Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (3,413)

Search Parameters:
Keywords = confuser

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
14 pages, 5954 KiB  
Article
Mapping Wet Areas and Drainage Networks of Data-Scarce Catchments Using Topographic Attributes
by Henrique Marinho Leite Chaves, Maria Tereza Leite Montalvão and Maria Rita Souza Fonseca
Water 2025, 17(15), 2298; https://doi.org/10.3390/w17152298 (registering DOI) - 2 Aug 2025
Abstract
Wet areas, which are locations in the landscape that consistently retain moisture, and channel networks are important landscape compartments, with key hydrological and ecological functions. Hence, defining their spatial boundaries is an important step towards sustainable watershed management. In catchments of developing countries, [...] Read more.
Wet areas, which are locations in the landscape that consistently retain moisture, and channel networks are important landscape compartments, with key hydrological and ecological functions. Hence, defining their spatial boundaries is an important step towards sustainable watershed management. In catchments of developing countries, wet areas and small order channels of river networks are rarely mapped, although they represent a crucial component of local livelihoods and ecosystems. In this study, topographic attributes generated with a 30 m SRTM DEM were used to map wet areas and stream networks of two tropical catchments in Central Brazil. The topographic attributes for wet areas were the local slope and the slope curvature, and the Topographic Wetness Index (TWI) was used to delineate the stream networks. Threshold values of the selected topographic attributes were calibrated in the Santa Maria catchment, comparing the synthetically generated wet areas and drainage networks with corresponding reference (map) features, and validated in the nearby Santa Maria basin. Drainage network and wet area delineation accuracies were estimated using random basin transects and multi-criteria and confusion matrix methods. The drainage network accuracies were 67.2% and 70.7%, and wet area accuracies were 72.7% and 73.8%, for the Santa Maria and Gama catchments, respectively, being equivalent or higher than previous studies. The mapping errors resulted from model incompleteness, DEM vertical inaccuracy, and cartographic misrepresentation of the reference topographic maps. The study’s novelty is the use of readily available information to map, with simplicity and robustness, wet areas and channel initiation in data-scarce, tropical environments. Full article
(This article belongs to the Section Hydrogeology)
Show Figures

Figure 1

41 pages, 86958 KiB  
Article
An Efficient Aerial Image Detection with Variable Receptive Fields
by Wenbin Liu, Liangren Shi and Guocheng An
Remote Sens. 2025, 17(15), 2672; https://doi.org/10.3390/rs17152672 (registering DOI) - 2 Aug 2025
Abstract
This article presents VRF-DETR, a lightweight real-time object detection framework for aerial remote sensing images, aimed at addressing the challenge of insufficient receptive fields for easily confused categories due to differences in height and perspective. Based on the RT-DETR architecture, our approach introduces [...] Read more.
This article presents VRF-DETR, a lightweight real-time object detection framework for aerial remote sensing images, aimed at addressing the challenge of insufficient receptive fields for easily confused categories due to differences in height and perspective. Based on the RT-DETR architecture, our approach introduces three key innovations: the multi-scale receptive field adaptive fusion (MSRF2) module replaces the Transformer encoder with parallel dilated convolutions and spatial-channel attention to adjust receptive fields for confusing objects dynamically; the gated multi-scale context (GMSC) block reconstructs the backbone using Gated Multi-Scale Context units with attention-gated convolution (AGConv), reducing parameters while enhancing multi-scale feature extraction; and the context-guided fusion (CGF) module optimizes feature fusion via context-guided weighting to resolve multi-scale semantic conflicts. Evaluations were conducted on both the VisDrone2019 and UAVDT datasets, where VRF-DETR achieved the mAP50 of 52.1% and the mAP50-95 of 32.2% on the VisDrone2019 validation set, surpassing RT-DETR by 4.9% and 3.5%, respectively, while reducing parameters by 32% and FLOPs by 22%. It maintains real-time performance (62.1 FPS) and generalizes effectively, outperforming state-of-the-art methods in accuracy-efficiency trade-offs for aerial object detection. Full article
(This article belongs to the Special Issue Deep Learning Innovations in Remote Sensing)
Show Figures

Figure 1

21 pages, 3036 KiB  
Article
Histological Features Detected for Separation of the Edible Leaves of Allium ursinum L. from the Poisonous Leaves of Convallaria majalis L. and Colchicum autumnale L
by Márta M-Hamvas, Angéla Tótik, Csongor Freytag, Attila Gáspár, Amina Nouar, Tamás Garda and Csaba Máthé
Plants 2025, 14(15), 2377; https://doi.org/10.3390/plants14152377 (registering DOI) - 1 Aug 2025
Abstract
Allium ursinum (wild garlic) has long been collected and consumed as food and medicine in the north temperate zone, where its popularity is growing. Colchicum autumnale and Convallaria majalis contain toxic alkaloids. Their habitats overlap, and without flowers, their vegetative organs are similar. [...] Read more.
Allium ursinum (wild garlic) has long been collected and consumed as food and medicine in the north temperate zone, where its popularity is growing. Colchicum autumnale and Convallaria majalis contain toxic alkaloids. Their habitats overlap, and without flowers, their vegetative organs are similar. Confusing the leaves of Colchicum or Convallaria with the leaves of wild garlic has repeatedly led to serious human and animal poisonings. Our goal was to find a histological characteristic that makes the separation of these leaves clear. We compared the anatomy of foliage leaves of these three species grown in the same garden (Debrecen, Hungary, Central Europe). We used a bright-field microscope to characterize the transversal sections of leaves. Cell types of epidermises were compared based on peels and different impressions. We established some significant differences in the histology of leaves. The adaxial peels of Allium consist of only “long” cells without stomata, but the abaxial ones show “long”, “short” and “T” cells with wavy cell walls as a peculiarity, and stomata. Convallaria and Colchicum leaves are amphystomatic, but in the case of Allium, they are hypostomatic. These traits were confirmed with herbarium specimens. Our results help to clearly identify these species even in mixed, dried plant material and may be used for diagnostic purposes. Full article
26 pages, 2653 KiB  
Article
Attacker Attribution in Multi-Step and Multi-Adversarial Network Attacks Using Transformer-Based Approach
by Romina Torres and Ana García
Appl. Sci. 2025, 15(15), 8476; https://doi.org/10.3390/app15158476 - 30 Jul 2025
Viewed by 112
Abstract
Recent studies on network intrusion detection using deep learning primarily focus on detecting attacks or classifying attack types, but they often overlook the challenge of attributing each attack to its specific source among many potential adversaries (multi-adversary attribution). This is a critical and [...] Read more.
Recent studies on network intrusion detection using deep learning primarily focus on detecting attacks or classifying attack types, but they often overlook the challenge of attributing each attack to its specific source among many potential adversaries (multi-adversary attribution). This is a critical and underexplored issue in cybersecurity. In this study, we address the problem of attacker attribution in complex, multi-step network attack (MSNA) environments, aiming to identify the responsible attacker (e.g., IP address) for each sequence of security alerts, rather than merely detecting the presence or type of attack. We propose a deep learning approach based on Transformer encoders to classify sequences of network alerts and attribute them to specific attackers among many candidates. Our pipeline includes data preprocessing, exploratory analysis, and robust training/validation using stratified splits and 5-fold cross-validation, all applied to real-world multi-step attack datasets from capture-the-flag (CTF) competitions. We compare the Transformer-based approach with a multilayer perceptron (MLP) baseline to quantify the benefits of advanced architectures. Experiments on this challenging dataset demonstrate that our Transformer model achieves near-perfect accuracy (99.98%) and F1-scores (macro and weighted ≈ 99%) in attack attribution, significantly outperforming the MLP baseline (accuracy 80.62%, macro F1 65.05% and weighted F1 80.48%). The Transformer generalizes robustly across all attacker classes, including those with few samples, as evidenced by per-class metrics and confusion matrices. Our results show that Transformer-based models are highly effective for multi-adversary attack attribution in MSNA, a scenario not or under-addressed in the previous intrusion detection systems (IDS) literature. The adoption of advanced architectures and rigorous validation strategies is essential for reliable attribution in complex and imbalanced environments. Full article
(This article belongs to the Special Issue Application of Deep Learning for Cybersecurity)
Show Figures

Figure 1

22 pages, 4895 KiB  
Article
Machine Learning-Assisted Secure Random Communication System
by Areeb Ahmed and Zoran Bosnić
Entropy 2025, 27(8), 815; https://doi.org/10.3390/e27080815 - 29 Jul 2025
Viewed by 150
Abstract
Machine learning techniques have revolutionized physical layer security (PLS) and provided opportunities for optimizing the performance and security of modern communication systems. In this study, we propose the first machine learning-assisted random communication system (ML-RCS). It comprises a pretrained decision tree (DT)-based receiver [...] Read more.
Machine learning techniques have revolutionized physical layer security (PLS) and provided opportunities for optimizing the performance and security of modern communication systems. In this study, we propose the first machine learning-assisted random communication system (ML-RCS). It comprises a pretrained decision tree (DT)-based receiver that extracts binary information from the transmitted random noise carrier signals. The ML-RCS employs skewed alpha-stable (α-stable) noise as a random carrier to encode the incoming binary bits securely. The DT model is pretrained on an extensively developed dataset encompassing all the selected parameter combinations to generate and detect the α-stable noise signals. The legitimate receiver leverages the pretrained DT and a predetermined key, specifically the pulse length of a single binary information bit, to securely decode the hidden binary bits. The performance evaluations included the single-bit transmission, confusion matrices, and a bit error rate (BER) analysis via Monte Carlo simulations. The fact that the BER reached 10−3 confirms the ability of the proposed system to establish successful secure communication between a transmitter and legitimate receiver. Additionally, the ML-RCS provides an increased data rate compared to previous random communication systems. From the perspective of security, the confusion matrices and computed false negative rate of 50.2% demonstrate the failure of an eavesdropper to decode the binary bits without access to the predetermined key and the private dataset. These findings highlight the potential ability of unconventional ML-RCSs to promote the development of secure next-generation communication devices with built-in PLSs. Full article
(This article belongs to the Special Issue Wireless Communications: Signal Processing Perspectives, 2nd Edition)
Show Figures

Figure 1

22 pages, 5848 KiB  
Article
Tools We Use: A UAV and Photogrammetry Workflow Analysis for Small Landscape Architecture Firms
by Bryant Baugus, Peter Summerlin, Cory Gallo and Duane McLemore
Architecture 2025, 5(3), 56; https://doi.org/10.3390/architecture5030056 - 29 Jul 2025
Viewed by 118
Abstract
Advanced technologies increase both the speed and the efficiency of work, saving time and money for practitioners. These technologies manifest in tools and resources that equip professionals across various sectors to carry out their work more effectively. Unfortunately, these resources can be confusing, [...] Read more.
Advanced technologies increase both the speed and the efficiency of work, saving time and money for practitioners. These technologies manifest in tools and resources that equip professionals across various sectors to carry out their work more effectively. Unfortunately, these resources can be confusing, convoluted, and critically misunderstood. Therefore, understanding emerging and advanced technology positions professionals to fill in gaps in knowledge and provides unrivaled value for the profession. This study examines advanced technology in the field of landscape architecture, analyzes applications of tools and resources, and provides a guide for implementation to answer the following research question: How can UAVs improve site analysis workflows for small landscape architecture firms? Focused on Unmanned Aerial Vehicles (UAVs), the discussion finds a multi-resource workflow leads to higher quality data, faster analysis, and more targeted solutions. Full article
Show Figures

Figure 1

24 pages, 8483 KiB  
Article
A Weakly Supervised Network for Coarse-to-Fine Change Detection in Hyperspectral Images
by Yadong Zhao and Zhao Chen
Remote Sens. 2025, 17(15), 2624; https://doi.org/10.3390/rs17152624 - 28 Jul 2025
Viewed by 256
Abstract
Hyperspectral image change detection (HSI-CD) provides substantial value in environmental monitoring, urban planning and other fields. In recent years, deep-learning based HSI-CD methods have made remarkable progress due to their powerful nonlinear feature learning capabilities, yet they face several challenges: mixed-pixel phenomenon affecting [...] Read more.
Hyperspectral image change detection (HSI-CD) provides substantial value in environmental monitoring, urban planning and other fields. In recent years, deep-learning based HSI-CD methods have made remarkable progress due to their powerful nonlinear feature learning capabilities, yet they face several challenges: mixed-pixel phenomenon affecting pixel-level detection accuracy; heterogeneous spatial scales of change targets where coarse-grained features fail to preserve fine-grained details; and dependence on high-quality labels. To address these challenges, this paper introduces WSCDNet, a weakly supervised HSI-CD network employing coarse-to-fine feature learning, with key innovations including: (1) A dual-branch detection framework integrating binary and multiclass change detection at the sub-pixel level that enhances collaborative optimization through a cross-feature coupling module; (2) introduction of multi-granularity aggregation and difference feature enhancement module for detecting easily confused regions, which effectively improves the model’s detection accuracy; and (3) proposal of a weakly supervised learning strategy, reducing model sensitivity to noisy pseudo-labels through decision-level consistency measurement and sample filtering mechanisms. Experimental results demonstrate that WSCDNet effectively enhances the accuracy and robustness of HSI-CD tasks, exhibiting superior performance under complex scenarios and weakly supervised conditions. Full article
(This article belongs to the Section Remote Sensing Image Processing)
Show Figures

Figure 1

27 pages, 4682 KiB  
Article
DERIENet: A Deep Ensemble Learning Approach for High-Performance Detection of Jute Leaf Diseases
by Mst. Tanbin Yasmin Tanny, Tangina Sultana, Md. Emran Biswas, Chanchol Kumar Modok, Arjina Akter, Mohammad Shorif Uddin and Md. Delowar Hossain
Information 2025, 16(8), 638; https://doi.org/10.3390/info16080638 - 27 Jul 2025
Viewed by 160
Abstract
Jute, a vital lignocellulosic fiber crop with substantial industrial and ecological relevance, continues to suffer considerable yield and quality degradation due to pervasive foliar pathologies. Traditional diagnostic modalities reliant on manual field inspections are inherently constrained by subjectivity, diagnostic latency, and inadequate scalability [...] Read more.
Jute, a vital lignocellulosic fiber crop with substantial industrial and ecological relevance, continues to suffer considerable yield and quality degradation due to pervasive foliar pathologies. Traditional diagnostic modalities reliant on manual field inspections are inherently constrained by subjectivity, diagnostic latency, and inadequate scalability across geographically distributed agrarian systems. To transcend these limitations, we propose DERIENet, a robust and scalable classification approach within a deep ensemble learning framework. It is meticulously engineered by integrating three high-performing convolutional neural networks—ResNet50, InceptionV3, and EfficientNetB0—along with regularization, batch normalization, and dropout strategies, to accurately classify jute leaf diseases such as Cercospora Leaf Spot, Golden Mosaic Virus, and healthy leaves. A key methodological contribution is the design of a novel augmentation pipeline, termed Geometric Localized Occlusion and Adaptive Rescaling (GLOAR), which dynamically modulates photometric and geometric distortions based on image entropy and luminance to synthetically upscale a limited dataset (920 images) into a significantly enriched and diverse dataset of 7800 samples, thereby mitigating overfitting and enhancing domain generalizability. Empirical evaluation, utilizing a comprehensive set of performance metrics—accuracy, precision, recall, F1-score, confusion matrices, and ROC curves—demonstrates that DERIENet achieves a state-of-the-art classification accuracy of 99.89%, with macro-averaged and weighted average precision, recall, and F1-score uniformly at 99.89%, and an AUC of 1.0 across all disease categories. The reliability of the model is validated by the confusion matrix, which shows that 899 out of 900 test images were correctly identified and that there was only one misclassification. Comparative evaluations of the various ensemble baselines, such as DenseNet201, MobileNetV2, and VGG16, and individual base learners demonstrate that DERIENet performs noticeably superior to all baseline models. It provides a highly interpretable, deployment-ready, and computationally efficient architecture that is ideal for integrating into edge or mobile platforms to facilitate in situ, real-time disease diagnostics in precision agriculture. Full article
Show Figures

Figure 1

27 pages, 10737 KiB  
Article
XT-SECA: An Efficient and Accurate XGBoost–Transformer Model for Urban Functional Zone Classification
by Xin Gao, Xianmin Wang, Li Cao, Haixiang Guo, Wenxue Chen and Xing Zhai
ISPRS Int. J. Geo-Inf. 2025, 14(8), 290; https://doi.org/10.3390/ijgi14080290 - 25 Jul 2025
Viewed by 184
Abstract
The remote sensing classification of urban functional zones provides scientific support for urban planning, land resource optimization, and ecological environment protection. However, urban functional zone classification encounters significant challenges in accuracy and efficiency due to complicated image structures, ambiguous critical features, and high [...] Read more.
The remote sensing classification of urban functional zones provides scientific support for urban planning, land resource optimization, and ecological environment protection. However, urban functional zone classification encounters significant challenges in accuracy and efficiency due to complicated image structures, ambiguous critical features, and high computational complexity. To tackle these challenges, this work proposes a novel XT-SECA algorithm employing a strengthened efficient channel attention mechanism (SECA) to integrate the feature-extraction XGBoost branch and the feature-enhancement Transformer feedforward branch. The SECA optimizes the feature-fusion process through dynamic pooling and adaptive convolution kernel strategies, reducing feature confusion between various functional zones. XT-SECA is characterized by sufficient learning of complex image structures, effective representation of significant features, and efficient computational performance. The Futian, Luohu, and Nanshan districts in Shenzhen City are selected to conduct urban functional zone classification by XT-SECA, and they feature administrative management, technological innovation, and commercial finance functions, respectively. XT-SECA can effectively distinguish diverse functional zones such as residential zones and public management and service zones, which are easily confused by current mainstream algorithms. Compared with the commonly adopted algorithms for urban functional zone classification, including Random Forest (RF), Long Short-Term Memory (LSTM) network, and Multi-Layer Perceptron (MLP), XT-SECA demonstrates significant advantages in terms of overall accuracy, precision, recall, F1-score, and Kappa coefficient, with an accuracy enhancement of 3.78%, 42.86%, and 44.17%, respectively. The Kappa coefficient is increased by 4.53%, 51.28%, and 52.73%, respectively. Full article
(This article belongs to the Topic Artificial Intelligence Models, Tools and Applications)
Show Figures

Figure 1

25 pages, 540 KiB  
Article
Karaites: Their Names and Migration Routes
by Alexander Beider
Genealogy 2025, 9(3), 75; https://doi.org/10.3390/genealogy9030075 - 25 Jul 2025
Viewed by 293
Abstract
The article provides an analysis of the geographic origins of Karaites in four areas where Karaite congregations were commonly found after the Middle Ages, namely, Arabic Middle East (territories of modern Iraq, Syria, Israel, and Egypt), Constantinople/Istanbul and its area, the Crimean Peninsula, [...] Read more.
The article provides an analysis of the geographic origins of Karaites in four areas where Karaite congregations were commonly found after the Middle Ages, namely, Arabic Middle East (territories of modern Iraq, Syria, Israel, and Egypt), Constantinople/Istanbul and its area, the Crimean Peninsula, and Eastern European territories belonging today to Lithuania and Ukraine. It combines available historical, onomastic, and linguistic data revealing the migrations of Karaites to and inside these regions. For the first two regions, no ambiguity exists about the roots of local Karaites. Their ancestors were Jews who adopted the Karaite version of Judaism. For the Crimean communities, various factors favor the hypothesis about the territories of the Byzantine Empire (which later became Ottoman), and more specifically, Constantinople and its area are the only major source for their development. The Karaite communities in such historical Eastern European provinces as Lithuania (properly speaking), Volhynia, and Red Ruthenia were created after migrations from Crimea to these territories. The article also discusses medieval, cultural, and potentially genetic links between Karaites and Rabbanite Jews in the areas in question. It also addresses one phonological feature, the sibilant confusion, shared by the Galician–Volhynian dialect of the Karaim language and the Lithuanian dialect of Yiddish. Full article
18 pages, 479 KiB  
Article
“A Dog Brings Benefits No Matter Where It’s from”: UK Residents’ Understanding of the Benefits and Risks of Importing Puppies from Romania to the UK
by Zoe Belshaw, Elizabeth Youens, Michelle Lord and Rowena M. A. Packer
Animals 2025, 15(15), 2192; https://doi.org/10.3390/ani15152192 - 25 Jul 2025
Viewed by 360
Abstract
The United Kingdom (UK) is a key market for puppy importation from the European Union (EU), as demand for puppies exceeds domestic supply. Many are illegally imported. Potential welfare risks to the puppies and negative impacts of these on their prospective owners are [...] Read more.
The United Kingdom (UK) is a key market for puppy importation from the European Union (EU), as demand for puppies exceeds domestic supply. Many are illegally imported. Potential welfare risks to the puppies and negative impacts of these on their prospective owners are well documented, but UK residents’ perspectives on the trade are not. This study aimed to use an online survey to capture UK residents’ understanding of the benefits and risks to imported puppies of being imported from Romania for sale in the UK, and the benefits and risks of buying an imported puppy for their prospective owners. Eligible responses were collected from n = 7184 participants; 4000 randomly selected free-text comments underwent content analysis. Respondents displayed a limited understanding of the nature and range of risks potentially associated with puppy importation. Worryingly, many viewed an EU-born puppy as equivalent to one bred in the UK; others considered them as “rescued”. Synonyms used for non-endemic diseases that might be carried by the puppies varied widely, suggesting substantial confusion may exist on this topic. The UK public may underestimate the potential risks associated with buying a puppy bred in the EU, which plays into the hands of illegal puppy traders. Full article
Show Figures

Figure 1

38 pages, 2094 KiB  
Article
Degenerative ‘Affordance’ of Social Media in Family Business
by Bridget Nneka Irene, Julius Irene, Joan Lockyer and Sunita Dewitt
Systems 2025, 13(8), 629; https://doi.org/10.3390/systems13080629 - 25 Jul 2025
Viewed by 189
Abstract
This paper introduces the concept of degenerative affordances to explain how social media can unintentionally destabilise family-run influencer businesses. While affordance theory typically highlights the enabling features of technology, the researchers shift the focus to its unintended, risk-laden consequences, particularly within family enterprises [...] Read more.
This paper introduces the concept of degenerative affordances to explain how social media can unintentionally destabilise family-run influencer businesses. While affordance theory typically highlights the enabling features of technology, the researchers shift the focus to its unintended, risk-laden consequences, particularly within family enterprises where professional and personal identities are deeply entangled. Drawing on platform capitalism, family business research, and intersectional feminist critiques, the researchers develop a theoretical model to examine how social media affordances contribute to role confusion, privacy breaches, and trust erosion. Using a mixed-methods design, the researchers combine narrative interviews (n = 20) with partial least squares structural equation modelling (PLS-SEM) on survey data (n = 320) from family-based influencers. This study’s findings reveal a high explanatory power (R2 = 0.934) for how digital platforms mediate entrepreneurial legitimacy through interpersonal trust and role dynamics. Notably, trust emerges as a key mediating mechanism linking social media engagement to perceptions of business legitimacy. This paper advances three core contributions: (1) introducing degenerative affordance as a novel extension of affordance theory; (2) unpacking how digitally mediated role confusion and privacy breaches function as internal threats to legitimacy in family businesses; and (3) problematising the epistemic assumptions embedded in entrepreneurial legitimacy itself. This study’s results call for a rethinking of how digital platforms, family roles, and entrepreneurial identities co-constitute each other under the pressures of visibility, intimacy, and algorithmic governance. The paper concludes with implications for influencer labour regulation, platform accountability, and the ethics of digital family entrepreneurship. Full article
(This article belongs to the Section Systems Practice in Social Science)
Show Figures

Figure 1

23 pages, 16115 KiB  
Article
Image Privacy Protection Communication Scheme by Fibonacci Interleaved Diffusion and Non-Degenerate Discrete Chaos
by Zhiyu Xie, Weihong Xie, Xiyuan Cheng, Zhengqin Yuan, Wenbin Cheng and Yiting Lin
Entropy 2025, 27(8), 790; https://doi.org/10.3390/e27080790 - 25 Jul 2025
Viewed by 147
Abstract
The rapid development of network communication technology has led to an increased focus on the security of image storage and transmission in multimedia information. This paper proposes an enhanced image security communication scheme based on Fibonacci interleaved diffusion and non-degenerate chaotic system to [...] Read more.
The rapid development of network communication technology has led to an increased focus on the security of image storage and transmission in multimedia information. This paper proposes an enhanced image security communication scheme based on Fibonacci interleaved diffusion and non-degenerate chaotic system to address the inadequacy of current image encryption technology. The scheme utilizes a hash function to extract the hash characteristic values of the plaintext image, generating initial perturbation keys to drive the chaotic system to generate initial pseudo-random sequences. Subsequently, the input image is subjected to a light scrambling process at the bit level. The Q matrix generated by the Fibonacci sequence is then employed to diffuse the obtained intermediate cipher image. The final ciphertext image is then generated by random direction confusion. Throughout the encryption process, plaintext correlation mechanisms are employed. Consequently, due to the feedback loop of the plaintext, this algorithm is capable of resisting known-plaintext attacks and chosen-plaintext attacks. Theoretical analysis and empirical results demonstrate that the algorithm fulfils the cryptographic requirements of confusion, diffusion, and avalanche effects, while also exhibiting a robust password space and excellent numerical statistical properties. Consequently, the security enhancement mechanism based on Fibonacci interleaved diffusion and non-degenerate chaotic system proposed in this paper effectively enhances the algorithm’s resistance to cryptographic attacks. Full article
Show Figures

Figure 1

21 pages, 4949 KiB  
Article
An Integrated Lightweight Neural Network Design and FPGA-Accelerated Edge Computing for Chili Pepper Variety and Origin Identification via an E-Nose
by Ziyu Guo, Yong Yin, Haolin Gu, