Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (297)

Search Parameters:
Keywords = symmetric diffusion

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
32 pages, 41108 KB  
Article
A Novel Medical Image Encryption Algorithm Based on High-Dimensional Memristor Chaotic System with Extended Josephus-RNA Hybrid Mechanism
by Yixiao Wang, Yutong Li, Zhenghong Yu, Tianxian Zhang and Xiangliang Xu
Symmetry 2025, 17(8), 1255; https://doi.org/10.3390/sym17081255 - 6 Aug 2025
Viewed by 323
Abstract
Conventional image encryption schemes struggle to meet the high security demands of medical images due to their large data volume, strong pixel correlation, and structural redundancy. To address these challenges, we propose a grayscale medical image encryption algorithm based on a novel 5-D [...] Read more.
Conventional image encryption schemes struggle to meet the high security demands of medical images due to their large data volume, strong pixel correlation, and structural redundancy. To address these challenges, we propose a grayscale medical image encryption algorithm based on a novel 5-D memristor chaotic system. The algorithm integrates a Symmetric L-type Josephus Spiral Scrambling (SLJSS) module and a Dynamic Codon-based Multi-RNA Diffusion (DCMRD) module to enhance spatial decorrelation and diffusion complexity. Simulation results demonstrate that the proposed method achieves near-ideal entropy (e.g., 7.9992), low correlation (e.g., 0.0043), and high robustness (e.g., NPCR: 99.62%, UACI: 33.45%) with time complexity of O(11MN), confirming its effectiveness and efficiency for medical image protection. Full article
(This article belongs to the Special Issue Symmetry in Chaos Theory and Applications)
Show Figures

Figure 1

24 pages, 90648 KB  
Article
An Image Encryption Method Based on a Two-Dimensional Cross-Coupled Chaotic System
by Caiwen Chen, Tianxiu Lu and Boxu Yan
Symmetry 2025, 17(8), 1221; https://doi.org/10.3390/sym17081221 - 2 Aug 2025
Viewed by 446
Abstract
Chaotic systems have demonstrated significant potential in the field of image encryption due to their extreme sensitivity to initial conditions, inherent unpredictability, and pseudo-random behavior. However, existing chaos-based encryption schemes still face several limitations, including narrow chaotic regions, discontinuous chaotic ranges, uneven trajectory [...] Read more.
Chaotic systems have demonstrated significant potential in the field of image encryption due to their extreme sensitivity to initial conditions, inherent unpredictability, and pseudo-random behavior. However, existing chaos-based encryption schemes still face several limitations, including narrow chaotic regions, discontinuous chaotic ranges, uneven trajectory distributions, and fixed pixel processing sequences. These issues substantially hinder the security and efficiency of such algorithms. To address these challenges, this paper proposes a novel hyperchaotic map, termed the two-dimensional cross-coupled chaotic map (2D-CFCM), derived from a newly designed 2D cross-coupled chaotic system. The proposed 2D-CFCM exhibits enhanced randomness, greater sensitivity to initial values, a broader chaotic region, and a more uniform trajectory distribution, thereby offering stronger security guarantees for image encryption applications. Based on the 2D-CFCM, an innovative image encryption method was further developed, incorporating efficient scrambling and forward and reverse random multidirectional diffusion operations with symmetrical properties. Through simulation tests on images of varying sizes and resolutions, including color images, the results demonstrate the strong security performance of the proposed method. This method has several remarkable features, including an extremely large key space (greater than 2912), extremely high key sensitivity, nearly ideal entropy value (greater than 7.997), extremely low pixel correlation (less than 0.04), and excellent resistance to differential attacks (with the average values of NPCR and UACI being 99.6050% and 33.4643%, respectively). Compared to existing encryption algorithms, the proposed method provides significantly enhanced security. Full article
(This article belongs to the Special Issue Symmetry in Chaos Theory and Applications)
Show Figures

