Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (544)

Search Parameters:
Keywords = chain topology

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
35 pages, 5585 KB  
Article
A General Procedure for Basic Kinematic Chain Formation and Topology Selection for Planar Mechanisms
by Arthur Erdman, John Titus, Mahmud Suhaimi Ibrahim and Sean Mather
Designs 2026, 10(3), 46; https://doi.org/10.3390/designs10030046 (registering DOI) - 27 Apr 2026
Abstract
In a complete kinematic synthesis process, a designer must select a planar linkage topology that is well suited to their problem situation. This involves weighing a set of competing priorities. For example, is it better to choose a simple topology like a four-bar [...] Read more.
In a complete kinematic synthesis process, a designer must select a planar linkage topology that is well suited to their problem situation. This involves weighing a set of competing priorities. For example, is it better to choose a simple topology like a four-bar mechanism that will be cheaper to produce, or a complex topology like an eight-bar mechanism that can produce intricate motions but will also be more expensive and more difficult to synthesize? The process of selecting the topology is broadly known as type synthesis, or sometimes structure synthesis, and has been studied in the past. However, past works on planar linkage type synthesis have overemphasized isomorphism detection, identifying the complete set of unique topologies up to a certain number of links, while the central problem of choosing the ideal topology has often been overlooked. In this work, a general procedure for forming basic kinematic chains (BKCs), a simplified topological representation, is presented. Then, a set of rules and design principles is provided that can help a designer narrow the infinite possible BKC options down to a manageable set. A few practical examples are provided to demonstrate the concepts and show that the procedure is effective. A literature review is also provided that examines past works, as well as introducing alternative approaches, such as simultaneous algorithmic methods and spatial methods. Full article
(This article belongs to the Section Mechanical Engineering Design)
Show Figures

Figure 1

21 pages, 2139 KB  
Article
Structural Symmetry Modeling and Network Optimization for Evaluating Industrial Chain Integration and Firm Performance: Evidence from Xinjiang’s Characteristic Food Processing Industry Under the Big Food Concept
by Ting Wang and Reziyan Wakasi
Symmetry 2026, 18(5), 735; https://doi.org/10.3390/sym18050735 (registering DOI) - 25 Apr 2026
Abstract
Industrial chains in agriculture are currently fragmented and do not support developing resource-based competitive advantages. This is true under the Big Food Framework’s strategic orientation. This research seeks to develop a new analytical framework for evaluating pathways to the integration of agricultural industrial [...] Read more.
Industrial chains in agriculture are currently fragmented and do not support developing resource-based competitive advantages. This is true under the Big Food Framework’s strategic orientation. This research seeks to develop a new analytical framework for evaluating pathways to the integration of agricultural industrial chains and their impact on the performance of companies engaged in food processing in Xinjiang. A mixed-method approach, employing both an exploratory and sequential design, will be used to do this. The primary method of data collection for this study is the case study method, along with the questionnaire method involving 145 agricultural enterprises. From these data, structural equation modeling (SEM) will be used to test the paths of causation among cognitive managers of firms who have implemented the BFF. Evidence will be presented to demonstrate the relationship among three types of integration (vertical, horizontal, and lateral) in the agricultural industrial chain, dynamic capabilities, and company performance. Additionally, network topology and optimization simulations will be conducted to determine how effectively structures are organized in training the respective companies. Important findings revealed in this research include the following: The managerial cognition constructs offered by BFFs play a key role in enhancing the depth and structural balance of industry chain integration. There were complementary performance effects found, and they are related to vertical integration achieving operational efficiency and financial efficiency; horizontal integration improving market competitiveness and brand competitiveness; and lateral integration facilitating innovative growth. Dynamic capabilities are a significant mediating mechanism linking institutional support and digital capability with the depth of integration across different modes of integration. The findings from network optimization suggest that there is a positive effect of balanced connectivity across the different dimensions of integration on overall system efficiency and reduced structural inefficiencies. Based on these findings, the authors recommend that organizations establish governance mechanisms that facilitate coordinated connectivity; strengthen adaptive capabilities within the firm; and promote balanced integration across industrial networks. Future researchers should consider applying these findings to conducting longitudinal studies on network evolution; integrating sustainability measures as part of their analysis; and conducting comparative validation studies across regions or industry systems. Full article
(This article belongs to the Section Chemistry: Symmetry/Asymmetry)
21 pages, 1231 KB  
Article
Disaster-Resilient Service Function Chain Deployment Based on Multi-Path Routing and Deep Reinforcement Learning
by Yun Xie and Junbin Liang
Electronics 2026, 15(9), 1795; https://doi.org/10.3390/electronics15091795 - 23 Apr 2026
Viewed by 110
Abstract
Network function virtualization (NFV) enables flexible service deployment by implementing network functions as software, with service function chains (SFCs) linking virtual network functions (VNFs) in a specific order to deliver end-to-end services. However, ensuring SFC resilience against large-scale disasters that can disrupt entire [...] Read more.
Network function virtualization (NFV) enables flexible service deployment by implementing network functions as software, with service function chains (SFCs) linking virtual network functions (VNFs) in a specific order to deliver end-to-end services. However, ensuring SFC resilience against large-scale disasters that can disrupt entire disaster zones (DZs) remains a significant challenge. In this paper, we study the multipath disaster-resilient SFC deployment problem, aiming to minimize the total bandwidth and computing resource overhead by jointly optimizing VNF placement, multipath routing, and protection mechanisms, subject to DZ-disjoint constraints. We formulate this problem as a Mixed-Integer Nonlinear Programming (MINLP) model and prove it to be NP-hard. To solve it efficiently, we propose a two-stage adaptive deployment approach; the first stage employs heuristic rules to generate a set of candidate paths satisfying DZ-disjoint constraints, and the second stage leverages deep reinforcement learning to intelligently place VNFs along these candidate paths, approximating the global optimum. Simulation results on real network topologies demonstrate that, compared to traditional dedicated protection strategies and a state-of-the-art exact algorithm, the proposed approach reduces resource overhead by up to 20% while effectively guaranteeing SFC disaster resilience, exhibiting good scalability and online deployment potential. Full article
26 pages, 31446 KB  
Article
A Training-Free Paradigm for Data-Scarce Maritime Scene Classification Using Vision-Language Models
by Jiabao Wu, Yujie Chen, Wentao Chen, Yicheng Lai, Junjun Li, Xuhang Chen and Wangyu Wu
Sensors 2026, 26(8), 2549; https://doi.org/10.3390/s26082549 - 21 Apr 2026
Viewed by 229
Abstract
Maritime Domain Awareness (MDA) relies heavily on data acquired from high-resolution optical spaceborne sensors; however, processing this massive quantity of sensor data via traditional supervised deep learning is severely bottlenecked by its dependency on exhaustively annotated datasets. Under extreme data scarcity, conventional architectures [...] Read more.
Maritime Domain Awareness (MDA) relies heavily on data acquired from high-resolution optical spaceborne sensors; however, processing this massive quantity of sensor data via traditional supervised deep learning is severely bottlenecked by its dependency on exhaustively annotated datasets. Under extreme data scarcity, conventional architectures suffer severe performance degradation, rendering them impractical for time-critical, zero-day deployments. To overcome this barrier, we propose a training-free inference paradigm that leverages the extensive pre-trained knowledge of Large Vision-Language Models (VLMs). Specifically, we introduce a Domain Knowledge-Enhanced In-Context Learning (DK-ICL) framework coupled with a Macro-Topological Chain-of-Thought (MT-CoT) strategy. This approach bridges the perspective gap between natural images and top–down optical sensor imagery by translating expert remote sensing heuristics into a strict, step-by-step reasoning pipeline. Extensive evaluations demonstrate the substantial efficacy of this framework. Armed with merely 4 visual exemplars per category as in-context triggers, our MT-CoT augmented VLMs outperform traditional models trained under identical scarcity by over 38% in F1-score. Crucially, real-world case studies confirm that this zero-gradient approach maintains robust generalization on unannotated, out-of-distribution coastal clutters, achieving performance parity with data-heavy networks trained on 50 times the data volume. By substituting massive human annotation and GPU optimization with scalable logical deduction, this paradigm establishes a resource-efficient foundation for next-generation intelligent maritime sensing networks. Full article
Show Figures

