Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (5,686)

Search Parameters:
Keywords = correspondence network

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
27 pages, 5736 KB  
Article
Real-Time Flange Bolt Loosening Detection with Improved YOLOv8 and Robust Angle Estimation
by Yingning Gao, Sizhu Zhou and Meiqiu Li
Sensors 2025, 25(19), 6200; https://doi.org/10.3390/s25196200 (registering DOI) - 6 Oct 2025
Abstract
Flange bolts are vital fasteners in civil, mechanical, and aerospace structures, where preload stability directly affects overall safety. Conventional methods for bolt loosening detection often suffer from missed detections, weak feature representation, and insufficient cross-scale fusion under complex backgrounds. This paper presents an [...] Read more.
Flange bolts are vital fasteners in civil, mechanical, and aerospace structures, where preload stability directly affects overall safety. Conventional methods for bolt loosening detection often suffer from missed detections, weak feature representation, and insufficient cross-scale fusion under complex backgrounds. This paper presents an integrated detection and angle estimation framework using a lightweight deep learning detection network. A MobileViT backbone is employed to balance local texture with global context. In the spatial pyramid pooling stage, large separable convolutional kernels are combined with a channel and spatial attention mechanism to highlight discriminative features while suppressing noise. Together with content-aware upsampling and bidirectional multi-scale feature fusion, the network achieves high accuracy in detecting small and low-contrast targets while maintaining real-time performance. For angle estimation, the framework adopts an efficient training-free pipeline consisting of oriented FAST and rotated BRIEF feature detection, approximate nearest neighbor matching, and robust sample consensus fitting. This approach reliably removes false correspondences and extracts stable rotation components, maintaining success rates between 85% and 93% with an average error close to one degree, even under reflection, blur, or moderate viewpoint changes. Experimental validation demonstrates strong stability in detection and angular estimation under varying illumination and texture conditions, with a favorable balance between computational efficiency and practical applicability. This study provides a practical, intelligent, and deployable solution for bolt loosening detection, supporting the safe operation of large-scale equipment and infrastructure. Full article
(This article belongs to the Section Intelligent Sensors)
14 pages, 2316 KB  
Article
Aircraft Foreign Object Debris Detection Method Using Registration–Siamese Network
by Mo Chen, Xuhui Li, Yan Liu, Sheng Cheng and Hongfu Zuo
Appl. Sci. 2025, 15(19), 10750; https://doi.org/10.3390/app151910750 - 6 Oct 2025
Abstract
Foreign object debris (FOD) in civil aviation environments poses severe risks to flight safety. Conventional detection primarily relies on manual visual inspection, which is inefficient, susceptible to fatigue-related errors, and carries a high risk of missed detections. Therefore, there is an urgent need [...] Read more.
Foreign object debris (FOD) in civil aviation environments poses severe risks to flight safety. Conventional detection primarily relies on manual visual inspection, which is inefficient, susceptible to fatigue-related errors, and carries a high risk of missed detections. Therefore, there is an urgent need to develop an efficient and convenient intelligent method for detecting aircraft FOD. This study proposes a detection model based on a Siamese network architecture integrated with a spatial transformation module. The proposed model identifies FOD by comparing the registered features of evidence-retention images with their corresponding normally distributed features. A dedicated aircraft FOD dataset was constructed for evaluation, and extensive experiments were conducted. The results indicate that the proposed model achieves an average improvement of 0.1365 in image-level AUC (Area Under the Curve) and 0.0834 in pixel-level AUC compared to the Patch Distribution Modeling (PaDiM) method. Additionally, the effects of the spatial transformation module and training dataset on detection performance were systematically investigated, confirming the robustness of the model and providing guidance for parameter selection in practical deployment. Overall, this research introduces a novel and effective approach for intelligent aircraft FOD detection, offering both methodological innovation and practical applicability. Full article
23 pages, 11276 KB  
Article
EP-REx: Evidence-Preserving Receptive-Field Expansion for Efficient Crack Segmentation
by Sanghyuck Lee, Jeongwon Lee, Timur Khairulov, Daehyeon Kim and Jaesung Lee
Symmetry 2025, 17(10), 1653; https://doi.org/10.3390/sym17101653 - 4 Oct 2025
Abstract
Crack segmentation plays a vital role in ensuring structural safety, yet practical deployment on resource-limited platforms demands models that balance accuracy with efficiency. While high-accuracy models often rely on computationally heavy designs to expand their receptive fields, recent lightweight approaches typically delay this [...] Read more.
Crack segmentation plays a vital role in ensuring structural safety, yet practical deployment on resource-limited platforms demands models that balance accuracy with efficiency. While high-accuracy models often rely on computationally heavy designs to expand their receptive fields, recent lightweight approaches typically delay this expansion to the deepest, low-resolution layers to maintain efficiency. This design choice leaves long-range context underutilized, where fine-grained evidence is most intact. In this paper, we propose an evidence-preserving receptive-field expansion network, which integrates a multi-scale dilated block to efficiently capture long-range context from the earliest stages and an input-guided gate that leverages grayscale conversion, average pooling, and gradient extraction to highlight crack evidence directly from raw inputs. Experiments on six benchmark datasets demonstrate that the proposed network achieves consistently higher accuracy under lightweight constraints. Each of the three proposed variants—Base, Small, and Tiny—outperforms its corresponding baselines with larger parameter counts, surpassing a total of 13 models. For example, the Base variant reduces parameters by 66% compared to the second-best CrackFormer II and floating-point operations by 53% on the Ceramic dataset, while still delivering superior accuracy. Pareto analyses further confirm that the proposed model establishes a superior accuracy–efficiency trade-off across parameters and floating-point operations. Full article
Show Figures

Figure 1

25 pages, 7875 KB  
Article
Intelligent Optimal Seismic Design of Buildings Based on the Inversion of Artificial Neural Networks
by Augusto Montisci, Francesca Pibi, Maria Cristina Porcu and Juan Carlos Vielma
Appl. Sci. 2025, 15(19), 10713; https://doi.org/10.3390/app151910713 - 4 Oct 2025
Abstract
The growing need for safe, cheap and sustainable earthquake-resistant buildings means that efficient methods for optimal seismic design must be found. The complexity and nonlinearity of the problem can be addressed using advanced automated techniques. This paper presents an intelligent three-step procedure for [...] Read more.
The growing need for safe, cheap and sustainable earthquake-resistant buildings means that efficient methods for optimal seismic design must be found. The complexity and nonlinearity of the problem can be addressed using advanced automated techniques. This paper presents an intelligent three-step procedure for optimally designing earthquake-resistant buildings based on the training (1st step) and successive inversion (2nd step) of Multi-Layer Perceptron Neural Networks. This involves solving the inverse problem of determining the optimal design parameters that meet pre-assigned, code-based performance targets, by means of a gradient-based optimization algorithm (3rd step). The effectiveness of the procedure was tested using an archetypal multistory, moment-resisting, concentrically braced steel frame with active tension diagonal bracing. The input dataset was obtained by varying four design parameters. The output dataset resulted from performance variables obtained through non-linear dynamic analyses carried out under three earthquakes consistent with the Chilean code spectrum, for all cases considered. Three spectrum-consistent records are sufficient for code-based seismic design, while each seismic excitation provides a wealth of information about the behavior of the structure, highlighting potential issues. For optimization purposes, only information relevant to critical sections was used as a performance indicator. Thus, the dataset for training consisted of pairs of design parameter sets and their corresponding performance indicator sets. A dedicated MLP was trained for each of the outputs over the entire dataset, which greatly reduced the total complexity of the problem without compromising the effectiveness of the solution. Due to the comparatively low number of cases considered, the leave-one-out method was adopted, which made the validation process more rigorous than usual since each case acted once as a validation set. The trained network was then inverted to find the input design search domain, where a cost-effective gradient-based algorithm determined the optimal design parameters. The feasibility of the solution was tested through numerical analyses, which proved the effectiveness of the proposed artificial intelligence-aided optimal seismic design procedure. Although the proposed methodology was tested on an archetypal building, the significance of the results highlights the effectiveness of the three-step procedure in solving complex optimization problems. This paves the way for its use in the design optimization of different kinds of earthquake-resistant buildings. Full article
Show Figures

