Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (29)

Search Parameters:
Keywords = dual-layer topological networks

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
31 pages, 712 KB  
Article
TDSR: Distributed Data Asset Registration and Cross-Jurisdictional Verification in Trusted Data Spaces
by Xingxing Yang, Jieling Xie, Weiping Deng, Chi Zhang, Junqi Ren, Shuang Liu, Wai Ip Lei, Wei Wang and Wenyong Wang
Electronics 2026, 15(10), 2079; https://doi.org/10.3390/electronics15102079 - 13 May 2026
Viewed by 33
Abstract
Trans-border data circulation across multi-jurisdictional boundaries faces an operational conflict between ownership provenance prerequisites and data minimisation mandates, compounded by the tight coupling of large data payloads with synchronous state consensus ledgers, which forces replication of feature matrices across all consensus nodes and [...] Read more.
Trans-border data circulation across multi-jurisdictional boundaries faces an operational conflict between ownership provenance prerequisites and data minimisation mandates, compounded by the tight coupling of large data payloads with synchronous state consensus ledgers, which forces replication of feature matrices across all consensus nodes and leads to network saturation. Existing frameworks remain unequipped to resolve this, as coupling in-band payload routing with synchronous state ledgers generates communication overheads scaling with data volume. The proposed Trusted Data Space with Registration (TDSR) implements a four-layer protocol stack. A dual-plane topology establishes a decoupled storage–ledger mechanism, partitioning asynchronous payload datastores and synchronous consensus ledgers to sustain throughput independent of data dimensionality. Navigating this infrastructure, the Unified Data Resource Identifier (UDRI) executes out-of-band cross-domain routing without exposing verifier intents. Driven by the Oblivious Data Asset Registration (ODAR) mechanism, a two-phase, four-algorithm lifecycle dictates end-to-end ownership provenance. This execution shifts hypothesis testing to isolated sandboxes via an algorithm-agnostic mathematical contract, capping external data transit at a constant leakage bound. A deployed testbed across the Guangdong-Hong Kong-Macao Greater Bay Area validates the proposed architecture, supporting data circulation across divergent legal jurisdictions. Full article
30 pages, 7176 KB  
Article
Resilience Quantification and Recovery Prediction of Highway Toll-Station Nodes Under Rainfall Disturbances
by Zhanzhong Wang, Junwen Jia, Xiaochao Wang, Chenxi Zhu, Donglin Jia, Meixuan Feng and Shuyuan Zhang
Sustainability 2026, 18(9), 4455; https://doi.org/10.3390/su18094455 - 1 May 2026
Viewed by 338
Abstract
Frequent rainfall events threaten expressway operations, and toll stations, as critical network nodes, are vulnerable to functional degradation and cascading effects. However, existing traffic resilience studies mainly focus on urban road networks or static assessments, making it difficult to characterize the resilience evolution, [...] Read more.
Frequent rainfall events threaten expressway operations, and toll stations, as critical network nodes, are vulnerable to functional degradation and cascading effects. However, existing traffic resilience studies mainly focus on urban road networks or static assessments, making it difficult to characterize the resilience evolution, recovery process, and predictability of toll-station nodes. This study proposes a resilience quantification and recovery prediction method for expressway toll-station nodes under rainfall disturbances. By integrating multi-source meteorological data, neighborhood propagation relationships, and network topology, a three-level resilience quantification framework is developed across the functional, neighborhood, and network layers. A piecewise exponential function is used to model the damage–valley–recovery process of node resilience and to extract parameters including damage depth and recovery rate. Focusing on the recovery stage, a node recovery prediction model is constructed by combining resilience sequences, meteorological disturbance features, and dual-graph spatial relationships, while dual-graph convolution and long short-term memory (LSTM) are used to capture the spatiotemporal evolution of node recovery. Results show that the proposed method quantifies toll-station node resilience, captures its staged evolution, and effectively predicts recovery. Baseline, cross-scene, and ablation results confirm the value of multi-source feature fusion and dual-graph propagation, supporting the sustainable operation of expressway systems under rainfall disturbances. Full article
Show Figures

