj Goranin
Appl. Sci. 2025, 15(15), 8152; https://doi.org/10.3390/app15158152 - 22 Jul 2025
Viewed by 874
Abstract
Rainbow table attacks utilize a time-memory trade-off to efficiently crack passwords by employing precomputed tables containing chains of passwords and hash values. Generating these tables is computationally intensive, and several researchers have proposed utilizing parallel computing to speed up the generation process. This [...] Read more.
Rainbow table attacks utilize a time-memory trade-off to efficiently crack passwords by employing precomputed tables containing chains of passwords and hash values. Generating these tables is computationally intensive, and several researchers have proposed utilizing parallel computing to speed up the generation process. This paper introduces a modification to the traditional master-slave parallelization model using the MPI framework, where, unlike previous approaches, the generation of starting points is decentralized, allowing each process to generate its own tasks independently. This design is proposed to reduce communication overhead and improve the efficiency of rainbow table generation. We reduced the number of inter-process communications by letting each process generate chains independently. We conducted three experiments to evaluate the performance of the parallel rainbow tables generation algorithm for four cryptographic hash functions: NTLMv2, MD5, SHA-256 and SHA-512. The first experiment assessed parallel performance, showing near-linear speedup and 95–99% efficiency across varying numbers of nodes. The second experiment evaluated scalability by increasing the number of processed chains from 100 to 100,000, revealing that higher workloads significantly impacted execution time, with SHA-512 being the most computationally intensive. The third experiment evaluated the effect of chain length on execution time, confirming that longer chains increase computational cost, with SHA-512 consistently requiring the most resources. The proposed approach offers an efficient and practical solution to the computational challenges of rainbow tables generation. The findings of this research can benefit key stakeholders, including cybersecurity professionals, ethical hackers, digital forensics experts and researchers in cryptography, by providing an efficient method for generating rainbow tables to analyze password security. Full article
Show Figures

Figure 1

22 pages, 1195 KB  
Article
Private Blockchain-Driven Digital Evidence Management Systems: A Collaborative Mining and NFT-Based Framework
by Butrus Mbimbi, David Murray and Michael Wilson
Information 2025, 16(7), 616; https://doi.org/10.3390/info16070616 - 17 Jul 2025
Viewed by 627
Abstract
Secure Digital Evidence Management Systems (DEMSs) ae crucial for law enforcement agencies, because traditional systems are prone to tampering and unauthorised access. Blockchain technology, particularly private blockchains, offers a solution by providing a centralised and tamper-proof system. This study proposes a private blockchain [...] Read more.
Secure Digital Evidence Management Systems (DEMSs) ae crucial for law enforcement agencies, because traditional systems are prone to tampering and unauthorised access. Blockchain technology, particularly private blockchains, offers a solution by providing a centralised and tamper-proof system. This study proposes a private blockchain using Proof of Work (PoW) to securely manage digital evidence. Miners are assigned specific nonce ranges to accelerate the mining process, called collaborative mining, to enhance the scalability challenges in DEMSs. Transaction data includes digital evidence to generate a Non-Fungible Token (NFT). Miners use NFTs to solve the puzzle according to the assigned difficulty level d, so as to generate a hash using SHA-256 and add it to the ledger. Users can verify the integrity and authenticity of records by re-generating the hash and comparing it with the one stored in the ledger. Our results show that the data was verified with 100% precision. The mining time was 2.5 s, and the nonce iterations were as high as 80×103 for d=5. This approach improves the scalability and integrity of digital evidence management by reducing the overall mining time. Full article
(This article belongs to the Special Issue Blockchain and AI: Innovations and Applications in ICT)
Show Figures

Figure 1

17 pages, 2902 KB  
Article
Analysis of Sand Production Mechanisms in Tight Gas Reservoirs: A Case Study from the Wenxing Gas Area, Northwestern Sichuan Basin
by Qilin Liu, Xinyao Zhang, Cheng Du, Kaixiang Di, Shiyi Xie, Huiying Tang, Jing Luo and Run Shu
Processes 2025, 13(7), 2278; https://doi.org/10.3390/pr13072278 - 17 Jul 2025
Viewed by 422
Abstract
In tight sandstone gas reservoirs, proppant flowback severely limits stable gas production. This study uses laboratory flowback experiments and field analyses of the ShaXimiao tight sandstone in the Wenxing gas area to investigate the mechanisms controlling sand production. The experiments show that displacing [...] Read more.
In tight sandstone gas reservoirs, proppant flowback severely limits stable gas production. This study uses laboratory flowback experiments and field analyses of the ShaXimiao tight sandstone in the Wenxing gas area to investigate the mechanisms controlling sand production. The experiments show that displacing fluid viscosity significantly affects the critical sand-flow velocity: with high-viscous slickwater (5 mPa·s), the critical velocity is 66% lower than with low-viscous formation water (1.15 mPa·s). The critical velocity for coated proppant is three times that of the mixed quartz sand and coated proppant. If the confining pressure is maintained, but the flow rate is further increased after the proppant flowback, a second instance of sand production can be observed. X-ray diffraction (XRD) tests were conducted for sand produced from practical wells to help find the sand production reasons. Based on experimental and field data analysis, sand production in Well X-1 primarily results from proppant detachment during rapid shut-in/open cycling operations, while in Well X-2, it originates from proppant crushing. The risk of formation sand production is low for both wells (the volumetric fraction of calcite tested from the produced sands is smaller than 0.5%). These findings highlight the importance of fluid viscosity, proppant consolidation, and pressure management in controlling sand production. Full article
(This article belongs to the Special Issue Advances in Enhancing Unconventional Oil/Gas Recovery, 2nd Edition)
Show Figures

Figure 1

15 pages, 271 KB  
Article
Evaluating the Energy Costs of SHA-256 and SHA-3 (KangarooTwelve) in Resource-Constrained IoT Devices
by Iain Baird, Isam Wadhaj, Baraq Ghaleb, Craig Thomson and Gordon Russell
IoT 2025, 6(3), 40; https://doi.org/10.3390/iot6030040 - 11 Jul 2025
Viewed by 642
Abstract
The rapid expansion of Internet of Things (IoT) devices has heightened the demand for lightweight and secure cryptographic mechanisms suitable for resource-constrained environments. While SHA-256 remains a widely used standard, the emergence of SHA-3 particularly the KangarooTwelve variant offers potential benefits in flexibility [...] Read more.
The rapid expansion of Internet of Things (IoT) devices has heightened the demand for lightweight and secure cryptographic mechanisms suitable for resource-constrained environments. While SHA-256 remains a widely used standard, the emergence of SHA-3 particularly the KangarooTwelve variant offers potential benefits in flexibility and post-quantum resilience for lightweight resource-constrained devices. This paper presents a comparative evaluation of the energy costs associated with SHA-256 and SHA-3 hashing in Contiki 3.0, using three generationally distinct IoT platforms: Sky Mote, Z1 Mote, and Wismote. Unlike previous studies that rely on hardware acceleration or limited scope, our work conducts a uniform, software-only analysis across all motes, employing consistent radio duty cycling, ContikiMAC (a low-power Medium Access Control protocol) and isolating the cryptographic workload from network overhead. The empirical results from the Cooja simulator reveal that while SHA-3 provides advanced security features, it incurs significantly higher CPU and, in some cases, radio energy costs particularly on legacy hardware. However, modern platforms like Wismote demonstrate a more balanced trade-off, making SHA-3 viable in higher-capability deployments. These findings offer actionable guidance for designers of secure IoT systems, highlighting the practical implications of cryptographic selection in energy-sensitive environments. Full article
Show Figures

Figure 1

24 pages, 3167 KB  
Article
Effects of Vegetation Heterogeneity on Butterfly Diversity in Urban Parks: Applying the Patch–Matrix Framework at Fine Scales
by Dan Han, Cheng Wang, Junying She, Zhenkai Sun and Luqin Yin
Sustainability 2025, 17(14), 6289; https://doi.org/10.3390/su17146289 - 9 Jul 2025
Viewed by 481
Abstract
(1) Background: Urban parks play a critical role in conserving biodiversity within city landscapes, yet the effects of fine-scale microhabitat heterogeneity remain poorly understood. This study examines how land cover and vegetation unit type within parks influence butterfly diversity. (2) Methods: From July [...] Read more.
(1) Background: Urban parks play a critical role in conserving biodiversity within city landscapes, yet the effects of fine-scale microhabitat heterogeneity remain poorly understood. This study examines how land cover and vegetation unit type within parks influence butterfly diversity. (2) Methods: From July to September 2019 and June to September 2020, adult butterflies were surveyed in 27 urban parks across Beijing. We classified vegetation into units based on vertical structure and management intensity, and then applied the patch–matrix framework and landscape metrics to quantify fine-scale heterogeneity in vegetation unit composition and configuration. Generalized linear models (GLM), generalized additive models (GAM), and random forest (RF) models were applied to identify factors influencing butterfly richness (Chao1 index) and abundance. (3) Results: In total, 10,462 individuals representing 37 species, 28 genera, and five families were recorded. Model results revealed that the proportion of park area covered by spontaneous herbaceous areas (SHA), wooded spontaneous meadows (WSM), and the Shannon diversity index (SHDI) of vegetation units were positively associated with butterfly species richness. In contrast, butterfly abundance was primarily influenced by the proportion of park area covered by cultivated meadows (CM) and overall green-space coverage. (4) Conclusions: Fine-scale vegetation patch composition within urban parks significantly influences butterfly diversity. Our findings support applying the patch–matrix framework at intra-park scales and suggest that integrating spontaneous herbaceous zones—especially wooded spontaneous meadows—with managed flower-rich meadows will enhance butterfly diversity in urban parks. Full article
Show Figures

Figure 1

15 pages, 10114 KB  
Article
Effect of Grain Size and Incidence Angle on Erosive Wear of Polyurea Coating
by Justyna Sokolska and Piotr Sokolski
Appl. Sci. 2025, 15(13), 7568; https://doi.org/10.3390/app15137568 - 5 Jul 2025
Viewed by 535
Abstract
This study investigated the erosive wear of a polyurea coating with a hardness of 95 ShA and a thickness of 3 mm applied to a 3 mm thick plate made of S235 steel. The process of erosive wear was carried out using a [...] Read more.
This study investigated the erosive wear of a polyurea coating with a hardness of 95 ShA and a thickness of 3 mm applied to a 3 mm thick plate made of S235 steel. The process of erosive wear was carried out using a stream of compressed air containing abrasive grains of aluminum oxide (Al2O3). The erosive wear was studied using different incidence angles (45°, 60° and 90°) and erosive grain sizes. Thus, the effects of the incidence angle and erosive grain size on the erosive wear of the polyurea coating were analyzed. Erosive wear was determined as linear wear: the depth of the wear trace was measured using an optical profilometer. This study showed a non-linear correlation between erosive wear, incidence angle and erosive particle size. In addition, a qualitative study of the surface of the coating after a wear test was carried out using a scanning electron microscope, which made it possible to describe the mechanisms of erosive wear of the polyurea coating. Full article
Show Figures

Figure 1

Back to TopTop