Figure 1

7 pages, 1733 KB  
Case Report
Bilateral Symmetrical Brain MRI Findings in Acute Necrotising Encephalopathy Type 1
by Alexander T. Hoppe, Twinkle Ghia, Richard Warne, Peter Shipman and Rahul Lakshmanan
Children 2025, 12(8), 974; https://doi.org/10.3390/children12080974 - 24 Jul 2025
Viewed by 456
Abstract
Background: Acute necrotising encephalopathy (ANE) is a rare and severe type of encephalopathy with bilateral symmetrical brain lesions, often following a viral prodrome. ANE type 1 (ANE1) is a disease subtype with a predisposing mutation in the gene encoding RAN binding protein 2 [...] Read more.
Background: Acute necrotising encephalopathy (ANE) is a rare and severe type of encephalopathy with bilateral symmetrical brain lesions, often following a viral prodrome. ANE type 1 (ANE1) is a disease subtype with a predisposing mutation in the gene encoding RAN binding protein 2 (RANBP2). Methods: We report a case of a 3-year-old girl with clinical symptoms of ANE and brain MRI findings suggesting ANE1, which was subsequently confirmed by genetic analysis. Results: MRI of the brain demonstrated symmetrical high T2/FLAIR signal changes in the lateral geniculate bodies, claustrum, ventromedial thalami, subthalamic nuclei, mamillary bodies, and brainstem, with partly corresponding diffusion restriction, as well as additional haemorrhagic changes in the lateral geniculate bodies on susceptibility weighted imaging. Genetic analysis revealed a heterozygous pathogenic variant of the RANBP2 gene. With immunosuppressive and supportive treatment, the patient fully recovered and was discharged after 10 days in the hospital with no residual symptoms. Conclusions: Recognition of the characteristic MRI findings in ANE1 can facilitate a timely diagnosis and enhance the clinical management of the patient and their relatives, especially given the high risk of disease recurrence. Full article
(This article belongs to the Special Issue Genetic Rare Diseases in Children)
Show Figures

Figure 1

16 pages, 2159 KB  
Article
A New Depth-Averaged Eulerian SPH Model for Passive Pollutant Transport in Open Channel Flows
by Kao-Hua Chang, Kai-Hsin Shih and Yung-Chieh Wang
Water 2025, 17(15), 2205; https://doi.org/10.3390/w17152205 - 24 Jul 2025
Cited by 1 | Viewed by 374
Abstract
Various nature-based solutions (NbS)—such as constructed wetlands, drainage ditches, and vegetated buffer strips—have recently demonstrated strong potential for mitigating pollutant transport in open channels and river systems. Numerical modeling is a widely adopted and effective approach for assessing the performance of these interventions. [...] Read more.
Various nature-based solutions (NbS)—such as constructed wetlands, drainage ditches, and vegetated buffer strips—have recently demonstrated strong potential for mitigating pollutant transport in open channels and river systems. Numerical modeling is a widely adopted and effective approach for assessing the performance of these interventions. This study presents the first development of a two-dimensional (2D) meshless advection–diffusion model based on an Eulerian smoothed particle hydrodynamics (SPH) framework, specifically designed to simulate passive pollutant transport in open channel flows. The proposed model marks a pioneering application of the ESPH technique to environmental pollutant transport problems. It couples the 2D depth-averaged shallow water equations with an advection–diffusion equation to represent both fluid motion and pollutant concentration dynamics. A uniform particle arrangement ensures that each fluid particle interacts symmetrically with eight neighboring particles for flux computation. To represent the pollutant transport process, the dispersion coefficient is defined as the sum of molecular and turbulent diffusion components. The turbulent diffusion coefficient is calculated using a prescribed turbulent Schmidt number and the eddy viscosity obtained from a Smagorinsky-type mixing-length turbulence model. Three analytical case studies, including one-dimensional transcritical open channel flow, 2D isotropic and anisotropic diffusion in still water, and advection–diffusion in a 2D uniform flow, are employed to verify the model’s accuracy and convergence. The model demonstrates first-order convergence, with relative root mean square errors (RRMSEs) of approximately 0.2% for water depth and velocity, and 0.1–0.5% for concentration. Additionally, the model is applied to a laboratory experiment involving 2D pollutant dispersion in a 90° junction channel. The simulated results show good agreement with measured velocity and concentration distributions. These findings indicate that the developed model is a reliable and effective tool for evaluating the performance of NbS in mitigating pollutant transport in open channels and river systems. Full article
Show Figures

