Skip Content
You are currently on the new version of our website. Access the old version .

Electronics, Volume 12, Issue 11

2023 June-1 - 208 articles

Cover Story: In decentralized systems, trust management becomes crucial for ensuring security and trust in industrial devices and applications. To address this challenge, we propose a novel model that leverages blockchain technology for cross-domain authentication. By establishing a bridge of trust, our model enables for secure communication between different domains in the Industrial Internet of Things (IIoT) ecosystem. This mechanism enhances efficiency, promotes interoperability, and ensures data integrity, thereby inspiring advancements in industrial security and fostering a safer and more interconnected industrial landscape. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (208)

  • Article
  • Open Access
6 Citations
3,906 Views
11 Pages

In this paper, we compare a new 1.2 kV rated 4H-SiC split-gate (SG) MOSFET with the conventional planar-gate (PG) MOSFETs. Both structures were fabricated with the same design rules and process platform. Therefore, the structures have similar electri...

  • Article
  • Open Access
3 Citations
2,400 Views
14 Pages

Delay Minimization Using Hybrid RSMA-TDMA for Mobile Edge Computing

  • Fengcheng Xiao,
  • Pengxu Chen,
  • Hua Wu,
  • Yuming Mao and
  • Hongwu Liu

Rate-splitting multiple access (RSMA) has recently received attention due to its benefits in both spectral and energy efficiencies. In this paper, we propose a hybrid RSMA-time-division multiple access (TDMA) scheme for a mobile edge computing (MEC)...

  • Article
  • Open Access
3 Citations
2,392 Views
14 Pages

A Wireless, Battery-Powered Probe Based on a Dual-Tier CMOS SPAD Array for Charged Particle Sensing

  • Joana Minga,
  • Paolo Brogi,
  • Gianmaria Collazuol,
  • Gian-Franco Dalla Betta,
  • Pier Simone Marrocchesi,
  • Fabio Morsani,
  • Lucio Pancheri,
  • Lodovico Ratti,
  • Gianmarco Torilla and
  • Carla Vacchi

A compact probe for charged particle imaging, with potential applications in source activity mapping and radio-guided surgery was designed and tested. The development of this technology holds significant implications for medical imaging, offering hea...

  • Article
  • Open Access
4 Citations
2,746 Views
21 Pages

Emotion recognition commonly relies on single-modal recognition methods, such as voice and video signals, which demonstrate a good practicability and universality in some scenarios. Nevertheless, as emotion-recognition application scenarios continue...

  • Article
  • Open Access
7 Citations
2,701 Views
17 Pages

In this paper, we study the communication performance of applying unmanned aerial vehicles (UAVs) combined with intelligent reflective surfaces (IRS) in a high speed railway (HSR) scenario. This study investigates the design and performance of (multi...

  • Article
  • Open Access
2 Citations
2,063 Views
13 Pages

A TEDE Algorithm Studies the Effect of Dataset Grouping on Supervised Learning Accuracy

  • Xufei Wang,
  • Penghui Wang,
  • Jeongyoung Song,
  • Taotao Hao and
  • Xinlu Duan

Datasets are the basis for research on deep learning methods in computer vision. The impact of the percentage of training sets in a dataset on the performance of neural network models needs to be further explored. In this paper, a twice equal differe...

  • Article
  • Open Access
3 Citations
1,927 Views
17 Pages

A critic-only learning-based tracking control with prescribed performance was proposed for a class of uncertain nonlinear systems. Based on an estimator and an optimal controller, a novel controller was designed to make tracking errors uniformly ulti...

  • Article
  • Open Access
42 Citations
3,795 Views
13 Pages

Energy Efficient Load-Balancing Mechanism in Integrated IoT–Fog–Cloud Environment

  • Meenu Vijarania,
  • Swati Gupta,
  • Akshat Agrawal,
  • Matthew O. Adigun,
  • Sunday Adeola Ajagbe and
  • Joseph Bamidele Awotunde

The Internet of Things (IoT) and cloud computing have revolutionized the technological era unabatedly. These technologies have impacted our lives to a great extent. The traditional cloud model faces a variety of complications with the colossal growth...

