Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (89)

Search Parameters:
Keywords = architectural signature system

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
32 pages, 9710 KiB  
Article
Early Detection of ITSC Faults in PMSMs Using Transformer Model and Transient Time-Frequency Features
by Ádám Zsuga and Adrienn Dineva
Energies 2025, 18(15), 4048; https://doi.org/10.3390/en18154048 - 30 Jul 2025
Viewed by 248
Abstract
Inter-turn short-circuit (ITSC) faults in permanent magnet synchronous machines (PMSMs) present a significant reliability challenge in electric vehicle (EV) drivetrains, particularly under non-stationary operating conditions characterized by inverter-driven transients, variable loads, and magnetic saturation. Existing diagnostic approaches, including motor current signature analysis (MCSA) [...] Read more.
Inter-turn short-circuit (ITSC) faults in permanent magnet synchronous machines (PMSMs) present a significant reliability challenge in electric vehicle (EV) drivetrains, particularly under non-stationary operating conditions characterized by inverter-driven transients, variable loads, and magnetic saturation. Existing diagnostic approaches, including motor current signature analysis (MCSA) and wavelet-based methods, are primarily designed for steady-state conditions and rely on manual feature selection, limiting their applicability in real-time embedded systems. Furthermore, the lack of publicly available, high-fidelity datasets capturing the transient dynamics and nonlinear flux-linkage behaviors of PMSMs under fault conditions poses an additional barrier to developing data-driven diagnostic solutions. To address these challenges, this study introduces a simulation framework that generates a comprehensive dataset using finite element method (FEM) models, incorporating magnetic saturation effects and inverter-driven transients across diverse EV operating scenarios. Time-frequency features extracted via Discrete Wavelet Transform (DWT) from stator current signals are used to train a Transformer model for automated ITSC fault detection. The Transformer model, leveraging self-attention mechanisms, captures both local transient patterns and long-range dependencies within the time-frequency feature space. This architecture operates without sequential processing, in contrast to recurrent models such as LSTM or RNN models, enabling efficient inference with a relatively low parameter count, which is advantageous for embedded applications. The proposed model achieves 97% validation accuracy on simulated data, demonstrating its potential for real-time PMSM fault detection. Additionally, the provided dataset and methodology contribute to the facilitation of reproducible research in ITSC diagnostics under realistic EV operating conditions. Full article
(This article belongs to the Special Issue Application of Artificial Intelligence in Power and Energy Systems)
Show Figures

Figure 1

21 pages, 2255 KiB  
Article
Cloud-Based Architecture for Hydrophone Data Acquisition and Processing of Surface and Underwater Vehicle Detection
by Francisco Pérez Carrasco, Anaida Fernández García, Alberto García, Verónica Ruiz Bejerano, Álvaro Gutiérrez and Alberto Belmonte-Hernández
J. Mar. Sci. Eng. 2025, 13(8), 1455; https://doi.org/10.3390/jmse13081455 - 30 Jul 2025
Viewed by 231
Abstract
This paper presents a cloud-based architecture for the acquisition, transmission, and processing of acoustic data from hydrophone arrays, designed to enable the detection and monitoring of both surface and underwater vehicles. The proposed system offers a modular and scalable cloud infrastructure that supports [...] Read more.
This paper presents a cloud-based architecture for the acquisition, transmission, and processing of acoustic data from hydrophone arrays, designed to enable the detection and monitoring of both surface and underwater vehicles. The proposed system offers a modular and scalable cloud infrastructure that supports real-time and distributed processing of hydrophone data collected in diverse aquatic environments. Acoustic signals captured by heterogeneous hydrophones—featuring varying sensitivity and bandwidth—are streamed to the cloud, where several machine learning algorithms can be deployed to extract distinguishing acoustic signatures from vessel engines and propellers in interaction with water. The architecture leverages cloud-based services for data ingestion, processing, and storage, facilitating robust vehicle detection and localization through propagation modeling and multi-array geometric configurations. Experimental validation demonstrates the system’s effectiveness in handling high-volume acoustic data streams while maintaining low-latency processing. The proposed approach highlights the potential of cloud technologies to deliver scalable, resilient, and adaptive acoustic sensing platforms for applications in maritime traffic monitoring, harbor security, and environmental surveillance. Full article
(This article belongs to the Section Ocean Engineering)
Show Figures