Figure 1

23 pages, 5798 KB  
Article
Application of Generative AI in Financial Risk Prediction: Enhancing Model Accuracy and Interpretability
by Kai-Chao Yao, Hsiu-Chu Hung, Ching-Hsin Wang, Wei-Lun Huang, Hui-Ting Liang, Tzu-Hsin Chu, Bo-Siang Chen and Wei-Sho Ho
Information 2025, 16(10), 857; https://doi.org/10.3390/info16100857 - 3 Oct 2025
Abstract
This study explores the application of generative artificial intelligence (AI) in financial risk forecasting, aiming to assess its potential in enhancing both the accuracy and interpretability of predictive models. Traditional methods often struggle with the complexity and nonlinearity of financial data, whereas generative [...] Read more.
This study explores the application of generative artificial intelligence (AI) in financial risk forecasting, aiming to assess its potential in enhancing both the accuracy and interpretability of predictive models. Traditional methods often struggle with the complexity and nonlinearity of financial data, whereas generative AI—such as large language models and generative adversarial networks (GANs)—offers novel solutions to these challenges. The study begins with a comprehensive review of current research on generative AI in financial risk prediction, with a focus on its roles in data augmentation and feature extraction. It then investigates techniques such as Generative Adversarial Explanation (GAX) to evaluate their effectiveness in improving model interpretability. Case studies demonstrate the practical value of generative AI in real-world financial forecasting and quantify its contribution to predictive accuracy. Furthermore, the study identifies key challenges—including data quality, model training costs, and regulatory compliance—and proposes corresponding mitigation strategies. The findings suggest that generative AI can significantly improve the accuracy and interpretability of financial risk models, though its adoption must be carefully managed to address associated risks. This study offers insights and guidance for future research in applying generative AI to financial risk forecasting. Full article
(This article belongs to the Special Issue Modeling in the Era of Generative AI)
62 pages, 3880 KB  
Article
Integrative Taxonomy Revealed Cryptic Diversity in the West African Grasshopper Genus Serpusia Karsch, 1891 (Orthoptera: Catantopinae)
by Jeanne Agrippine Yetchom Fondjo, Alain Christel Wandji, Reza Zahiri, Oliver Hawlitschek and Claudia Hemp
Insects 2025, 16(10), 1020; https://doi.org/10.3390/insects16101020 - 1 Oct 2025
Abstract
Background/Objectives: Despite their ecological significance, DNA barcoding data for African rainforest Orthoptera remain underrepresented globally, limiting progress in species discovery, biodiversity assessment, and conservation. This study aimed to generate molecular data for morphologically identified Serpusia Karsch, 1891 species to evaluate their taxonomic status. [...] Read more.
Background/Objectives: Despite their ecological significance, DNA barcoding data for African rainforest Orthoptera remain underrepresented globally, limiting progress in species discovery, biodiversity assessment, and conservation. This study aimed to generate molecular data for morphologically identified Serpusia Karsch, 1891 species to evaluate their taxonomic status. Methods: Specimens were collected from multiple sites in Cameroon and analyzed using DNA barcoding with COI-5P and 16S rDNA markers. Species delimitation was performed with Automatic Barcode Gap Discovery, and phylogenetic relationships were inferred using Maximum Likelihood and Bayesian Inference. Additionally, external morphology and the male phallic complex were examined. Results: Molecular analyses delineated 19 MOTUs, five corresponding to Serpusia opacula, seven to Serpusia succursor and the remainder to outgroups. Similarity-based assignments matched these MOTUs to 19 BINs. Phylogenetic reconstruction revealed S. opacula and S. succursor as two genetically distinct clades, with the S. opacula group more closely related to Aresceutica Karsch, 1896 than to the S. succursor group. Accordingly, we established a new genus, Paraserpusia gen. nov., to accommodate S. succursor. Within the S. opacula group, five species are recognized: one previously described (S. opacula) and four new species (S. kennei sp. nov., S. missoupi sp. nov., S. seinoi sp. nov., and S. verhaaghi sp. nov.). The former S. succursor, now Paraserpusia succursor, is divided into six well-supported lineages, five of which are formally described here (P. hoeferi sp. nov., P. husemanni sp. nov., P. kekeunoui sp. nov., P. tamessei sp. nov., and P. tindoi sp. nov.). A haplotype network based on COI-5P sequences corroborates three major clades corresponding to the S. opacula group, the S. succursor group, and Aresceutica. Diagnostic morphological differences between Serpusia and Paraserpusia are consistently supported across characters. Conclusions: This integrative approach reveals substantial hidden diversity within Serpusia and highlights the importance of combining molecular and morphological data to uncover and formally describe previously overlooked taxa. Full article
(This article belongs to the Section Insect Systematics, Phylogeny and Evolution)
24 pages, 4942 KB  
Article
ConvNet-Generated Adversarial Perturbations for Evaluating 3D Object Detection Robustness
by Temesgen Mikael Abraha, John Brandon Graham-Knight, Patricia Lasserre, Homayoun Najjaran and Yves Lucet
Sensors 2025, 25(19), 6026; https://doi.org/10.3390/s25196026 - 1 Oct 2025
Abstract
This paper presents a novel adversarial Convolutional Neural Network (ConvNet) method for generating adversarial perturbations in 3D point clouds, enabling gradient-free robustness evaluation of object detection systems at inference time. Unlike existing iterative gradient methods, our approach embeds the ConvNet directly into the [...] Read more.
This paper presents a novel adversarial Convolutional Neural Network (ConvNet) method for generating adversarial perturbations in 3D point clouds, enabling gradient-free robustness evaluation of object detection systems at inference time. Unlike existing iterative gradient methods, our approach embeds the ConvNet directly into the detection pipeline at the voxel feature level. The ConvNet is trained to maximize detection loss while maintaining perturbations within sensor error bounds through multi-component loss constraints (intensity, bias, and imbalance terms). Evaluation on a Sparsely Embedded Convolutional Detection (SECOND) detector with the KITTI dataset shows 8% overall mean Average Precision (mAP) degradation, while CenterPoint on NuScenes exhibits 24% weighted mAP reduction across 10 object classes. Analysis reveals an inverse relationship between object size and adversarial vulnerability: smaller objects (pedestrians: 13%, cyclists: 14%) show higher vulnerability compared to larger vehicles (cars: 0.2%) on KITTI, with similar patterns on NuScenes, where barriers (68%) and pedestrians (32%) are most affected. Despite perturbations remaining within typical sensor error margins (mean L2 norm of 0.09% for KITTI, 0.05% for NuScenes, corresponding to 0.9–2.6 cm at typical urban distances), substantial detection failures occur. The key novelty is training a ConvNet to learn effective adversarial perturbations during a one-time training phase and then using the trained network for gradient-free robustness evaluation during inference, requiring only a forward pass through the ConvNet (1.2–2.0 ms overhead) instead of iterative gradient computation, making continuous vulnerability monitoring practical for autonomous driving safety assessment. Full article
(This article belongs to the Section Sensing and Imaging)
Show Figures

