Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (3,074)

Search Parameters:
Keywords = S-graph

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
26 pages, 36463 KB  
Article
Real-Time Warehouse Monitoring with Ceiling Cameras and Digital Twin for Asset Tracking and Scene Analysis
by Jianqiao Cheng, Connor Verhulst, Pieter De Clercq, Shannon Van De Velde, Steven Sagaert, Marc Mertens, Merwan Birem, Maithili Deshmukh, Neel Broekx, Erwin Rademakers, Abdellatif Bey-Temsamani and Jean-Edouard Blanquart
Logistics 2025, 9(4), 153; https://doi.org/10.3390/logistics9040153 - 28 Oct 2025
Abstract
Background: Effective asset tracking and monitoring are critical for modern warehouse management. Methods: In this paper, we present a real-time warehouse monitoring system that leverages ceiling-mounted cameras, computer vision-based object detection, a knowledge-graph based world model. The system is implemented in [...] Read more.
Background: Effective asset tracking and monitoring are critical for modern warehouse management. Methods: In this paper, we present a real-time warehouse monitoring system that leverages ceiling-mounted cameras, computer vision-based object detection, a knowledge-graph based world model. The system is implemented in two architectural configurations: a distributed setup with edge processing and a centralized setup. Results: Experimental results demonstrate the system’s capability to accurately detect and continuously track common warehouse assets such as pallets, boxes, and forklifts. This work provides a detailed methodology, covering aspects from camera placement and neural network training to world model integration and real-world deployment. Conclusions: Our experiments show that the system achieves high detection accuracy and reliable real-time tracking across multiple viewpoints, and it is easily scalable to large-scale logistics and inventory applications. Full article
(This article belongs to the Section Artificial Intelligence, Logistics Analytics, and Automation)
Show Figures

Figure 1

30 pages, 3557 KB  
Article
Application of Graph Neural Networks to Model Stem Cell Donor–Recipient Compatibility in the Detection and Classification of Leukemia
by Saeeda Meftah Salem Eltanashi and Ayça Kurnaz Türkben
Appl. Sci. 2025, 15(21), 11500; https://doi.org/10.3390/app152111500 - 28 Oct 2025
Abstract
Stem cell transplants are a common treatment for leukemia, and close donor–recipient matching improves their success. Machine learning models like support vector machine (SVM), convolutional neural networks (CNNs), and recurrent neural networks (RNNs) can have difficulty handling the complexity of genomic and immune [...] Read more.
Stem cell transplants are a common treatment for leukemia, and close donor–recipient matching improves their success. Machine learning models like support vector machine (SVM), convolutional neural networks (CNNs), and recurrent neural networks (RNNs) can have difficulty handling the complexity of genomic and immune data, which then lowers the accuracy of clinical predictions. This study looks at using graph neural networks (GNNs) in a different way. This method combines data such as single-nucleotide polymorphisms (SNPs), human leukocyte antigen (HLA) typing, and clinical details to create a graph that shows the relationship between donor and recipient pairs. The framework uses graph attention networks (GATs) to focus on key compatibility traits and Dynamic GNNs (DGNNs) to monitor changes in the immune system and the disease’s progression. With data from the 1000 Genomes Project, the model correctly identified matches with 97.68% to 99.74% accuracy and classified them with 98.76% to 99.4% accuracy, outperforming standard machine learning models. The model uses SNP similarity and HLA mismatches to assess compatibility, which enhances its match prediction and compatibility explanation capabilities. The results suggest that GNNs offer a helpful and understandable way to model donor–recipient matching, potentially assisting in early leukemia detection and personalized stem cell transplant plans. Full article
Show Figures