Figure 1

26 pages, 8232 KB  
Article
A CML-ECA Chaotic Image Encryption System Based on Multi-Source Perturbation Mechanism and Dynamic DNA Encoding
by Xin Xie, Kun Zhang, Bing Zheng, Hao Ning, Yu Zhou, Qi Peng and Zhengyu Li
Symmetry 2025, 17(7), 1042; https://doi.org/10.3390/sym17071042 - 2 Jul 2025
Cited by 1 | Viewed by 496
Abstract
To meet the growing demand for secure and reliable image protection in digital communication, this paper proposes a novel image encryption framework that addresses the challenges of high plaintext sensitivity, resistance to statistical attacks, and key security. The method combines a two-dimensional dynamically [...] Read more.
To meet the growing demand for secure and reliable image protection in digital communication, this paper proposes a novel image encryption framework that addresses the challenges of high plaintext sensitivity, resistance to statistical attacks, and key security. The method combines a two-dimensional dynamically coupled map lattice (2D DCML) with elementary cellular automata (ECA) to construct a heterogeneous chaotic system with strong spatiotemporal complexity. To further enhance nonlinearity and diffusion, a multi-source perturbation mechanism and adaptive DNA encoding strategy are introduced. These components work together to obscure the image structure, pixel correlations, and histogram characteristics. By embedding spatial and temporal symmetry into the coupled lattice evolution and perturbation processes, the proposed method ensures a more uniform and balanced transformation of image data. Meanwhile, the method enhances the confusion and diffusion effects by utilizing the principle of symmetric perturbation, thereby improving the overall security of the system. Experimental evaluations on standard images demonstrate that the proposed scheme achieves high encryption quality in terms of histogram uniformity, information entropy, NPCR, UACI, and key sensitivity tests. It also shows strong resistance to chosen plaintext attacks, confirming its robustness for secure image transmission. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

59 pages, 1417 KB  
Article
Symmetrized Neural Network Operators in Fractional Calculus: Caputo Derivatives, Asymptotic Analysis, and the Voronovskaya–Santos–Sales Theorem
by Rômulo Damasclin Chaves dos Santos, Jorge Henrique de Oliveira Sales and Gislan Silveira Santos
Axioms 2025, 14(7), 510; https://doi.org/10.3390/axioms14070510 - 30 Jun 2025
Viewed by 362
Abstract
This work presents a comprehensive mathematical framework for symmetrized neural network operators operating under the paradigm of fractional calculus. By introducing a perturbed hyperbolic tangent activation, we construct a family of localized, symmetric, and positive kernel-like densities, which form the analytical backbone for [...] Read more.
This work presents a comprehensive mathematical framework for symmetrized neural network operators operating under the paradigm of fractional calculus. By introducing a perturbed hyperbolic tangent activation, we construct a family of localized, symmetric, and positive kernel-like densities, which form the analytical backbone for three classes of multivariate operators: quasi-interpolation, Kantorovich-type, and quadrature-type. A central theoretical contribution is the derivation of the Voronovskaya–Santos–Sales Theorem, which extends classical asymptotic expansions to the fractional domain, providing rigorous error bounds and normalized remainder terms governed by Caputo derivatives. The operators exhibit key properties such as partition of unity, exponential decay, and scaling invariance, which are essential for stable and accurate approximations in high-dimensional settings and systems governed by nonlocal dynamics. The theoretical framework is thoroughly validated through applications in signal processing and fractional fluid dynamics, including the formulation of nonlocal viscous models and fractional Navier–Stokes equations with memory effects. Numerical experiments demonstrate a relative error reduction of up to 92.5% when compared to classical quasi-interpolation operators, with observed convergence rates reaching On1.5 under Caputo derivatives, using parameters λ=3.5, q=1.8, and n=100. This synergy between neural operator theory, asymptotic analysis, and fractional calculus not only advances the theoretical landscape of function approximation but also provides practical computational tools for addressing complex physical systems characterized by long-range interactions and anomalous diffusion. Full article
(This article belongs to the Special Issue Advances in Fuzzy Logic and Computational Intelligence)
Show Figures