Figure 1

26 pages, 2589 KB  
Article
Vision-Based Adaptive Control of Robotic Arm Using MN-MD3+BC
by Xianxia Zhang, Junjie Wu and Chang Zhao
Appl. Sci. 2025, 15(19), 10569; https://doi.org/10.3390/app151910569 - 30 Sep 2025
Abstract
Aiming at the problems of traditional calibrated visual servo systems relying on precise model calibration and the high training cost and low efficiency of online reinforcement learning, this paper proposes a Multi-Network Mean Delayed Deep Deterministic Policy Gradient Algorithm with Behavior Cloning (MN-MD3+BC) [...] Read more.
Aiming at the problems of traditional calibrated visual servo systems relying on precise model calibration and the high training cost and low efficiency of online reinforcement learning, this paper proposes a Multi-Network Mean Delayed Deep Deterministic Policy Gradient Algorithm with Behavior Cloning (MN-MD3+BC) for uncalibrated visual adaptive control of robotic arms. The algorithm improves upon the Twin Delayed Deep Deterministic Policy Gradient (TD3) network framework by adopting an architecture with one actor network and three critic networks, along with corresponding target networks. By constructing a multi-critic network integration mechanism, the mean output of the networks is used as the final Q-value estimate, effectively reducing the estimation bias of a single critic network. Meanwhile, a behavior cloning regularization term is introduced to address the common distribution shift problem in offline reinforcement learning. Furthermore, to obtain a high-quality dataset, an innovative data recombination-driven dataset creation method is proposed, which reduces training costs and avoids the risks of real-world exploration. The trained policy network is embedded into the actual system as an adaptive controller, driving the robotic arm to gradually approach the target position through closed-loop control. The algorithm is applied to uncalibrated multi-degree-of-freedom robotic arm visual servo tasks, providing an adaptive and low-dependency solution for dynamic and complex scenarios. MATLAB simulations and experiments on the WPR1 platform demonstrate that, compared to traditional Jacobian matrix-based model-free methods, the proposed approach exhibits advantages in tracking accuracy, error convergence speed, and system stability. Full article
(This article belongs to the Special Issue Intelligent Control of Robotic System)
Show Figures