Figure 1

25 pages, 8326 KB  
Article
Research on Restoring Urban Flood Community Resilience Based on Hydrodynamic Models
by Mian Wang, Ruirui Sun, Huanhuan Yang, Hao Wang, Ding Jiao and Gaoqing Lv
Water 2026, 18(8), 903; https://doi.org/10.3390/w18080903 - 9 Apr 2026
Viewed by 538
Abstract
Global climate change continues to intensify, leading to an increase in extreme meteorological disasters characterized by high intensity, frequency, and extensive impact. Chinese cities are facing increasingly severe flood disaster risks. As the fundamental unit of the urban system, scientifically quantifying a community’s [...] Read more.
Global climate change continues to intensify, leading to an increase in extreme meteorological disasters characterized by high intensity, frequency, and extensive impact. Chinese cities are facing increasingly severe flood disaster risks. As the fundamental unit of the urban system, scientifically quantifying a community’s post-disaster recovery capacity provides a crucial basis for formulating disaster prevention and mitigation strategies. Existing research has largely focused on either quantitative resilience assessment of communities or the functional recovery of specific systems within communities, falling short of meeting the quantitative needs for assessing community functional recovery after flood disasters. Given this, this paper aims to construct a community functional recovery model based on different land use types to precisely quantify the recovery trajectory of community functions. First, the MIKE 21 two-dimensional hydrodynamic model is employed to simulate 100-year and 200-year flood scenarios, obtaining dynamic inundation data at the community scale. Subsequently, a semi-Markov process is adopted to model the recovery of individual buildings, with the aggregated building functions within the community summarized to derive building recovery curves. A road network topology model is constructed using the Space L method, and network global efficiency is applied to quantify community road functionality. Green space functional loss is quantified based on the percentage of inundated areas. Finally, calculation is performed based on the proposed dual-layer computational framework consisting of a connectivity layer and a functional layer, and the overall community functional recovery curve after the disaster is generated, thereby achieving precise quantification of the recovery process. The research findings indicate that increased disaster intensity significantly amplifies functional losses and recovery delays. Concurrently, distinct land use types exert markedly different impacts on community recovery. This study quantitatively reveals the phased dominant roles of various land use types throughout the community recovery process, providing a scientific basis for formulating phased, prioritized resilience enhancement strategies. Full article
(This article belongs to the Special Issue "Watershed–Urban" Flooding and Waterlogging Disasters)
Show Figures

Figure 1

26 pages, 1118 KB  
Article
Representation-Centric Approach for Android Malware Classification: Interpretability-Driven Feature Engineering on Function Call Graphs
by Gyumin Kim, Dongmin Yoon, NaeJoung Kwak and ByoungYup Lee
Appl. Sci. 2026, 16(6), 2670; https://doi.org/10.3390/app16062670 - 11 Mar 2026
Cited by 1 | Viewed by 534
Abstract
The existing research on Android malware detection using graph neural networks (GNNs) has largely focused on architectural improvements, while input node feature representations have received less systematic attention. This study adopts a representation-centric approach to enhance function call graph (FCG)-based malware classification through [...] Read more.
The existing research on Android malware detection using graph neural networks (GNNs) has largely focused on architectural improvements, while input node feature representations have received less systematic attention. This study adopts a representation-centric approach to enhance function call graph (FCG)-based malware classification through interpretability-driven feature engineering. We propose a dual-level structural feature framework integrating local topological patterns with global graph-level properties. The initial feature set comprises 13 dimensions: five local degree profile (LDP) features and eight global structural features capturing community structure, execution flow, and connectivity patterns. To mitigate the curse of dimensionality, we apply an interpretability-driven selection using integrated gradients (IG), gradient-weighted class activation mapping (GradCAM), and Shapley additive explanations (SHAP), yielding an optimized seven-dimensional subset. Experiments on the MalNet-Tiny benchmark demonstrate that the proposed approach achieves 94.47 ± 0.25% accuracy with jumping knowledge GraphSAGE (JK-GraphSAGE), improving the LDP-only baseline by 0.32 percentage points while reducing feature dimensionality by 46%. The selected features exhibit consistent importance across four GNN architectures and multiple message-passing layers, demonstrating model-agnostic effectiveness. The results reveal that aggregation mechanisms critically influence feature utility, highlighting the necessity of interpretability-guided design for robust malware detection. This work provides a systematic methodology for feature engineering in graph-based security applications. Full article
Show Figures