Figure 1

19 pages, 5612 KB  
Article
DCPRES: Contrastive Deep Graph Clustering with Progressive Relaxation Weighting Strategy
by Xiao Qin, Lei Peng, Zhengyou Qin and Changan Yuan
Electronics 2025, 14(21), 4206; https://doi.org/10.3390/electronics14214206 (registering DOI) - 28 Oct 2025
Abstract
Existing contrastive deep graph clustering methods typically employ fixed-threshold strategies when constructing positive and negative sample pairs, and fail to integrate both graph structure information and clustering structure information effectively. However, this fixed-threshold and binary partitioning approach is overly rigid, limiting the model’s [...] Read more.
Existing contrastive deep graph clustering methods typically employ fixed-threshold strategies when constructing positive and negative sample pairs, and fail to integrate both graph structure information and clustering structure information effectively. However, this fixed-threshold and binary partitioning approach is overly rigid, limiting the model’s utilization of potentially learnable samples. To address this problem, this paper proposes a contrastive deep graph clustering model with a progressive relaxation weighting strategy (DCPRES). By introducing the progressive relaxation weighting strategy (PRES), DCPRES dynamically allocates sample weights, constructing a progressive training strategy from easy to difficult samples. This effectively mitigates the impact of pseudo-label noise and enhances the quality of positive and negative sample pair construction. Building upon this, DCPRES designs two contrastive learning losses: an instance-level loss and a cluster-level loss. These respectively focus on local node information and global cluster distribution characteristics, promoting more robust representation learning and clustering performance. Extensive experiments demonstrated that DCPRES significantly outperforms existing methods on multiple public graph datasets, exhibiting a superior robustness and stability. For instance, on the CORA dataset, our model achieved a significant improvement over the static approach of CCGC, with the NMI increasing by 4.73%, the ACC by 4.77%, the ARI value by 7.03%, and the F1-score by 5.89%. It provides an efficient and stable solution for unsupervised graph clustering tasks. Full article
(This article belongs to the Special Issue Recent Advances in Efficient Image and Video Processing)
Show Figures

Figure 1

16 pages, 4768 KB  
Article
Dynamic Modeling of a Three-Phase BLDC Motor Using Bond Graph Methodology
by Mayar Abdullah Taleb and Géza Husi
Actuators 2025, 14(11), 523; https://doi.org/10.3390/act14110523 (registering DOI) - 28 Oct 2025
Abstract
This paper presents a dynamic modeling approach for a 3-phase BLDC motor used in a differential-drive serving robot using bond graph (BG) methodology. Designed for structured indoor environments, the serving robot incorporates mechanical, electrical, and control components that require an integrated modeling strategy. [...] Read more.
This paper presents a dynamic modeling approach for a 3-phase BLDC motor used in a differential-drive serving robot using bond graph (BG) methodology. Designed for structured indoor environments, the serving robot incorporates mechanical, electrical, and control components that require an integrated modeling strategy. Traditional methods often fall short in handling the multi-domain nature of such systems. Bond graphs, with their energy-based modeling capability, offer a unified framework for capturing electromechanical dynamics and physical interactions. This work develops a complete bond graph model of a three-phase BLDC motor-driven robot, simulates its performance under typical operating conditions, and validates the model through current, torque, EMF, and velocity responses. The results demonstrate the model’s effectiveness in reflecting real-world robot behavior, supporting future design optimization and control development. Full article
(This article belongs to the Section Actuators for Robotics)
Show Figures

Figure 1

26 pages, 540 KB  
Article
Enhance Graph-Based Intrusion Detection in Optical Networks via Pseudo-Metapaths
by Gang Qu, Haochun Jin, Liang Zhang, Minhui Ge, Xin Wu, Haoran Li and Jian Xu
Mathematics 2025, 13(21), 3432; https://doi.org/10.3390/math13213432 - 28 Oct 2025
Abstract
Deep learning on graphs has emerged as a leading paradigm for intrusion detection, yet its performance in optical networks is often hindered by sparse labeled data and severe class imbalance, leading to an “under-reaching” issue where supervision signals fail to propagate effectively. To [...] Read more.
Deep learning on graphs has emerged as a leading paradigm for intrusion detection, yet its performance in optical networks is often hindered by sparse labeled data and severe class imbalance, leading to an “under-reaching” issue where supervision signals fail to propagate effectively. To address this, we introduce Pseudo-Metapaths: dynamic, semantically aware propagation routes discovered on-the-fly. Our framework first leverages Beta-Wavelet spectral filters for robust, frequency-aware node representations. It then transforms the graph into a dynamic heterogeneous structure using the model’s own pseudo-labels to define transient ‘normal’ or ‘anomaly’ node types. This enables an attention mechanism to learn the importance of different Pseudo-Metapaths (e.g., Anomaly–Normal–Anomaly), guiding supervision signals along the most informative routes. Extensive experiments on four benchmark datasets demonstrate quantitative superiority. Our model achieves state-of-the-art F1-scores, outperforming a strong spectral GNN backbone by up to 3.15%. Ablation studies further confirm that our Pseudo-Metapath module is critical, as its removal causes F1-scores to drop by as much as 7.12%, directly validating its effectiveness against the under-reaching problem. Full article
(This article belongs to the Special Issue Advances in Computational Methods for Network Security)
Show Figures

