Skip Content
You are currently on the new version of our website. Access the old version .

Electronics, Volume 14, Issue 8

2025 April-2 - 208 articles

Cover Story: In the following study, an underwater hyperspectral LiDAR (UDHSL) system was designed with a 450–700 nm spectral range, 10–300 nm adjustable bandwidth, and 50 kHz–1 MHz tunable repetition frequency. Featuring ≤1 mrad divergence, 7 ns pulses, and 7.5 µJ energy, the system achieves 1.13 cm ranging resolution and 1.02 m accuracy at a range of 27 m. Experimental 3D mapping demonstrates synchronized spectral-topographic data acquisition through 11-band (450–650 nm) point clouds: distance-colored models reveal target geometry, normalized intensity visualizations enable spectral discrimination, and RGB composites facilitate true-color representation. The system's dual sensing capabilities advance underwater exploration by concurrently resolving the spatial and spectral signatures of submerged targets. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (208)

  • Article
  • Open Access
3 Citations
2,140 Views
25 Pages

Assessing Urban Activity and Accessibility in the 20 min City Concept

  • Tsetsentsengel Munkhbayar,
  • Zolzaya Dashdorj,
  • Hun-Hee Cho,
  • Jun-Woo Lee,
  • Tae-Koo Kang and
  • Erdenebaatar Altangerel

The 20 min city concept ensures that essential services—such as work, education, healthcare, and recreation—are accessible within a 20 min walk or transit ride. This study evaluates urban accessibility in Ulaanbaatar by analyzing Points o...

  • Article
  • Open Access
1 Citations
1,327 Views
23 Pages

In 5G and beyond 5G networks, function placement is a crucial strategy for enhancing the flexibility and efficiency of the Radio Access Network (RAN). However, demonstrating optimal function splitting and placement to meet diverse user demands remain...

  • Article
  • Open Access
5 Citations
3,735 Views
24 Pages

A Secure Bank Loan Prediction System by Bridging Differential Privacy and Explainable Machine Learning

  • Muhammad Minoar Hossain,
  • Mohammad Mamun,
  • Arslan Munir,
  • Mohammad Motiur Rahman and
  • Safiul Haque Chowdhury

Bank loan prediction (BLP) analyzes the financial records of individuals to conclude possible loan status. Financial records always contain confidential information. Hence, privacy is significant in the BLP system. This research aims to generate a pr...

  • Article
  • Open Access
1 Citations
1,204 Views
18 Pages

Intracranial aneurysm is a common clinical disease that seriously endangers the health of patients. In view of the shortcomings of existing intracranial aneurysm recognition methods in dealing with complex aneurysm morphologies, varying sizes, as wel...

  • Article
  • Open Access
2 Citations
1,873 Views
29 Pages

In automotive software development, testing and validation workloads are often concentrated at the end of the development cycle, leading to delays and late-stage issue discovery. To address this, virtual Electronic Control Units (vECUs) have gained a...

  • Article
  • Open Access
1 Citations
923 Views
25 Pages

Mobile edge computing (MEC) has emerged as a promising paradigm to enhance computational capabilities at the network edge, enabling low-latency services for users while ensuring efficient resource utilization for operators. One of the key challenges...

  • Article
  • Open Access
2 Citations
2,385 Views
32 Pages

Assertion-Based Verification of I2C Module Using SystemVerilog

  • Dae-Won Moon,
  • Seung-Hyun Pyo,
  • Dae-Ki Hong,
  • Otgonbayar Bataa and
  • Erdenekhuu Norinpel

In today’s semiconductor verification field, SystemVerilog Assertions (SVAs) are one of the most important methodologies for functional verification. A representative verification technique is Universal Verification Methodology (UVM)-based veri...

  • Article
  • Open Access
735 Views
23 Pages

A Fast Framework for Generating Radioactive Mixture Spectra and Its Application to Remote High-Performance Mixture Identification

  • Chiman Kwan,
  • Bulent Ayhan,
  • Adam Stavola,
  • Kazi Aminul Islam,
  • Hongfang Zhang and
  • Jiang Li

Remote detection of radioactive materials in mixtures using handheld or portal detectors remains a challenge because of factors such as low concentration, environmental interference, sensor noise, and other complications. This work introduces a fast...