Figure 1

38 pages, 9716 KB  
Article
Research on Spatial Information Network Vulnerability Analysis Methodology Based on Multi-Layer Hypernetworks
by Xiaolan Yu, Wei Xiong and Yali Liu
Sensors 2026, 26(5), 1570; https://doi.org/10.3390/s26051570 - 2 Mar 2026
Viewed by 463
Abstract
As the core infrastructure for providing all-weather, full-coverage, high-speed, and diversified information services, spatial information networks (SINs) possess significant social, economic, and military value. However, due to the inherent characteristics of their network architecture, SINs are susceptible to core service paralysis and functional [...] Read more.
As the core infrastructure for providing all-weather, full-coverage, high-speed, and diversified information services, spatial information networks (SINs) possess significant social, economic, and military value. However, due to the inherent characteristics of their network architecture, SINs are susceptible to core service paralysis and functional failure under large-scale targeted attacks or random disturbances, posing a critical bottleneck that constrains their stable operation. Current research on SIN vulnerability is predominantly confined to a single network topology perspective, lacking an integrated consideration of the task execution perspective. Consequently, it fails to accommodate the dual requirements of “network topology stability” and “task execution effectiveness”. To address the aforementioned research needs and challenges, this study adopts a “topology-task” dual-perspective fusion approach and proposes a vulnerability analysis framework for SINs that integrates multi-layer networks and hypernetworks. First, a two-layer SIN topology model encompassing the user layer and the satellite layer is constructed. Leveraging hypernetwork theory, information tasks involving multiple network entities are formally defined, and an integrated multi-layer hypernetwork model is established. Second, based on distinct task types, three categories of task efficiency evaluation metrics are defined, and corresponding quantitative methods for calculating SIN vulnerability are derived. Third, during the vulnerability analysis phase, a novel strategy for identifying and removing overlapping nodes in hypernetworks is introduced to enable precise localization of critical nodes within the network. Concurrently, a pre-attack node hardening strategy is designed to minimize the impact of attacks on network performance. Finally, through systematic analysis of vulnerability performance and critical node characteristics under different node removal strategies, the results demonstrate enhanced network performance. The effectiveness of the proposed method is validated by comparing the defense performance of the hardening strategy across various attack scenarios. To verify the feasibility and superiority of the proposed method, this study designs 5 × 5 groups of simulation experiments with varying network parameters. The results indicate that, compared with traditional methods, the proposed strategy can more accurately identify core nodes affecting the stable operation of SINs, significantly reducing network vulnerability and improving network survivability. In addition, a comprehensive sensitivity analysis of SIN vulnerability is conducted from three key influencing dimensions—mission scale, satellite count, and constellation configuration—clarifying the impact of each dimension on network invulnerability. Thus, this paper provides a reliable theoretical foundation and technical support for the planning, design, optimal deployment, and operation and maintenance management of SINs. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

26 pages, 1763 KB  
Article
A Complex Systems Approach to NEV Disruptive Innovation Diffusion: Co-Evolution Across Enterprise and Consumer Networks
by Ruguo Fan, Dingyi Liu, Liu Yang and Kang Du
Systems 2026, 14(2), 172; https://doi.org/10.3390/systems14020172 - 4 Feb 2026
Viewed by 366
Abstract
Consumer attitude uncertainty can hinder disruptive innovation (DI) diffusion in the new energy vehicle (NEV) market and weaken enterprises’ incentives to adopt new technologies. This study develops a dual-layer coupled network model linking consumer attitude dissemination and enterprise R&D strategy evolution under bounded [...] Read more.
Consumer attitude uncertainty can hinder disruptive innovation (DI) diffusion in the new energy vehicle (NEV) market and weaken enterprises’ incentives to adopt new technologies. This study develops a dual-layer coupled network model linking consumer attitude dissemination and enterprise R&D strategy evolution under bounded observability. Our simulations show three main findings. First, stronger discouragement of counter-attitudinal dissemination markedly suppresses diffusion and lowers steady-state adoption. Second, diffusion strengthens when consumers weight public information more and firm messaging less, particularly under stronger policy support. Third, network structure shapes diffusion: stronger inter-enterprise connectivity increases adoption, and consumer topology and interaction breadth exert different effects under different network types. These results clarify how information environments, policy support, and cross-layer behavioral modulation jointly shape diffusion regimes. Full article
Show Figures