Figure 1

27 pages, 8594 KiB  
Article
An Explainable Hybrid CNN–Transformer Architecture for Visual Malware Classification
by Mohammed Alshomrani, Aiiad Albeshri, Abdulaziz A. Alsulami and Badraddin Alturki
Sensors 2025, 25(15), 4581; https://doi.org/10.3390/s25154581 - 24 Jul 2025
Viewed by 668
Abstract
Malware continues to develop, posing significant challenges for traditional signature-based detection systems. Visual malware classification, which transforms malware binaries into grayscale images, has emerged as a promising alternative for recognizing patterns in malicious code. This study presents a hybrid deep learning architecture that [...] Read more.
Malware continues to develop, posing significant challenges for traditional signature-based detection systems. Visual malware classification, which transforms malware binaries into grayscale images, has emerged as a promising alternative for recognizing patterns in malicious code. This study presents a hybrid deep learning architecture that combines the local feature extraction capabilities of ConvNeXt-Tiny (a CNN-based model) with the global context modeling of the Swin Transformer. The proposed model is evaluated using three benchmark datasets—Malimg, MaleVis, VirusMNIST—encompassing 61 malware classes. Experimental results show that the hybrid model achieved a validation accuracy of 94.04%, outperforming both the ConvNeXt-Tiny-only model (92.45%) and the Swin Transformer-only model (90.44%). Additionally, we extended our validation dataset to two more datasets—Maldeb and Dumpware-10—to strengthen the empirical foundation of our work. The proposed hybrid model achieved competitive accuracy on both, with 98% on Maldeb and 97% on Dumpware-10. To enhance model interpretability, we employed Gradient-weighted Class Activation Mapping (Grad-CAM), which visualizes the learned representations and reveals the complementary nature of CNN and Transformer modules. The hybrid architecture, combined with explainable AI, offers an effective and interpretable approach for malware classification, facilitating better understanding and trust in automated detection systems. In addition, a real-time deployment scenario is demonstrated to validate the model’s practical applicability in dynamic environments. Full article
(This article belongs to the Special Issue Cyber Security and AI—2nd Edition)
Show Figures

Figure 1

24 pages, 2613 KiB  
Article
Hierarchical Sensing Framework for Polymer Degradation Monitoring: A Physics-Constrained Reinforcement Learning Framework for Programmable Material Discovery
by Xiaoyu Hu, Xiuyuan Zhao and Wenhe Liu
Sensors 2025, 25(14), 4479; https://doi.org/10.3390/s25144479 - 18 Jul 2025
Viewed by 259
Abstract
The design of materials with programmable degradation profiles presents a fundamental challenge in pattern recognition across molecular space, requiring the identification of complex structure–property relationships within an exponentially large chemical domain. This paper introduces a novel physics-informed deep learning framework that integrates multi-scale [...] Read more.
The design of materials with programmable degradation profiles presents a fundamental challenge in pattern recognition across molecular space, requiring the identification of complex structure–property relationships within an exponentially large chemical domain. This paper introduces a novel physics-informed deep learning framework that integrates multi-scale molecular sensing data with reinforcement learning algorithms to enable intelligent characterization and prediction of polymer degradation dynamics. Our method combines three key innovations: (1) a dual-channel sensing architecture that fuses spectroscopic signatures from Graph Isomorphism Networks with temporal degradation patterns captured by transformer-based models, enabling comprehensive molecular state detection across multiple scales; (2) a physics-constrained policy network that ensures sensor measurements adhere to thermodynamic principles while optimizing the exploration of degradation pathways; and (3) a hierarchical signal processing system that balances multiple sensing modalities through adaptive weighting schemes learned from experimental feedback. The framework employs curriculum-based training that progressively increases molecular complexity, enabling robust detection of degradation markers linking polymer architectures to enzymatic breakdown kinetics. Experimental validation through automated synthesis and in situ characterization of 847 novel polymers demonstrates the framework’s sensing capabilities, achieving a 73.2% synthesis success rate and identifying 42 structures with precisely monitored degradation profiles spanning 6 to 24 months. Learned molecular patterns reveal previously undetected correlations between specific spectroscopic signatures and degradation susceptibility, validated through accelerated aging studies with continuous sensor monitoring. Our results establish that physics-informed constraints significantly improve both the validity (94.7%) and diversity (0.82 Tanimoto distance) of generated molecular structures compared with unconstrained baselines. This work advances the convergence of intelligent sensing technologies and materials science, demonstrating how physics-informed machine learning can enhance real-time monitoring capabilities for next-generation sustainable materials. Full article
(This article belongs to the Special Issue Functional Polymers and Fibers: Sensing Materials and Applications)
Show Figures

