Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (60)

Search Parameters:
Keywords = cloud edge removal

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
16 pages, 1436 KB  
Article
Mutual Cloud: Decentralized Task Orchestration in Loosely Coupled Distributed Environments
by Chaewon Keum, Yelin Song, Seoyoung Lee, Kyungwoon Cho and Hyokyung Bahn
Appl. Sci. 2026, 16(7), 3484; https://doi.org/10.3390/app16073484 - 2 Apr 2026
Viewed by 398
Abstract
Today, many computing workloads are executed in loosely coupled, geographically distributed environments where resources are owned by different organizations. Examples include inter-institutional research infrastructures, community-operated clusters, and edge deployments. As disconnections are frequent in such environments, ensuring reliable task execution remains a fundamental [...] Read more.
Today, many computing workloads are executed in loosely coupled, geographically distributed environments where resources are owned by different organizations. Examples include inter-institutional research infrastructures, community-operated clusters, and edge deployments. As disconnections are frequent in such environments, ensuring reliable task execution remains a fundamental challenge. Kubernetes, the de facto standard for cluster orchestration, provides centralized control and strong consistency, but suffers from slow recovery when node failures occur frequently. At the opposite extreme, blockchain-based orchestration removes centralized control but incurs substantial latency due to global consensus, making it unsuitable for time-sensitive task scheduling. This paper presents Mutual Cloud, a decentralized orchestration framework that operates between these two extremes. Mutual Cloud adopts a hybrid architecture where task admission and queue management are handled in a centralized manner similar to conventional public clouds, whereas most scheduling functions, including execution-node selection and failure handling, are performed in a decentralized manner by autonomous agents using a distributed hash table. We implement a prototype of Mutual Cloud and evaluate its performance through large-scale simulation studies. The results show that Mutual Cloud maintains stable performance comparable to centralized baselines under normal conditions while achieving approximately five-second-level recovery latency under substantial node failures. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

21 pages, 3931 KB  
Article
Vehicle Speed Estimation Using Infrastructure-Mounted LiDAR via Rectangle Edge Matching
by Injun Hong and Manbok Park
Appl. Sci. 2026, 16(5), 2513; https://doi.org/10.3390/app16052513 - 5 Mar 2026
Viewed by 357
Abstract
Smart transportation infrastructure is increasingly deployed, and cooperative perception using stationary Light Detection and Ranging (LiDAR) sensors installed at intersections and along roadsides is becoming more important. However, infrastructure LiDAR often suffers from sparse point-cloud data (PCD) at long ranges and frequent occlusions, [...] Read more.
Smart transportation infrastructure is increasingly deployed, and cooperative perception using stationary Light Detection and Ranging (LiDAR) sensors installed at intersections and along roadsides is becoming more important. However, infrastructure LiDAR often suffers from sparse point-cloud data (PCD) at long ranges and frequent occlusions, which can degrade the stability of inter-frame displacement and speed estimation. This paper proposes a real-time vehicle speed estimation method that operates robustly under sparse and partially observed conditions. The proposed approach extracts boundary points from clustered vehicle PCD and removes outliers, and then fits a 2D rectangle to the vehicle contour via Gauss–Newton optimization by minimizing distance-based residuals between boundary points and rectangle edges. To further improve robustness, we incorporate Hessian augmentation terms that account for boundary states and size variations, thereby alleviating excessive boundary violations and abnormal deformation of the width and height parameters during iterations. Next, from the fitted rectangles in consecutive frames, we construct a nearest corner with respect to the LiDAR origin and an auxiliary point, and perform 2D SVD-based alignment using only these two representative points. This enables efficient computation of inter-frame displacement and speed without full point-cloud registration (e.g., iterative closest point (ICP)). Experiments conducted at an intersection in K-City (Hwaseong, Republic of Korea) using a 40-channel LiDAR, a test vehicle (Genesis G70), and a real-time kinematic (RTK) system (MRP-2000) show that the proposed method stably preserves representative points and fits rectangles, even in sparse regions where only about two LiDAR rings are observed. Using CAN-based vehicle speed as the reference, the proposed method achieves an MAE of 0.76–1.37 kph and an RMSE of 0.90–1.58 kph over the tested speed settings (30, 50, and 70 kph, as well as high speed (~90 kph)) and trajectory scenarios. Furthermore, per-object processing-time measurements confirm the real-time feasibility of the proposed algorithm. Full article
Show Figures