Figure 1

27 pages, 2572 KB  
Article
Automating Lexical Graph Construction with Large Language Models: A Scalable Approach to Japanese Multi-Relation Lexical Networks
by Benedikt Perak and Dragana Špica
Knowledge 2025, 5(4), 24; https://doi.org/10.3390/knowledge5040024 - 27 Oct 2025
Abstract
In recent advancements within natural language processing (NLP), lexical networks play a crucial role in representing semantic relationships between words, enhancing applications from word sense disambiguation to educational tools. Traditional methods for constructing lexical networks, however, are resource-intensive, relying heavily on expert lexicographers. [...] Read more.
In recent advancements within natural language processing (NLP), lexical networks play a crucial role in representing semantic relationships between words, enhancing applications from word sense disambiguation to educational tools. Traditional methods for constructing lexical networks, however, are resource-intensive, relying heavily on expert lexicographers. Leveraging GPT-4o, a large language model (LLM), our study presents an automated, scalable approach to creating multi-relational Japanese lexical networks for the general Japanese language. This study builds on previous methods of integrating synonyms but extends to other relations such as hyponymy, hypernymy, meronymy, and holonomy. Using a combination of structured prompts and graph-based data storage, the model extracts detailed lexical relationships, which are then systematically validated and encoded. Results reveal a substantial expansion in network size, with over 155,000 nodes and 700,000 edges, enriching Japanese lexical associations with nuanced hierarchical and associative layers. Comparisons with WordNet show substantial alignment in relation types, particularly with soft matching, underscoring the model’s efficacy in reflecting the multifaceted nature of lexical semantics. This work contributes a versatile framework for constructing expansive lexical resources that hold promises for enhancing NLP tasks and educational applications across various languages and domains. Full article
(This article belongs to the Special Issue Knowledge Management in Learning and Education)
Show Figures

Figure 1

22 pages, 979 KB  
Article
Multi-Modal Semantic Fusion for Smart Contract Vulnerability Detection in Cloud-Based Blockchain Analytics Platforms
by Xingyu Zeng, Qiaoyan Wen and Sujuan Qin
Electronics 2025, 14(21), 4188; https://doi.org/10.3390/electronics14214188 (registering DOI) - 27 Oct 2025
Abstract
With the growth of trusted computing demand for big data analysis, cloud computing platforms are reshaping trusted data infrastructure by integrating Blockchain as a Service (BaaS), which uses elastic resource scheduling and heterogeneous hardware acceleration to support petabyte level multi-institution data security exchange [...] Read more.
With the growth of trusted computing demand for big data analysis, cloud computing platforms are reshaping trusted data infrastructure by integrating Blockchain as a Service (BaaS), which uses elastic resource scheduling and heterogeneous hardware acceleration to support petabyte level multi-institution data security exchange in medical, financial, and other fields. As the core hub of data-intensive scenarios, the BaaS platform has the dual capabilities of privacy computing and process automation. However, its deep dependence on smart contracts generates new code layer vulnerabilities, resulting in malicious contamination of analysis results. The existing detection schemes are limited to the perspective of single-source data, which makes it difficult to capture both global semantic associations and local structural details in a cloud computing environment, leading to a performance bottleneck in terms of scalability and detection accuracy. To address these challenges, this paper proposes a smart contract vulnerability detection method based on multi-modal semantic fusion for the blockchain analysis platform of cloud computing. Firstly, the contract source code is parsed into an abstract syntax tree, and the key code is accurately located based on the predefined vulnerability feature set. Then, the text features and graph structure features of key codes are extracted in parallel to realize the deep fusion of them. Finally, with the help of attention enhancement, the vulnerability probability is output through the fully connected network. The experiments on Ethereum benchmark datasets show that the detection accuracy of our method for re-entrancy vulnerability, timestamp vulnerability, overflow/underflow vulnerability, and delegatecall vulnerability can reach 92.2%, 96.3%, 91.4%, and 89.5%, surpassing previous methods. Additionally, our method has the potential for practical deployment in cloud-based blockchain service environments. Full article
(This article belongs to the Special Issue New Trends in Cloud Computing for Big Data Analytics)
Show Figures