  • Review
  • Open Access
2,768 Views
25 Pages

Deep learning has been introduced to single-image super-resolution (SISR) in the last decade. These techniques have taken over the benchmarks of SISR tasks. Nevertheless, most architectural designs necessitate substantial computational resources, lea...

  • Article
  • Open Access
3,500 Views
15 Pages

Three-dimensional object detection has attracted more and more attention from industry and academia due to its wide application in various fields such as autonomous driving and robotics. Currently, the refinement methods used by advanced two-stage de...

  • Article
  • Open Access
20 Citations
2,426 Views
20 Pages

In the era of electrification and artificial intelligence, direct current motors are widely utilized with numerous innovative adaptive and learning methods. Traditional methods utilize model-based algebraic techniques with system identification, such...

  • Article
  • Open Access
5 Citations
2,825 Views
23 Pages

Image classification methods based on deep learning have been widely used in the study of nonintrusive load identification. However, in the process of encoding the load electrical signals into images, how to fully retain features of the raw data and...

  • Article
  • Open Access
6 Citations
2,955 Views
14 Pages

In this paper, a compact high-selectivity frequency tunable bandpass filter (BPF) with constant absolute bandwidth (ABW) based on varactor-loaded step-impedance resonators (SIRs) is presented. By introducing cross coupling between resonators, a pair...

  • Article
  • Open Access
5 Citations
2,114 Views
19 Pages

The Named Data Network (NDN) enables efficient content dissemination through interest-based retrieval, name-based routing, and content caching. In the industrial Internet architecture based on NDN, device identity distribution, identification, resolu...

  • Article
  • Open Access
1,725 Views
14 Pages

Image Recognition of Group Point Objects under Interference Conditions

  • Viliam Ďuriš,
  • Anatoly V. Grigoriev and
  • Sergey G. Chumarov

The process of forming a vector-field model of flat images of group point objects, with various field-forming functions, is considered in this paper. Algorithms for recognizing group point objects in the presence of false and missing point objects ar...

  • Article
  • Open Access
15 Citations
2,789 Views
16 Pages

With the development of intelligent transportation and the rapid growth of application data, the tasks of offloading vehicles in vehicle-to-vehicle communication technology are continuously increasing. To further improve the service efficiency of the...

  • Article
  • Open Access
14 Citations
15,680 Views
20 Pages

This research article presents an analysis of health data collected from wearable devices, aiming to uncover the practical applications and implications of such analyses in personalized healthcare. The study explores insights derived from heart rate,...

  • Article
  • Open Access
3 Citations
2,545 Views
14 Pages

A Method for Suppressing False Target Jamming with Non-Uniform Stepped-Frequency Radar

  • Yongzhe Zhu,
  • Zhaojian Zhang,
  • Xiaoge Wang,
  • Binbin Li,
  • Weijian Liu and
  • Hao Chen

Stepped-frequency radar can increase the degree of freedom of the range dimension by adding a tiny stepping frequency between neighboring pulse carrier frequencies, which has a clear advantage in countering range false target jamming. However, when t...

  • Article
  • Open Access
6 Citations
2,621 Views
15 Pages

Artificial intelligence technology in the context of smart manufacturing uses manufacturing data to enable the automatic detection, classification, and identification of products in the production process, reducing production costs and human consumpt...

  • Article
  • Open Access
3 Citations
2,877 Views
11 Pages

Threshold Voltage Measurement Protocol “Triple Sense” Applied to GaN HEMTs

  • Tamiris Grossl Bade,
  • Hassan Hamad,
  • Adrien Lambert,
  • Hervé Morel and
  • Dominique Planson

The threshold voltage instability in p-GaN gate high electron mobility transistors (HEMTs) has been brought into evidence in recent years. It can lead to reliability issues in switching applications, and it can be followed by other degradation mechan...