  • Article
  • Open Access
2,029 Views
26 Pages

The non-uniform memory access (NUMA) architecture is the de facto norm in modern server processors. Applications running on NUMA processors may suffer significant performance degradation (NUMA effect) due to the non-uniform memory accesses, including...

  • Review
  • Open Access
2 Citations
2,968 Views
37 Pages

Cyber–Physical Resilience: Evolution of Concept, Indicators, and Legal Frameworks

  • Antonella Longo,
  • Ali Aghazadeh Ardebili,
  • Alessandro Lazari and
  • Antonio Ficarella

The protection of critical infrastructures (CIs) from cyber–physical threats and natural hazards has become increasingly vital in modern society, which relies heavily on the essential services provided by these infrastructures. The European Uni...

  • Article
  • Open Access
1,366 Views
17 Pages

SSA-VMD-Double-Fuzzy-Logic for Human Vital Signs Detection Using a UWB Radar

  • Ji Li,
  • Weixin Zhang,
  • Zeping Xu,
  • Yunpeng Wang,
  • Zhaotian Deng,
  • Chengwu You and
  • Chengpei Tang

Ultra-wide-band (UWB) radar technology is a contactless signal detection technology. The UWB technology can be used for the clinical medical monitoring of the human heartbeat and respiration. In this paper, a novel algorithm is proposed to estimate h...

  • Article
  • Open Access
1,280 Views
39 Pages

IV-Nlp: A Methodology to Understand the Behavior of DL Models and Its Application from a Causal Approach

  • Yudi Guzman-Monteza,
  • Juan M. Fernandez-Luna and
  • Francisco J. Ribadas-Pena

Integrating causal inference and estimation methods, especially in Natural Language Processsing (NLP), is essential to improve interpretability and robustness in deep learning (DL) models. The objectives are to present the IV-NLP methodology and its...

  • Article
  • Open Access
1 Citations
1,121 Views
11 Pages

The evaluation of driver workload in the lead vehicle of a driver-following autonomous truck platoon was conducted using bio-signal analysis. In this study, a single driver operated the lead vehicle while the second and third trucks followed autonomo...

  • Article
  • Open Access
1,196 Views
19 Pages

Named entity recognition and relation extraction are two crucial techniques in the construction of knowledge graphs, as their performance directly impacts downstream tasks. In scenarios such as social media, where text is short and contains numerous...

  • Article
  • Open Access
1 Citations
1,387 Views
25 Pages

While blockchain’s immutability ensures data integrity, it also poses significant challenges when dealing with illegal or erroneous data that require modification. The concept of redactable blockchain has emerged, utilizing Chameleon Hash (CH)...

  • Article
  • Open Access
8 Citations
2,167 Views
25 Pages

Motor Current Signature Analysis (MCSA) is a commonly used non-invasive method for diagnosing faults in electric motors. Although MCSA provides significant advantages—current signals are easy to acquire and inherently robust against noise&mdash...

  • Article
  • Open Access
1,701 Views
23 Pages

Webshells are widely used by attackers to maintain access during the post-exploitation phase. As security defenses improve, traditional file-based Webshells are increasingly detectable. To evade detection, attackers are shifting toward fileless Websh...

  • Article
  • Open Access
2 Citations
1,133 Views
22 Pages

Advancing Secret Sharing in 3D Models Through Vertex Index Sharing

  • Yuan-Yu Tsai,
  • Jyun-Yu Jhou,
  • Tz-Yi You and
  • Ching-Ta Lu

Secret sharing is a robust data protection technique that secures sensitive information by partitioning it into multiple shares, such that the original data can only be reconstructed when a sufficient number of shares are combined. While this method...

  • Article
  • Open Access
1 Citations
2,460 Views
19 Pages

TeeDFuzzer: Fuzzing Trusted Execution Environment

  • Sheng Wen,
  • Liam Xu,
  • Liwei Tian,
  • Suping Liu and
  • Yong Ding

The Trusted Execution Environment (TEE) is crucial for safeguarding the ecosystem of embedded systems. It uses isolation to minimize the TCB (Trusted Computing Base) and protect sensitive software. It is vital because devices handle vast, potentially...

  • Article
  • Open Access
1,044 Views
14 Pages

To address the challenges in insulator defect detection for transmission lines, including complex background interference, varying defect region scales, and sample imbalance, we propose a detection method that effectively integrates scene perception...

  • Article
  • Open Access
8 Citations
2,066 Views
23 Pages

Design and Optimization of an Internet of Things-Based Cloud Platform for Autonomous Agricultural Machinery Using Narrowband Internet of Things and 5G Dual-Channel Communication

  • Baidong Zhao,
  • Dingkun Zheng,
  • Chenghan Yang,
  • Shuang Wang,
  • Madina Mansurova,
  • Sholpan Jomartova,
  • Nadezhda Kunicina,
  • Anatolijs Zabasta,
  • Vladimir Beliaev and
  • Roberts Grants
  • + 1 author

This paper proposes a design and optimization scheme for an Internet of Things (IoT)-based cloud platform aimed at enhancing the communication efficiency and operational performance of autonomous agricultural machinery. The platform integrates the du...

  • Article
  • Open Access
4 Citations
1,438 Views
19 Pages

This study proposes an improved bidirectional dynamic jump point search (JPS) algorithm to address key challenges in mobile robot path planning, including excessive node expansions, poor path smoothness, safety concerns, and extended search times. Th...

  • Article
  • Open Access
2,764 Views
22 Pages

The rapid advancement of 3D imaging technology and depth cameras has made depth data more accessible for applications such as virtual reality and autonomous driving. However, depth maps typically suffer from lower resolution and quality compared to c...

  • Article
  • Open Access
4,075 Views
21 Pages

Package Integration and System Performance Analysis of Glass-Based Passive Components for 5G New Radio Millimeter-Wave Modules

  • Muhammad Ali,
  • Atom Watanabe,
  • Takenori Kakutani,
  • Pulugurtha M. Raj,
  • Rao. R. Tummala and
  • Madhavan Swaminathan

In this paper, package integration of glass–based passive components for 5G new radio (NR) millimeter–wave (mm wave) bands and an analysis of their system performance are presented. Passive components such as diplexers and couplers coveri...

  • Feature Paper
  • Article
  • Open Access
582 Views
19 Pages

Cascadable Complementary SSF-Based Biquads with 8 GHz Cutoff Frequency and Very Low Power Consumption

  • Matteo Lombardo,
  • Francesco Centurelli,
  • Pietro Monsurrò and
  • Alessandro Trifiletti

Low-pass filters with bandwidths larger than several GHz are required in many applications, such as anti-aliasing filters in high-speed ADCs and pulse-shaping filters in high-speed DACs. In highly integrated applications, low area occupation and powe...

  • Article
  • Open Access
903 Views
19 Pages

An Integrated RF Sensor Design for Anchor-Free Collaborative Localization in GNSS-Denied Environments

  • Di Bai,
  • Xinran Li,
  • Lingyun Zhou,
  • Chunyong Yang,
  • Yongqiang Cui,
  • Liyun Bai and
  • Yunhao Chen

To address the challenge of collaborative nodes being unable to accurately perceive each other’s positions in global navigation satellite system (GNSS)-denied environments (such as after hostile interference or in urban canyons), we propose a G...

  • Article
  • Open Access
1,130 Views
12 Pages

Massive multiple-input–multiple-output (MIMO) systems encounter substantial challenges in relation to channel state information (CSI) feedback; this is particularly the case in frequency division duplex systems, where the lack of channel recipr...

  • Article
  • Open Access
1 Citations
1,102 Views
21 Pages

Aiming at the problems of significant communication overheads, the low reliability of primary nodes, and the insufficient dynamic adaptability of traditional consensus algorithms in intellectual property transaction scenarios, an Improved Practical B...