Figure 1

23 pages, 8095 KB  
Article
Three-Dimensional Measurement of Transmission Line Icing Based on a Rule-Based Stereo Vision Framework
by Nalini Rizkyta Nusantika, Jin Xiao and Xiaoguang Hu
Electronics 2025, 14(21), 4184; https://doi.org/10.3390/electronics14214184 (registering DOI) - 27 Oct 2025
Abstract
The safety and reliability of modern power systems are increasingly challenged by adverse environmental conditions. (1) Background: Ice accumulation on power transmission lines is recognized as a severe threat to grid stability, as tower collapse, conductor breakage, and large-scale outages may be caused, [...] Read more.
The safety and reliability of modern power systems are increasingly challenged by adverse environmental conditions. (1) Background: Ice accumulation on power transmission lines is recognized as a severe threat to grid stability, as tower collapse, conductor breakage, and large-scale outages may be caused, thereby making accurate monitoring essential. (2) Methods: A rule-driven and interpretable stereo vision framework is proposed for three-dimensional (3D) detection and quantitative measurement of transmission line icing. The framework consists of three stages. First, adaptive preprocessing and segmentation are applied using multiscale Retinex with nonlinear color restoration, graph-based segmentation with structural constraints, and hybrid edge detection. Second, stereo feature extraction and matching are performed through entropy-based adaptive cropping, self-adaptive keypoint thresholding with circular descriptor analysis, and multi-level geometric validation. Third, 3D reconstruction is realized by fusing segmentation and stereo correspondences through triangulation with shape-constrained refinement, reaching millimeter-level accuracy. (3) Result: An accuracy of 98.35%, sensitivity of 91.63%, specificity of 99.42%, and precision of 96.03% were achieved in contour extraction, while a precision of 90%, recall of 82%, and an F1-score of 0.8594 with real-time efficiency (0.014–0.037 s) were obtained in stereo matching. Millimeter-level accuracy (Mean Absolute Error: 1.26 mm, Root Mean Square Error: 1.53 mm, Coefficient of Determination = 0.99) was further achieved in 3D reconstruction. (4) Conclusions: Superior accuracy, efficiency, and interpretability are demonstrated compared with two existing rule-based stereo vision methods (Method A: ROI Tracking and Geometric Validation Method and Method B: Rule-Based Segmentation with Adaptive Thresholding) that perform line icing identification and 3D reconstruction, highlighting the framework’s advantages under limited data conditions. The interpretability of the framework is ensured through rule-based operations and stepwise visual outputs, allowing each processing result, from segmentation to three-dimensional reconstruction, to be directly understood and verified by operators and engineers. This transparency facilitates practical deployment and informed decision making in real world grid monitoring systems. Full article
Show Figures

Figure 1

24 pages, 1525 KB  
Article
Counting Tree-like Multigraphs with a Given Number of Vertices and Multiple Edges
by Muhammad Ilyas, Seemab Hayat and Naveed Ahmed Azam
Mathematics 2025, 13(21), 3405; https://doi.org/10.3390/math13213405 - 26 Oct 2025
Viewed by 44
Abstract
The enumeration of chemical graphs plays a crucial role in cheminformatics and bioinformatics, especially in the search for novel drug discovery. These graphs are usually tree-like multigraphs, or they consist of tree-like multigraphs attached to a central core. In both configurations, the tree-like [...] Read more.
The enumeration of chemical graphs plays a crucial role in cheminformatics and bioinformatics, especially in the search for novel drug discovery. These graphs are usually tree-like multigraphs, or they consist of tree-like multigraphs attached to a central core. In both configurations, the tree-like components play a key role in determining the properties and activities of chemical compounds. In this work, we propose a dynamic programming approach to precisely count the number of tree-like multigraphs with a given number of n vertices and Δ multiple edges. Our method transforms multigraphs into rooted forms by designating their unicentroid or bicentroid as the root and then defining a canonical representation based on the maximal subgraphs rooted at the root’s children. This canonical form ensures that each multigraph is counted only once. Recursive formulas are then established based on the number of vertices and multiple edges in the largest subgraphs rooted at the root’s children. The resulting algorithm achieves a time complexity of O(n2(n+Δ(n+Δ2·min{n,Δ}))) and space complexity of O(n2(Δ3+1)). Extensive experiments demonstrate that the proposed method scales efficiently, being able to count multigraphs with up to 200 vertices (e.g., (200, 26)) and up to 50 multiple edges (e.g., (90, 50)) in under 15 min. In contrast, the available state-of-the-art tool Nauty runs out of memory beyond moderately sized instances, as it relies on explicit generation of all candidate multigraphs. These results highlight the practical advantage and strong potential of the proposed method as a scalable tool for chemical graph enumeration in drug discovery applications. Full article
(This article belongs to the Special Issue Graph Theory and Applications, 3rd Edition)
Show Figures