Figure 1

22 pages, 2815 KB  
Article
Multi-Layer Cryptosystem Using Reversible Cellular Automata
by George Cosmin Stănică and Petre Anghelescu
Electronics 2025, 14(13), 2627; https://doi.org/10.3390/electronics14132627 - 29 Jun 2025
Viewed by 440
Abstract
The growing need for adaptable and efficient hardware-based encryption methods has led to increased interest in unconventional models such as cellular automata (CA). This study presents the hardware design and the field programmable gate array (FPGA)-based implementation of a multi-layer symmetric block encryption [...] Read more.
The growing need for adaptable and efficient hardware-based encryption methods has led to increased interest in unconventional models such as cellular automata (CA). This study presents the hardware design and the field programmable gate array (FPGA)-based implementation of a multi-layer symmetric block encryption algorithm built on the principles of reversible cellular automata (RCA). The algorithm operates on 128-bit plaintext blocks processed over iterative rounds and integrates five RCA components, each assigned with specific transformation roles to ensure high data diffusion. A 256-bit secret key that governs the rule configuration yields a vast keyspace, significantly enhancing resistance to brute-force attacks. Key elements such as rule-based evolution, neighborhood radius, and hybrid cellular automata for random state generation are also integrated into the hardware logic. All cryptographic components, including initialization, encryption logic, and control, are built exclusively using CA, ensuring design consistency and low complexity. The cryptosystem takes advantage of the localized interactions and naturally parallel CA structure, which align with the architecture of FPGA devices, making them a suitable platform for implementing such encryption schemes. The results demonstrate the feasibility of deploying multi-layer RCA encryption schemes on reconfigurable devices and provide a viable path toward efficient and secure hardware-level encryption systems. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

15 pages, 580 KB  
Article
Impact of Log-Normal Particle Size Distribution in Holby–Morgan Degradation Model on Aging of Pt/C Catalyst in PEMFC
by Victor A. Kovtunenko
Technologies 2025, 13(7), 262; https://doi.org/10.3390/technologies13070262 - 20 Jun 2025
Viewed by 819
Abstract
The Holby–Morgan model of electrochemical degradation in platinum on a carbon catalyst is studied with respect to the impact of particle size distribution on aging in polymer electrolyte membrane fuel cells. The European Union harmonized protocol for testing by non-symmetric square-wave voltage is [...] Read more.
The Holby–Morgan model of electrochemical degradation in platinum on a carbon catalyst is studied with respect to the impact of particle size distribution on aging in polymer electrolyte membrane fuel cells. The European Union harmonized protocol for testing by non-symmetric square-wave voltage is applied for accelerated stress cycling. The log-normal distribution is estimated using finite size groups which are defined by two parameters of the median and standard deviation. In the non-diffusive model, the first integral of the system is obtained which reduces the number of differential equations. Without ion diffusion, it allows to simulate platinum particles shrank through platinum dissolution and growth by platinum ion deposition. Numerical tests of catalyst degradation in the diffusion model demonstrate the following changes in platinum particle size distribution: broadening for small and shrinking for large medians with tailing towards large particles; the possibility of probability decrease as well as increase for each size group; and overall, a drop in the platinum particle size takes place, which is faster for the small median owing to the Gibbs–Thompson effect. Full article
(This article belongs to the Section Environmental Technology)
Show Figures

Figure 1

13 pages, 4059 KB  
Article
Mo-Dopant-Enhanced Energy Storage Performance of VS2 Microflowers as Electrode Materials for Supercapacitors
by Jingwei Wang, Xuejun Zheng, Long Xie, Zhenhua Xiang and Wenyuan He
Inorganics 2025, 13(6), 199; https://doi.org/10.3390/inorganics13060199 - 13 Jun 2025
Viewed by 624
Abstract
It is found that Mo doping can enhance the supercapacitor performance of VS2 microflowers. The X-ray diffraction combined with energy dispersive X-ray, X-ray photoelectron spectroscopy, and Raman spectra results verify the successful doping of Mo atoms into the VS2 matrix. As [...] Read more.
It is found that Mo doping can enhance the supercapacitor performance of VS2 microflowers. The X-ray diffraction combined with energy dispersive X-ray, X-ray photoelectron spectroscopy, and Raman spectra results verify the successful doping of Mo atoms into the VS2 matrix. As the electrode material of supercapacitors, the Mo-doped VS2 performs better electrochemical performance than pristine VS2, achieving the specific capacitance of 170 F g−1 at 0.5 A g−1 and 389.5 F g−1 at 5 mV s−1. Furthermore, the symmetric supercapacitor based on the Mo-doped VS2 exhibits good stability and ideal rate capability. The enhanced capability is presumably ascribed to the more accessible active sites and faster electrons/ions diffusion kinetics, which are caused by the increased specific surface area, expanded interlayer spacing, and improved conductivity after Mo doping. This strategy can also be extended to strengthen the capacitive properties of other transition metal dichalcogenides for advanced energy storage devices. Full article
Show Figures

