Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,482)

Search Parameters:
Keywords = computer-tailoring

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
24 pages, 1012 KB  
Review
The Role of Imaging in Monitoring Large Vessel Vasculitis: A Comprehensive Review
by Inês Sopa, Roberto Pereira da Costa, Joana Martins Martinho and Cristina Ponte
Biomolecules 2025, 15(11), 1505; https://doi.org/10.3390/biom15111505 (registering DOI) - 24 Oct 2025
Abstract
Giant cell arteritis (GCA) and Takayasu arteritis (TAK) are forms of primary large vessel vasculitis (LVV) affecting the aorta and its major branches. Timely diagnosis and accurate monitoring are essential to prevent irreversible damage. Current assessment strategies rely heavily on symptoms, physical examination, [...] Read more.
Giant cell arteritis (GCA) and Takayasu arteritis (TAK) are forms of primary large vessel vasculitis (LVV) affecting the aorta and its major branches. Timely diagnosis and accurate monitoring are essential to prevent irreversible damage. Current assessment strategies rely heavily on symptoms, physical examination, and inflammatory markers, which lack sensitivity and specificity, particularly in patients treated with IL-6 inhibitors. This narrative review provides a comprehensive overview of the role of imaging in monitoring LVV. Ultrasound, magnetic resonance imaging, and positron emission tomography better reflect disease activity and treatment response compared to conventional clinical and laboratory measures. Notably, emerging imaging-based tools such as the OMERACT GCA Ultrasound Score, the Takayasu Ultrasound Index, and the TAK Integrated Disease Activity Index (TAIDAI) are promising treat-to-target instruments. While computed tomography is primarily used to assess structural damage, conventional angiography now plays a more limited role, mainly reserved for procedural planning and haemodynamic evaluation. A key challenge remains: interpreting persistent vascular abnormalities, which may indicate active disease, vascular remodelling, or irreversible damage. Standardisation of imaging protocols and interpretation is needed, alongside further research on the prognostic value of imaging for relapse risk. This review supports a multimodal, patient-tailored approach in which imaging is central to the long-term management of LVV. Full article
(This article belongs to the Special Issue Biomarkers for Vascular Disease II)
23 pages, 1845 KB  
Review
Management of Asymptomatic Severe Aortic Stenosis: Current Evidence and Future Directions
by Giulia Laterra, Federica Agnello, Orazio Strazzieri, Claudia Reddavid, Lorenzo Scalia, Salvatore Ingala, Simona Guarino, Chiara Barbera, Maria Daniela Russo, Giuliano Costa and Marco Barbanti
J. Clin. Med. 2025, 14(21), 7549; https://doi.org/10.3390/jcm14217549 (registering DOI) - 24 Oct 2025
Abstract
Systematic Severe aortic stenosis (AS) is a progressive disease and one of the most common valvular heart diseases in developed countries. The management of asymptomatic severe AS remains challenging and requires a tailored, patient-specific approach. Optimal timing of intervention in asymptomatic patients continues [...] Read more.
Systematic Severe aortic stenosis (AS) is a progressive disease and one of the most common valvular heart diseases in developed countries. The management of asymptomatic severe AS remains challenging and requires a tailored, patient-specific approach. Optimal timing of intervention in asymptomatic patients continues to be a matter of ongoing debate. In individuals with severe AS and reduced left ventricular ejection fraction (LVEF), both the ESC/EACTS and ACC/AHA guidelines recommend aortic valve replacement (AVR), regardless of symptom status. In contrast, for patients with preserved LVEF (≥50%), the decision to proceed with AVR must be individualized and based on a comprehensive risk assessment. Risk stratification plays a central role in guiding early intervention strategies and should incorporate clinical findings, echocardiographic parameters, biomarkers, and advanced imaging techniques such as cardiac magnetic resonance and computed tomography. Recent randomized controlled trials have yielded mixed results regarding the mortality benefit of early AVR but have consistently demonstrated a reduction in heart failure-related hospitalizations. Timely intervention in carefully selected high-risk patients may improve long-term outcomes, while avoiding unnecessary procedures in lower-risk individuals remains equally important. Full article
(This article belongs to the Section Cardiovascular Medicine)
Show Figures