Figure 1

21 pages, 2252 KB  
Article
A Physics-Constrained Heterogeneous GNN Guided by Physical Symmetry for Heavy-Duty Vehicle Load Estimation
by Lizhuo Luo, Leqi Zhang, Hongli Wang, Yunjing Wang and Hang Yin
Symmetry 2025, 17(11), 1802; https://doi.org/10.3390/sym17111802 - 26 Oct 2025
Viewed by 81
Abstract
Accurate heavy-duty vehicle load estimation is crucial for transportation and environmental regulation, yet current methods lack precision in data accuracy and practicality for field implementation. We propose a Self-Supervised Reconstruction Heterogeneous Graph Convolutional Network (SSR-HGCN) for load estimation using On-Board Diagnostics (OBD) data. [...] Read more.
Accurate heavy-duty vehicle load estimation is crucial for transportation and environmental regulation, yet current methods lack precision in data accuracy and practicality for field implementation. We propose a Self-Supervised Reconstruction Heterogeneous Graph Convolutional Network (SSR-HGCN) for load estimation using On-Board Diagnostics (OBD) data. The method integrates physics-constrained heterogeneous graph construction based on vehicle speed, acceleration, and engine parameters, leveraging graph neural networks’ information propagation mechanisms and self-supervised learning’s adaptability to low-quality data. The method comprises three modules: (1) a physics-constrained heterogeneous graph structure that, guided by the symmetry (invariance) of physical laws, introduces a structural asymmetry by treating kinematic and dynamic features as distinct node types to enhance model interpretability; (2) a self-supervised reconstruction module that learns robust representations from noisy OBD streams without extensive labeling, improving adaptability to data quality variations; and (3) a multi-layer feature extraction architecture combining graph convolutional networks (GCNs) and graph attention networks (GATs) for hierarchical feature aggregation. On a test set of 800 heavy-duty vehicle trips, SSR-HGCN demonstrated superior performance over key baseline models. Compared with the classical time-series model LSTM, it achieved average improvements of 20.76% in RMSE and 41.23% in MAPE. It also outperformed the standard graph model GraphSAGE, reducing RMSE by 21.98% and MAPE by 7.15%, ultimately achieving < 15% error for over 90% of test samples. This method provides an effective technical solution for heavy-duty vehicle load monitoring, with immediate applications in fleet supervision, overloading detection, and regulatory enforcement for environmental compliance. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

29 pages, 3861 KB  
Article
Mitigating Crossfire Attacks via Topology Spoofing Based on ENRNN-MTD
by Dexian Chang, Xiaobing Zhang, Jiajia Sun and Chen Fang
Appl. Sci. 2025, 15(21), 11432; https://doi.org/10.3390/app152111432 - 25 Oct 2025
Viewed by 139
Abstract
Crossfire attacks disrupt network services by targeting critical links of server groups, causing traffic congestion and server failures that prevent legitimate users from accessing services. To counter this threat, this study proposes a novel topology spoofing defense mechanism based on a sequence-based Graph [...] Read more.
Crossfire attacks disrupt network services by targeting critical links of server groups, causing traffic congestion and server failures that prevent legitimate users from accessing services. To counter this threat, this study proposes a novel topology spoofing defense mechanism based on a sequence-based Graph Neural Network–Moving Target Defense (ENRNN-MTD). During the reconnaissance phase, the method employs a GNN to generate multiple random and diverse virtual topologies, which are mapped to various external hosts. This obscures the real internal network structure and complicates the attacker’s ability to accurately identify it. In the attack phase, an IP random-hopping mechanism using a chaotic sequence is introduced to conceal node information and increase the cost of launching attacks, thereby enhancing the protection of critical services. Experimental results demonstrate that, compared to existing defense mechanisms, the proposed approach exhibits significant advantages in terms of deception topology randomness, defensive effectiveness, and system load management. Full article
(This article belongs to the Special Issue IoT Technology and Information Security)
Show Figures