Figure 1

27 pages, 2849 KB  
Systematic Review
Intrusion Detection in Fog Computing: A Systematic Review of Security Advances and Challenges
by Nyashadzashe Tamuka, Topside Ehleketani Mathonsi, Thomas Otieno Olwal, Solly Maswikaneng, Tonderai Muchenje and Tshimangadzo Mavin Tshilongamulenzhe
Computers 2026, 15(3), 169; https://doi.org/10.3390/computers15030169 - 5 Mar 2026
Viewed by 737
Abstract
Fog computing extends cloud services to the network edge to support low-latency IoT applications. However, since fog environments are distributed and resource-constrained, intrusion detection systems must be adapted to defend against cyberattacks while keeping computation and communication overhead minimal. This systematic review presents [...] Read more.
Fog computing extends cloud services to the network edge to support low-latency IoT applications. However, since fog environments are distributed and resource-constrained, intrusion detection systems must be adapted to defend against cyberattacks while keeping computation and communication overhead minimal. This systematic review presents research on intrusion detection systems (IDSs) for fog computing and synthesizes advances and research gaps. The study was guided by the “Preferred-Reporting-Items for-Systematic-Reviews-and-Meta-Analyses” (PRISMA) framework. Scopus and Web of Science were searched in the title field using TITLE/TI = (“intrusion detection” AND “fog computing”) for 2021–2025. The inclusion criteria were (i) 2021–2025 publications, (ii) journal or conference papers, (iii) English language, and (iv) open access availability; duplicates were removed programmatically using a DOI-first key with a title, year, and author alternative. The search identified 8560 records, of which 4905 were unique and included for qualitative grouping and bibliometric synthesis. Metadata (year, venue, authors, affiliations, keywords, and citations) were extracted and analyzed in Python to compute trends and collaboration. Intrusion detection systems in fog networks were categorized into traditional/signature-based, machine learning, deep learning, and hybrid/ensemble. Hybrid and DL approaches reported accuracy ranging from 95 to 99% on benchmark datasets (such as NSL-KDD, UNSW-NB15, CIC-IDS2017, KDD99, BoT-IoT). Notable bottlenecks included computational load relative to real-time latency on resource-constrained nodes, elevated false-positive rates for anomaly detection under concept drift, limited generalization to unseen attacks, privacy risks from centralizing data, and limited real-world validation. Bibliometric analyses highlighted the field’s concentration in fast-turnaround, open-access journals such as IEEE Access and Sensors, as well as a small number of highly collaborative author clusters, alongside dominant terms such as “learning,” “federated,” “ensemble,” “lightweight,” and “explainability.” Emerging directions include federated and distributed training to preserve privacy, as well as online/continual learning adaptation. Future work should consist of real-world evaluation of fog networks, ultra-lightweight yet adaptive hybrid IDS, self-learning, and secure cooperative frameworks. These insights help researchers select appropriate IDS models for fog networks. Full article
Show Figures