Figure 1

24 pages, 1053 KB  
Review
Machine Learning-Driven Prediction of Reactive Oxygen Species Dynamics for Assessing Nanomaterials’ Cytotoxicity
by Zuowei Ji and Ziyu Yin
Biomimetics 2025, 10(11), 718; https://doi.org/10.3390/biomimetics10110718 (registering DOI) - 24 Oct 2025
Abstract
Nanomaterials (NMs) possess unique physicochemical features that set them apart from bulk counterparts. Their adjustable properties provide remarkable flexibility, giving rise to a wide array of variants. However, these attributes can also trigger complex biological interactions, particularly the generation of reactive oxygen species [...] Read more.
Nanomaterials (NMs) possess unique physicochemical features that set them apart from bulk counterparts. Their adjustable properties provide remarkable flexibility, giving rise to a wide array of variants. However, these attributes can also trigger complex biological interactions, particularly the generation of reactive oxygen species (ROS), which are central to nanomaterial-induced cytotoxicity. The ambivalent nature of ROS, essential for physiological signaling yet harmful when dysregulated, can lead to substantial health consequences. The scarcity of reliable toxicity and safety data, together with the inadequacies of conventional testing methods, highlights the urgent need for more effective strategies to assess nanomaterial-related hazards and risks. Given the intricate interplay between NMs and biological systems, computational approaches, particularly machine learning (ML), have emerged as powerful tools to model ROS dynamics, predict cytotoxic outcomes, and optimize nanomaterial design. This review highlights recent advances in applying ML to predict both the generation and neutralization of ROS by diverse NMs and to identify the critical determinants underlying ROS-mediated toxicity. These insights provide new opportunities for predictive nanotoxicology and the development of safer, application-tailored NMs. Full article
(This article belongs to the Special Issue Artificial Intelligence (AI) in Biomedical Engineering: 2nd Edition)
Show Figures

Graphical abstract

23 pages, 11949 KB  
Article
MDAS-YOLO: A Lightweight Adaptive Framework for Multi-Scale and Dense Pest Detection in Apple Orchards
by Bo Ma, Jiawei Xu, Ruofei Liu, Junlin Mu, Biye Li, Rongsen Xie, Shuangxi Liu, Xianliang Hu, Yongqiang Zheng, Hongjian Zhang and Jinxing Wang
Horticulturae 2025, 11(11), 1273; https://doi.org/10.3390/horticulturae11111273 - 22 Oct 2025
Abstract
Accurate monitoring of orchard pests is vital for green and efficient apple production. Yet images captured by intelligent pest-monitoring lamps often contain small targets, weak boundaries, and crowded scenes, which hamper detection accuracy. We present MDAS-YOLO, a lightweight detection framework tailored for smart [...] Read more.
Accurate monitoring of orchard pests is vital for green and efficient apple production. Yet images captured by intelligent pest-monitoring lamps often contain small targets, weak boundaries, and crowded scenes, which hamper detection accuracy. We present MDAS-YOLO, a lightweight detection framework tailored for smart pest monitoring in apple orchards. At the input stage, we adopt the LIME++ enhancement to mitigate low illumination and non-uniform lighting, improving image quality at the source. On the model side, we integrate three structural innovations: (1) a C3k2-MESA-DSM module in the backbone to explicitly strengthen contours and fine textures via multi-scale edge enhancement and dual-domain feature selection; (2) an AP-BiFPN in the neck to achieve adaptive cross-scale fusion through learnable weighting and differentiated pooling; and (3) a SimAM block before the detection head to perform zero-parameter, pixel-level saliency re-calibration, suppressing background redundancy without extra computation. On a self-built apple-orchard pest dataset, MDAS-YOLO attains 95.68% mAP, outperforming YOLOv11n by 6.97 percentage points while maintaining a superior trade-off among accuracy, model size, and inference speed. Overall, the proposed synergistic pipeline—input enhancement, early edge fidelity, mid-level adaptive fusion, and end-stage lightweight re-calibration—effectively addresses small-scale, weak-boundary, and densely distributed pests, providing a promising and regionally validated approach for intelligent pest monitoring and sustainable orchard management, and offering methodological insights for future multi-regional pest monitoring research. Full article
(This article belongs to the Section Insect Pest Management)
Show Figures