Figure 1

35 pages, 11904 KB  
Article
AdaptPest-Net: A Task-Adaptive Network with Graph–Mamba Fusion for Multi-Scale Agricultural Pest Recognition
by Jixiang Zou, Wenzhong Yang, Chuanxiang Li and Zhishan Feng
Entropy 2025, 27(12), 1211; https://doi.org/10.3390/e27121211 - 28 Nov 2025
Viewed by 701
Abstract
Accurate pest classification is critical for precision agriculture, yet existing deep learning methods face challenges including computational inefficiency from uniform sample processing and inadequate modeling of complex feature relationships. This paper proposes AdaptPest-Net, a task-adaptive architecture with three key innovations: (1) Sample-Difficulty-Aware Dynamic [...] Read more.
Accurate pest classification is critical for precision agriculture, yet existing deep learning methods face challenges including computational inefficiency from uniform sample processing and inadequate modeling of complex feature relationships. This paper proposes AdaptPest-Net, a task-adaptive architecture with three key innovations: (1) Sample-Difficulty-Aware Dynamic Routing (SDADR) employs Gaussian-gated path selection to adaptively route samples through shallow, medium, or deep networks based on predicted classification difficulty, improving accuracy by matching network capacity to sample complexity; (2) Graph Convolution-Mamba Fusion (GCMF) synergistically combines a 3-layer GCN with adaptive adjacency for explicit spatial structural modeling and a selective Mamba state-space model (T = 8, input-dependent parameters) for temporal feature dynamics, capturing complementary topological relationships and long-range dependencies through parallel dual-branch extraction; (3) Bidirectional Cross-Modal Attention enables deep integration between spatial and temporal modalities through mutual enhancement with batch-level knowledge transfer and adaptive gate fusion, where graph topology directly guides Mamba’s feature evolution. Comprehensive experiments on IP102 and D0 demonstrate that AdaptPest-Net achieves 78.4% accuracy on IP102, representing a significant improvement over existing methods, while D0 experiments validate strong cross-dataset generalization capability with 99.85% accuracy. Full article
Show Figures

Figure 1

24 pages, 5884 KB  
Article
A High-Precision Verifiable Watermarking Scheme for Vector Geographic Data Using Difference Expansion and Metadata Restoration
by Li-Ming Gao, Qian Wang and Li Zhang
Symmetry 2025, 17(11), 1849; https://doi.org/10.3390/sym17111849 - 3 Nov 2025
Cited by 1 | Viewed by 1001
Abstract
Vector geographic data require strict preservation of coordinate precision and topological integrity. However, their open transmission poses simultaneous challenges for copyright protection and data security. To address these issues, this study proposes a reversible watermarking framework that integrates difference expansion (DE) for lossless [...] Read more.
Vector geographic data require strict preservation of coordinate precision and topological integrity. However, their open transmission poses simultaneous challenges for copyright protection and data security. To address these issues, this study proposes a reversible watermarking framework that integrates difference expansion (DE) for lossless coordinate recovery, the Arnold transform for watermark encryption, and a metadata-assisted dual restoration mechanism to ensure geometric and topological consistency after embedding. Experimental evaluations on multiple vector datasets—including administrative boundaries, hydrographic networks, and road layers—demonstrate that the proposed method achieves near-zero distortion (RMSE ≈ 10−16), complete reversibility, and strong robustness against geometric and noise attacks, outperforming conventional DFT- and QIM-based schemes in terms of imperceptibility and restoration accuracy. The approach provides an efficient and verifiable solution for secure sharing and copyright protection of vector geographic data, contributing to reliable data provenance and trustworthy spatial information management. Full article
(This article belongs to the Special Issue Symmetries and Symmetry-Breaking in Data Security)
Show Figures

