Digital Intelligence Technology and Applications, 2nd Edition

A special issue of Electronics (ISSN 2079-9292).

Deadline for manuscript submissions: 15 May 2026 | Viewed by 712

Special Issue Editors


E-Mail Website
Guest Editor
Xiangjiang Laboratory, Hunan University of Technology and Business, Changsha 410205, China
Interests: pattern recognition; artificial intelligence; data processing and analysis
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
School of Civil Engineering, University of Queensland, St Lucia, QLD 4072, Australia
Interests: intelligent transportation systems; spatial-temporal data management and data mining
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
School of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou 510006, China
Interests: deep learning; image recognition; graph neural network and multimedia content analysis
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The rapid advancements in digital intelligence technology have revolutionized various fields, driving significant progress and innovation. Digital intelligence encompasses a spectrum of technologies, including advanced algorithms, machine learning, data analytics, and artificial intelligence, which enhance our ability to process, analyze, and leverage digital data effectively. These technologies are becoming indispensable in domains such as healthcare, smart cities, smart transportation, industrial informatization, and security.

This Special Issue, titled “Digital Intelligence Technology and Applications, 2nd Edition”, aims to promote high-quality research that addresses critical issues, emerging challenges, and innovative applications in the development, analysis, and implementation of digital intelligence solutions across various sectors. We invite original research articles and comprehensive reviews on topics including, but not limited to, the following:

  1. Advances in digital data preprocessing and cleaning;
  2. Representation learning for digital data;
  3. Multimodal data fusion and analysis;
  4. Applications of digital intelligence in intelligent transportation and smart cities;
  5. Advancements in deep learning and machine learning for digital intelligence;
  6. Digital intelligence in healthcare and biomedical applications;
  7. AI-driven decision making and automation;
  8. Digital intelligence in natural environment monitoring and disaster management;
  9. Human–computer interaction and user experience in digital intelligence systems;
  10. Industrial applications of digital intelligence.

Dr. Xinyu Zhang
Dr. Dan He
Dr. Yang-Tao Wang
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • digital intelligence
  • artificial intelligence
  • machine learning
  • data analysis
  • digital intelligence technology and applications

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.

Further information on MDPI's Special Issue policies can be found here.

Related Special Issue

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

18 pages, 3873 KB  
Article
An Adaptive JPEG Steganography Algorithm Based on the UT-GAN Model
by Lina Tan, Yi Li, Yan Zeng and Peng Chen
Electronics 2025, 14(20), 4046; https://doi.org/10.3390/electronics14204046 - 15 Oct 2025
Viewed by 163
Abstract
Adversarial examples pose severe challenges to information security, as their impacts directly extend to steganography and steganalysis technologies. This scenario, in turn, has further spurred the research and application of adversarial steganography. In response, we propose a novel adversarial embedding scheme rooted in [...] Read more.
Adversarial examples pose severe challenges to information security, as their impacts directly extend to steganography and steganalysis technologies. This scenario, in turn, has further spurred the research and application of adversarial steganography. In response, we propose a novel adversarial embedding scheme rooted in a hybrid, partially data-driven approach. The proposed scheme first leverages an adversarial neural network (UT-GAN, Universal Transform Generative Adversarial Network) to generate stego images as a preprocessing step. Subsequently, it dynamically adjusts the cost function with the aid of a DCTR (Discrete Cosine Transform Residual)-based gradient calculator to optimize the images, ensuring that the final adversarial images can resist detection by steganalysis tools. The encoder in this scheme adopts a unique architecture, where its internal parameters are determined by a partially data-driven mechanism. This design not only enhances the capability of traditional steganography schemes to counter advanced steganalysis technologies but also effectively reduces the computational overhead during stego image generation. Full article
(This article belongs to the Special Issue Digital Intelligence Technology and Applications, 2nd Edition)
Show Figures