Figure 1

14 pages, 294 KB  
Article
A Discrete-Time Single-Server Retrial Queue with Preemption and Adaptive Retrial Times: Theoretical Analysis and Telecommunication Insights
by Iván Atencia-Mckillop, José Luis Galán-García, María Ángeles Galán-García, Yolanda Padilla-Domínguez, Pedro Rodríguez-Cielos and Pablo Rodríguez-Padilla
Mathematics 2025, 13(21), 3361; https://doi.org/10.3390/math13213361 - 22 Oct 2025
Abstract
This paper analyzes a discrete-time single-server retrial queue with preemptive service, Bernoulli arrivals, and adaptive retrial times, tailored to telecommunications systems. In call centers, the model captures caller retries and priority interruptions, while in cellular networks, it represents user channel access attempts with [...] Read more.
This paper analyzes a discrete-time single-server retrial queue with preemptive service, Bernoulli arrivals, and adaptive retrial times, tailored to telecommunications systems. In call centers, the model captures caller retries and priority interruptions, while in cellular networks, it represents user channel access attempts with preemption for emergency calls. Using a Markov chain framework, we derive the stationary distribution, establish a stability condition, and compute performance metrics, including the mean number of retrying callers or users and orbit size probabilities. The model incorporates a novel retrial time adaptation probability, reflecting dynamic retry behaviors in telecommunications. Numerical results demonstrate the impact of arrival rates, preemption probabilities, and retrial adaptations on system performance, offering insights for optimizing call center staffing and cellular network protocols. Applications to slotted ALOHA and TDMA systems highlight the model’s practical relevance. Full article
(This article belongs to the Special Issue Advances in Queueing Theory and Applications)
28 pages, 1459 KB  
Article
Research on Computing Power Resources-Based Clustering Methods for Edge Computing Terminals
by Jian Wang, Jiali Li, Xianzhi Cao, Chang Lv and Liusong Yang
Appl. Sci. 2025, 15(20), 11285; https://doi.org/10.3390/app152011285 - 21 Oct 2025
Viewed by 147
Abstract
In the “cloud–edge–end” three-tier architecture of edge computing, the cloud, edge layer, and end-device layer collaborate to enable efficient data processing and task allocation. Certain computation-intensive tasks are decomposed into subtasks at the edge layer and assigned to terminal devices for execution. However, [...] Read more.
In the “cloud–edge–end” three-tier architecture of edge computing, the cloud, edge layer, and end-device layer collaborate to enable efficient data processing and task allocation. Certain computation-intensive tasks are decomposed into subtasks at the edge layer and assigned to terminal devices for execution. However, existing research has primarily focused on resource scheduling, paying insufficient attention to the specific requirements of tasks for computing and storage resources, as well as to constructing terminal clusters tailored to the needs of different subtasks.This study proposes a multi-objective optimization-based cluster construction method to address this gap, aiming to form matched clusters for each subtask. First, this study integrates the computing and storage resources of nodes into a unified concept termed the computing power resources of terminal nodes. A computing power metric model is then designed to quantitatively evaluate the heterogeneous resources of terminals, deriving a comprehensive computing power value for each node to assess its capability. Building upon this model, this study introduces an improved NSGA-III (Non-dominated Sorting Genetic Algorithm III) clustering algorithm. This algorithm incorporates simulated annealing and adaptive genetic operations to generate the initial population and employs a differential mutation strategy in place of traditional methods, thereby enhancing optimization efficiency and solution diversity. The experimental results demonstrate that the proposed algorithm consistently outperformed the optimal baseline algorithm across most scenarios, achieving average improvements of 18.07%, 7.82%, 15.25%, and 10% across the four optimization objectives, respectively. A comprehensive comparative analysis against multiple benchmark algorithms further confirms the marked competitiveness of the method in multi-objective optimization. This approach enables more efficient construction of terminal clusters adapted to subtask requirements, thereby validating its efficacy and superior performance. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