Figure 1

28 pages, 4006 KB  
Article
Resilience Assessment of Cascading Failures in Dual-Layer International Railway Freight Networks Based on Coupled Map Lattice
by Si Chen, Zhiwei Lin, Qian Zhang and Yinying Tang
Appl. Sci. 2025, 15(20), 10899; https://doi.org/10.3390/app152010899 - 10 Oct 2025
Viewed by 1415
Abstract
The China Railway Express (China-Europe container railway freight transport) is pivotal to Eurasian freight, yet its transcontinental railway faces escalating cascading risks. We develop a coupled map lattice (CML) model representing the physical infrastructure layer and the operational traffic layer concurrently to quantify [...] Read more.
The China Railway Express (China-Europe container railway freight transport) is pivotal to Eurasian freight, yet its transcontinental railway faces escalating cascading risks. We develop a coupled map lattice (CML) model representing the physical infrastructure layer and the operational traffic layer concurrently to quantify and mitigate cascading failures. Twenty critical stations are identified by integrating TOPSIS entropy weighting with grey relational analysis in dual-layer networks. The enhanced CML embeds node-degree, edge-betweenness, and freight-flow coupling coefficients, and introduces two adaptive cargo-redistribution rules—distance-based and load-based for real-time rerouting. Extensive simulations reveal that network resilience peaks when the coupling coefficient equals 0.4. Under targeted attacks, cascading failures propagate within three to four iterations and reduce network efficiency by more than 50%, indicating the vital function of higher importance nodes. Distance-based redistribution outperforms load-based redistribution after node failures, whereas the opposite occurs after edge failures. These findings attract our attention that redundant border corridors and intelligent monitoring should be deployed, while redistribution rules and multi-tier emergency response systems should be employed according to different scenarios. The proposed methodology provides a dual-layer analytical framework for addressing cascading risks of transcontinental networks, offering actionable guidance for intelligent transportation management of international intermodal freight networks. Full article
Show Figures

Figure 1

15 pages, 6693 KB  
Article
Double-Network Hydrogels via Hybrid Strategies: Potential in Large-Scale Manufacturing for Colorimetric Indicator
by Ningli An, Jiwen Liu, Wentao Zhou, Qing He, Jianan Li and Yali Xiong
Gels 2025, 11(9), 697; https://doi.org/10.3390/gels11090697 - 2 Sep 2025
Cited by 1 | Viewed by 1313
Abstract
Biological hydrogels are widely available in terms of raw material sources and can be processed and molded using relatively simple techniques. Hydrogels can offer abundant three-dimensional, water-containing channels that facilitate the reaction between gases and dye, making them the preferred choice for the [...] Read more.
Biological hydrogels are widely available in terms of raw material sources and can be processed and molded using relatively simple techniques. Hydrogels can offer abundant three-dimensional, water-containing channels that facilitate the reaction between gases and dye, making them the preferred choice for the solid support layer in colorimetric indicators. However, biomass hydrogels exhibit inferior mechanical properties, making them unsuitable for large-scale manufacturing processes. In this study, four dual-network composite hydrogels Agar/Gelatin, Sodium Alginate/Agar, Sodium Alginate/Poly (vinyl alcohol), Sodium Alginate/Gelatin (AG/Gel, SA/AG, SA/PVA and SA/Gel) prepared through hybrid strategies. Furthermore, the influence of the dual-network structure on the mechanical properties and ammonia response was systematically investigated, using microscopy and Fourier transform infrared spectroscopy (FTIR) characterization method. The experimental results demonstrate that the incorporation of SA into original hydrogel matrices can significantly enhance both the mechanical and ammonia response performance due to the secondary topological network structure. The interpenetrating double network structure was effectively regulated through the calcium ion cross-linking process. The color difference threshold of SA/PVA’s response to ammonia gas is 10, it holds promise for rapid detection applications. The SA/Gel composite hydrogel exhibits excellent mechanical robustness and toughness. The tensile strength of the SA/Gel sample is 11 times that of a single gel, and the toughness is 80 times greater, suggesting its suitability for large-scale manufacturing of colorimetric indicator. Full article
(This article belongs to the Section Gel Processing and Engineering)
Show Figures