Figure 1

40 pages, 2206 KiB  
Review
Toward Generative AI-Based Intrusion Detection Systems for the Internet of Vehicles (IoV)
by Isra Mahmoudi, Djallel Eddine Boubiche, Samir Athmani, Homero Toral-Cruz and Freddy I. Chan-Puc
Future Internet 2025, 17(7), 310; https://doi.org/10.3390/fi17070310 - 17 Jul 2025
Viewed by 492
Abstract
The increasing complexity and scale of Internet of Vehicles (IoV) networks pose significant security challenges, necessitating the development of advanced intrusion detection systems (IDS). Traditional IDS approaches, such as rule-based and signature-based methods, are often inadequate in detecting novel and sophisticated attacks due [...] Read more.
The increasing complexity and scale of Internet of Vehicles (IoV) networks pose significant security challenges, necessitating the development of advanced intrusion detection systems (IDS). Traditional IDS approaches, such as rule-based and signature-based methods, are often inadequate in detecting novel and sophisticated attacks due to their limited adaptability and dependency on predefined patterns. To overcome these limitations, machine learning (ML) and deep learning (DL)-based IDS have been introduced, offering better generalization and the ability to learn from data. However, these models can still struggle with zero-day attacks, require large volumes of labeled data, and may be vulnerable to adversarial examples. In response to these challenges, Generative AI-based IDS—leveraging models such as Generative Adversarial Networks (GANs), Variational Autoencoders (VAEs), and Transformers—have emerged as promising solutions that offer enhanced adaptability, synthetic data generation for training, and improved detection capabilities for evolving threats. This survey provides an overview of IoV architecture, vulnerabilities, and classical IDS techniques while focusing on the growing role of Generative AI in strengthening IoV security. It discusses the current landscape, highlights the key challenges, and outlines future research directions aimed at building more resilient and intelligent IDS for the IoV ecosystem. Full article
Show Figures

Figure 1

19 pages, 2632 KiB  
Article
Data-Driven Attack Detection Mechanism Against False Data Injection Attacks in DC Microgrids Using CNN-LSTM-Attention
by Chunxiu Li, Xinyu Wang, Xiaotao Chen, Aiming Han and Xingye Zhang
Symmetry 2025, 17(7), 1140; https://doi.org/10.3390/sym17071140 - 16 Jul 2025
Viewed by 235
Abstract
This study presents a novel spatio-temporal detection framework for identifying False Data Injection (FDI) attacks in DC microgrid systems from the perspective of cyber–physical symmetry. While modern DC microgrids benefit from increasingly sophisticated cyber–physical symmetry network integration, this interconnected architecture simultaneously introduces significant [...] Read more.
This study presents a novel spatio-temporal detection framework for identifying False Data Injection (FDI) attacks in DC microgrid systems from the perspective of cyber–physical symmetry. While modern DC microgrids benefit from increasingly sophisticated cyber–physical symmetry network integration, this interconnected architecture simultaneously introduces significant cybersecurity vulnerabilities. Notably, FDI attacks can effectively bypass conventional Chi-square detector-based protection mechanisms through malicious manipulation of communication layer data. To address this critical security challenge, we propose a hybrid deep learning framework that synergistically combines: Convolutional Neural Networks (CNN) for robust spatial feature extraction from power system measurements; Long Short-Term Memory (LSTM) networks for capturing complex temporal dependencies; and an attention mechanism that dynamically weights the most discriminative features. The framework operates through a hierarchical feature extraction process: First-level spatial analysis identifies local measurement patterns; second-level temporal analysis detects sequential anomalies; attention-based feature refinement focuses on the most attack-relevant signatures. Comprehensive simulation studies demonstrate the superior performance of our CNN-LSTM-Attention framework compared to conventional detection approaches (CNN-SVM and MLP), with significant improvements across all key metrics. Namely, the accuracy, precision, F1-score, and recall could be improved by at least 7.17%, 6.59%, 2.72% and 6.55%. Full article
Show Figures