17 pages, 3194 KB  
Article
Improved Real-Time Detection Transformer with Low-Frequency Feature Integrator and Token Statistics Self-Attention for Automated Grading of Stropharia rugoso-annulata Mushroom
by Yu-Hang He, Shi-Yun Duan and Wen-Hao Su
Foods 2025, 14(20), 3581; https://doi.org/10.3390/foods14203581 - 21 Oct 2025
Viewed by 129
Abstract
Manual grading of Stropharia rugoso-annulata mushroom is plagued by inefficiency and subjectivity, while existing detection models face inherent trade-offs between accuracy, real-time performance, and deployability on resource-constrained edge devices. To address these challenges, this study presents an Improved Real-Time Detection Transformer (RT-DETR) tailored [...] Read more.
Manual grading of Stropharia rugoso-annulata mushroom is plagued by inefficiency and subjectivity, while existing detection models face inherent trade-offs between accuracy, real-time performance, and deployability on resource-constrained edge devices. To address these challenges, this study presents an Improved Real-Time Detection Transformer (RT-DETR) tailored for automated grading of Stropharia rugoso-annulata. Two innovative modules underpin the model: (1) the low-frequency feature integrator (LFFI), which leverages wavelet decomposition to preserve critical low-frequency global structural information, thereby enhancing the capture of large mushroom morphology; (2) the Token Statistics Self-Attention (TSSA) mechanism, which replaces traditional self-attention with second-moment statistical computations. This reduces complexity from O(n2) to O(n) and inherently generates interpretable attention patterns, augmenting model explainability. Experimental results demonstrate that the improved model achieves 95.2% mAP@0.5:0.95 at 262 FPS, with a substantial reduction in computational overhead compared to the original RT-DETR. It outperforms APHS-YOLO in both accuracy and efficiency, eliminates the need for non-maximum suppression (NMS) post-processing, and balances global structural awareness with local detail sensitivity. These attributes render it highly suitable for industrial edge deployment. This work offers an efficient framework for the automated grading of large-target crop detection. Full article
(This article belongs to the Section Food Engineering and Technology)
Show Figures