Figure 1

15 pages, 1486 KB  
Review
Challenges of Space Debris Detection, Tracking, and Monitoring in Near-Earth Orbit: Overview of Current Status and Mitigation Strategies
by Motti Haridim, Assaf Shaked, Niv Cohen and Jacob Gavan
Information 2026, 17(3), 253; https://doi.org/10.3390/info17030253 - 3 Mar 2026
Viewed by 1307
Abstract
The accumulation of space debris in near-Earth orbit, particularly in Low Earth Orbit (LEO), poses an increasing threat to satellite operations, communication infrastructures, and long-term space sustainability. As modern constellations expand and incorporate advanced satellite technologies, including sensing and wireless communications, artificial intelligence-of-things [...] Read more.
The accumulation of space debris in near-Earth orbit, particularly in Low Earth Orbit (LEO), poses an increasing threat to satellite operations, communication infrastructures, and long-term space sustainability. As modern constellations expand and incorporate advanced satellite technologies, including sensing and wireless communications, artificial intelligence-of-things (AIoT), enabled payloads, and edge computing for on-orbit data processing, the risk profile grows. This paper reviews the current debris environment and existing sensing and monitoring techniques, highlights major collision events and deliberate debris-generating activities, and analyzes the role of both governmental and commercial satellite constellations in exacerbating and mitigating the challenges. Emerging space surveillance and tracking (SST) techniques, leveraging radar, optical sensors, and interferometric SAR for enhanced intelligence, surveillance, and reconnaissance (ISR), are highlighted alongside software-defined networking (SDN) approaches and cloud communication technology that enable coordinated debris-avoidance maneuvers. Key international regulatory frameworks, tracking architectures, and mitigation measures, including alignment with ISO 24113 standards, advanced TT&C capabilities, and evolving active debris removal technologies, are examined. The study emphasizes the necessity of a global, interoperable ecosystem that integrates AI/ML (artificial intelligence and machine learning)-driven situational awareness, secure SATCOM links with AJ/LPI/LPD (anti-jamming/low probability of interception/low probability of detection) characteristics, and collaborative protocols among space agencies, commercial operators, and regulatory bodies to ensure the sustainable use of orbital space for future generations. Full article
(This article belongs to the Special Issue Sensing and Wireless Communications)
Show Figures

Figure 1

45 pages, 2170 KB  
Systematic Review
From Precision Agriculture to Intelligent Agricultural Ecosystems: A Systematic Review of Machine Learning and Big Data Applications
by Ania Cravero, Samuel Sepúlveda, Fernanda Gutiérrez and Lilia Muñoz
Agronomy 2026, 16(5), 516; https://doi.org/10.3390/agronomy16050516 - 27 Feb 2026
Cited by 2 | Viewed by 1585
Abstract
This systematic review analyzes the evolution of Machine Learning and Big Data applications in agriculture from 2021 to 2025, with particular emphasis on how recent technological advances facilitate the transition from precision agriculture to Intelligent Agricultural Ecosystems. A comprehensive literature search was conducted [...] Read more.
This systematic review analyzes the evolution of Machine Learning and Big Data applications in agriculture from 2021 to 2025, with particular emphasis on how recent technological advances facilitate the transition from precision agriculture to Intelligent Agricultural Ecosystems. A comprehensive literature search was conducted across Scopus, Web of Science, IEEE Xplore, the ACM Digital Library, SpringerLink, and MDPI, following the PRISMA 2020 guidelines. After duplicate removal and a two-stage screening process (title/abstract screening followed by full-text assessment), eligible peer-reviewed studies were systematically extracted using a structured coding matrix encompassing six analytical domains: crops, soil, weather and water, land use, animal systems, and farmer decision-making. The findings reveal a substantial increase in ML-driven agricultural analytics. Although Random Forest and Convolutional Neural Networks remain widely adopted, recent studies demonstrate a marked shift toward advanced Deep Learning architectures, integrated cloud–edge–device infrastructures, Federated Learning frameworks for privacy-preserving collaboration, Explainable AI techniques to enhance transparency, and governance-oriented mechanisms to ensure interoperability. Notwithstanding these advances, several persistent challenges remain, including limited generalizability across diverse agroclimatic contexts, the high costs associated with high-quality data annotation, the integration of heterogeneous and multimodal datasets, and infrastructural constraints related to connectivity. These developments are synthesized within the IAE conceptual framework, underscoring governance- and lifecycle-aware orchestration MLOps as a critical differentiator that transcends purely technology-centric approaches. Full article
Show Figures

Figure 1

25 pages, 3690 KB  
Article
Thick Cloud Removal in Multitemporal Remote Sensing Images via Sobel-Consistency and Subspace-Based Spatiospectral Low-Rank Tensor Regularization
by Yao Li, Yujie Zhang and Hongwei Li
Remote Sens. 2026, 18(4), 573; https://doi.org/10.3390/rs18040573 - 12 Feb 2026
Viewed by 333
Abstract
Thick cloud removal is a critical preprocessing step for multitemporal remote sensing images (MTRSIs), as it directly determines the reliability of downstream analysis and applications. In MTRSIs, the same geographic region is observed at different times, and the underlying edge structures often remain [...] Read more.
Thick cloud removal is a critical preprocessing step for multitemporal remote sensing images (MTRSIs), as it directly determines the reliability of downstream analysis and applications. In MTRSIs, the same geographic region is observed at different times, and the underlying edge structures often remain physically consistent across temporal observations. Leveraging this intrinsic property, we introduce a Sobel-consistent term that explicitly enforces temporal consistency of edge-related features, thereby improving the reconstruction of fine structures and textures in cloud-obscured regions. Building on this insight, we propose a novel thick cloud removal model that integrates Sobel-based edge consistency with subspace-based spatiospectral low-rank tensor regularization. In this model, intrinsic images derived from subspace representation are organized into a fourth-order tensor, and low-rank constraints are applied to jointly capture the spatial, spectral, and temporal correlations inherent in MTRSIs. To efficiently solve the resulting optimization problem, we introduce an algorithm based on proximal alternating minimization. Experiments on both simulated and real-world MTRSI datasets demonstrate that the proposed method achieves superior reconstruction accuracy and visual fidelity, validating the physical interpretability and effectiveness of the approach. Full article
(This article belongs to the Section Remote Sensing Image Processing)
Show Figures

Figure 1

30 pages, 6341 KB  
Article
MCS-VD: Alliance Chain-Driven Multi-Cloud Storage and Verifiable Deletion Scheme for Smart Grid Data
by Lihua Zhang, Jiali Luo, Yi Yang and Wenbiao Wang
Future Internet 2026, 18(1), 56; https://doi.org/10.3390/fi18010056 - 20 Jan 2026
Cited by 1 | Viewed by 391
Abstract
The entire system collapses due to the issues of inadequate centralized storage capacity, poor scalability, low storage efficiency, and susceptibility to single point of failure brought on by huge power consumption data in the smart grid; thus, an alliance chain-driven multi-cloud storage and [...] Read more.
The entire system collapses due to the issues of inadequate centralized storage capacity, poor scalability, low storage efficiency, and susceptibility to single point of failure brought on by huge power consumption data in the smart grid; thus, an alliance chain-driven multi-cloud storage and verifiable deletion method for smart grid data is proposed. By leveraging the synergy between alliance blockchain and multi-cloud architecture, the encrypted power data originating from edge nodes is dispersed across a decentralized multi-cloud infrastructure, which effectively mitigates the danger of data loss resulting from single-point failures or malicious intrusions. The removal of expired and user-defined data is guaranteed through a transaction deletion algorithm integrated into the indexed storage deletion chain and strengthens the flexibility and security of the storage architecture. Based on the Practical Byzantine Fault-Tolerant Consensus Protocol with Ultra-Low Storage Overhead (ULS-PBFT), by the hierarchical grouping of nodes, the system communication overhead and storage overhead are reduced. Security analysis proves that the scheme can resist tampering attacks, impersonation attacks, collusion attacks, double spend attacks, and replay attacks. Performance evaluation shows that the scheme improves compared to similar methods. Full article
(This article belongs to the Special Issue Security and Privacy in Blockchains and the IoT—3rd Edition)
Show Figures