Figure 1

14 pages, 1521 KiB  
Article
Unsupervised Machine Learning Methods for Anomaly Detection in Network Packets
by Hyoseong Park, Dongil Shin, Chulgyun Park, Jisoo Jang and Dongkyoo Shin
Electronics 2025, 14(14), 2779; https://doi.org/10.3390/electronics14142779 - 10 Jul 2025
Viewed by 377
Abstract
Traditional intrusion detection systems (IDS) based on packet signatures are widely used in network security but often fail to detect previously unseen attacks. To overcome this limitation, machine learning-based methods have been explored to identify anomalous patterns in network traffic indicative of unknown [...] Read more.
Traditional intrusion detection systems (IDS) based on packet signatures are widely used in network security but often fail to detect previously unseen attacks. To overcome this limitation, machine learning-based methods have been explored to identify anomalous patterns in network traffic indicative of unknown intrusions. In this study, we propose an IDS model based on the Long Short-Term Memory Autoencoder (LSTM-AE), specifically a Convolutional Neural Network Bidirectional LSTM Autoencoder (CNN-BiLSTM-AE). The model integrates convolutional layers for spatial feature extraction and bidirectional LSTM layers to capture temporal dependencies in both directions. By leveraging CNNs to extract key spatial features and BiLSTM to model sequential patterns, the proposed architecture enables effective differentiation between normal and malicious traffic. Anomalies are detected by computing reconstruction loss during inference and applying a predefined threshold to classify traffic. The experimental results demonstrate that the CNN-BiLSTM-AE model achieves high detection performance, with an accuracy of 98.1% and an F1-score of 98.3%, highlighting its effectiveness in identifying previously unknown intrusions. Full article
(This article belongs to the Special Issue Advancements in AI-Driven Cybersecurity and Securing AI Systems)
Show Figures

Figure 1

32 pages, 7150 KiB  
Article
A Riemannian Dichotomizer Approach on Symmetric Positive Definite Manifolds for Offline, Writer-Independent Signature Verification
by Nikolaos Vasilakis, Christos Chorianopoulos and Elias N. Zois
Appl. Sci. 2025, 15(13), 7015; https://doi.org/10.3390/app15137015 - 21 Jun 2025
Cited by 1 | Viewed by 381
Abstract
Automated handwritten signature verification continues to pose significant challenges. A common approach for developing writer-independent signature verifiers involves the use of a dichotomizer, a function that generates a dissimilarity vector with the differences between similar and dissimilar pairs of signature descriptors as components. [...] Read more.
Automated handwritten signature verification continues to pose significant challenges. A common approach for developing writer-independent signature verifiers involves the use of a dichotomizer, a function that generates a dissimilarity vector with the differences between similar and dissimilar pairs of signature descriptors as components. The Dichotomy Transform was applied within a Euclidean or vector space context, where vectored representations of handwritten signatures were embedded in and conformed to Euclidean geometry. Recent advances in computer vision indicate that image representations to the Riemannian Symmetric Positive Definite (SPD) manifolds outperform vector space representations. In offline signature verification, both writer-dependent and writer-independent systems have recently begun leveraging Riemannian frameworks in the space of SPD matrices, demonstrating notable success. This work introduces, for the first time in the signature verification literature, a Riemannian dichotomizer employing Riemannian dissimilarity vectors (RDVs). The proposed framework explores a number of local and global (or common pole) topologies, as well as simple serial and parallel fusion strategies for RDVs for constructing robust models. Experiments were conducted on five popular signature datasets of Western and Asian origin, using blind intra- and cross-lingual experimental protocols. The results indicate the discriminative capabilities of the proposed Riemannian dichotomizer framework, which can be compared to other state-of-the-art and computationally demanding architectures. Full article
Show Figures