Figure 1

28 pages, 1103 KB  
Article
An Efficient and Effective Model for Preserving Privacy Data in Location-Based Graphs
by Surapon Riyana and Nattapon Harnsamut
Symmetry 2025, 17(10), 1772; https://doi.org/10.3390/sym17101772 - 21 Oct 2025
Viewed by 104
Abstract
Location-based services (LBSs), which are used for navigation, tracking, and mapping across digital devices and social platforms, establish a user’s position and deliver tailored experiences. Collecting and sharing such trajectory datasets with analysts for business purposes raises critical privacy concerns, as both symmetry [...] Read more.
Location-based services (LBSs), which are used for navigation, tracking, and mapping across digital devices and social platforms, establish a user’s position and deliver tailored experiences. Collecting and sharing such trajectory datasets with analysts for business purposes raises critical privacy concerns, as both symmetry in recurring behavior mobility patterns and asymmetry in irregular movement mobility patterns in sensitive locations collectively expose highly identifiable information, resulting in re-identification risks, trajectory disclosure, and location inference. In response, several privacy preservation models have been proposed, including k-anonymity, l-diversity, t-closeness, LKC-privacy, differential privacy, and location-based approaches. However, these models still exhibit privacy issues, including sensitive location inference (e.g., hospitals, pawnshops, prisons, safe houses), disclosure from duplicate trajectories revealing sensitive places, and the re-identification of unique locations such as homes, condominiums, and offices. Efforts to address these issues often lead to utility loss and computational complexity. To overcome these limitations, we propose a new (ξ, ϵ)-privacy model that combines data generalization and suppression with sliding windows and R-Tree structures, where sliding windows partition large trajectory graphs into simplified subgraphs, R-Trees provide hierarchical indexing for spatial generalization, and suppression removes highly identifiable locations. The model addresses both symmetry and asymmetry in mobility patterns by balancing generalization and suppression to protect privacy while maintaining data utility. Symmetry-driven mechanisms that enhance resistance to inference attacks and support data confidentiality, integrity, and availability are core requirements of cryptography and information security. An experimental evaluation on the City80k and Metro100k datasets confirms that the (ξ, ϵ)-privacy model addresses privacy issues with reduced utility loss and efficient scalability, while validating robustness through relative error across query types in diverse analytical scenarios. The findings provide evidence of the model’s practicality for large-scale location data, confirming its relevance to secure computation, data protection, and information security applications. Full article
Show Figures

Figure 1

7 pages, 1456 KB  
Proceeding Paper
Towards a More Natural Urdu: A Comprehensive Approach to Text-to-Speech and Voice Cloning
by Muhammad Ramiz Saud, Muhammad Romail Imran and Raja Hashim Ali
Eng. Proc. 2025, 87(1), 112; https://doi.org/10.3390/engproc2025087112 - 20 Oct 2025
Viewed by 32
Abstract
This paper introduces a comprehensive approach to building natural-sounding Urdu Text-to-Speech (TTS) and voice cloning systems, addressing the lack of computational resources for Urdu. We developed a large-scale dataset of over 100 h of Urdu speech, carefully cleaned and phonetically aligned through an [...] Read more.
This paper introduces a comprehensive approach to building natural-sounding Urdu Text-to-Speech (TTS) and voice cloning systems, addressing the lack of computational resources for Urdu. We developed a large-scale dataset of over 100 h of Urdu speech, carefully cleaned and phonetically aligned through an automated transcription pipeline to preserve linguistic accuracy. The dataset was then used to fine-tune Tacotron2, a neural network model originally trained for English, with modifications tailored to Urdu’s phonological and morphological features. To further enhance naturalness, we integrated voice cloning techniques that capture regional accents and produce personalized speech outputs. Model performance was evaluated through mean opinion score (MOS), word error rate (WER), and speaker similarity, showing substantial improvements compared to previous Urdu systems. The results demonstrate clear progress toward natural and intelligible Urdu speech synthesis, while also revealing challenges such as handling dialectal variation and preventing model overfitting. This work contributes an essential resource and methodology for advancing Urdu natural language processing (NLP), with promising applications in education, accessibility, entertainment, and assistive technologies. Full article
(This article belongs to the Proceedings of The 5th International Electronic Conference on Applied Sciences)
Show Figures