  • Article
  • Open Access
2 Citations
2,028 Views
14 Pages

To address the needs of enhancing adaptive control and reducing emissions at intersections within intelligent traffic signal systems, this study innovatively proposes a deep reinforcement learning signal control model tailored for mixed traffic flows...

  • Review
  • Open Access
5 Citations
7,888 Views
25 Pages

This article aims to review the industrial applications of AI-based intelligent system algorithms in the manufacturing sector to find the latest methods used for sustainability and optimisation. In contrast to previous review articles that broadly su...

  • Article
  • Open Access
4,306 Views
24 Pages

This paper investigates the effectiveness of Chain-of-Thought (COT) reasoning in addressing length bias when deploying Large Language Models (LLMs) on the device side within wireless network environments. By conducting systematic experiments on two r...

  • Article
  • Open Access
2 Citations
1,705 Views
21 Pages

Hierarchical Federated Learning (HFL) for the Internet of Vehicles (IoV) leverages roadside units (RSU) to construct a low-latency, highly scalable multilayer cooperative training framework. However, with the rapid growth in the number of vehicle nod...

  • Article
  • Open Access
3 Citations
2,726 Views
18 Pages

Unsupervised Contrastive Learning for Time Series Data Clustering

  • Bo Cao,
  • Qinghua Xing,
  • Ke Yang,
  • Xuan Wu and
  • Longyue Li

Aiming at the problems of existing time series data clustering methods, such as the lack of similarity metric universality, the influence of dimensional catastrophe, and the limitation of feature expression ability, a time series data clustering meth...

  • Feature Paper
  • Article
  • Open Access
1 Citations
1,086 Views
37 Pages

Multibattery Charger System Based on a Multilevel Dual-Active-Bridge Power Converter

  • José M. Campos-Salazar,
  • Sergio Busquets-Monge,
  • Alber Filba-Martinez and
  • Salvador Alepuz

This work introduces a novel battery charger implemented with a four-level three-phase neutral-point-clamped converter and a four-level single-phase dual-active-bridge converter, which offers the intrinsic advantages of multilevel conversion, provide...

  • Article
  • Open Access
3 Citations
981 Views
29 Pages

Although deep learning has significantly advanced brain tumor MRI segmentation and preoperative planning, existing methods like U-Net and Transformer, which are widely used Encoder–Decoder architectures in medical image segmentation, still have...

  • Article
  • Open Access
1,057 Views
21 Pages

Temporal Map-Based Boundary Refinement Network for Video Moment Localization

  • Liang Lyu,
  • Deyin Liu,
  • Chengyuan Zhang,
  • Yilin Zhang,
  • Haoyu Ruan and
  • Lei Zhu

Video moment localization has gradually become a hot research problem in video understanding. Despite much remarkable progress, there are still two limitations in the following aspects. Firstly, previous methods usually directly regarded the moment c...

  • Article
  • Open Access
1,508 Views
23 Pages

Enhanced Power Sharing Control of an Islanded DC Microgrid with Unmatched Line Impedances

  • Mulualem Tesfaye,
  • Abdelhakim Saim,
  • Azeddine Houari,
  • Mohamed Machmoum and
  • Jean-Christophe Olivier

Nowadays, the rise of DC loads along with distributed energy resources (DERs) and energy storage systems (ESSs) have led to a growing interest in using direct current (DC) microgrid systems. Conventional droop control methods face significant limitat...

  • Article
  • Open Access
2 Citations
2,877 Views
30 Pages

Reliable fault diagnosis in railway operational equipment is critical to ensuring system safety, operational efficiency, and predictive maintenance. Existing methods struggle to capture the intricate interdependencies among fault causes, failure mode...

  • Article
  • Open Access
728 Views
21 Pages

Controlling Charge Generation in Organic Photovoltaic Ternary Blends: How Trace Ternary Additives Determine Mechanism

  • Nathan A. Cooling,
  • Krishna Feron,
  • Timothy W. Jones,
  • Warwick J. Belcher and
  • Paul C. Dastoor

A series of modified tetraphenylporphyrins varying only in the electron-donating or electron-withdrawing character of the substituents in the para-phenyl position have been blended into the active layer of MEH-PPV:PCBM bulk heterojunction solar cells...