Figure 1

22 pages, 1797 KB  
Article
A Novel Hybrid Deep Learning–Probabilistic Framework for Real-Time Crash Detection from Monocular Traffic Video
by Reşat Buğra Erkartal and Atınç Yılmaz
Appl. Sci. 2025, 15(19), 10523; https://doi.org/10.3390/app151910523 - 29 Sep 2025
Abstract
The rapid evolution of autonomous vehicle technologies has amplified the need for crash detection that operates robustly under complex traffic conditions with minimal latency. We propose a hybrid temporal hierarchy that augments a Region-based Convolutional Neural Network (R-CNN) with an adaptive time-variant Kalman [...] Read more.
The rapid evolution of autonomous vehicle technologies has amplified the need for crash detection that operates robustly under complex traffic conditions with minimal latency. We propose a hybrid temporal hierarchy that augments a Region-based Convolutional Neural Network (R-CNN) with an adaptive time-variant Kalman filter (with total-variation prior), a Hidden Markov Model (HMM) for state stabilization, and a lightweight Artificial Neural Network (ANN) for learned temporal refinement, enabling real-time crash detection from monocular video. Evaluated on simulated traffic in CARLA and real-world driving in Istanbul, the full temporal stack achieves the best precision–recall balance, yielding 83.47% F1 offline and 82.57% in real time (corresponding to 94.5% and 91.2% detection accuracy, respectively). Ablations are consistent and interpretable: removing the HMM reduces F1 by 1.85–2.16 percentage points (pp), whereas removing the ANN has a larger impact of 2.94–4.58 pp, indicating that the ANN provides the largest marginal gains—especially under real-time constraints. The transition from offline to real time incurs a modest overall loss (−0.90 pp F1), driven more by recall than precision. Compared to strong single-frame baselines, YOLOv10 attains 82.16% F1 and a real-time Transformer detector reaches 82.41% F1, while our full temporal stack remains slightly ahead in real time and offers a more favorable precision–recall trade-off. Notably, integrating the ANN into the HMM-based pipeline improves accuracy by 2.2%, while the time-variant Kalman configuration reduces detection lag by approximately 0.5 s—an improvement that directly addresses the human reaction time gap. Under identical conditions, the best RCNN-based configuration yields AP@0.50 ≈ 0.79 with an end-to-end latency of 119 ± 21 ms per frame (~8–9 FPS). Overall, coupling deep learning with probabilistic reasoning yields additive temporal benefits and advances deployable, camera-only crash detection that is cost-efficient and scalable for intelligent transportation systems. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

18 pages, 2725 KB  
Article
Recent Advances on the VAN Method
by Nicholas V. Sarlis, Efthimios S. Skordas and Panayiotis A. Varotsos
Appl. Sci. 2025, 15(19), 10516; https://doi.org/10.3390/app151910516 - 28 Sep 2025
Abstract
In the 1980s, Varotsos, Alexopoulos and Nomicos (VAN) introduced a short -term earthquake (EQ) prediction method based on measurements of the electric field of the Earth at various locations on the Earth’s surface. The corresponding electric signals are called Seismic Electric Signals (SES). [...] Read more.
In the 1980s, Varotsos, Alexopoulos and Nomicos (VAN) introduced a short -term earthquake (EQ) prediction method based on measurements of the electric field of the Earth at various locations on the Earth’s surface. The corresponding electric signals are called Seismic Electric Signals (SES). Here, we present the advances of the VAN method during the period 2022–2025. For this purpose, we make use of the VAN telemetric network comprising of eight geoelectric field stations that have operated in Greece since the 1990s. The SES reported and documented well in advance (at arxiv.org) are compared with the subsequent seismicity in Greece during the same study period. The comparison reveals that all strong EQs of magnitude M5.8 within the area N34.541.5E20.027.5 have been preceded by SES activities, thus leading to a hit rate of 100%. The study of the present results points to the need of continuing VAN experimentation in Greece. Moreover, we employ the Receiver Operation Characteristics (ROC) method to evaluate the performance of the method. Study of the ROC reveals a false alarm rate of approximately 5% which is shown to be statistically significant, while the method can be characterized as outstanding. Full article
(This article belongs to the Special Issue Application of Data Processing in Earthquake Science)
Show Figures