  • Article
  • Open Access
14 Citations
4,831 Views
15 Pages

Personalized and Safe Soft Glove for Rehabilitation Training

  • Fanye Meng,
  • Chang Liu,
  • Yu Li,
  • Hao Hao,
  • Qishen Li,
  • Chenyi Lyu,
  • Zimo Wang,
  • Gang Ge,
  • Junyi Yin and
  • Xiao Xiao
  • + 1 author

Traditional hand rehabilitation devices present a challenge in providing personalized training that can lead to finger movements exceeding the safe range, resulting in secondary injuries. To address this issue, we introduce a soft rehabilitation trai...

  • Article
  • Open Access
4 Citations
1,952 Views
19 Pages

In a complex electromagnetic environment, any noise present generally exhibits strong impulsive characteristics. The performance of existing parameter estimation methods carried out in Gaussian white noise for the linear frequency modulation (LFM) si...

  • Article
  • Open Access
12 Citations
3,334 Views
21 Pages

Automated Multimodal Stress Detection in Computer Office Workspace

  • Thelma Androutsou,
  • Spyridon Angelopoulos,
  • Evangelos Hristoforou,
  • George K. Matsopoulos and
  • Dimitrios D. Koutsouris

Nowadays, changes in the conditions and nature of the workplace make it imperative to create unobtrusive systems for the automatic detection of occupational stress, which can be feasibly addressed through the adoption of Internet of Things (IoT) tech...

  • Article
  • Open Access
7 Citations
3,227 Views
17 Pages

Facial expression recognition (FER) techniques can be widely used in human-computer interaction, intelligent robots, intelligent monitoring, and other domains. Currently, FER methods based on deep learning have become the mainstream schemes. However,...

  • Article
  • Open Access
4 Citations
2,391 Views
18 Pages

Image aesthetic assessment (IAA) with neural attention has made significant progress due to its effectiveness in object recognition. Current studies have shown that the features learned by convolutional neural networks (CNN) at different learning sta...

  • Article
  • Open Access
2 Citations
2,889 Views
15 Pages

Hardware Design and Implementation of a Lightweight Saber Algorithm Based on DRC Method

  • Weifang Zheng,
  • Huihong Zhang,
  • Yuejun Zhang,
  • Yongzhong Wen,
  • Jie Lv,
  • Lei Ni and
  • Zhiyi Li

With the development of quantum computers, the security of classical cryptosystems is seriously threatened, and the Saber algorithm has become one of the potential candidates for post-quantum cryptosystems (PQCs). To address the problems of long dela...

  • Article
  • Open Access
4 Citations
2,014 Views
19 Pages

This paper addresses the challenging problem of bipartite consensus tracking of multi-agent systems that are subject to compound uncertainties and actuator faults. Specifically, the study considers a leader agent with fractional-order nonlinear dynam...

  • Article
  • Open Access
1,617 Views
11 Pages

Fingerprint Fusion Location Method Based on Wireless Signal Distribution Characteristic

  • Jianlei Yang,
  • Baoguo Yu,
  • Shichen Li,
  • Xuan Li,
  • Shuo Li,
  • Cheng Ci and
  • Hong Wu

In the context of the rapid development of the Internet and the Internet of Things technology, services based on location information have received more and more attention, and people gradually have higher expectations for the quality and experience...

  • Article
  • Open Access
2 Citations
2,148 Views
16 Pages

The shear reinforcement of dual-anchorage (SRD) is used to enhance the safety of reinforced concrete structures in construction sites. In SRD, welding is used to create shear reinforcement, and after production, a quality inspection of the welding be...

  • Article
  • Open Access
26 Citations
12,430 Views
17 Pages

Managing Digital Transformation: A Case Study in a Higher Education Institution

  • Vicente Díaz-Garcia,
  • Antonio Montero-Navarro,
  • José-Luis Rodríguez-Sánchez and
  • Rocío Gallego-Losada

The new paradigms derived from technological innovations lead to the digital transformation of organisations. Higher Education Institutions cannot ignore these changes, which affect them like any other organisation, but especially because of their ac...

  • Article
  • Open Access
9 Citations
5,333 Views
18 Pages

Improving the Accuracy of Lane Detection by Enhancing the Long-Range Dependence

  • Bo Liu,
  • Li Feng,
  • Qinglin Zhao,
  • Guanghui Li and
  • Yufeng Chen

Lane detection is a common task in computer vision that involves identifying the boundaries of lanes on a road from an image or a video. Improving the accuracy of lane detection is of great help to advanced driver assistance systems and autonomous dr...

  • Article
  • Open Access
7 Citations
2,534 Views
18 Pages

A Hybrid Forecast Model of EEMD-CNN-ILSTM for Crude Oil Futures Price

  • Jingyang Wang,
  • Tianhu Zhang,
  • Tong Lu and
  • Zhihong Xue

Crude oil has dual attributes of finance and energy. Its price fluctuation significantly impacts global economic development and financial market stability. Therefore, it is necessary to predict crude oil futures prices. In this paper, a hybrid forec...

  • Article
  • Open Access
4 Citations
2,037 Views
16 Pages

Accurate traffic forecasting is crucial for the advancement of smart cities. Although there have been many studies on traffic forecasting, the accurate forecasting of traffic volume is still a challenge. To effectively capture the spatio-temporal cor...

  • Article
  • Open Access
3 Citations
1,935 Views
22 Pages

The analysis of geomagnetic suitability is the basis and premise of geomagnetic matching navigation and positioning. A geomagnetic suitability evaluation model using mixed sampling and an improved back propagation neural network (BPNN) based on the g...

  • Article
  • Open Access
10 Citations
3,318 Views
16 Pages

A Projected AR Serious Game for Shoulder Rehabilitation Using Hand-Finger Tracking and Performance Metrics: A Preliminary Study on Healthy Subjects

  • Rosanna M. Viglialoro,
  • Giuseppe Turini,
  • Marina Carbone,
  • Sara Condino,
  • Virginia Mamone,
  • Nico Coluccia,
  • Stefania Dell’Agli,
  • Gabriele Morucci,
  • Larisa Ryskalin and
  • Marco Gesi
  • + 1 author

Research studies show that serious games can increase patient motivation regardless of age or illness and be an affordable and promising solution with respect to conventional physiotherapy. In this paper, we present the latest evolution of our system...

  • Article
  • Open Access
5 Citations
3,755 Views
17 Pages

With the emergence of cloud-native computing, serverless computing has become a popular way to deploy intensive applications due to its scalability and flexibility, and it has been increasingly applied in the field of big data processing on service p...

  • Article
  • Open Access
3 Citations
3,046 Views
17 Pages

Preliminary Design and Construction Database for Laboratory Accidents

  • Xuying Zheng,
  • Fang Miao,
  • Jiaqi Yuan,
  • Huasong Xia,
  • Piyachat Udomwong and
  • Nopasit Chakpitak

With the growth of university chemistry experiment projects, the corresponding laboratory safety risks are increasing year by year for scientific research personnel, and specialized equipment. However, accident data are not stored systematically for...

  • Article
  • Open Access
4 Citations
2,262 Views
18 Pages

In low-carbon energy systems, due to the high proportion of renewable energy access, the voltage regulation capacity of the system will decrease. Therefore, in the event of voltage violation, it is easy to cause large-scale renewable energy off-grid...

  • Article
  • Open Access
21 Citations
3,618 Views
22 Pages

Speech Emotion Recognition Based on Deep Residual Shrinkage Network

  • Tian Han,
  • Zhu Zhang,
  • Mingyuan Ren,
  • Changchun Dong,
  • Xiaolin Jiang and
  • Quansheng Zhuang

Speech emotion recognition (SER) technology is significant for human–computer interaction, and this paper studies the features and modeling of SER. Mel-spectrogram is introduced and utilized as the feature of speech, and the theory and extracti...