  • Article
  • Open Access
2 Citations
2,211 Views
28 Pages

Detection of TCP and MQTT-Based DoS/DDoS Attacks on MUD IoT Networks

  • Nut Aroon,
  • Luke Kane,
  • Vicky Liu and
  • Yuefeng Li

Mitigating cyberattacks on IoT networks is critical and remains a significant challenge, as such attacks can cause severe damage to the network systems and services. Moreover, the large volume of devices in IoT networks presents another challenge in...

  • Article
  • Open Access
1 Citations
1,195 Views
30 Pages

Prototype Design for Irradiance Estimation Using Closed-Form Models and an Optimized MPPT IC Algorithm

  • Clever R. Calizaya-Neira,
  • Roger Jesus Coaquira-Castillo,
  • L. Walter Utrilla Mego,
  • Julio Cesar Herrera-Levano,
  • Alexander Palomino Lopez,
  • Edison Moreno-Cardenas and
  • Erwin J. Sacoto-Cabrera

Measuring solar irradiance is key to assessing the conversion efficiency of photovoltaic (PV) modules. Also, PV modules can be used to estimate irradiance through their electrical response to solar radiation using closed-form models (CFMs). This pape...

  • Article
  • Open Access
1 Citations
1,720 Views
22 Pages

F2SOD: A Federated Few-Shot Object Detection

  • Peng Li,
  • Tianyu Zhang,
  • Chen Qing and
  • Shuzhuang Zhang

With the popularity of edge computation, object detection applications face challenges of limited data volume and data privacy. To address these, we propose a federated few-shot object detection framework, F2SOD. It involves three steps: collaborativ...

  • Article
  • Open Access
8 Citations
6,971 Views
45 Pages

Engineering Sustainable Data Architectures for Modern Financial Institutions

  • Sergiu-Alexandru Ionescu,
  • Vlad Diaconita and
  • Andreea-Oana Radu

Modern financial institutions now manage increasingly advanced data-related activities and place a growing emphasis on environmental and energy impacts. In financial modeling, relational databases, big data systems, and the cloud are integrated, taki...

  • Article
  • Open Access
805 Views
18 Pages

Compared with the traditional brushless doubly-fed generator (BDFG), the BDFG with double stator (BDFG-DS) architecture achieves enhanced configurability by physically decoupling the power and control windings onto independent stator assemblies. The...

  • Article
  • Open Access
1 Citations
1,569 Views
24 Pages

Blockchain technology is increasingly being adopted across critical domains, such as healthcare and finance, yet it remains susceptible to anomalies and malicious attacks. Hence, robust anomaly detection is essential in these decentralized systems to...

  • Article
  • Open Access
1,458 Views
20 Pages

The increasing complexity and computational demands of deep neural networks (DNNs) pose significant challenges and deployment on resource-constrained devices due to substantial latency and considerable energy consumption. Multi-exit DNNs have emerged...

  • Article
  • Open Access
1 Citations
1,217 Views
25 Pages

Cooperative driving systems can coordinate individual vehicles on the road in a platoon, holding significant promise for enhancing traffic efficiency and lowering the energy consumption of vehicle movements. For an extended period, vehicles on the ro...

  • Article
  • Open Access
4 Citations
2,093 Views
23 Pages

Multi-Scale Feature Fusion-Based Real-Time Anomaly Detection in Industrial Control Systems

  • Lin Xu,
  • Kequan Shang,
  • Xiaohan Zhang,
  • Conghui Zheng and
  • Li Pan

Industrial control systems (ICSs) are a critical component of key infrastructure. However, as ICSs transition from isolated systems to modern networked environments, they face increasing security risks. Traditional anomaly detection methods struggle...

  • Article
  • Open Access
2 Citations
878 Views
15 Pages

Active magnetic bearings (AMBs) are a class of electromechanical equipment that effectively integrate Magnetic Bearing technology with PMSM technology, particularly for applications involving high-power and high-speed permanent magnet motors. However...

of 5

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Electronics - ISSN 2079-9292