Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (929)

Search Parameters:
Keywords = IP networks

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
17 pages, 6264 KB  
Article
Robust Fine-Grained Pest Classification via Boundary-Aware Attention and Growth-Stage Supervision
by Xinliang Liu, Ruiming Zhu and Yuying Cao
Insects 2026, 17(4), 423; https://doi.org/10.3390/insects17040423 - 15 Apr 2026
Abstract
Accurate pest identification plays a critical role in effective pest management and sustainable agricultural production. However, fine-grained pest classification is inherently challenging due to low inter-class separability, significant intra-class variability, and complex environmental interference. To address these challenges, we develop a boundary-aware channel-spatial [...] Read more.
Accurate pest identification plays a critical role in effective pest management and sustainable agricultural production. However, fine-grained pest classification is inherently challenging due to low inter-class separability, significant intra-class variability, and complex environmental interference. To address these challenges, we develop a boundary-aware channel-spatial attention network to strengthen discriminative feature learning while suppressing background noise. The proposed attention module enhances fine-grained structural and boundary cues to improve inter-class separability under cluttered field conditions. Furthermore, auxiliary label supervision based on pest growth stages is incorporated to model developmental variations and enhance intra-class consistency. Experiments on the IP102 dataset demonstrate that the proposed method consistently outperforms state-of-the-art baselines in classification accuracy, validating its effectiveness for fine-grained agricultural pest classification. These results highlight the potential of integrating boundary-aware attention mechanisms with growth-stage supervision for robust real-world pest classification. Full article
(This article belongs to the Section Insect Pest and Vector Management)
28 pages, 474 KB  
Article
De-Anonymization Techniques in the Tor Network Using an Experimental Testbed
by Ondrej Kainz, Sebastián Petro, Miroslav Michalko, Miroslav Murin and Ervín Šimko
J. Cybersecur. Priv. 2026, 6(2), 72; https://doi.org/10.3390/jcp6020072 - 13 Apr 2026
Viewed by 135
Abstract
Tor is an anonymization network that enables access to hidden services and protects user identity through layered encryption. While its core technology offers strong privacy, users can still be exposed through indirect attack methods or configuration mistakes. This research not only explores de-anonymization [...] Read more.
Tor is an anonymization network that enables access to hidden services and protects user identity through layered encryption. While its core technology offers strong privacy, users can still be exposed through indirect attack methods or configuration mistakes. This research not only explores de-anonymization techniques but also provides a practical guide for constructing a fully functional experimental Tor environment using virtual machines. The custom-built testbed allows for safe simulation of attacks without impacting the public Tor network. Within this environment, three key information-gathering approaches were evaluated: (1) malware-based reverse shells that establish external communication, (2) malicious PDF and Office files used to trigger outbound connections, and (3) analysis of service misconfigurations that may reveal the IP address of hidden services. The results confirm that although the Tor network itself is resilient, user behavior, improper configurations, and insecure content handling can lead to significant privacy risks. By combining practical environment setup with real-world attack scenarios, this paper serves both as a reference for building experimental Tor networks and as a security-oriented analysis of known de-anonymization vectors. The findings emphasize the critical need for user awareness and precise configuration in privacy-focused technologies. Full article
(This article belongs to the Section Security Engineering & Applications)
23 pages, 1950 KB  
Article
Encrypted Traffic Detection via a Federated Learning-Based Multi-Scale Feature Fusion Framework
by Yichao Fei, Youfeng Zhao, Wenrui Liu, Fei Wu, Shangdong Liu, Xinyu Zhu, Yimu Ji and Pingsheng Jia
Electronics 2026, 15(8), 1570; https://doi.org/10.3390/electronics15081570 - 9 Apr 2026
Viewed by 231
Abstract
With the proliferation of edge computing in IoT and smart security, there is a growing demand for large-scale encrypted traffic anomaly detection. However, the opaque nature of encrypted traffic makes it difficult for traditional detection methods to balance efficiency and accuracy. To address [...] Read more.
With the proliferation of edge computing in IoT and smart security, there is a growing demand for large-scale encrypted traffic anomaly detection. However, the opaque nature of encrypted traffic makes it difficult for traditional detection methods to balance efficiency and accuracy. To address this challenge, this paper proposes FMTF, a Multi-Scale Feature Fusion method based on Federated Learning for encrypted traffic anomaly detection. FMTF constructs graph structures at three scales—spatial, statistical, and content—to comprehensively characterize traffic features. At the spatial scale, communication graphs are constructed based on host-to-host IP interactions, where each node represents the IP address of a host and edges capture the communication relationships between them. The statistical scale builds traffic statistic graphs based on interactions between port numbers, with nodes representing individual ports and edge weights corresponding to the lengths of transmitted packets. At the content scale, byte-level traffic graphs are generated, where nodes represent pairs of bytes extracted from the traffic data, and edges are weighted using pointwise mutual information (PMI) to reflect the statistical association between byte occurrences. To extract and fuse these multi-scale features, FMTF employs the Graph Attention Network (GAT), enhancing the model’s traffic representation capability. Furthermore, to reduce raw-data exposure in distributed edge environments, FMTF integrates a federated learning framework. In this framework, edge devices train models locally based on their multi-scale traffic features and periodically share model parameters with a central server for aggregation, thereby optimizing the global model without exposing raw data. Experimental results demonstrate that FMTF maintains efficient and accurate anomaly detection performance even under limited computing resources, offering a practical and effective solution for encrypted traffic identification and network security protection in edge computing environments. Full article
Show Figures