Figure 1

20 pages, 1865 KB  
Article
Loop-Constrained Connectivity Calculation for Planar Multi-Loop Mechanisms: Base–End-Effector Localization and Functional-Constraint Screening
by Xiaoxiong Li and Huafeng Ding
Machines 2026, 14(4), 455; https://doi.org/10.3390/machines14040455 - 20 Apr 2026
Viewed by 225
Abstract
Planar multi-loop mechanisms often generate a large number of non-isomorphic candidate topological graphs during automatic synthesis, making it difficult to efficiently identify configurations that satisfy engineering-oriented functional requirements. To address this issue, a loop-constrained connectivity calculation method and a connectivity-based localization and screening [...] Read more.
Planar multi-loop mechanisms often generate a large number of non-isomorphic candidate topological graphs during automatic synthesis, making it difficult to efficiently identify configurations that satisfy engineering-oriented functional requirements. To address this issue, a loop-constrained connectivity calculation method and a connectivity-based localization and screening procedure are proposed. The proposed connectivity calculation is directly formulated for general planar non-fractionated kinematic chains (NFKCs), including those with multiple joints. For planar fractionated kinematic chains (FKCs), however, the present method is not applied directly at the full-system level, but only to decomposed non-fractionated subchains after system-level decomposition. Starting from a structurally admissible set of candidate topological graphs, a connectivity matrix is established for automatic localization of the base and the end-effector (EE). Functional screening is then performed by combining the connectivity criterion with object-oriented rules on hydraulic driving-pair arrangement and driving-redundancy patterns. The method was validated using the 10-link, 3-DOF single-joint equivalent of the KC1 subchain of a mine scaler manipulator arm. Under the prescribed structural and functional constraints, 249 admissible configurations were obtained. The results indicate that the proposed method provides an effective basis for application-oriented topological screening and subsequent dimensional synthesis. Full article
(This article belongs to the Section Machine Design and Theory)
Show Figures

Figure 1

30 pages, 2646 KB  
Article
Coordinated Defense Strategies for Energy Storage Systems Against Cascading Faults in Extreme Grid Scenarios
by Xiangli Deng and Ye Shen
Energies 2026, 19(8), 1944; https://doi.org/10.3390/en19081944 - 17 Apr 2026
Viewed by 201
Abstract
To address the vulnerability of renewable-dominated power grids to cascading failures under extreme conditions and the limitations of existing methods in jointly handling vulnerability identification, energy storage allocation, and online control, this paper proposes an energy-storage-assisted coordinated defense strategy. First, a source-load uncertainty [...] Read more.
To address the vulnerability of renewable-dominated power grids to cascading failures under extreme conditions and the limitations of existing methods in jointly handling vulnerability identification, energy storage allocation, and online control, this paper proposes an energy-storage-assisted coordinated defense strategy. First, a source-load uncertainty model is constructed and seven typical extreme operating scenarios are identified. Second, a cascading-failure evolution model that accounts for thermal accumulation is established to identify critical vulnerable branches. Third, for areas prone to local disconnection and weak terminal voltages, a coordinated ESS allocation model is developed by jointly considering active power, energy capacity, and reactive power support to determine candidate deployment locations and capacities. Finally, a graph neural network (GNN) is used to extract time-varying topological and electrical-state features, and proximal policy optimization (PPO) is employed to generate coordinated control commands for multiple ESSs, thereby linking overload suppression with voltage support. The results for the modified IEEE 39-bus system show that the proposed method identifies high-risk branches more accurately and forms an integrated defense chain covering identification, allocation, and control. The method reduces thermal stress in critical sections during the early stage of a fault, mitigates load shedding, and enhances system survivability. Full article
(This article belongs to the Section F1: Electrical Power System)
Show Figures