Figure 1

31 pages, 3895 KiB  
Article
Enhanced Pilot Attention Monitoring: A Time-Frequency EEG Analysis Using CNN–LSTM Networks for Aviation Safety
by Quynh Anh Nguyen, Nam Anh Dao and Long Nguyen
Information 2025, 16(6), 503; https://doi.org/10.3390/info16060503 - 17 Jun 2025
Viewed by 407
Abstract
Despite significant technological advancements in aviation safety systems, human-operator condition monitoring remains a critical challenge, with more than 75% of aircraft incidents stemming from attention-related perceptual failures. This study addresses a fundamental question in sensor-based condition monitoring: how can temporal- and frequency-domain EEG [...] Read more.
Despite significant technological advancements in aviation safety systems, human-operator condition monitoring remains a critical challenge, with more than 75% of aircraft incidents stemming from attention-related perceptual failures. This study addresses a fundamental question in sensor-based condition monitoring: how can temporal- and frequency-domain EEG sensor data be optimally integrated to detect precursors of system failure in human–machine interfaces? We propose a three-stage diagnostic framework that mirrors industrial condition monitoring approaches. First, raw EEG sensor signals undergo preprocessing into standardized one-second epochs. Second, a novel hybrid feature-extraction methodology combines time- and frequency-domain features to create comprehensive sensor signatures of neural states. Finally, our dual-architecture CNN–LSTM model processes spatial patterns via CNNs while capturing temporal degradation signals via LSTMs, enabling robust classification in noisy operational environments. Our contributions include (1) a multimodal data fusion approach for EEG sensors that provides a more comprehensive representation of operator conditions, and (2) an artificial intelligence architecture that balances spatial and temporal analysis for the predictive maintenance of attention states. When validated on aviation-related EEG datasets, our condition monitoring system achieved significantly higher diagnostic accuracy across various noise conditions compared to existing approaches. The practical applications extend beyond theoretical improvement, offering a pathway to implement more reliable human–machine interface monitoring in critical systems, potentially preventing catastrophic failures by detecting condition anomalies before they propagate through the system. Full article
(This article belongs to the Special Issue Machine Learning and Artificial Intelligence with Applications)
Show Figures

Figure 1

32 pages, 2557 KiB  
Article
Ensemble-Based Binding Free Energy Profiling and Network Analysis of the KRAS Interactions with DARPin Proteins Targeting Distinct Binding Sites: Revealing Molecular Determinants and Universal Architecture of Regulatory Hotspots and Allosteric Binding
by Mohammed Alshahrani, Vedant Parikh, Brandon Foley and Gennady Verkhivker
Biomolecules 2025, 15(6), 819; https://doi.org/10.3390/biom15060819 - 5 Jun 2025
Viewed by 719
Abstract
KRAS is a pivotal oncoprotein that regulates cell proliferation and survival through interactions with downstream effectors such as RAF1. Despite significant advances in understanding KRAS biology, the structural and dynamic mechanisms of KRAS allostery remain poorly understood. In this study, we employ microsecond [...] Read more.
KRAS is a pivotal oncoprotein that regulates cell proliferation and survival through interactions with downstream effectors such as RAF1. Despite significant advances in understanding KRAS biology, the structural and dynamic mechanisms of KRAS allostery remain poorly understood. In this study, we employ microsecond molecular dynamics simulations, mutational scanning, and binding free energy calculations together with dynamic network modeling to dissect how engineered DARPin proteins K27, K55, K13, and K19 engage KRAS through diverse molecular mechanisms ranging from effector mimicry to conformational restriction and allosteric modulation. Mutational scanning across all four DARPin systems identifies a core set of evolutionarily constrained residues that function as universal hotspots in KRAS recognition. KRAS residues I36, Y40, M67, and H95 consistently emerge as critical contributors to binding stability. Binding free energy computations show that, despite similar binding modes, K27 relies heavily on electrostatic contributions from major binding hotspots while K55 exploits a dense hydrophobic cluster enhancing its effector-mimetic signature. The allosteric binders K13 and K19, by contrast, stabilize a KRAS-specific pocket in the α3–loop–α4 motif, introducing new hinges and bottlenecks that rewire the communication architecture of KRAS without full immobilization. Network-based analysis reveals a strikingly consistent theme: despite their distinct mechanisms of recognition, all systems engage a unifying allosteric architecture that spans multiple functional motifs. This architecture is not only preserved across complexes but also mirrors the intrinsic communication framework of KRAS itself, where specific residues function as central hubs transmitting conformational changes across the protein. By integrating dynamic profiling, energetic mapping, and network modeling, our study provides a multi-scale mechanistic roadmap for targeting KRAS, revealing how engineered proteins can exploit both conserved motifs and isoform-specific features to enable precision modulation of KRAS signaling in oncogenic contexts. Full article
Show Figures