Figure 1

24 pages, 3661 KB  
Article
Real-Time Occluded Target Detection and Collaborative Tracking Method for UAVs
by Yandi Ai, Ruolong Li, Chaoqian Xiang and Xin Liang
Electronics 2025, 14(20), 4034; https://doi.org/10.3390/electronics14204034 - 14 Oct 2025
Viewed by 180
Abstract
To address the failure of unmanned aerial vehicle (UAV) target tracking caused by occlusion and limited field of view in dense low-altitude obstacle environments, this paper proposes a novel framework integrating occlusion-aware modeling and multi-UAV collaboration. A lightweight tracking model based on the [...] Read more.
To address the failure of unmanned aerial vehicle (UAV) target tracking caused by occlusion and limited field of view in dense low-altitude obstacle environments, this paper proposes a novel framework integrating occlusion-aware modeling and multi-UAV collaboration. A lightweight tracking model based on the Mamba backbone is developed, incorporating a Dilated Wavelet Receptive Field Enhancement Module (DWRFEM) to fuse multi-scale contextual features, significantly mitigating contour fragmentation and feature degradation under severe occlusion. A dual-branch feature optimization architecture is designed, combining the Distilled Tanh Activation with Context (DiTAC) activation function and Kolmogorov–Arnold Network (KAN) bottleneck layers to enhance discriminative feature representation. To overcome the limitations of single-UAV perception, a multi-UAV cooperative system is established. Ray intersection is employed to reduce localization uncertainty, while spherical sampling viewpoints are dynamically generated based on obstacle density. Safe trajectory planning is achieved using a Crested Porcupine Optimizer (CPO). Experiments on the Multi-Drone Multi-Target Tracking (MDMT) dataset demonstrate that the model achieves 84.1% average precision (AP) at 95 Frames Per Second (FPS), striking a favorable balance between speed and accuracy, making it suitable for edge deployment. Field tests with three collaborative UAVs show sustained target coverage in complex environments, outperforming traditional single-UAV approaches. This study provides a systematic solution for robust tracking in challenging low-altitude scenarios. Full article
(This article belongs to the Special Issue Digital Intelligence Technology and Applications, 2nd Edition)
Show Figures

Figure 1

16 pages, 2037 KB  
Article
Risk Assessment of New Distribution Network Dispatching Operations Considering Multiple Uncertain Factors
by Lianrong Pan, Xiao Yang, Shangbing Yuan, Jiaan Li and Haowen Xue
Electronics 2025, 14(20), 4012; https://doi.org/10.3390/electronics14204012 - 13 Oct 2025
Viewed by 180
Abstract
In traditional scheduling operations, dispatchers mainly rely on SCADA/EMS systems or personal experience. However, with access to a large number of new energy sources, the scale of the distribution network continues to expand, and its topology becomes increasingly complex, leading to potential security [...] Read more.
In traditional scheduling operations, dispatchers mainly rely on SCADA/EMS systems or personal experience. However, with access to a large number of new energy sources, the scale of the distribution network continues to expand, and its topology becomes increasingly complex, leading to potential security risks in scheduling operations. Therefore, it is very important to carry out risk assessments before scheduling operations. In this paper, risk theory is introduced into the field of distribution network scheduling operations, and a new risk assessment method is proposed considering various uncertain factors in the distribution network. In order to comprehensively analyze the influence of uncertainty factors in the operational process of a new distribution network, the output probability models of wind power, photovoltaic power, and load are first constructed in this study. Then, the improved Latin hypercube sampling method is used to extract the operating state of the distribution network system from the probability model, and the node voltage over-limit and line power flow overload are used as indicators to measure the severity of the consequences so as to establish a quantitative scheduling operation risk assessment system and analyze its framework in detail. Finally, simulation analysis is carried out in the improved IEEE-RTS79 test system: taking 15–25 lines from the operation state to the maintenance state as an example, this paper analyzes the influence of different locations and capacities of wind and solar access on the scheduling operation risk of distribution networks. The results can provide a reference for dispatchers to prevent risks before operation. Full article
(This article belongs to the Special Issue Digital Intelligence Technology and Applications, 2nd Edition)
Show Figures

Figure 1

Back to TopTop