Figure 1

18 pages, 15092 KB  
Article
Ultra-Low Bitrate Predictive Portrait Video Compression with Diffusion Models
by Xinyi Chen, Weimin Lei, Wei Zhang, Yanwen Wang and Mingxin Liu
Symmetry 2025, 17(6), 913; https://doi.org/10.3390/sym17060913 - 10 Jun 2025
Viewed by 1154
Abstract
Deep neural video compression codecs have shown great promise in recent years. However, there are still considerable challenges for ultra-low bitrate video coding. Inspired by recent diffusion models for image and video compression attempts, we attempt to leverage diffusion models for ultra-low bitrate [...] Read more.
Deep neural video compression codecs have shown great promise in recent years. However, there are still considerable challenges for ultra-low bitrate video coding. Inspired by recent diffusion models for image and video compression attempts, we attempt to leverage diffusion models for ultra-low bitrate portrait video compression. In this paper, we propose a predictive portrait video compression method that leverages the temporal prediction capabilities of diffusion models. Specifically, we develop a temporal diffusion predictor based on a conditional latent diffusion model, with the predicted results serving as decoded frames. We symmetrically integrate a temporal diffusion predictor at the encoding and decoding side, respectively. When the perceptual quality of the predicted results in encoding end falls below a predefined threshold, a new frame sequence is employed for prediction. While the predictor at the decoding side directly generates predicted frames as reconstruction based on the evaluation results. This symmetry ensures that the prediction frames generated at the decoding end are consistent with those at the encoding end. We also design an adaptive coding strategy that incorporates frame quality assessment and adaptive keyframe control. To ensure consistent quality of subsequent predicted frames and achieve high perceptual reconstruction, this strategy dynamically evaluates the visual quality of the predicted results during encoding, retains the predicted frames that meet the quality threshold, and adaptively adjusts the length of the keyframe sequence based on motion complexity. The experimental results demonstrate that, compared with the traditional video codecs and other popular methods, the proposed scheme provides superior compression performance at ultra-low bitrates while maintaining competitiveness in visual effects, achieving more than 24% bitrate savings compared with VVC in terms of perceptual distortion. Full article
Show Figures

Figure 1

23 pages, 23602 KB  
Article
Exploration of the Supercapacitive Performance of 3D Flower-like Architecture of Quaternary CuNiCoZnO Developed on Versatile Substrates
by Priya G. Gaikwad, Nidhi Tiwari, Rajanish K. Kamat, Sadaf Jamal Gilani, Sagar M. Mane, Jaewoong Lee and Shriniwas B. Kulkarni
Micromachines 2025, 16(6), 645; https://doi.org/10.3390/mi16060645 - 28 May 2025
Viewed by 514
Abstract
The demand for high-performance supercapacitors has driven extensive research into novel electrode materials with superior electrochemical properties. This study explores the supercapacitive behavior of quaternary CuNiCoZnO (CNCZO) films engineered into a three-dimensional (3D) flower-like morphology and developed on versatile substrates, including carbon cloth, [...] Read more.
The demand for high-performance supercapacitors has driven extensive research into novel electrode materials with superior electrochemical properties. This study explores the supercapacitive behavior of quaternary CuNiCoZnO (CNCZO) films engineered into a three-dimensional (3D) flower-like morphology and developed on versatile substrates, including carbon cloth, stainless steel mesh, and nickel foam. The unique structural design, comprising interconnected nanosheets, enhances the electroactive surface area, facilitates ion diffusion, and improves charge storage capability. The synergistic effect of the multi-metallic composition contributes to remarkable electrochemical characteristics, including high specific capacitance, excellent rate capability, and outstanding cycling stability. Furthermore, the influence of different substrates on the electrochemical performance is systematically investigated to optimize material–substrate interactions. Electrochemical evaluations reveal outstanding specific capacitance values of 2318.5 F/g, 1993.7 F/g, and 2741.3 F/g at 2 mA/cm2 for CNCZO electrodes on stainless steel mesh, carbon cloth, and nickel foam, respectively, with capacitance retention of 77.3%, 95.7%, and 86.1% over 5000 cycles. Furthermore, a symmetric device of CNCZO@Ni exhibits a peak specific capacitance of 67.7 F/g at a current density of 4 mA/cm2, a power density of 717.4 W/kg, and an energy density of 25.6 Wh/kg, maintaining 84.5% stability over 5000 cycles. The straightforward synthesis of CNCZO on multiple substrates presents a promising route for the development of flexible, high-performance energy storage devices. Full article
(This article belongs to the Special Issue Energy Conversion and Storage Devices: Materials and Applications)
Show Figures