Figure 1

22 pages, 3276 KB  
Article
AFR-CR: An Adaptive Frequency Domain Feature Reconstruction-Based Method for Cloud Removal via SAR-Assisted Remote Sensing Image Fusion
by Xiufang Zhou, Qirui Fang, Xunqiang Gong, Shuting Yang, Tieding Lu, Yuting Wan, Ailong Ma and Yanfei Zhong
Remote Sens. 2026, 18(2), 201; https://doi.org/10.3390/rs18020201 - 8 Jan 2026
Viewed by 664
Abstract
Optical imagery is often contaminated by clouds to varying degrees, which greatly affects the interpretation and analysis of images. Synthetic Aperture Radar (SAR) possesses the characteristic of penetrating clouds and mist, and a common strategy in SAR-assisted cloud removal involves fusing SAR and [...] Read more.
Optical imagery is often contaminated by clouds to varying degrees, which greatly affects the interpretation and analysis of images. Synthetic Aperture Radar (SAR) possesses the characteristic of penetrating clouds and mist, and a common strategy in SAR-assisted cloud removal involves fusing SAR and optical data and leveraging deep learning networks to reconstruct cloud-free optical imagery. However, these methods do not fully consider the characteristics of the frequency domain when processing feature integration, resulting in blurred edges of the generated cloudless optical images. Therefore, an adaptive frequency domain feature reconstruction-based cloud removal method is proposed to solve the problem. The proposed method comprises four key sequential stages. First, shallow features are extracted by fusing optical and SAR images. Second, a Transformer-based encoder captures multi-scale semantic features. Subsequently, the Frequency Domain Decoupling Module (FDDM) is employed. Utilizing a Dynamic Mask Generation mechanism, it explicitly decomposes features into low-frequency structures and high-frequency details, effectively suppressing cloud interference while preserving surface textures. Finally, robust information interaction is facilitated by the Cross-Frequency Reconstruction Module (CFRM) via transposed cross-attention, ensuring precise fusion and reconstruction. Experimental evaluation on the M3R-CR dataset confirms that the proposed approach achieves the best results on all four evaluated metrics, surpassing the performance of the eight other State-of-the-Art methods. It has demonstrated its effectiveness and advanced capabilities in the task of SAR-optical fusion for cloud removal. Full article
Show Figures

Figure 1

26 pages, 7430 KB  
Article
PMSAF-Net: A Progressive Multi-Scale Asymmetric Fusion Network for Lightweight and Multi-Platform Thin Cloud Removal
by Li Wang and Feng Liang
Remote Sens. 2025, 17(24), 4001; https://doi.org/10.3390/rs17244001 - 11 Dec 2025
Viewed by 419
Abstract
With the rapid improvement of deep learning, significant progress has been made in cloud removal for remote sensing images (RSIs). However, the practical deployment of existing methods on multi-platform devices faces several limitations, including high computational complexity preventing real-time processing, substantial hardware resource [...] Read more.
With the rapid improvement of deep learning, significant progress has been made in cloud removal for remote sensing images (RSIs). However, the practical deployment of existing methods on multi-platform devices faces several limitations, including high computational complexity preventing real-time processing, substantial hardware resource demands that are unsuitable for edge devices, and inadequate performance in complex cloud scenarios. To address these challenges, we propose PMSAF-Net, a lightweight Progressive Multi-Scale Asymmetric Fusion Network designed for efficient thin cloud removal. The proposed network employs a Dual-Branch Asymmetric Attention (DBAA) module to optimize spatial details and channel dependencies, reducing computation cost while improving feature extraction. A Multi-Scale Context Aggregation (MSCA) mechanism captures multi-level contextual information through hierarchical dilated convolutions, effectively handling clouds of varying scales and complexities. A Refined Residual Block (RRB) minimizes boundary artifacts through reflection padding and residual calibration. Additionally, an Iterative Feature Refinement (IFR) module progressively enhances feature representations via dense cross-stage connections. Extensive experimental multi-platform datasets results show that the proposed method achieves favorable performance against state-of-the-art algorithms. With only 0.32 M parameters, PMSAF-Net maintains low computational costs, demonstrating its strong potential for multi-platform deployment on resource-constrained edge devices. Full article
Show Figures