Figure 1

21 pages, 2027 KB  
Article
Fast Network Reconfiguration Method with SOP Considering Random Output of Distributed Generation
by Zhongqiang Zhou, Yuan Wen, Yixin Xia, Xiaofang Liu, Yusong Huang, Jialong Tan and Jupeng Zeng
Processes 2025, 13(10), 3104; https://doi.org/10.3390/pr13103104 - 28 Sep 2025
Abstract
Power outages in non-faulted zones caused by system failures significantly reduce the reliability of distribution networks. To address this issue, this paper proposes a fault self-healing technique based on the integration of soft open points (SOPs) and network reconfiguration. A mathematical model for [...] Read more.
Power outages in non-faulted zones caused by system failures significantly reduce the reliability of distribution networks. To address this issue, this paper proposes a fault self-healing technique based on the integration of soft open points (SOPs) and network reconfiguration. A mathematical model for power restoration is developed. The model incorporates SOP operational constraints and the stochastic output of photovoltaic (PV) distributed generation. And this formulation enables the determination of the optimal network reconfiguration strategy and enhances the restoration capability. The study first analyzes the operational principles of SOPs and formulates corresponding constraints based on their voltage support and power flow regulation capabilities. The stochastic nature of PV power output is then modeled and integrated into the restoration model to enhance its practical applicability. This restoration model is further reformulated as a second-order cone programming (SOCP) problem to enable efficient computation of the optimal network configuration. The proposed method is simulated and validated in MATLAB R2019a. Results demonstrate that combining the SOP with the reconfiguration strategy achieves a 100% load restoration rate. This represents a significant improvement compared to traditional network reconfiguration methods. Furthermore, the second-order cone programming (SOCP) transformation ensures computational efficiency. The proposed approach effectively enhances both the fault recovery capability and operational reliability of distribution networks with high penetration of renewable energy. Full article
Show Figures

Figure 1

22 pages, 4882 KB  
Article
82.5 GHz Photonic W-Band IM/DD PS-PAM4 Wireless Transmission over 300 m Based on Balanced and Lightweight DNN Equalizer Cascaded with Clustering Algorithm
by Jingtao Ge, Jie Zhang, Sicong Xu, Qihang Wang, Jingwen Lin, Sheng Hu, Xin Lu, Zhihang Ou, Siqi Wang, Tong Wang, Yichen Li, Yuan Ma, Jiali Chen, Tensheng Zhang and Wen Zhou
Sensors 2025, 25(19), 5986; https://doi.org/10.3390/s25195986 - 27 Sep 2025
Abstract
With the rise of 6G, the exponential growth of data traffic, the proliferation of emerging applications, and the ubiquity of smart devices, the demand for spectral resources is unprecedented. Terahertz communication (100 GHz–3 THz) plays a key role in alleviating spectrum scarcity through [...] Read more.
With the rise of 6G, the exponential growth of data traffic, the proliferation of emerging applications, and the ubiquity of smart devices, the demand for spectral resources is unprecedented. Terahertz communication (100 GHz–3 THz) plays a key role in alleviating spectrum scarcity through ultra-broadband transmission. In this study, terahertz optical carrier-based systems are employed, where fiber-optic components are used to generate the optical signals, and the signal is transmitted via direct detection in the receiver side, without relying on fiber-optic transmission. In these systems, deep learning-based equalization effectively compensates for nonlinear distortions, while probability shaping (PS) enhances system capacity under modulation constraints. However, the probability distribution of signals processed by PS varies with amplitude, making it challenging to extract useful information from the minority class, which in turn limits the effectiveness of nonlinear equalization. Furthermore, in IM-DD systems, optical multipath interference (MPI) noise introduces signal-dependent amplitude jitter after direct detection, degrading system performance. To address these challenges, we propose a lightweight neural network equalizer assisted by the Synthetic Minority Oversampling Technique (SMOTE) and a clustering method. Applying SMOTE prior to the equalizer mitigates training difficulties arising from class imbalance, while the low-complexity clustering algorithm after the equalizer identifies edge jitter levels for decision-making. This joint approach compensates for both nonlinear distortion and jitter-related decision errors. Based on this algorithm, we conducted a 3.75 Gbaud W-band PAM4 wireless transmission experiment over 300 m at Fudan University’s Handan campus, achieving a bit error rate of 1.32 × 10−3, which corresponds to a 70.7% improvement over conventional schemes. Compared to traditional equalizers, the proposed new equalizer reduces algorithm complexity by 70.6% and training sequence length by 33%, while achieving the same performance. These advantages highlight its significant potential for future optical carrier-based wireless communication systems. Full article
(This article belongs to the Special Issue Recent Advances in Optical Wireless Communications)
Show Figures

Figure 1

21 pages, 1482 KB  
Article
Models and Methods for Assessing Intruder’s Awareness of Attacked Objects
by Vladimir V. Baranov and Alexander A. Shelupanov
Symmetry 2025, 17(10), 1604; https://doi.org/10.3390/sym17101604 - 27 Sep 2025
Abstract
The formation of strategies and tactics of destructive impact (DI) at the stages of complex computer attacks (CCAs) largely depends on the content of intelligence data obtained by the intruder about the attacked elements of distributed information systems (DISs). This study analyzes scientific [...] Read more.
The formation of strategies and tactics of destructive impact (DI) at the stages of complex computer attacks (CCAs) largely depends on the content of intelligence data obtained by the intruder about the attacked elements of distributed information systems (DISs). This study analyzes scientific papers, methodologies and standards in the field of assessing the indicators of awareness of the intruder about the objects of DI and symmetrical indicators of intelligence security of the elements of the DIS. It was revealed that the aspects of changing the quantitative and qualitative characteristics of intelligence data (ID) at the stages of CCA, as well as their impact on the possibilities of using certain types of simple computer attacks (SKAs), are poorly studied and insufficiently systematized. This paper uses technologies for modeling the process of an intruder obtaining ID based on the application of the methodology of black, grey and white boxes and the theory of fuzzy sets. This allowed us to identify the relationship between certain arrays of ID and the possibilities of applying certain types of SCA end-structure arrays of ID according to the levels of identifying objects of DI, and to create a scale of intruder awareness symmetrical to the scale of intelligence protection of the elements of the DIS. Experiments were conducted to verify the practical applicability of the developed models and techniques, showing positive results that make it possible to identify vulnerable objects, tactics and techniques of the intruder in advance. The result of this study is the development of an intruder awareness scale, which includes five levels of his knowledge about the attacked system, estimated by numerical intervals and characterized by linguistic terms. Each awareness level corresponds to one CCA stage: primary ID collection, penetration and legalization, privilege escalation, distribution and DI. Awareness levels have corresponding typical ID lists that can be potentially available after conducting the corresponding type of SCA. Typical ID lists are classified according to the following DI levels: network, hardware, system, application and user level. For each awareness level, the method of obtaining the ID by the intruder is specified. These research results represent a scientific contribution. The practical contribution is the application of the developed scale for information security (IS) incident management. It allows for a proactive assessment of DIS security against CCAs—modeling the real DIS structure and various CCA scenarios. During an incident, upon detection of a certain CCA stage, it allows for identifying data on DIS elements potentially known by the intruder and eliminating further development of the incident. The results of this study can also be used for training IS specialists in network security, risk assessment and IS incident management. Full article
(This article belongs to the Special Issue Symmetry: Feature Papers 2025)
Show Figures