Figure 1

31 pages, 19763 KB  
Article
Square-Based Division Scheme for Image Encryption Using Generalized Fibonacci Matrices
by Panagiotis Oikonomou, George K. Kranas, Maria Sapounaki, Georgios Spathoulas, Aikaterini Aretaki, Athanasios Kakarountas and Maria Adam
Mathematics 2025, 13(11), 1781; https://doi.org/10.3390/math13111781 - 27 May 2025
Viewed by 474
Abstract
This paper proposes a novel image encryption and decryption scheme, called Square Block Division-Fibonacci (SBD-Fibonacci), which dynamically partitions any input image into optimally sized square blocks to enable efficient encryption without resizing or distortion. The proposed encryption scheme can dynamically adapt to the [...] Read more.
This paper proposes a novel image encryption and decryption scheme, called Square Block Division-Fibonacci (SBD-Fibonacci), which dynamically partitions any input image into optimally sized square blocks to enable efficient encryption without resizing or distortion. The proposed encryption scheme can dynamically adapt to the image dimensions and ensure compatibility with images of varying and high resolutions, while it serves as a yardstick for any symmetric-key image encryption algorithm. An optimization model, combined with the Lagrange Four-Square theorem, minimizes trivial block sizes, strengthening the encryption structure. Encryption keys are generated using the direct sum of generalized Fibonacci matrices, ensuring key matrix invertibility and strong diffusion properties and security levels. Experimental results on widely-used benchmark images and a comparative analysis against State-of-the-Art encryption algorithms demonstrate that SBD-Fibonacci achieves high entropy, strong resistance to differential and statistical attacks, and efficient runtime performance—even for large images. Full article
(This article belongs to the Section E1: Mathematics and Computer Science)
Show Figures

Figure 1

17 pages, 5008 KB  
Article
Structure Approximation-Based Preconditioning for Solving Tempered Fractional Diffusion Equations
by Xuan Zhang and Chaojie Wang
Algorithms 2025, 18(6), 307; https://doi.org/10.3390/a18060307 - 23 May 2025
Viewed by 287
Abstract
Tempered fractional diffusion equations constitute a critical class of partial differential equations with broad applications across multiple physical domains. In this paper, the Crank–Nicolson method and the tempered weighted and shifted Grünwald formula are used to discretize the tempered fractional diffusion equations. The [...] Read more.
Tempered fractional diffusion equations constitute a critical class of partial differential equations with broad applications across multiple physical domains. In this paper, the Crank–Nicolson method and the tempered weighted and shifted Grünwald formula are used to discretize the tempered fractional diffusion equations. The discretized system has the structure of the sum of the identity matrix and a diagonal matrix multiplied by a symmetric positive definite (SPD) Toeplitz matrix. For the discretized system, we propose a structure approximation-based preconditioning method. The structure approximation lies in two aspects: the inverse approximation based on the row-by-row strategy and the SPD Toeplitz approximation by the τ matrix. The proposed preconditioning method can be efficiently implemented using the discrete sine transform (DST). In spectral analysis, it is found that the eigenvalues of the preconditioned coefficient matrix are clustered around 1, ensuring fast convergence of Krylov subspace methods with the new preconditioner. Numerical experiments demonstrate the effectiveness of the proposed preconditioner. Full article
(This article belongs to the Special Issue Numerical Optimization and Algorithms: 3rd Edition)
Show Figures