Figure 1

29 pages, 919 KB  
Article
DDoS Defense Strategy Based on Blockchain and Unsupervised Learning Techniques in SDN
by Shengmin Peng, Jialin Tian, Xiangyu Zheng, Shuwu Chen and Zhaogang Shu
Future Internet 2025, 17(8), 367; https://doi.org/10.3390/fi17080367 - 13 Aug 2025
Cited by 1 | Viewed by 1869
Abstract
With the rapid development of technologies such as cloud computing, big data, and the Internet of Things (IoT), Software-Defined Networking (SDN) is emerging as a new network architecture for the modern Internet. SDN separates the control plane from the data plane, allowing a [...] Read more.
With the rapid development of technologies such as cloud computing, big data, and the Internet of Things (IoT), Software-Defined Networking (SDN) is emerging as a new network architecture for the modern Internet. SDN separates the control plane from the data plane, allowing a central controller, the SDN controller, to quickly direct the routing devices within the topology to forward data packets, thus providing flexible traffic management for communication between information sources. However, traditional Distributed Denial of Service (DDoS) attacks still significantly impact SDN systems. This paper proposes a novel dual-layer strategy capable of detecting and mitigating DDoS attacks in an SDN network environment. The first layer of the strategy enhances security by using blockchain technology to replace the SDN flow table storage container in the northbound interface of the SDN controller. Smart contracts are then used to process the stored flow table information. We employ the time window algorithm and the token bucket algorithm to construct the first layer strategy to defend against obvious DDoS attacks. To detect and mitigate less obvious DDoS attacks, we design a second-layer strategy that uses a composite data feature correlation coefficient calculation method and the Isolation Forest algorithm from unsupervised learning techniques to perform binary classification, thereby identifying abnormal traffic. We conduct experimental validation using the publicly available DDoS dataset CIC-DDoS2019. The results show that using this strategy in the SDN network reduces the average deviation of round-trip time (RTT) by approximately 38.86% compared with the original SDN network without this strategy. Furthermore, the accuracy of DDoS attack detection reaches 97.66% and an F1 score of 92.2%. Compared with other similar methods, under comparable detection accuracy, the deployment of our strategy in small-scale SDN network topologies provides faster detection speeds for DDoS attacks and exhibits less fluctuation in detection time. This indicates that implementing this strategy can effectively identify DDoS attacks without affecting the stability of data transmission in the SDN network environment. Full article
(This article belongs to the Special Issue DDoS Attack Detection for Cyber–Physical Systems)
Show Figures