Figure 1

16 pages, 1852 KB  
Article
Field Responsive Swelling of Poly(Methacrylic Acid) Hydrogel—Isothermal Kinetic Analysis
by Jelena D. Jovanovic, Vesna V. Panic, Nebojsa N. Begovic and Borivoj K. Adnadjevic
Polymers 2025, 17(19), 2602; https://doi.org/10.3390/polym17192602 - 26 Sep 2025
Abstract
Externally governed hydrogel swelling is a highly convenient yet inherently challenging process, as it requires both responsive materials and appropriately tuned external stimuli. In this work, for the first time, the influence of simultaneous action of external physical fields—ultrasound (US) and microwave heating [...] Read more.
Externally governed hydrogel swelling is a highly convenient yet inherently challenging process, as it requires both responsive materials and appropriately tuned external stimuli. In this work, for the first time, the influence of simultaneous action of external physical fields—ultrasound (US) and microwave heating (MW), combined with cooling—on the isothermal swelling kinetics of poly(methacrylic acid) (PMAA) hydrogel was investigated and compared with swelling under conventional thermal heating (TH) under isothermal conditions. Swelling kinetics were monitored over a temperature range of 248–318 K, under simultaneous cooling with either US, MW, or TH. The well-established Peppas model was used to determine swelling kinetics parameters, revealing a significant acceleration in the swelling process under MW (up to 48.8 times at 313 K), as well as different water penetrating mechanisms (non-Fickian diffusion) compared to TH and US (Super-case II). Additionally, it was demonstrated that the swelling conversion curves could be mathematically described using a “shrinking boundary surfaces” model. Isothermal swelling constants and the corresponding kinetic parameters (activation energy Ea and pre-exponential factor ln A) were calculated. The results confirmed that external physical fields significantly influence the thermal activation and swelling behavior of PMAA xerogels, offering insight into field-responsive transport processes in hydrogel networks. Full article
(This article belongs to the Special Issue Polymer Hydrogels: Synthesis, Properties and Applications)
Show Figures

Figure 1

18 pages, 11608 KB  
Article
YOLO-MSPM: A Precise and Lightweight Cotton Verticillium Wilt Detection Network
by Xinbo Zhao, Jianan Chi, Fei Wang, Xuan Li, Xingcan Yuwen, Tong Li, Yi Shi and Liujun Xiao
Agriculture 2025, 15(19), 2013; https://doi.org/10.3390/agriculture15192013 - 26 Sep 2025
Abstract
Cotton is one of the world’s most important economic crops, and its yield and quality have a significant impact on the agricultural economy. However, Verticillium wilt of cotton, as a widely spread disease, severely affects the growth and yield of cotton. Due to [...] Read more.
Cotton is one of the world’s most important economic crops, and its yield and quality have a significant impact on the agricultural economy. However, Verticillium wilt of cotton, as a widely spread disease, severely affects the growth and yield of cotton. Due to the typically small and densely distributed characteristics of this disease, its identification poses considerable challenges. In this study, we introduce YOLO-MSPM, a lightweight and accurate detection framework, designed on the YOLOv11 architecture to efficiently identify cotton Verticillium wilt. In order to achieve a lightweight model, MobileNetV4 is introduced into the backbone network. Moreover, a single-head self-attention (SHSA) mechanism is integrated into the C2PSA block, allowing the network to emphasize critical areas of the feature maps and thus enhance its ability to represent features effectively. Furthermore, the PC3k2 module combines pinwheel-shaped convolution (PConv) with C3k2, and the mobile inverted bottleneck convolution (MBConv) module is incorporated into the detection head of YOLOv11. Such adjustments improve multi-scale information integration, enhance small-target recognition, and effectively reduce computation costs. According to the evaluation, YOLO-MSPM achieves precision (0.933), recall (0.920), mAP50 (0.970), and mAP50-95 (0.797), each exceeding the corresponding performance of YOLOv11n. In terms of model lightweighting, the YOLO-MSPM model has 1.773 M parameters, which is a 31.332% reduction compared to YOLOv11n. Its GFLOPs and model size are 5.4 and 4.0 MB, respectively, representing reductions of 14.286% and 27.273%. The study delivers a lightweight yet accurate solution to support the identification and monitoring of cotton Verticillium wilt in environments with limited resources. Full article
Show Figures

Figure 1

Back to TopTop