Figure 1

29 pages, 1206 KB  
Article
An Evidence-Based Architecture for Trustworthy Asset Discovery in Cybersecurity-Critical IT Environments
by Ivana Ogrizek Biškupić, Mislav Balković and Ivan Bencarić
J. Cybersecur. Priv. 2026, 6(2), 67; https://doi.org/10.3390/jcp6020067 - 7 Apr 2026
Viewed by 279
Abstract
Asset discovery is a fundamental but inherently flawed capability in cybersecurity, as current methodologies frequently confuse preliminary discovery observations with definitive asset inventories, thereby obscuring uncertainty, restricting auditability, and eroding trust in security-critical decision-making. This work addresses the issue of inconsistent asset identification [...] Read more.
Asset discovery is a fundamental but inherently flawed capability in cybersecurity, as current methodologies frequently confuse preliminary discovery observations with definitive asset inventories, thereby obscuring uncertainty, restricting auditability, and eroding trust in security-critical decision-making. This work addresses the issue of inconsistent asset identification in dynamic IT settings by presenting an evidence-based architectural paradigm that clearly distinguishes observation, identity resolution, and inventory representation. The principal research aim is to develop and authenticate an architecture that maintains discovery evidence, facilitates deterministic, verifiable identity resolution, and supports interpretable inventory derivation. In contrast to state-centric and model-driven methodologies, the proposed architecture enhances (i) traceability through the preservation of time-scoped, method-attributed observations, (ii) identity continuity amidst dynamic conditions such as IP reassignment and infrastructure modifications, and (iii) auditability by facilitating the reconstruction of inventory claims from foundational evidence. An examined proof-of-concept implementation in a controlled yet realistic network environment shows superior identity stability, greater discovery traceability, and retention of historical context relative to traditional inventory models. The results validate the practicality and architectural benefits of the strategy; nevertheless, the evaluation is constrained by a lack of formalised performance indicators and adversarial robustness, which are recognised as priorities for further investigation. Full article
(This article belongs to the Special Issue Building Community of Good Practice in Cybersecurity)
Show Figures