Figure 1

16 pages, 4421 KB  
Article
Harmony Between Ritual and Residential Spaces in Traditional Chinese Courtyards: A Space Syntax Analysis of Prince Kung’s Mansion in Beijing
by Peiyan Guo, Yuxin Sang, Fengyi Li, Taifeng Lyu and Tingfeng Liu
Buildings 2025, 15(21), 3815; https://doi.org/10.3390/buildings15213815 - 22 Oct 2025
Viewed by 280
Abstract
The influence of traditional Chinese ritual culture on courtyard spatial sequences is widely acknowledged. However, quantitative analytical methods, such as space syntax, have rarely been applied in studies of ritual–residential space relations. This study uses space syntax, specifically Visibility Graph Analysis (VGA) and [...] Read more.
The influence of traditional Chinese ritual culture on courtyard spatial sequences is widely acknowledged. However, quantitative analytical methods, such as space syntax, have rarely been applied in studies of ritual–residential space relations. This study uses space syntax, specifically Visibility Graph Analysis (VGA) and axial maps, to conduct a quantitative study of the spatial relationship between ritual and residential areas in Prince Kung’s Mansion. The VGA results indicate a distinct gradient of visual integration, which decreases progressively from the outward-oriented ritual areas, such as the palace gate and halls, through the transitional domestic ritual areas to the inward-oriented residential areas, such as Xijin Zhai and Ledao Tang. This pattern demonstrates a positive correlation between spatial visibility and ritual hierarchy. The axial map results confirm that the central axis and core ritual spaces exhibit the highest spatial connectivity, reflecting their supreme ritual status. More importantly, spatial connectivity is intensified during ritual activities compared to in daily life, indicating that enhanced spatial connectivity is required during rituals. Ritual spaces are characterized by extroversion, high visibility, and connectivity, while residential spaces prioritize introversion and minimal exposure. The deliberately designed ritual–residential architectural spatial sequence of Prince Kung’s Mansion articulates Confucian ideological principles, such as centrality as orthodoxy, gender segregation, and hierarchy. This study visually and quantitatively illustrates the harmony between ritual and residential spaces in Prince Kung’s Mansion. It enhances our understanding of the mechanisms of expression of courtyard ritual cultural spaces, providing evidence-based guidance for functional adaptive transformations in heritage conservation practices. It also offers a fresh perspective on the analysis of courtyard ritual spaces. Full article
Show Figures

Figure 1

24 pages, 10501 KB  
Article
Unveiling Dark Web Identity Patterns: A Network-Based Analysis of Identification Types and Communication Channels in Illicit Activities
by Luis de-Marcos, Adrián Domínguez-Díaz, Javier Junquera-Sánchez, Carlos Cilleruelo and José-Javier Martínez-Herráiz
Information 2025, 16(11), 924; https://doi.org/10.3390/info16110924 - 22 Oct 2025
Viewed by 259
Abstract
The Dark Web, a hidden segment of the internet, has become a hub for illicit activities, facilitated by various forms of digital identification (IDs) such as email addresses, Telegram accounts, and cryptocurrency wallets. This study conducts a comprehensive analysis of the Dark Web’s [...] Read more.
The Dark Web, a hidden segment of the internet, has become a hub for illicit activities, facilitated by various forms of digital identification (IDs) such as email addresses, Telegram accounts, and cryptocurrency wallets. This study conducts a comprehensive analysis of the Dark Web’s identification and communication patterns, focusing on the roles of different ID types and their associated activities. Using a dataset of Dark Web documents, we construct and analyze a bipartite network to model the relationships between IDs and web documents, employing graph–theoretical metrics such as degree centrality, closeness centrality, betweenness centrality, and k-core decomposition, while analyzing subnetworks formed by ID type. Our findings reveal that Telegram forms the backbone of the network, serving as the primary communication tool for hacking-related activities, particularly within Russian-speaking communities. In contrast, email plays a more decentralized role, facilitating finance–crypto and other activities but with a high level of fragmentation and English as the predominant language. XMR (Monero) wallets emerge as a key component in financial transactions, forming a cohesive subnetwork focused on cryptocurrency-related activities. The analysis also highlights the modular and hierarchical nature of the Dark Web, with distinct clusters for hacking, finance–crypto, and drugs–narcotics, often operating independently but with some cross-topic interactions. This study provides a foundation for understanding the Dark Web’s structure and dynamics, offering insights that can inform strategies for monitoring and mitigating its risks. Full article
(This article belongs to the Section Information Security and Privacy)
Show Figures