Figure 1

22 pages, 10903 KB  
Article
Enhancing Point Cloud Registration for Pipe Fittings: A Coarse-to-Fine Approach with DANIP Keypoint Detection and ICP Optimization
by Zeyuan Liu and Xiaofeng Yue
Sensors 2025, 25(22), 7012; https://doi.org/10.3390/s25227012 - 17 Nov 2025
Viewed by 672
Abstract
In 3D reconstruction, loss of depth data caused by highly reflective surfaces often undermines the accuracy of point cloud registration. Traditional registration methods suffer from reduced accuracy and computational efficiency under such conditions. This paper presents a novel coarse-to-fine point cloud registration approach [...] Read more.
In 3D reconstruction, loss of depth data caused by highly reflective surfaces often undermines the accuracy of point cloud registration. Traditional registration methods suffer from reduced accuracy and computational efficiency under such conditions. This paper presents a novel coarse-to-fine point cloud registration approach that combines a density-aware keypoint detection method with iterative closest point optimization to enhance both precision and computational performance. The proposed keypoint detection method optimizes registration by progressively refining the initial pose estimate through multi-scale geometric feature detection. This process includes a density-aware mechanism for removing edge outliers and an adaptive threshold based on normal vector inner products. This improves both keypoint identification accuracy and matching efficiency, providing better initial registration for the iterative closest point algorithm in scenarios with significant data loss. The approach prevents the iterative closest point algorithm from converging to local optima, which improves both convergence speed and overall computational performance. Experimental results show that, under optimal conditions, the runtime is reduced by up to 78.01% across several datasets, including those from Stanford, Kinect, Queen, and ASL-LRD. Compared to other traditional methods, the proposed approach delivers higher registration accuracy, even for multi-view point clouds with severe data loss, which demonstrates its robustness and potential for engineering applications. Full article
(This article belongs to the Section Optical Sensors)
Show Figures

Figure 1

27 pages, 33395 KB  
Article
Deep Line-Segment Detection-Driven Building Footprints Extraction from Backpack LiDAR Point Clouds for Urban Scene Reconstruction
by Jia Li, Rushi Lv, Qiuping Lan, Xinyi Shou, Hengyu Ruan, Jianjun Cao and Zikuan Li
Remote Sens. 2025, 17(22), 3730; https://doi.org/10.3390/rs17223730 - 17 Nov 2025
Cited by 1 | Viewed by 1569
Abstract
Accurate and reliable extraction of building footprints from LiDAR point clouds is a fundamental task in remote sensing and urban scene reconstruction. Building footprints serve as essential geospatial products that support GIS database updating, land-use monitoring, disaster management, and digital twin development. Traditional [...] Read more.
Accurate and reliable extraction of building footprints from LiDAR point clouds is a fundamental task in remote sensing and urban scene reconstruction. Building footprints serve as essential geospatial products that support GIS database updating, land-use monitoring, disaster management, and digital twin development. Traditional image-based methods enable large-scale mapping but suffer from 2D perspective limitations and radiometric distortions, while airborne or vehicle-borne LiDAR systems often face single-viewpoint constraints that lead to incomplete or fragmented footprints. Recently, backpack mobile laser scanning (MLS) has emerged as a flexible platform for capturing dense urban geometry at the pedestrian level. However, the high noise, point sparsity, and structural complexity of MLS data make reliable footprints delineation particularly challenging. To address these issues, this study proposes a Deep Line-Segment Detection–Driven Building Footprints Extraction Framework that integrates multi-layer accumulated occupancy mapping, deep geometric feature learning, and structure-aware regularization. The accumulated occupancy maps aggregate stable wall features from multiple height slices to enhance contour continuity and suppress random noise. A deep line-segment detector is then employed to extract robust geometric cues from noisy projections, achieving accurate edge localization and reduced false responses. Finally, a structural chain-based completion and redundancy filtering strategy repairs fragmented contours and removes spurious lines, ensuring coherent and topologically consistent footprints reconstruction. Extensive experiments conducted on two campus scenes containing 102 buildings demonstrate that the proposed method achieves superior performance with an average Precision of 95.7%, Recall of 92.2%, F1-score of 93.9%, and IoU of 88.6%, outperforming existing baseline approaches by 4.5–7.8% in F1-score. These results highlight the strong potential of backpack LiDAR point clouds, when combined with deep line-segment detection and structural reasoning, to complement traditional remote sensing imagery and provide a reliable pathway for large-scale urban scene reconstruction and geospatial interpretation. Full article
Show Figures