Graphical abstract

22 pages, 1792 KiB  
Article
Ensemble Multi-Expert Forecasting: Robust Decision-Making in Chaotic Financial Markets
by Alexander Musaev and Dmitry Grigoriev
J. Risk Financial Manag. 2025, 18(6), 296; https://doi.org/10.3390/jrfm18060296 - 29 May 2025
Viewed by 556
Abstract
Financial time series in volatile markets often exhibit non-stationary behavior and signatures of stochastic chaos, challenging traditional forecasting methods based on stationarity assumptions. In this paper, we introduce a novel multi-expert forecasting system (MES) that leverages ensemble machine learning techniques—including bagging, boosting, and [...] Read more.
Financial time series in volatile markets often exhibit non-stationary behavior and signatures of stochastic chaos, challenging traditional forecasting methods based on stationarity assumptions. In this paper, we introduce a novel multi-expert forecasting system (MES) that leverages ensemble machine learning techniques—including bagging, boosting, and stacking—to enhance prediction accuracy and support robust risk management decisions. The proposed framework integrates diverse “weak learner” models, ranging from linear extrapolation and multidimensional regression to sentiment-based text analytics, into a unified decision-making architecture. Each expert is designed to capture distinct aspects of the underlying market dynamics, while the supervisory module aggregates their outputs using adaptive weighting schemes that account for evolving error characteristics. Empirical evaluations using high-frequency currency data, notably for the EUR/USD pair, demonstrate that the ensemble approach significantly improves forecast reliability, as evidenced by higher winning probabilities and better net trading results compared to individual forecasting models. These findings contribute both to the theoretical understanding of ensemble forecasting under chaotic market conditions and to its practical application in financial risk management, offering a reproducible methodology for managing uncertainty in highly dynamic environments. Full article
Show Figures