Figure 1

32 pages, 2102 KB  
Article
D* Lite and Transformer-Enhanced SAC: A Hybrid Reinforcement Learning Framework for COLREGs-Compliant Autonomous Navigation in Dynamic Maritime Environments
by Tianqing Chen, Yamei Lan, Yichen Li, Jiesen Zhang and Yijie Yin
J. Mar. Sci. Eng. 2025, 13(8), 1498; https://doi.org/10.3390/jmse13081498 - 4 Aug 2025
Viewed by 1923
Abstract
Autonomous navigation in dynamic, multi-vessel maritime environments presents a formidable challenge, demanding strict adherence to the International Regulations for Preventing Collisions at Sea (COLREGs). Conventional approaches often struggle with the dual imperatives of global path optimality and local reactive safety, and they frequently [...] Read more.
Autonomous navigation in dynamic, multi-vessel maritime environments presents a formidable challenge, demanding strict adherence to the International Regulations for Preventing Collisions at Sea (COLREGs). Conventional approaches often struggle with the dual imperatives of global path optimality and local reactive safety, and they frequently rely on simplistic state representations that fail to capture complex spatio-temporal interactions among vessels. We introduce a novel hybrid reinforcement learning framework, D* Lite + Transformer-Enhanced Soft Actor-Critic (TE-SAC), to overcome these limitations. This hierarchical framework synergizes the strengths of global and local planning. An enhanced D* Lite algorithm generates efficient, long-horizon reference paths at the global level. At the local level, the TE-SAC agent performs COLREGs-compliant tactical maneuvering. The core innovation resides in TE-SAC’s synergistic state encoder, which uniquely combines a Graph Neural Network (GNN) to model the instantaneous spatial topology of vessel encounters with a Transformer encoder to capture long-range temporal dependencies and infer vessel intent. Comprehensive simulations demonstrate the framework’s superior performance, validating the strengths of both planning layers. At the local level, our TE-SAC agent exhibits remarkable tactical intelligence, achieving an exceptional 98.7% COLREGs compliance rate and reducing energy consumption by 15–20% through smoother, more decisive maneuvers. This high-quality local control, guided by the efficient global paths from the enhanced D* Lite algorithm, culminates in a 10–32 percentage point improvement in overall task success rates compared to state-of-the-art baselines. This work presents a robust, verifiable, and efficient framework. By demonstrating superior performance and compliance with rules in high-fidelity simulations, it lays a crucial foundation for advancing the practical application of intelligent autonomous navigation systems. Full article
(This article belongs to the Special Issue Motion Control and Path Planning of Marine Vehicles—3rd Edition)
Show Figures

Figure 1

14 pages, 1081 KB  
Article
Optical Frequency Comb-Based Continuous-Variable Quantum Secret Sharing Scheme
by Runsheng Peng, Yijun Wang, Hang Zhang, Yun Mao and Ying Guo
Mathematics 2025, 13(15), 2455; https://doi.org/10.3390/math13152455 - 30 Jul 2025
Cited by 1 | Viewed by 1231
Abstract
Quantum secret sharing (QSS) faces inherent limitations in scaling to multi-user networks due to excess noise introduced by highly asymmetric beam splitters (HABSs) in chain-structured topologies. To overcome this challenge, we propose an optical frequency comb-based continuous-variable QSS (OFC CV-QSS) scheme that establishes [...] Read more.
Quantum secret sharing (QSS) faces inherent limitations in scaling to multi-user networks due to excess noise introduced by highly asymmetric beam splitters (HABSs) in chain-structured topologies. To overcome this challenge, we propose an optical frequency comb-based continuous-variable QSS (OFC CV-QSS) scheme that establishes parallel frequency channels between users and the dealer via OFC-generated multi-wavelength carriers. By replacing the chain-structured links with dedicated frequency channels and integrating the Chinese remainder theorem (CRT) with a decentralized architecture, our design eliminates excess noise from all users using HABS while providing mathematical- and physical-layer security. Simulation results demonstrate that the scheme achieves a more than 50% improvement in maximum transmission distance compared to chain-based QSS, with significantly slower performance degradation as users scale to 20. Numerical simulations confirm the feasibility of this theoretical framework for multi-user quantum networks, offering dual-layer confidentiality without compromising key rates. Full article
Show Figures