Figure 1

13 pages, 2075 KB  
Communication
Design and Development of a Multi-Channel High-Frequency Switch Matrix
by Tao Li, Zehong Yan, Junhua Ren and Hongwu Gao
Electronics 2026, 15(7), 1505; https://doi.org/10.3390/electronics15071505 - 3 Apr 2026
Viewed by 258
Abstract
To meet the increasingly strict requirements of modern communication, radar detection and electronic measurement systems for wide-bandwidth, low-insertion-loss and high-isolation signal routing, this paper presents a 16 × 16 programmable switch matrix that simultaneously achieves wideband operation (DC-40 GHz), low insertion loss (≤0.9 [...] Read more.
To meet the increasingly strict requirements of modern communication, radar detection and electronic measurement systems for wide-bandwidth, low-insertion-loss and high-isolation signal routing, this paper presents a 16 × 16 programmable switch matrix that simultaneously achieves wideband operation (DC-40 GHz), low insertion loss (≤0.9 dB maximum), high isolation (>50 dB typical), and systematic modular scalability, a combination not found in existing implementations. The matrix, constructed with high-quality coaxial switches and optimized RF circuitry and electromagnetic structures, provides flexible and stable single-pole multi-throw (SPMT) signal routing across an ultra-wide frequency range from DC to 40 GHz. The switch matrix features a modular architecture, integrating multiple RF switching units, drive control circuits, and communication interface modules. This architecture achieves minimal signal path depth while maintaining full connectivity between any input and output port, directly minimizing cumulative insertion loss. Through precise impedance matching design and isolation structure optimization, the system still exhibits outstanding transmission characteristics at the 40 GHz high-frequency end: typical insertion loss does not exceed 0.9 dB, and the isolation between channels is better than 50 dB, effectively ensuring the integrity of signals in complex multi-channel environments. To meet the requirements of automated testing and remote control, the equipment integrates dual communication interfaces (serial port/network port), supports the SCPI command set and TCP/IP protocol, and can be conveniently embedded in various test platforms to achieve instrument interconnection and test process automation. Experimental verification shows that this matrix exhibits excellent switching stability and signal consistency across the entire 40 GHz, with a switching action time of less than 10 ms. Furthermore, it is capable of real-time topology reconfiguration via a microcontroller or FPGA. These innovations collectively deliver a switch matrix that meets the demanding requirements of 5G communication, millimeter-wave radar, and aerospace defense systems—applications where bandwidth, signal integrity, and system flexibility are paramount. Full article
(This article belongs to the Section Microwave and Wireless Communications)
Show Figures

Figure 1

25 pages, 20821 KB  
Article
Double-Attention Context Interactive Network for Hyperspectral Image Classification
by Nannan Hu, Zhongao Wang, Minghao Wang and Yuefeng Zhao
Remote Sens. 2026, 18(7), 1059; https://doi.org/10.3390/rs18071059 - 2 Apr 2026
Viewed by 312
Abstract
Convolution is still the main method for hyperspectral image classification, since it takes into account both spatial and spectral characteristics. However, the convolution relies on local perceptual computation, ignoring the effective discriminant of context association for classification. In this paper, we propose a [...] Read more.
Convolution is still the main method for hyperspectral image classification, since it takes into account both spatial and spectral characteristics. However, the convolution relies on local perceptual computation, ignoring the effective discriminant of context association for classification. In this paper, we propose a Double-Attention Context Interactive Network (DACINet) for hyperspectral image classification. Specifically, a Context Interaction Fusion Module (CIFM) is designed to enhance long-range contextual dependencies. By stacking multiple 3D convolutional layers, the module progressively enlarges its receptive field, while cross-layer residual connections facilitate the integration of features from different contextual scales, thereby strengthening the model’s ability to capture complex relationships within the hyperspectral data. Then, a Channel–Spatial Double-Attention (CSDA) mechanism based on 3D is proposed for enhancing the two-dimensional spatial features and one-dimensional spectral features, respectively, and fusing the enhanced features. Furthermore, we also construct a hybrid convolutional layer, which combines 2D and 3D convolution to further enhance spectral bands on the basis of three-dimensional understanding. Extensive experiments on the widely used IP, UP, SA and HU datasets show that the proposed DACINet achieves superior classification accuracy, reaching Overall Accuracies of 96.78%, 97.77%, 99.53% and 86.67% respectively, outperforming other state-of-the-art models. Full article
Show Figures