Graphical abstract

27 pages, 2075 KB  
Review
Physics-Informed Machine Learning for Intelligent Gas Turbine Digital Twins: A Review
by Hiyam Farhat and Amani Altarawneh
Energies 2025, 18(20), 5523; https://doi.org/10.3390/en18205523 - 20 Oct 2025
Viewed by 339
Abstract
This review surveys recent progress in hybrid artificial intelligence (AI) approaches for gas turbine intelligent digital twins, with an emphasis on models that integrate physics-based simulations and machine learning. The main contribution is the introduction of a structured classification of hybrid AI methods [...] Read more.
This review surveys recent progress in hybrid artificial intelligence (AI) approaches for gas turbine intelligent digital twins, with an emphasis on models that integrate physics-based simulations and machine learning. The main contribution is the introduction of a structured classification of hybrid AI methods tailored to gas turbine applications, the development of a novel comparative maturity framework, and the proposal of a layered roadmap for integration. The classification organizes hybrid AI approaches into four categories: (1) artificial neural network (ANN)-augmented thermodynamic models, (2) physics-integrated operational architectures, (3) physics-constrained neural networks (PcNNs) with computational fluid dynamics (CFD) surrogates, and (4) generative and model discovery approaches. The maturity framework evaluates these categories across five criteria: data dependency, interpretability, deployment complexity, workflow integration, and real-time capability. Industrial case studies—including General Electric (GE) Vernova’s SmartSignal, Siemens’ Autonomous Turbine Operation and Maintenance (ATOM), and the Electric Power Research Institute (EPRI) turbine digital twin—illustrate applications in real-time diagnostics, predictive maintenance, and performance optimization. Together, the classification and maturity framework provide the means for systematic assessment of hybrid AI methods in gas turbine intelligent digital twins. The review concludes by identifying key challenges and outlining a roadmap for the future development of scalable, interpretable, and operationally robust intelligent digital twins for gas turbines. Full article
Show Figures

Figure 1

23 pages, 1986 KB  
Article
GMHCA-MCBILSTM: A Gated Multi-Head Cross-Modal Attention-Based Network for Emotion Recognition Using Multi-Physiological Signals
by Xueping Li, Yanbo Li, Yuhang Li and Yuan Yang
Algorithms 2025, 18(10), 664; https://doi.org/10.3390/a18100664 - 20 Oct 2025
Viewed by 281
Abstract
To address the limitations of the single-modal electroencephalogram (EEG), such as its single physiological dimension, weak anti-interference ability, and inability to fully reflect emotional states, this paper proposes a gated multi-head cross-attention module (GMHCA) for multimodal fusion of EEG, electrooculography (EOG),and electrodermal activity [...] Read more.
To address the limitations of the single-modal electroencephalogram (EEG), such as its single physiological dimension, weak anti-interference ability, and inability to fully reflect emotional states, this paper proposes a gated multi-head cross-attention module (GMHCA) for multimodal fusion of EEG, electrooculography (EOG),and electrodermal activity (EDA). This attention module employs three independent and parallel attention computation units to assign independent attention weights to different feature subsets across modalities. Combined with a modality complementarity metric, the gating mechanism suppresses redundant heads and enhances the information transmission of key heads. Through multi-head concatenation, cross-modal interaction results from different perspectives are fused. For the backbone network, a multi-scale convolution and bidirectional long short-term memory network (MC-BiLSTM) is designed for feature extraction, tailored to the characteristics of each modality. Experiments show that this method, which primarily fuses eight-channel EEG with peripheral physiological signals, achieves an emotion recognition accuracy of 89.45%, a 7.68% improvement over single-modal EEG. In addition, in cross-subject experiments conducted on the SEED-IV dataset, the EEG+EOG modality achieved a classification accuracy of 92.73%. All were significantly better than the baseline method. This fully demonstrates the effectiveness of the innovative GMHCA module architecture and MC-BiLSTM feature extraction network proposed in this paper for multimodal fusion methods. Through the novel attention gating mechanism, higher recognition accuracy is achieved while significantly reducing the number of EEG channels, providing new ideas and approaches based on attention mechanisms and gated fusion for multimodal emotion recognition in resource-constrained environments. Full article
(This article belongs to the Special Issue Machine Learning in Medical Signal and Image Processing (4th Edition))
Show Figures