Figure 1

13 pages, 1340 KB  
Article
Method for Patterning of Conductive Polymers on Flexible Substrates with Possible Applications for Wearable Sensing
by Mariya Aleksandrova, Georgi Nikolov, Valentin Mateev, Rade Tomov and Ivo Iliev
Micromachines 2026, 17(4), 467; https://doi.org/10.3390/mi17040467 - 12 Apr 2026
Viewed by 270
Abstract
This study presents a novel fabrication approach for the precise patterning of conductive polymer coatings (graphene/PEDOT:PSS) on flexible substrates. Traditional lithographic methods often result in chemical or thermal degradation of polymer chains, compromising electrical conductivity. The proposed method utilizes an inversely structured gold [...] Read more.
This study presents a novel fabrication approach for the precise patterning of conductive polymer coatings (graphene/PEDOT:PSS) on flexible substrates. Traditional lithographic methods often result in chemical or thermal degradation of polymer chains, compromising electrical conductivity. The proposed method utilizes an inversely structured gold nanocoating (400–450 nm) as a sacrificial template. By employing a selective lift-off process in a potassium iodide solution, high-resolution polymer topologies are achieved without damaging the active material. The resulting structures exhibit a sheet resistance of 90–100 Ω/sq and maintain linear sensitivity to temperature and humidity, making them suitable for next-generation wearable medical diagnostics. Full article
(This article belongs to the Special Issue Wearable Biosensors: From Materials to Systems)
Show Figures

Figure 1

30 pages, 6016 KB  
Review
Macromolecular Design Principles Governing Electrospinning of Polymer Nanofibers
by Lan Yi and Christian Dreyer
Polymers 2026, 18(8), 929; https://doi.org/10.3390/polym18080929 - 10 Apr 2026
Viewed by 607
Abstract
Electrospinning is a versatile technique for producing polymer nanofibers with high ratios of surface area to volume and tunable porosity. Conventional approach to the optimization of processing parameters such as voltage and flow rate frequently encounters limitations in reproducibility and scalability. This review [...] Read more.
Electrospinning is a versatile technique for producing polymer nanofibers with high ratios of surface area to volume and tunable porosity. Conventional approach to the optimization of processing parameters such as voltage and flow rate frequently encounters limitations in reproducibility and scalability. This review proposes a comprehensive framework that integrates macromolecular design principles with established electrohydrodynamic theories. We analyze how intrinsic molecular traits, specifically chain entanglement density, molecular weight distribution (MWD), topological architecture, and polymer–solvent thermodynamic interactions, define the boundaries of jet stability and solidification. Key findings highlight that while molecular weight establishes a baseline for spinnability, the MWD dictates the dynamic response under extreme deformation. Notably, high-molecular-weight fractions act as elastic load-bearers that suppress capillary breakup. Furthermore, we discuss here how molecular architecture and solvent-mediated segmental mobility determine whether molecular orientation is kinetically trapped or relaxed during the nanosecond timescales of jet flight. By establishing a hierarchical design logic prioritizing molecular and formulation variables over processing parameters, this framework provides a robust strategy to overcome challenges in scalability and reproducibility, positioning electrospinning as a sensitive probe for macromolecular dynamics under extreme elongation. Full article
(This article belongs to the Section Polymer Processing and Engineering)
Show Figures

Figure 1

36 pages, 7325 KB  
Article
Intelligent Scheduling of Rail-Guided Shuttle Cars via Deep Reinforcement Learning Integrating Dynamic Graph Neural Networks and Transformer Model
by Fang Zhu and Shanshan Peng
Algorithms 2026, 19(4), 289; https://doi.org/10.3390/a19040289 - 8 Apr 2026
Viewed by 239
Abstract
With the rapid development of e-commerce and smart manufacturing, automated warehouse systems have become critical infrastructure for modern logistics. In China’s vast market, the dynamic scheduling of Rail-Guided Vehicles (RGVs) faces significant challenges due to complex task uncertainties, hierarchical supply chain structures, and [...] Read more.
With the rapid development of e-commerce and smart manufacturing, automated warehouse systems have become critical infrastructure for modern logistics. In China’s vast market, the dynamic scheduling of Rail-Guided Vehicles (RGVs) faces significant challenges due to complex task uncertainties, hierarchical supply chain structures, and real-time collision avoidance requirements. Traditional rule-based methods and static optimization models often fail to adapt to such dynamic environments. To address these issues, this paper proposes a novel hybrid deep reinforcement learning framework integrating a Dynamic Graph Neural Network (DGNN) and a Transformer model. The DGNN captures the spatiotemporal dependencies of the warehouse network topology, while the Transformer mechanism enhances long-range feature extraction for task prioritization. Furthermore, we design a centralized Deep Q-network (DQN) framework with parameterized action spaces to coordinate multiple RGVs collaboratively. While the system manages multiple physical vehicles, the learning architecture employs a single-agent global scheduler to avoid the non-stationarity issues inherent in multi-agent reinforcement learning. Experimental results based on real-world data from a large-scale electronics manufacturing warehouse demonstrate that our method reduces average task completion time by 18.5% and improves system throughput by 22.3% compared to state-of-the-art baselines. The proposed approach demonstrates potential for intelligent warehouse management in dynamic industrial scenarios. Full article
Show Figures