Figure 1

22 pages, 5900 KB  
Article
Measuring Vitality and Spatial Efficiency of Public Spaces in Commercial Complexes: A Multi-Source Data-Driven Analysis in Guangzhou, China
by Xiaojuan Liu, Lipeng Ge and Jun Huang
Land 2026, 15(3), 501; https://doi.org/10.3390/land15030501 - 20 Mar 2026
Viewed by 398
Abstract
The accurate measurement and optimization of spatial vitality inside commercial complexes has become crucial for sophisticated urban governance as urban growth moves from rapid expansion to quality-oriented stock augmentation. This research creates a multifaceted assessment methodology that incorporates systemic connectedness (transportation synergy), spatial [...] Read more.
The accurate measurement and optimization of spatial vitality inside commercial complexes has become crucial for sophisticated urban governance as urban growth moves from rapid expansion to quality-oriented stock augmentation. This research creates a multifaceted assessment methodology that incorporates systemic connectedness (transportation synergy), spatial performance (public activity and social efficacy), and spatial supply (human–land linkages and arrangement). We used a stratified purposive sample of 20 business complexes spread across eight districts in Guangzhou, a typical high-density megacity. In order to understand the underlying mechanisms of spatial vitality, we measured important indicators including the Polycentricity Index (α) and the Spatial Performance Index (β) using a mixed-methods approach that included K-means clustering, multinomial logit regression, and Structural Equation Modeling (SEM). Four important insights are shown by our findings. 1. The paradox of density and efficiency: The notion that high-density development inevitably ensures lively public space is called into question by the lack of a significant linear correlation between the Floor Area Ratio (FAR) and spatial performance (r = 0.32, p > 0.05), despite a core–periphery gradient in development intensity. 2. Structural Supply Demand Mismatch: Although overall spatial performance is strong (β = 0.81 ± 0.07), there is a notable shortfall in cultural and artistic venues, where young adults’ demand (0.27) is 145% greater than supply (0.11). 3. Polycentric Networking vs. Transport Polarization: While spatial structures show a networked polycentric pattern (mean α = 6.40), transportation synergy is affected by core–periphery polarization, which results in “vitality islands” in the periphery. 4. Dual-Path Driving Mechanisms: According to SEM results, cultural spaces have a considerable indirect impact (39.7% mediation) by boosting brand uniqueness and “cultural capital,” while composite plaza spaces have a strong direct effect on commercial performance (γ = 0.682). Based on these findings, we suggest distinct optimization strategies: aging projects need climate-responsive design interventions; growing areas should create family-oriented consumption ecosystems; and core districts should give priority to cultural “IP” integration. For the planning and revitalization of commercial land use in high-density global environments, this study offers a solid analytical framework and practical insights. Full article
Show Figures

Figure 1

16 pages, 1063 KB  
Article
Integrating Inverse Prompting and Chain-of-Thought Reasoning for Automated Flood Control Text Generation: A Case Study of the Lixiahe Region
by Hui Min, Feng Ye, Dong Xu, Jin Xu and Xiaoping Liao
Water 2026, 18(6), 686; https://doi.org/10.3390/w18060686 - 15 Mar 2026
Viewed by 314
Abstract
Flood control briefings are critical emergency response documents that provide timely decision support for urban safety and regional development under climate change challenges. However, existing large language models (LLMs) face significant difficulties in domain-specific adaptation, content controllability, and logical consistency when processing complex [...] Read more.
Flood control briefings are critical emergency response documents that provide timely decision support for urban safety and regional development under climate change challenges. However, existing large language models (LLMs) face significant difficulties in domain-specific adaptation, content controllability, and logical consistency when processing complex water conservancy data. This study aims to develop a robust automated text generation method that ensures high accuracy and logical rigor for flood prevention in the Lixiahe region. We propose an IP-CoT method that integrates Chain-of-Thought (CoT) reasoning for structured information extraction and an Inverse Prompting (IP) mechanism with beam search to optimize content relevance using the DeepSeek-R1 model. Validated on a constructed dataset comprising flood control records from the Lixia River network from 2010 to 2024, the proposed method achieved an accuracy rate of 95.32% in the verification of emotional attributes, which is 2% to 15% higher than most traditional models. Additionally, in the verification of thematic attributes, fluency and diversity were improved, showing significant enhancements compared to the baseline model. This approach significantly enhances the quality and efficiency of domain-specific text generation, providing a reliable intelligent solution for modernizing regional flood control decision-making systems. Full article
(This article belongs to the Section Hydrology)
Show Figures