Figure 1

27 pages, 297 KiB  
Article
A Practical Performance Benchmark of Post-Quantum Cryptography Across Heterogeneous Computing Environments
by Maryam Abbasi, Filipe Cardoso, Paulo Váz, José Silva and Pedro Martins
Cryptography 2025, 9(2), 32; https://doi.org/10.3390/cryptography9020032 - 21 May 2025
Viewed by 3110
Abstract
The emergence of large-scale quantum computing presents an imminent threat to contemporary public-key cryptosystems, with quantum algorithms such as Shor’s algorithm capable of efficiently breaking RSA and elliptic curve cryptography (ECC). This vulnerability has catalyzed accelerated standardization efforts for post-quantum cryptography (PQC) by [...] Read more.
The emergence of large-scale quantum computing presents an imminent threat to contemporary public-key cryptosystems, with quantum algorithms such as Shor’s algorithm capable of efficiently breaking RSA and elliptic curve cryptography (ECC). This vulnerability has catalyzed accelerated standardization efforts for post-quantum cryptography (PQC) by the U.S. National Institute of Standards and Technology (NIST) and global security stakeholders. While theoretical security analysis of these quantum-resistant algorithms has advanced considerably, comprehensive real-world performance benchmarks spanning diverse computing environments—from high-performance cloud infrastructure to severely resource-constrained IoT devices—remain insufficient for informed deployment planning. This paper presents the most extensive cross-platform empirical evaluation to date of NIST-selected PQC algorithms, including CRYSTALS-Kyber and NTRU for key encapsulation mechanisms (KEMs), alongside BIKE as a code-based alternative, and CRYSTALS-Dilithium and Falcon for digital signatures. Our systematic benchmarking framework measures computational latency, memory utilization, key sizes, and protocol overhead across multiple security levels (NIST Levels 1, 3, and 5) in three distinct hardware environments and various network conditions. Results demonstrate that contemporary server architectures can implement these algorithms with negligible performance impact (<5% additional latency), making immediate adoption feasible for cloud services. In contrast, resource-constrained devices experience more significant overhead, with computational demands varying by up to 12× between algorithms at equivalent security levels, highlighting the importance of algorithm selection for edge deployments. Beyond standalone algorithm performance, we analyze integration challenges within existing security protocols, revealing that naive implementation of PQC in TLS 1.3 can increase handshake size by up to 7× compared to classical approaches. To address this, we propose and evaluate three optimization strategies that reduce bandwidth requirements by 40–60% without compromising security guarantees. Our investigation further encompasses memory-constrained implementation techniques, side-channel resistance measures, and hybrid classical-quantum approaches for transitional deployments. Based on these comprehensive findings, we present a risk-based migration framework and algorithm selection guidelines tailored to specific use cases, including financial transactions, secure firmware updates, vehicle-to-infrastructure communications, and IoT fleet management. This practical roadmap enables organizations to strategically prioritize systems for quantum-resistant upgrades based on data sensitivity, resource constraints, and technical feasibility. Our results conclusively demonstrate that PQC is deployment-ready for most applications, provided that implementations are carefully optimized for the specific performance characteristics and security requirements of target environments. We also identify several remaining research challenges for the community, including further optimization for ultra-constrained devices, standardization of hybrid schemes, and hardware acceleration opportunities. Full article
Show Figures

Figure 1

23 pages, 6938 KiB  
Article
A Hybrid Attention Framework Integrating Channel–Spatial Refinement and Frequency Spectral Analysis for Remote Sensing Smoke Recognition
by Guangtao Cheng, Lisha Yang, Zhihao Yu, Xiaobo Li and Guanghui Fu
Fire 2025, 8(5), 197; https://doi.org/10.3390/fire8050197 - 14 May 2025
Viewed by 479
Abstract
In recent years, accelerated global climate change has precipitated an increased frequency of wildfire events, with their devastating impacts on ecological systems and human populations becoming increasingly significant. Satellite remote sensing technology, leveraging its extensive spatial coverage and real-time monitoring capabilities, has emerged [...] Read more.
In recent years, accelerated global climate change has precipitated an increased frequency of wildfire events, with their devastating impacts on ecological systems and human populations becoming increasingly significant. Satellite remote sensing technology, leveraging its extensive spatial coverage and real-time monitoring capabilities, has emerged as a pivotal approach for wildfire early warning and comprehensive disaster assessment. To effectively detect subtle smoke signatures while minimizing background interference in remote sensing imagery, this paper introduces a novel dual-branch attention framework (CSFAttention) that synergistically integrates channel–spatial refinement with frequency spectral analysis to aggregate smoke features in remote sensing images. The channel–spatial branch implements an innovative triple-pooling strategy (incorporating average, maximum, and standard deviation pooling) across both channel and spatial dimensions to generate complementary descriptors that enhance distinct statistical properties of smoke representations. Concurrently, the frequency branch explicitly enhances high-frequency edge patterns, which are critical for distinguishing subtle textural variations characteristic of smoke plumes. The outputs from these complementary branches are fused through element-wise summation, yielding a refined feature representation that optimizes channel dependencies, spatial saliency, and spectral discriminability. The CSFAttention module is strategically integrated into the bottleneck structures of the ResNet architecture, forming a specialized deep network specifically designed for robust smoke recognition. Experimental validation on the USTC_SmokeRS dataset demonstrates that the proposed CSFResNet achieves recognition accuracy of 96.84%, surpassing existing deep networks for RS smoke recognition. Full article
Show Figures