Graphical abstract

22 pages, 11315 KB  
Article
Biodata-Driven Knowledge Graph Recommendation System: Fusing Foot and Leg Characteristics for Personalised Shoe Recommendation
by Haoyu Zhang and Xiaoying Li
Appl. Sci. 2025, 15(20), 11281; https://doi.org/10.3390/app152011281 - 21 Oct 2025
Viewed by 186
Abstract
(1) This study aims to enhance the precision of ergonomic fitting in traditional shoe size selection by integrating literature and measured biometric data. (2) A correlation table between biometric features and shoe models was established, which was then embedded into a knowledge graph [...] Read more.
(1) This study aims to enhance the precision of ergonomic fitting in traditional shoe size selection by integrating literature and measured biometric data. (2) A correlation table between biometric features and shoe models was established, which was then embedded into a knowledge graph (KG) for visual, accurate recommendations. The experiment employed pressure sensors and depth cameras to collect biometric data from the foot and leg, evaluating the consistency of the system’s recommendations and user satisfaction. (3) The results indicate that the biometric-driven shoe recommendation system significantly outperforms traditional size-based systems in terms of stability and satisfaction. (4) The KG framework has notably improved ergonomic adaptability in the early prototype stage, offering a viable technological approach for intelligent shoe selection and holding significant potential for further optimization. Full article
Show Figures

Figure 1

29 pages, 13306 KB  
Article
Building Outline Extraction via Topology-Aware Loop Parsing and Parallel Constraint from Airborne LiDAR
by Ke Liu, Hongchao Ma, Li Li, Shixin Huang, Liang Zhang, Xiaoli Liang and Zhan Cai
Remote Sens. 2025, 17(20), 3498; https://doi.org/10.3390/rs17203498 - 21 Oct 2025
Viewed by 267
Abstract
Building outlines are important vector data for various applications, but due to the uneven point density and complex building structures, extracting satisfactory building outlines from airborne light detection and ranging point cloud data poses significant challenges. Thus, a building outline extraction method based [...] Read more.
Building outlines are important vector data for various applications, but due to the uneven point density and complex building structures, extracting satisfactory building outlines from airborne light detection and ranging point cloud data poses significant challenges. Thus, a building outline extraction method based on topology-aware loop parsing and parallel constraint is proposed. First, constrained Delaunay triangulation (DT) is used to organize scattered projected building points, and initial boundary points and edges are extracted based on the constrained DT. Subsequently, accurate semantic boundary points are obtained by parsing the topology-aware loops searched from an undirected graph. Building dominant directions are estimated through angle normalization, merging, and perpendicular pairing. Finally, outlines are regularized using the parallel constraint-based method, which simultaneously considers the fitness between the dominant direction and boundary points, and the length of line segments. Experiments on five datasets, including three datasets provided by ISPRS and two datasets with high-density point clouds and complex building structures, verify that the proposed method can extract sequential and semantic boundary points, with over 97.88% correctness. Additionally, the regularized outlines are attractive, and most line segments are parallel or perpendicular. The RMSE, PoLiS, and RCC metrics are better than 0.94 m, 0.84 m, and 0.69 m, respectively. The extracted building outlines can be used for building three-dimensional (3D) reconstruction. Full article
Show Figures

Figure 1

Back to TopTop