Figure 1

17 pages, 5060 KB  
Article
Iterative Morphological Filtering for DEM Generation: Improving Accuracy and Robustness in Complex Terrains
by Shaobo Linghu, Wenlong Song, Yizhu Lu, Kaizheng Xiang, Hongjie Liu, Long Chen, Tianshi Feng, Rongjie Gui, Yao Zhao and Haider Abbas
Appl. Sci. 2025, 15(21), 11683; https://doi.org/10.3390/app152111683 - 31 Oct 2025
Viewed by 922
Abstract
Accurate terrain modeling from high-resolution digital surface models (DSM) is critical for geosciences, geology, geomorphology, earthquake studies, and applied geology. However, existing filtering methods such as progressive morphological filtering (PMF), cloth simulation filtering (CSF), and progressive TIN densification (TIN) often struggle with complex [...] Read more.
Accurate terrain modeling from high-resolution digital surface models (DSM) is critical for geosciences, geology, geomorphology, earthquake studies, and applied geology. However, existing filtering methods such as progressive morphological filtering (PMF), cloth simulation filtering (CSF), and progressive TIN densification (TIN) often struggle with complex topography and urban structures, leading to either excessive ground loss or incomplete object removal. Furthermore, some of these algorithms are only specialized for point cloud data and are not optimized for grid data. To address these limitations, we propose an iterative morphological filtering (IMF) algorithm that introduces a binary surface edge-segmentation strategy. The method refines object–ground separation by combining iterative morphological operations with block-based graph-cut stitching, thus enhancing continuity and accuracy in challenging terrain. Validation on UAV-derived DSM over the Haihe Basin in China and the ISPRS Vaihingen dataset shows that IMF achieves notable accuracy improvements: the Vaihingen test areas yielded an average Type I error of 8.93%, Type II error of 3.09%, overall accuracy of 80.85%, and Kappa coefficient of 0.7524, while the Haihe Basin test areas achieved Type I and II errors of 2.22% and 1.87%, overall accuracy of 89.32%, and a Kappa coefficient of 0.8706. These results demonstrate that IMF outperforms conventional methods by reducing both Type I and Type II errors, producing terrains highly consistent with real conditions. This innovation provides a robust and scalable solution for digital elevation models (DEM) generation from gridded DSM, offering significant value for large-scale environmental monitoring and flood risk assessment. Full article
Show Figures

Figure 1

21 pages, 993 KB  
Article
BIMW: Blockchain-Enabled Innocuous Model Watermarking for Secure Ownership Verification
by Xinyun Liu and Ronghua Xu
Future Internet 2025, 17(11), 490; https://doi.org/10.3390/fi17110490 - 26 Oct 2025
Viewed by 1562
Abstract
The integration of artificial intelligence (AI) and edge computing gives rise to edge intelligence (EI), which offers effective solutions to the limitations of traditional cloud-based AI; however, deploying models across distributed edge platforms raises concerns regarding authenticity, thereby necessitating robust mechanisms for ownership [...] Read more.
The integration of artificial intelligence (AI) and edge computing gives rise to edge intelligence (EI), which offers effective solutions to the limitations of traditional cloud-based AI; however, deploying models across distributed edge platforms raises concerns regarding authenticity, thereby necessitating robust mechanisms for ownership verification. Currently, backdoor-based model watermarking techniques represent a state-of-the-art approach for ownership verification; however, their reliance on model poisoning introduces potential security risks and unintended behaviors. To solve this challenge, we propose BIMW, a blockchain-enabled innocuous model watermarking framework that ensures secure and trustworthy AI model deployment and sharing in distributed edge computing environments. Unlike widely applied backdoor-based watermarking methods, BIMW adopts a novel innocuous model watermarking method called interpretable watermarking (IW), which embeds ownership information without compromising model integrity or functionality. In addition, BIMW integrates a blockchain security fabric to ensure the integrity and auditability of watermarked data during storage and sharing. Extensive experiments were conducted on a Jetson Orin Nano board, which simulates edge computing environments. The numerical results show that our framework outperforms baselines in terms of predicate accuracy, p-value, watermark success rate (WSR), and harmlessness H. Our framework demonstrates resilience against watermarking removal attacks, and it introduces limited latency through the blockchain fabric. Full article
(This article belongs to the Special Issue Distributed Machine Learning and Federated Edge Computing for IoT)
Show Figures

Figure 1

25 pages, 18310 KB  
Article
A Multimodal Fusion Method for Weld Seam Extraction Under Arc Light and Fume Interference
by Lei Cai and Han Zhao
J. Manuf. Mater. Process. 2025, 9(11), 350; https://doi.org/10.3390/jmmp9110350 - 26 Oct 2025
Cited by 1 | Viewed by 1749
Abstract
During the Gas Metal Arc Welding (GMAW) process, intense arc light and dense fumes cause local overexposure in RGB images and data loss in point clouds, which severely compromises the extraction accuracy of circular closed-curve weld seams. To address this challenge, this paper [...] Read more.
During the Gas Metal Arc Welding (GMAW) process, intense arc light and dense fumes cause local overexposure in RGB images and data loss in point clouds, which severely compromises the extraction accuracy of circular closed-curve weld seams. To address this challenge, this paper proposes a multimodal fusion method for weld seam extraction under arc light and fume interference. The method begins by constructing a weld seam edge feature extraction (WSEF) module based on a synergistic fusion network, which achieves precise localization of the weld contour by coupling image arc light-removal and semantic segmentation tasks. Subsequently, an image-to-point cloud mapping-guided Local Point Cloud Feature extraction (LPCF) module was designed, incorporating the Shuffle Attention mechanism to enhance robustness against noise and occlusion. Building upon this, a cross-modal attention-driven multimodal feature fusion (MFF) module integrates 2D edge features with 3D structural information to generate a spatially consistent and detail-rich fused point cloud. Finally, a hierarchical trajectory reconstruction and smoothing method is employed to achieve high-precision reconstruction of the closed weld seam path. The experimental results demonstrate that under severe arc light and fume interference, the proposed method achieves a Root Mean Square Error below 0.6 mm, a maximum error not exceeding 1.2 mm, and a processing time under 5 s. Its performance significantly surpasses that of existing methods, showcasing excellent accuracy and robustness. Full article
Show Figures

Figure 1

24 pages, 6042 KB  
Article
IncentiveChain: Adequate Power and Water Usage in Smart Farming Through Diffusion of Blockchain Crypto-Ether
by Sukrutha L. T. Vangipuram, Saraju P. Mohanty and Elias Kougianos
Information 2025, 16(10), 858; https://doi.org/10.3390/info16100858 - 4 Oct 2025
Cited by 1 | Viewed by 1483
Abstract
The recent advancements in blockchain technology have also expanded its applications to smart agricultural fields, leading to increased research and studies in areas such as supply chain traceability systems and insurance systems. Policies and reward systems built on top of centralized systems face [...] Read more.
The recent advancements in blockchain technology have also expanded its applications to smart agricultural fields, leading to increased research and studies in areas such as supply chain traceability systems and insurance systems. Policies and reward systems built on top of centralized systems face several problems and issues, including data integrity issues, modifications in data readings, third-party banking vulnerabilities, and central point failures. The current paper discusses how farming is becoming a leading cause of water and electricity wastage and introduces a novel idea called IncentiveChain. To keep a limit on the usage of resources in farming, we implemented an application for distributing cryptocurrency to the producers, as the farmers are responsible for the activities in farming fields. Launching incentive schemes can benefit farmers economically and attract more interest and attention. We provide a state-of-the-art architecture and design through distributed storage, which will include using edge points and various technologies affiliated with national agricultural departments and regional utility companies to make IncentiveChain practical. We successfully demonstrate the execution of the IncentiveChain application by transferring crypto-ether from utility company accounts to farmer accounts in a decentralized system application. With this system, the ether is distributed to the farmer more securely using the blockchain, which in turn removes third-party banking vulnerabilities and central, cloud, and blockchain constraints and adds data trust and authenticity. Full article
Show Figures

Figure 1

Back to TopTop