Figure 1

22 pages, 6467 KiB  
Article
Integrated Geophysical Signatures of the Jiaodong Region in China and Their Implications for Deep Architecture and Gold Metallogenic Systems
by Haiyang Kuang, Jiayong Yan, Kun Zhang, Wenlong Tang, Chao Fu, Jiangang Liang, Guoli Zhang and Yuexin You
Minerals 2025, 15(4), 417; https://doi.org/10.3390/min15040417 - 17 Apr 2025
Cited by 1 | Viewed by 476
Abstract
The Jiaodong region ranks as the world’s third-largest gold metallogenic province, where Late Mesozoic gold mineralization exhibits close genetic connections with cratonic destruction and multi-stage plate tectonic interactions. This study systematically deciphers the deep-seated architecture and metallogenic controls through integrated analysis of gravity, [...] Read more.
The Jiaodong region ranks as the world’s third-largest gold metallogenic province, where Late Mesozoic gold mineralization exhibits close genetic connections with cratonic destruction and multi-stage plate tectonic interactions. This study systematically deciphers the deep-seated architecture and metallogenic controls through integrated analysis of gravity, aeromagnetic, and magnetotelluric datasets. The key findings demonstrate the following: (1) Bouguer gravity anomalies reveal a “two uplifts flanking a central depression” tectonic framework, reflecting superimposed effects from Yangtze Plate subduction and Pacific Plate rollback; (2) zoned aeromagnetic anomalies suggest that the Sanshandao–Jiaojia–Zhaoyuan–Pingdu Metallogenic Belt extends seaward with significant exploration potential; (3) magnetotelluric inversion identifies three lithosphere penetrating conductive zones, confirming the Jiaojia and Zhaoyuan–Pingdu faults as crust mantle fluid conduits, while the Taocun–Jimo fault marks the North China–Sulu Block boundary; and (4) metallogenic materials derive from hybrid sources of deep Yangtze Plate subduction and mantle upwelling, with gold enrichment controlled by intersections of NE-trending faults and EW-oriented basement folds. Integrated geophysical signatures indicate that the northwestern Jiaodong offshore area (north of Sanshandao) holds supergiant gold deposit potential. This research provides critical constraints for the craton destruction type gold mineralization model. Full article
Show Figures

Figure 1

26 pages, 4765 KiB  
Article
Dynamic Sharding and Monte Carlo for Post-Quantum Blockchain Resilience
by Dahhak Hajar, Nadia Afifi and Imane Hilal
Cryptography 2025, 9(2), 22; https://doi.org/10.3390/cryptography9020022 - 11 Apr 2025
Viewed by 873
Abstract
Scalability and security restrictions are posing new challenges for blockchain networks, especially in the face of Distributed Denial-of-Service (DDoS) attacks and upcoming quantum threats. Previous research also found that post-quantum blockchains, despite their improved cryptographic algorithms, are still vulnerable to DDoS attacks, emphasizing [...] Read more.
Scalability and security restrictions are posing new challenges for blockchain networks, especially in the face of Distributed Denial-of-Service (DDoS) attacks and upcoming quantum threats. Previous research also found that post-quantum blockchains, despite their improved cryptographic algorithms, are still vulnerable to DDoS attacks, emphasizing the need for more resilient architectural solutions. This research studies the use of dynamic sharding, an innovative approach for post-quantum blockchains that allows for adaptive division of the network into shards based on workload and network conditions. Unlike static sharding, dynamic sharding optimizes resource allocation in real time, increasing transaction throughput and minimizing DDoS-induced disruptions. We provide a detailed study using Monte Carlo simulations to examine transaction success rates, resource consumption, and fault tolerance for both dynamic sharding-based and non-sharded post-quantum blockchains under simulated DDoS attack scenarios. The findings show that dynamic sharding leads to higher transaction success rates and more efficient resource use than non-sharded infrastructures, even in high-intensity attack scenarios. Furthermore, the combination of dynamic sharding and the Falcon post-quantum signature technique creates a layered strategy that combines cryptographic robustness, scalability, and resilience. This paper provides light on the potential of adaptive blockchain designs to address major scalability and security issues, opening the path for quantum-resilient systems. Full article
(This article belongs to the Special Issue Emerging Trends in Blockchain and Its Applications)
Show Figures

Figure 1

Back to TopTop