Figure 1

17 pages, 940 KB  
Article
Integrated Transcriptomics Reveals a SHEV ORF3-Mediated circRNA Network That Disrupts Riboflavin Metabolism and Activates the ko05212 Pathway
by Weihao Luo, Jiya Li, Shengping Wu, Lingjie Wang, Yulong Yin, Xin Cao, Leli Wang and Hanwei Jiao
Vet. Sci. 2026, 13(3), 253; https://doi.org/10.3390/vetsci13030253 - 9 Mar 2026
Cited by 1 | Viewed by 332
Abstract
The Swine hepatitis E virus (SHEV) ORF3 protein is pivotal in pathogenesis, yet its regulation of host metabolic homeostasis via endogenous RNA networks remains unclear. This study aimed to elucidate how the SHEV ORF3-mediated circRNA-miRNA network modulates riboflavin metabolism and triggers the aberrant [...] Read more.
The Swine hepatitis E virus (SHEV) ORF3 protein is pivotal in pathogenesis, yet its regulation of host metabolic homeostasis via endogenous RNA networks remains unclear. This study aimed to elucidate how the SHEV ORF3-mediated circRNA-miRNA network modulates riboflavin metabolism and triggers the aberrant activation of the ko05212 pathway, while also evaluating their physical interactions using AlphaFold 3 structural simulations. To achieve this, high-throughput RNA sequencing, KEGG pathway analysis, and AlphaFold 3 structural simulations were employed to elucidate the circRNA-miRNA-mRNA regulatory network and potential physical interactions. Transcriptomics revealed a “dual activation” of Riboflavin metabolism and Pancreatic cancer pathways. Specifically, we identified an “ENPP Isozyme Switch,” where upregulated hsa_circ_0077855 sponges miR-181a-2-3p, relieving repression of the metabolic enzyme ENPP3 and proto-oncogene KRAS. Furthermore, AlphaFold 3 simulations yielded an extremely low interface predicted Template Modeling score (ipTM = 0.08), refuting direct physical binding, and ORF3 was found to suppress the m6A eraser FTO, suggesting host epigenetic instability. Consequently, SHEV ORF3 induces metabolic remodeling through a dual “epigenetic-post-transcriptional” mechanism: disrupting m6A homeostasis via FTO suppression and constructing a pathogenic ceRNA network via the ENPP3/miR-181a/KRAS axis. These findings highlight the critical role of non-coding RNAs in driving the virus-induced “pre-pathological state”. Full article
Show Figures

Figure 1

27 pages, 566 KB  
Article
Digital Twins at the Edge: A High-Availability Framework for Resilient Data Processing in IoT Sensor Networks
by Madalin Neagu, Codruta Maria Serban, Anca Hangan and Gheorghe Sebestyen
Future Internet 2026, 18(3), 137; https://doi.org/10.3390/fi18030137 - 6 Mar 2026
Viewed by 649
Abstract
The expansion of Internet-of-Things deployments at the network edge challenges service continuity, as single points of failure can interrupt critical data-processing pipelines. This paper introduces the Operational Digital Twin (ODT) —a live, state-synchronized standby system designed for node-level failover in resource-constrained edge environments. [...] Read more.
The expansion of Internet-of-Things deployments at the network edge challenges service continuity, as single points of failure can interrupt critical data-processing pipelines. This paper introduces the Operational Digital Twin (ODT) —a live, state-synchronized standby system designed for node-level failover in resource-constrained edge environments. In contrast to Digital Twins designed for modeling and analysis, an ODT is designed for operational continuity, standing ready to assume control when the primary node fails. We instantiate this concept through a self-configuring, high-availability architecture that implements the ODT for node-level redundancy. To ground this new conceptual category empirically, we define and validate four measurable criteria for ODT fidelity—state fidelity, synchronization timeliness, behavioral mirroring, and failover validation—establishing a framework that extends beyond passive replication. The design adopts a primary–secondary model with automated node discovery, configuration mirroring, and Virtual IP-based failover. Fault-injection experiments demonstrate low failover latency, prompt service restoration, limited message loss during transitions, and minimal resource overhead. These findings demonstrate that the proposed Operational Digital Twin mechanism reduces single points of failure and provides a lightweight, cost-efficient approach to sustaining reliable data processing in distributed edge environments. Full article
(This article belongs to the Special Issue IoT Architecture Supported by Digital Twin: Challenges and Solutions)
Show Figures