Figure 1

25 pages, 2368 KB  
Article
Multi-Probing Opportunistic Routing in Buffer-Constrained Wireless Sensor Networks
by Nannan Sun, Shouxin Cao, Xiaoyuan Liu, Yue Gao, Yang Xu and Jia Liu
Sensors 2026, 26(8), 2295; https://doi.org/10.3390/s26082295 - 8 Apr 2026
Viewed by 223
Abstract
Wireless sensor networks (WSNs) are fundamental building blocks of modern ubiquitous sensing systems. In many practical WSN deployments, sensing devices are tightly constrained in buffer capacity, while device mobility leads to topology decentralization. These characteristics pose significant challenges for reliable and timely data [...] Read more.
Wireless sensor networks (WSNs) are fundamental building blocks of modern ubiquitous sensing systems. In many practical WSN deployments, sensing devices are tightly constrained in buffer capacity, while device mobility leads to topology decentralization. These characteristics pose significant challenges for reliable and timely data delivery across WSNs. In this paper, we propose a general multi-probing opportunistic routing strategy tailored for buffer-constrained WSNs, aiming to enhance transmission opportunity utilization under realistic sensing device limitations. With the help of Queueing Theory and Markov Chain Theory, we capture the sophisticated queueing processes for the buffer space of sensors, which enables the limiting distribution of the buffer occupation state to be determined. On this basis, we develop a theoretical performance modeling framework to evaluate the fundamental performance metrics of the WSN with the multi-probing opportunistic routing, including the per-flow throughput and the expected end-to-end delay. The validity of the performance modeling framework is verified by network simulations. Moreover, extensive numerical results demonstrate the network performance behaviors comprehensively and reveal some insightful findings that can serve as important guidelines for the configuration and operation of WSNs. Full article
Show Figures

Figure 1

24 pages, 17819 KB  
Article
GT-TD3: A Kinematics-Aware Graph-Transformer Framework for Stable Trajectory Tracking of High-Degree-of-Freedom (DOF) Manipulators
by Hanwen Miao, Haoran Hou, Zhaopeng Zhu, Zheng Chao and Rui Zhang
Machines 2026, 14(4), 397; https://doi.org/10.3390/machines14040397 - 5 Apr 2026
Viewed by 437
Abstract
Accurate trajectory tracking of redundant manipulators is difficult because the controller must simultaneously model local couplings between adjacent joints and global dependencies across the whole kinematic chain. Existing reinforcement learning methods typically employ multilayer perceptrons, which do not explicitly exploit manipulator structure and [...] Read more.
Accurate trajectory tracking of redundant manipulators is difficult because the controller must simultaneously model local couplings between adjacent joints and global dependencies across the whole kinematic chain. Existing reinforcement learning methods typically employ multilayer perceptrons, which do not explicitly exploit manipulator structure and therefore show limited stability and representation ability in high-dimensional continuous control tasks. This paper proposes GT-TD3, a Graph Transformer-enhanced-Twin Delayed Deep Deterministic Policy Gradient framework, for redundant manipulator trajectory tracking. The proposed actor first converts the raw system state into joint-level node features and uses a graph neural network to extract local kinematic coupling information. A Transformer is then employed to capture long-range dependencies among joints. To strengthen the use of structural priors, topology- and distance-related bias terms are incorporated into the attention mechanism, enabling the network to encode manipulator structure during global feature learning. Experiments on a 7-DoF KUKA iiwa manipulator in PyBullet demonstrate that GT-TD3 outperforms MLP, pure GNN, and pure Transformer baselines in tracking performance. The proposed method achieves more stable training, faster convergence, and smoother and more accurate end-effector motion. The results show that the integration of local graph modeling and structure-aware global attention provides an effective solution for high-precision trajectory tracking of redundant manipulators. Full article
(This article belongs to the Section Robotics, Mechatronics and Intelligent Machines)
Show Figures