Figure 1

37 pages, 6550 KB  
Article
Multiphase Transport Network Optimization: Mathematical Framework Integrating Resilience Quantification and Dynamic Algorithm Coupling
by Linghao Ren, Xinyue Li, Renjie Song, Yuning Wang, Meiyun Gui and Bo Tang
Mathematics 2025, 13(13), 2061; https://doi.org/10.3390/math13132061 - 21 Jun 2025
Cited by 2 | Viewed by 1698
Abstract
This study proposes a multi-dimensional urban transportation network optimization framework (MTNO-RQDC) to address structural failure risks from aging infrastructure and regional connectivity bottlenecks. Through dual-dataset validation using both the Baltimore road network and PeMS07 traffic flow data, we first develop a traffic simulation [...] Read more.
This study proposes a multi-dimensional urban transportation network optimization framework (MTNO-RQDC) to address structural failure risks from aging infrastructure and regional connectivity bottlenecks. Through dual-dataset validation using both the Baltimore road network and PeMS07 traffic flow data, we first develop a traffic simulation model integrating Dijkstra’s algorithm with capacity-constrained allocation strategies for guiding reconstruction planning for the collapsed Francis Scott Key Bridge. Next, we create a dynamic adaptive public transit optimization model using an entropy weight-TOPSIS decision framework coupled with an improved simulated annealing algorithm (ISA-TS), achieving coordinated suburban–urban network optimization while maintaining 92.3% solution stability under simulated node failure conditions. The framework introduces three key innovations: (1) a dual-layer regional division model combining K-means geographical partitioning with spectral clustering functional zoning; (2) fault-tolerant network topology optimization demonstrated through 1000-epoch Monte Carlo failure simulations; (3) cross-dataset transferability validation showing 15.7% performance variance between Baltimore and PeMS07 environments. Experimental results demonstrate a 28.7% reduction in road network traffic variance (from 42,760 to 32,100), 22.4% improvement in public transit path redundancy, and 30.4–44.6% decrease in regional traffic load variance with minimal costs. Hyperparameter analysis reveals two optimal operational modes: rapid cooling (rate = 0.90) achieves 85% improvement within 50 epochs for emergency response, while slow cooling (rate = 0.99) yields 12.7% superior solutions for long-term planning. The framework establishes a new multi-objective paradigm balancing structural resilience, functional connectivity, and computational robustness for sustainable smart city transportation systems. Full article
Show Figures

Figure 1

21 pages, 3373 KB  
Article
Research on Intelligent Hierarchical Energy Management for Connected Automated Range-Extended Electric Vehicles Based on Speed Prediction
by Xixu Lai, Hanwu Liu, Yulong Lei, Wencai Sun, Song Wang, Jinmiao Xiang and Ziyu Wang
Energies 2025, 18(12), 3053; https://doi.org/10.3390/en18123053 - 9 Jun 2025
Viewed by 1020
Abstract
To address energy management challenges for intelligent connected automated range-extended electric vehicles under vehicle-road cooperative environments, a hierarchical energy management strategy (EMS) based on speed prediction is proposed from the perspective of multi-objective optimization (MOO), with comprehensive system performance being significantly enhanced. Focusing [...] Read more.
To address energy management challenges for intelligent connected automated range-extended electric vehicles under vehicle-road cooperative environments, a hierarchical energy management strategy (EMS) based on speed prediction is proposed from the perspective of multi-objective optimization (MOO), with comprehensive system performance being significantly enhanced. Focusing on connected car-following scenarios, acceleration sequence prediction is performed based on Kalman filtering and preceding vehicle acceleration. A dual-layer optimization strategy is subsequently developed: in the upper layer, optimal speed curves are planned based on road network topology and preceding vehicle trajectories, while in the lower layer, coordinated multi-power source allocation is achieved through EMSMPC-P, a Bayesian-optimized model predictive EMS based on Pontryagin’ s minimum principle (PMP). A MOO model is ultimately formulated to enhance comprehensive system performance. Simulation and bench test results demonstrate that with SoC0 = 0.4, 7.69% and 5.13% improvement in fuel economy is achieved by EMSMPC-P compared to the charge depleting-charge sustaining (CD-CS) method and the charge depleting-blend (CD-Blend) method. Travel time reductions of 62.2% and 58.7% are observed versus CD-CS and CD-Blend. Battery lifespan degradation is mitigated by 16.18% and 5.89% relative to CD-CS and CD-Blend, demonstrating the method’s marked advantages in improving traffic efficiency, safety, battery life maintenance, and fuel economy. This study not only establishes a technical paradigm with theoretical depth and engineering applicability for EMS, but also quantitatively reveals intrinsic mechanisms underlying long-term prediction accuracy enhancement through data analysis, providing critical guidance for future vehicle–road–cloud collaborative system development. Full article
Show Figures

Figure 1

Back to TopTop