Figure 1

30 pages, 2517 KB  
Article
Private Data Incrementalization: Data-Centric Model Development for Clinical Liver Segmentation
by Stephanie Batista, Miguel Couceiro, Ricardo Filipe, Paulo Rachinhas, Jorge Isidoro and Inês Domingues
Bioengineering 2025, 12(5), 530; https://doi.org/10.3390/bioengineering12050530 - 15 May 2025
Viewed by 522
Abstract
Machine Learning models, more specifically Artificial Neural Networks, are transforming medical imaging by enabling precise liver segmentation, a crucial task for diagnosing and treating liver diseases. However, these models often face challenges in adapting to diverse clinical data sources as differences in dataset [...] Read more.
Machine Learning models, more specifically Artificial Neural Networks, are transforming medical imaging by enabling precise liver segmentation, a crucial task for diagnosing and treating liver diseases. However, these models often face challenges in adapting to diverse clinical data sources as differences in dataset volume, resolution, and origin impact generalization and performance. This study introduces a Private Data Incrementalization, a data-centric approach to enhance the adaptability of Artificial Neural Networks by progressively exposing them to varied clinical data. As the target of this study is not to propose a new image segmentation model, the existing medical imaging segmentation models—including U-Net, ResUNet++, Fully Convolutional Network, and a modified algorithm based on the Conditional Bernoulli Diffusion Model—are used. The study evaluates these four models using a curated private dataset of computed tomography scans from Coimbra University Hospital, supplemented by two public datasets, 3D-IRCADb01 and CHAOS. The Private Data Incrementalization method systematically increases the volume and diversity of training data, simulating real-world conditions where models must handle varied imaging contexts. Pre-processing and post-processing stages, incremental training, and performance evaluations reveal that structured exposure to diverse datasets improves segmentation performance, with ResUNet++ achieving the highest accuracy (0.9972) and Dice Similarity Coefficient (0.9449), and the best Average Symmetric Surface Distance (0.0053 mm), demonstrating the importance of dataset diversity and volume for segmentation models’ robustness and generalization. Private Data Incrementalization thus offers a scalable strategy for building resilient segmentation models, ultimately benefiting clinical workflows, patient care, and healthcare resource management by addressing the variability inherent in clinical imaging data. Full article
(This article belongs to the Section Biosignal Processing)
Show Figures

Figure 1

18 pages, 2345 KB  
Article
SGM-EMA: Speech Enhancement Method Score-Based Diffusion Model and EMA Mechanism
by Yuezhou Wu, Zhiri Li and Hua Huang
Appl. Sci. 2025, 15(10), 5243; https://doi.org/10.3390/app15105243 - 8 May 2025
Viewed by 1130
Abstract
The score-based diffusion model has made significant progress in the field of computer vision, surpassing the performance of generative models, such as variational autoencoders, and has been extended to applications such as speech enhancement and recognition. This paper proposes a U-Net architecture using [...] Read more.
The score-based diffusion model has made significant progress in the field of computer vision, surpassing the performance of generative models, such as variational autoencoders, and has been extended to applications such as speech enhancement and recognition. This paper proposes a U-Net architecture using a score-based diffusion model and an efficient multi-scale attention mechanism (EMA) for the speech enhancement task. The model leverages the symmetric structure of U-Net to extract speech features and captures contextual information and local details across different scales using the EMA mechanism, improving speech quality in noisy environments. We evaluate the method on the VoiceBank-DEMAND (VB-DMD) dataset and the DARPA TIMIT Acoustic-Phonetic Continuous Speech Corpus–TUT Sound Events 2017 (TIMIT-TUT) dataset. The experimental results show that the proposed model performed well in terms of speech quality perception (PESQ), extended short-time objective intelligibility (ESTOI), and scale-invariant signal-to-distortion ratio (SI-SDR). Especially when processing out-of-dataset noisy speech, the proposed method achieved excellent speech enhancement results compared to other methods, demonstrating the model’s strong generalization capability. We also conducted an ablation study on the SDE solver and the EMA mechanism, and the results show that the reverse diffusion method outperformed the Euler–Maruyama method, and the EMA strategy could improve the model performance. The results demonstrate the effectiveness of these two techniques in our system. Nevertheless, since the model is specifically designed for Gaussian noise, its performance under non-Gaussian or complex noise conditions may be limited. Full article
(This article belongs to the Special Issue Application of Deep Learning in Speech Enhancement Technology)
Show Figures

Figure 1

Back to TopTop