  • Article
  • Open Access
5 Citations
4,704 Views
16 Pages

Active noise cancellation (ANC) is the most important function in an audio device because it removes unwanted ambient noise. As many audio devices are increasingly equipped with digital signal processing (DSP) circuits, the need for low-power and hig...

  • Article
  • Open Access
1 Citations
1,717 Views
15 Pages

A Gray-Box Stability Analysis Method of Grid-Connected Inverter Considering Synchronization Dynamics

  • Tianzhi Zheng,
  • Fannie Kong,
  • Guojin Li,
  • Zhenmin Wang and
  • Yanming Chen

The Grid-Connected Inverter (GCI) can be considered a gray box when circuit and controller parameters are missing due to intellectual property rights or parameter variations caused by aging, which poses an impediment to assessing the stability of the...

  • Brief Report
  • Open Access
5 Citations
1,866 Views
10 Pages

The Internet of Vehicles (IoV) empowers intelligent and tailored services for intelligent connected vehicles (ICVs). However, with the increasing number of onboard external communication interfaces, ICVs face the challenges of malicious network intru...

  • Communication
  • Open Access
1 Citations
1,905 Views
11 Pages

A Period Training Method for Heterogeneous UUV Dynamic Task Allocation

  • Jiaxuan Xie,
  • Kai Yang,
  • Shan Gao,
  • Shixiong Bao,
  • Lei Zuo and
  • Xiangyu Wei

In the dynamic task allocation of unmanned underwater vehicles (UUVs), the schemes of UUVs need to be quickly reallocated to respond to emergencies. The most common heuristic allocation method uses predesigned optimization rules to iteratively obtain...

  • Article
  • Open Access
13 Citations
2,727 Views
14 Pages

A Robust Scheme for RIS-Assisted UAV Secure Communication in IoT

  • Pengzhi Qian,
  • Yu Zhang,
  • Xiaojuan Yan,
  • Yong Chen and
  • Yifu Sun

Reconfigurable intelligent surface (RIS)-assisted unmanned aerial vehicles (UAV) have been extensively studied on the Internet of Things (IoT) systems to improve communication performance. In this paper, we aimed to counter simultaneous jamming and e...

  • Article
  • Open Access
7 Citations
2,286 Views
44 Pages

A Multi-Strategy Sparrow Search Algorithm with Selective Ensemble

  • Zhendong Wang,
  • Jianlan Wang,
  • Dahai Li and
  • Donglin Zhu

Aiming at the deficiencies of the sparrow search algorithm (SSA), such as being easily disturbed by the local optimal and deficient optimization accuracy, a multi-strategy sparrow search algorithm with selective ensemble (MSESSA) is proposed. Firstly...

  • Feature Paper
  • Article
  • Open Access
6 Citations
1,964 Views
18 Pages

Let us consider a situation where two information brokers, whose currency is, of course, information, need to reciprocally exchange information. The two brokers, being somewhat distrustful, would like a third, mutually trusted entity to be involved i...

  • Article
  • Open Access
7 Citations
3,654 Views
36 Pages

Recently, equipment replacement and maintenance repair and operation (MRO) optimization have substantially increased owing to the aging and deterioration of industrial plants, such as steel-making factories in Korea. Therefore, plant owners are requi...

  • Review
  • Open Access
11 Citations
3,994 Views
14 Pages

Cyber security is nowadays synonymous with the reliability of elements connected to the internet. Better control of factories, security systems or even individual sensors is possible through the use of Internet of Things technology. The security of t...

  • Article
  • Open Access
5 Citations
3,134 Views
10 Pages

Flexibility and light weight have become the development trends in the field of exoskeleton research. With high movement flexibility, low movable inertia and excellent wearable comfort, such a type of system is gradually becoming an exclusive candida...

of 5

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Electronics - ISSN 2079-9292