Graphical abstract

25 pages, 2728 KB  
Article
GDNN: A Practical Hybrid Book Recommendation System for the Field of Ideological and Political Education
by Yanli Liang, Hui Liu and Songsong Liu
Electronics 2026, 15(5), 1086; https://doi.org/10.3390/electronics15051086 - 5 Mar 2026
Viewed by 309
Abstract
Ideological and political education (IPE) is a cornerstone of higher education in China. As IPE-related book collections expand rapidly, university libraries face a growing challenge of information overload, which hinders the accurate characterization of student reading preferences and the efficient matching of resources [...] Read more.
Ideological and political education (IPE) is a cornerstone of higher education in China. As IPE-related book collections expand rapidly, university libraries face a growing challenge of information overload, which hinders the accurate characterization of student reading preferences and the efficient matching of resources to demand. To address these issues, this study proposes GDNN, a practical hybrid recommendation system designed for both warm-start and cold-start scenarios. For warm-start users with historical borrowing records, we develop the PPSM-GCN framework. This framework enhances the classical graph convolutional collaborative filtering model LightGCN by integrating a novel potential positive sample mining (PPSM) strategy, which effectively mitigates data sparsity and improves the modeling of latent interests. For cold-start users without interaction history, we introduce an embedding and MLP architecture. This deep neural network learns implicit reader–book associations from reader attributes and book metadata, enabling personalized recommendations even in the absence of historical data. Experimental results demonstrate that PPSM-GCN and the embedding and MLP method achieve significant performance gains in their respective scenarios. This research provides both technical support and practical insights for the precise delivery of IPE resources and the overall enhancement of educational effectiveness in higher education. Full article
Show Figures

Figure 1

19 pages, 1091 KB  
Review
Applications of Methods of Solving Inverse Heat Conduction Problems for Energy-Intensive Industrial Processes and Energy Conversion—Current State of the Art and Recent Challenges
by Magda Joachimiak and Damian Joachimiak
Energies 2026, 19(5), 1291; https://doi.org/10.3390/en19051291 - 4 Mar 2026
Viewed by 589
Abstract
This paper presents methods and applications of inverse heat conduction problems (IHCPs) that are ill-posed in the Hadamard sense. The IHCP solution allows for the determination of boundary conditions in the form of heat flux or temperature in places where measurement is impossible [...] Read more.
This paper presents methods and applications of inverse heat conduction problems (IHCPs) that are ill-posed in the Hadamard sense. The IHCP solution allows for the determination of boundary conditions in the form of heat flux or temperature in places where measurement is impossible or difficult to perform. The applications of IHCP solutions to energy-intensive industrial processes, such as heat treatment and thermochemical treatment, are described. Examples are given of determining boundary conditions on the inner surface of the wall of a power boiler and piston machine, as well as on the surface of a gas turbine blade. It is noted that the application of IHCP solutions to the above-mentioned issues often requires simplification of the computational model, in particular, the method of stabilising the inverse problem (IP). For this purpose, quasi-regularisation of IP and machine learning are currently used. Methods with stabilising properties and neural networks were identified as a challenging and interesting direction for the development of IHCP solutions. Full article
Show Figures

Figure 1

22 pages, 9883 KB  
Article
Biomechanical Evaluation of CAD/CAM Inlay Restorations Through Experimental Flexural Strength Testing and Finite Element Analysis
by Omer Sagsoz, Mehmet Yildiz and Hojjat Ghahramanzadeh Asl
J. Funct. Biomater. 2026, 17(3), 123; https://doi.org/10.3390/jfb17030123 - 3 Mar 2026
Viewed by 524
Abstract
Background: This study aimed to investigate the biomechanical behavior of conservative inlay restorations fabricated from different CAD/CAM materials by combining experimental flexural strength testing with finite element analysis. Methods: Five CAD/CAM materials were evaluated: feldspathic ceramic (Cerec Blocs), leucite-reinforced ceramic (IPS Empress CAD), [...] Read more.
Background: This study aimed to investigate the biomechanical behavior of conservative inlay restorations fabricated from different CAD/CAM materials by combining experimental flexural strength testing with finite element analysis. Methods: Five CAD/CAM materials were evaluated: feldspathic ceramic (Cerec Blocs), leucite-reinforced ceramic (IPS Empress CAD), resin nano-ceramic (Lava Ultimate), polymer-infiltrated ceramic network (VITA Enamic), and lithium disilicate ceramic (IPS e.max CAD). Young’s modulus and Poisson’s ratio were experimentally determined using three-point bending and nanoindentation tests and used as inputs for 3D FEA. Von Mises (VM) stress distributions within the inlays were analyzed under simulated occlusal loading. Results: Maximum VM stresses showed an inverse relationship with material elasticity. IPS e.max CAD exhibited the highest maximum VM stress (45.571 MPa), whereas the resin nano-ceramic showed the lowest (25.419 MPa). Despite higher stress concentrations in high-modulus ceramics, VM values for all materials remained well below their FS limits. Conclusions: All materials demonstrated adequate mechanical stability under physiological loading. Lithium disilicate showed a comparatively larger margin between stress levels and flexural strength, while lower-modulus materials tended to promote greater stress transfer to supporting structures. Full article
(This article belongs to the Section Biomaterials and Devices for Healthcare Applications)
Show Figures