Figure 1

12 pages, 928 KB  
Article
One Size Does Not Fit All: A Configurational Analysis of Asymmetric Paths to Organizational Resilience for SMEs and Large Enterprises
by An Chin Cheng
Systems 2026, 14(4), 397; https://doi.org/10.3390/systems14040397 - 4 Apr 2026
Viewed by 322
Abstract
The escalation of geopolitical tensions has forced global manufacturers to reconfigure their supply chains. While Digital Transformation (DT) is widely touted as a primary driver of resilience, traditional variance-based research often assumes a symmetric, linear relationship that applies universally across firms. This study [...] Read more.
The escalation of geopolitical tensions has forced global manufacturers to reconfigure their supply chains. While Digital Transformation (DT) is widely touted as a primary driver of resilience, traditional variance-based research often assumes a symmetric, linear relationship that applies universally across firms. This study challenges this assumption through the lens of Complexity Theory. Viewing supply chains as Complex Adaptive Systems (CASs), we employ Fuzzy-Set Qualitative Comparative Analysis (fsQCA) on a stratified sample of 928 manufacturers in a geopolitical high-risk zone (Taiwan). We identify equifinal pathways to Organizational Resilience, revealing a fundamental asymmetry between organizational types. The results suggest that while large enterprises rely on a resource-intensive strategy—which we term the “Digital Fortress” configurational metaphor (combining high digital maturity and agility as a core condition)—SMEs can achieve high resilience through an “Agile Dodger” configuration, leveraging operational agility and niche positioning without necessitating high digital maturity. This study contributes to the systems literature by mapping the “topology of resilience” and offering tailored configurational pathways that complement traditional variance-based perspectives in volatile ecosystems. Full article
(This article belongs to the Special Issue Supply Chain and Business Model Innovation in the Digital Era)
Show Figures

Figure 1

22 pages, 389 KB  
Article
Adaptive Multipath Proofs for Privacy Protection and Security in Payment Channel Networks
by Wenqi Li, Zijie Pan and Yunqing Yang
Mathematics 2026, 14(7), 1199; https://doi.org/10.3390/math14071199 - 3 Apr 2026
Viewed by 262
Abstract
Payment channel networks enable scalable off-chain payments, but their practical deployment remains constrained by a persistent tension among routing efficiency, liquidity visibility, transaction privacy, and settlement security. Existing multipath routing mechanisms can improve payment success under fragmented liquidity, yet they often expose sensitive [...] Read more.
Payment channel networks enable scalable off-chain payments, but their practical deployment remains constrained by a persistent tension among routing efficiency, liquidity visibility, transaction privacy, and settlement security. Existing multipath routing mechanisms can improve payment success under fragmented liquidity, yet they often expose sensitive balance information, leak structural features of payment routes, and enlarge the attack surface for probing, channel exhaustion, and selective forwarding. This paper presents a novel framework, Adaptive Multipath Proofs (AMPs), for privacy protection and security in payment channel networks. The core idea is to bind multipath routing decisions with lightweight zero-knowledge verifiability, allowing intermediate nodes to validate path feasibility, fragment consistency, and settlement constraints without learning exact channel balances, the complete payment amount, or the global route structure. AMP integrates three mechanisms: a hidden-liquidity feasibility proof that supports privacy-preserving route selection, an adaptive payment-splitting strategy that dynamically determines fragment allocation according to network congestion and balance uncertainty, and a proof-coupled settlement guard that enforces atomicity and timeout consistency across all payment fragments. Together, these mechanisms reduce information leakage while preserving robust payment execution under dynamic network conditions. Experimental evaluation on real Lightning Network topologies and synthetic stress scenarios demonstrates that AMP significantly lowers balance disclosure and endpoint inference risk, improves payment completion under skewed liquidity distributions, and introduces only moderate computational and communication overhead. The results indicate that adaptive proof-carrying multipath routing offers a practical and effective direction for building secure, privacy-preserving, and high-success payment channel networks. Full article
Show Figures