Graphical abstract

30 pages, 5198 KB  
Article
Security Authentication Scheme for Vehicle-to-Everything Computing Task Offloading Environments
by Yubao Liu, Chenhao Li, Quanchao Sun and Haiyue Jiang
Sensors 2025, 25(20), 6428; https://doi.org/10.3390/s25206428 - 17 Oct 2025
Viewed by 194
Abstract
Computational task offloading is a key technology in the field of vehicle-to-everything (V2X) communication, where security issues represent a core challenge throughout the offloading process. We must ensure the legitimacy of both the offloading entity (requesting vehicle) and the offloader (edge server or [...] Read more.
Computational task offloading is a key technology in the field of vehicle-to-everything (V2X) communication, where security issues represent a core challenge throughout the offloading process. We must ensure the legitimacy of both the offloading entity (requesting vehicle) and the offloader (edge server or assisting vehicle), as well as the confidentiality and integrity of task data during transmission and processing. To this end, we propose a security authentication scheme for the V2X computational task offloading environment. We conducted rigorous formal and informal analyses of the scheme, supplemented by verification using the formal security verification tool AVISPA. This demonstrates that the proposed scheme possesses fundamental security properties in the V2X environment, capable of resisting various threats and attacks. Furthermore, compared to other related authentication schemes, our proposed solution exhibits favorable performance in terms of computational and communication overhead. Finally, we conducted network simulations using NS-3 to evaluate the scheme’s performance at the network layer. Overall, the proposed scheme provides reliable and scalable security guarantees tailored to the requirements of computing task offloading in V2X environments. Full article
(This article belongs to the Section Vehicular Sensing)
Show Figures

Figure 1

24 pages, 2291 KB  
Article
Achieving Computational Symmetry: A Novel Workflow Task Scheduling and Resource Allocation Method for D2D Cooperation
by Xianzhi Cao, Chang Lv, Jiali Li and Jian Wang
Symmetry 2025, 17(10), 1746; https://doi.org/10.3390/sym17101746 - 16 Oct 2025
Viewed by 293
Abstract
With the rapid advancement of mobile edge computing and Internet of Things (IoT) technologies, device-to-device (D2D) cooperative computing has garnered significant attention due to its low latency and high resource utilization efficiency. However, workflow task scheduling in D2D networks poses considerable challenges, such [...] Read more.
With the rapid advancement of mobile edge computing and Internet of Things (IoT) technologies, device-to-device (D2D) cooperative computing has garnered significant attention due to its low latency and high resource utilization efficiency. However, workflow task scheduling in D2D networks poses considerable challenges, such as severe heterogeneity in device resources and complex inter-task dependencies, which may result in low resource utilization and inefficient scheduling, ultimately breaking the computational symmetry—a balanced state of computational resource allocation among terminal devices and load balance across the network. To address these challenges and restore system-level symmetry, a novel workflow task scheduling method tailored for D2D cooperative environments is proposed. First, a Non-dominated Sorting Genetic Algorithm (NSGA) is employed to optimize the allocation of computational resources across terminal devices, maximizing the overall computing capacity while achieving a symmetrical and balanced resource distribution. A scoring mechanism and a normalization strategy are introduced to accurately assess the compatibility between tasks and processors, thereby enhancing resource utilization during scheduling. Subsequently, task priorities are determined based on the calculation of each task’s Shapley value, ensuring that critical tasks are scheduled preferentially. Finally, a hybrid algorithm integrating Q-learning with Asynchronous Advantage Actor–Critic (A3C) is developed to perform precise and adaptive task scheduling, improving system load balancing and execution efficiency. Extensive simulation results demonstrate that the proposed method outperforms state-of-art methods in both energy consumption and response time, with improvements of 26.34% and 29.98%, respectively, underscoring the robustness and superiority of the proposed method. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