Figure 1

45 pages, 7022 KB  
Article
Digitalization of Railway Traffic Dispatching Systems: From Legacy Infrastructure to a Software-Centric Platform
by Ivan Kokić, Jovana Vuleta-Radoičić, Iva Salom, Goran Dimić, Bratislav Planić, Sandra Velimirović and Slavica Boštjančič Rakas
Computers 2026, 15(3), 163; https://doi.org/10.3390/computers15030163 - 3 Mar 2026
Viewed by 507
Abstract
Digitalization of railway traffic dispatching systems is a key step in the modernization of railway telecommunication infrastructure. This paper presents a case study of the migration from legacy analog technology to a software-centric dispatching platform that integrates digital signal processing, optical fiber transmission, [...] Read more.
Digitalization of railway traffic dispatching systems is a key step in the modernization of railway telecommunication infrastructure. This paper presents a case study of the migration from legacy analog technology to a software-centric dispatching platform that integrates digital signal processing, optical fiber transmission, and Internet Protocol (IP)-based network architectures, as implemented in the Serbian railway system. The modernization is performed through an iterative, incremental process: existing analog dispatcher equipment and established operating procedures are preserved, while digital dispatching centers, trackside communication nodes, and radio-dispatching services are introduced gradually. This staged evolution enables high-capacity, noise-resilient communication and seamless interconnection between the old and the new subsystems without disrupting railway operations. The adoption of software-based control and integrated digital signal processing provides modular scalability, real-time system supervision, automated diagnostics, and improved maintainability. One of critical services within the new architecture, the Centralized Call Record- and Message-Archiving System (CCRMAS), provides a centralized platform that captures, secures, and retrieves operational railway communication in real time for monitoring, post-incident analysis, and regulatory compliance. The resulting architecture, deployed within Serbian Railways, establishes a scalable and resilient foundation for future automation, interoperability, and integration within intelligent railway traffic-management environments. Thus, the paper extracts a generalizable hybrid migration architecture model and transferable design principles, supported by deployment artifacts and illustrated through migration scenarios, that can be applied to the modernization of other legacy-intensive railway networks. Full article
Show Figures

Figure 1

20 pages, 682 KB  
Article
ARQ-Enhanced Short-Packet NOMA Communications with STAR-RIS
by Zhipeng Wang, Jin Li, Shuai Zhang and Dechuan Chen
Telecom 2026, 7(2), 25; https://doi.org/10.3390/telecom7020025 - 2 Mar 2026
Viewed by 335
Abstract
To address the rigorous requirements of ultra-reliable low-latency communication (URLLC) in beyond 5G/6G networks, we propose an innovative architecture combining automatic repeat request (ARQ) protocol with a simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) to enhance short-packet non-orthogonal multiple access (NOMA) communications. [...] Read more.
To address the rigorous requirements of ultra-reliable low-latency communication (URLLC) in beyond 5G/6G networks, we propose an innovative architecture combining automatic repeat request (ARQ) protocol with a simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) to enhance short-packet non-orthogonal multiple access (NOMA) communications. Specifically, retransmission mechanism provided by ARQ is utilized to mitigate packet errors stemming from practical system imperfections, i.e., imperfect channel state information (ipCSI), imperfect successive interference cancellation (ipSIC), and hardware impairments. Using the analytical foundation provided by finite blocklength (FBL) theory, expressions for two key performance metrics, i.e., the average block error rate (BLER) and effective throughput, are derived for two NOMA users. Simulation results validate the analytical derivations and demonstrate that the ARQ scheme provides significant reliability gains for each user and achieves synergistic gain with STAR-RIS technology. In addition, the effective throughput exhibits a peak at an optimal blocklength, balancing the reliability gain from a longer blocklength against the spectral efficiency loss from a lower coding rate. This optimal blocklength decreases with more STAR-RIS elements, as improved channel conditions reduce the need for long blocklengths. Full article
Show Figures

Figure 1

Back to TopTop