Figure 1

14 pages, 3785 KB  
Article
Topology-Induced Reduction in the Order–Disorder Transition in AB Block Copolymer: A Unit-Matched Comparison of Diblock, Multiblock, Comb, and Star Architectures
by June Huh
Polymers 2026, 18(7), 869; https://doi.org/10.3390/polym18070869 - 1 Apr 2026
Viewed by 434
Abstract
Chain topology offers a chemistry-preserving route to tune block copolymer (BCP) self-assembly by modifying intrachain correlations and relaxation pathways without changing monomer interactions. Here, we perform a unit-matched comparison of four lamella-forming AB architectures reconstructed from an identical constitutive diblock unit ( [...] Read more.
Chain topology offers a chemistry-preserving route to tune block copolymer (BCP) self-assembly by modifying intrachain correlations and relaxation pathways without changing monomer interactions. Here, we perform a unit-matched comparison of four lamella-forming AB architectures reconstructed from an identical constitutive diblock unit (N0): a linear diblock (DB), a linear multiblock (MB), a comb-like architecture (CB), and a star-like architecture (SB). Using dynamical density functional theory (DDFT), we quantify topology-dependent bulk ordering thresholds and show that architectural reconfiguration systematically stabilizes the ordered phase, reducing the order–disorder transition relative to DB (MB/CB/SB 0.793/0.762/0.752 of the diblock value), in semi-quantitative agreement with random phase approximation (RPA) spinodal trends. We also compare topology-dependent directed self-assembly in a common trench geometry under matched reduced quench depth Δ(χN0)=χN0(χN0)ODT, thereby isolating kinetic differences at comparable thermodynamic distance from bulk ordering. A Fourier-based alignment order parameter α(t) reveals sigmoidal alignment kinetics over decades in time and is well captured by a logistic form in lnt, enabling compact descriptors (t50, t90, and a steepness parameter k) that separate alignment onset from late-stage defect annihilation, while selective sidewalls robustly template sidewall-parallel lamellae across all topologies, the late-stage kinetics remain strongly connectivity dependent and can exhibit long-tailed completion associated with slow late-stage defect annihilation. These results demonstrate a dual role of topology in DSA: lowering the segregation strength required for bulk ordering while reshaping defect-mediated alignment pathways under confinement. Full article
Show Figures

Figure 1

54 pages, 570 KB  
Article
Quantum Blockchains: Post-Quantum and Intrinsically Quantum Schemes
by Andrea Addazi
Electronics 2026, 15(7), 1447; https://doi.org/10.3390/electronics15071447 - 30 Mar 2026
Viewed by 556
Abstract
The advent of fault-tolerant quantum computers poses an existential threat to the current blockchain technology, which relies on cryptographic primitives like elliptic-curve cryptography and SHA-256 hashing. This manuscript surveys the emerging field of quantum-secure blockchains, categorizing the main research directions into two paradigms. [...] Read more.
The advent of fault-tolerant quantum computers poses an existential threat to the current blockchain technology, which relies on cryptographic primitives like elliptic-curve cryptography and SHA-256 hashing. This manuscript surveys the emerging field of quantum-secure blockchains, categorizing the main research directions into two paradigms. The first, post-quantum blockchain, seeks to replace classical cryptographic elements with quantum-resistant algorithms. The second, more radical approach aims to construct an intrinsically quantum blockchain, where the ledger’s security and state are encoded directly in quantum mechanical principles. We delve into three promising intrinsic schemes: those based on Greenberger–Horne–Zeilinger (GHZ) states and entanglement in time, those leveraging multi-time states and pseudo-density matrices, and hypergraph-based approaches. As the principal original contribution of this work, we present a comprehensive theoretical framework for a topological quantum blockchain based on non-Abelian anyons, providing the first detailed encoding scheme mapping classical blockchain data to braiding sequences. We further develop the connection to Chern–Simons theory, establishing a field-theoretic foundation where the blockchain’s history is encoded in Wilson loops, and its immutability follows from topological and gauge invariance. Extending this framework, we introduce a holographic AdS/CFT interpretation, revealing that the topological blockchain can be understood as a dual description of a black hole analog in anti-de Sitter space, where the blockchain’s history is encoded in the microstates of a black hole and linking braids between blocks correspond to wormholes. We provide a detailed physical and mathematical analysis of each scheme, comparing their security assumptions, resource requirements, and feasibility in the near and long terms. The topological approach, in particular, offers a compelling new path toward a blockchain with inherent fault tolerance, where the chain’s history is encoded in the topology of anyon worldlines, making it naturally resistant to decoherence and local tampering. Full article
Show Figures

Figure 1

Back to TopTop