23 pages, 2255 KB  
Article
Design and Implementation of a YOLOv2 Accelerator on a Zynq-7000 FPGA
by Huimin Kim and Tae-Kyoung Kim
Sensors 2025, 25(20), 6359; https://doi.org/10.3390/s25206359 - 14 Oct 2025
Viewed by 454
Abstract
You Only Look Once (YOLO) is a convolutional neural network-based object detection algorithm widely used in real-time vision applications. However, its high computational demand leads to significant power consumption and cost when deployed in graphics processing units. Field-programmable gate arrays offer a low-power [...] Read more.
You Only Look Once (YOLO) is a convolutional neural network-based object detection algorithm widely used in real-time vision applications. However, its high computational demand leads to significant power consumption and cost when deployed in graphics processing units. Field-programmable gate arrays offer a low-power alternative. However, their efficient implementation requires architecture-level optimization tailored to limited device resources. This study presents an optimized YOLOv2 accelerator for the Zynq-7000 system-on-chip (SoC). The design employs 16-bit integer quantization, a filter reuse structure, an input feature map reuse scheme using a line buffer, and tiling parameter optimization for the convolution and max pooling layers to maximize resource efficiency. In addition, a stall-based control mechanism is introduced to prevent structural hazards in the pipeline. The proposed accelerator was implemented on the Zynq-7000 SoC board, and a system-level evaluation confirmed a negligible accuracy drop of only 0.2% compared with the 32-bit floating-point baseline. Compared with previous YOLO accelerators on the same SoC, the design achieved up to 26% and 15% reductions in flip-flop and digital signal processor usage, respectively. This result demonstrates feasible deployment on XC7Z020 with DSP 57.27% and FF 16.55% utilization. Full article
(This article belongs to the Special Issue Object Detection and Recognition Based on Deep Learning)
Show Figures

Figure 1

25 pages, 3069 KB  
Article
DrSVision: A Machine Learning Tool for Cortical Region-Specific fNIRS Calibration Based on Cadaveric Head MRI
by Serhat Ilgaz Yöner, Mehmet Emin Aksoy, Hayrettin Can Südor, Kurtuluş İzzetoğlu, Baran Bozkurt and Alp Dinçer
Sensors 2025, 25(20), 6340; https://doi.org/10.3390/s25206340 - 14 Oct 2025
Viewed by 294
Abstract
Functional Near-Infrared Spectroscopy is (fNIRS) a non-invasive neuroimaging technique that monitors cerebral hemodynamic responses by measuring near-infrared (NIR) light absorption caused by changes in oxygenated and deoxygenated hemoglobin concentrations. While fNIRS has been widely used in cognitive and clinical neuroscience, a key challenge [...] Read more.
Functional Near-Infrared Spectroscopy is (fNIRS) a non-invasive neuroimaging technique that monitors cerebral hemodynamic responses by measuring near-infrared (NIR) light absorption caused by changes in oxygenated and deoxygenated hemoglobin concentrations. While fNIRS has been widely used in cognitive and clinical neuroscience, a key challenge persists: the lack of practical tools required for calibrating source-detector separation (SDS) to maximize sensitivity at depth (SAD) for monitoring specific cortical regions of interest to neuroscience and neuroimaging studies. This study presents DrSVision version 1.0, a standalone software developed to address this limitation. Monte Carlo (MC) simulations were performed using segmented magnetic resonance imaging (MRI) data from eight cadaveric heads to realistically model light attenuation across anatomical layers. SAD of 10–20 mm with SDS of 19–39 mm was computed. The dataset was used to train a Gaussian Process Regression (GPR)-based machine learning (ML) model that recommends optimal SDS for achieving maximal sensitivity at targeted depths. The software operates independently of any third-party platforms and provides users with region-specific calibration outputs tailored for experimental goals, supporting more precise application of fNIRS. Future developments aim to incorporate subject-specific calibration using anatomical data and broaden support for diverse and personalized experimental setups. DrSVision represents a step forward in fNIRS experimentation. Full article
(This article belongs to the Special Issue Recent Innovations in Computational Imaging and Sensing)
Show Figures

Graphical abstract

Back to TopTop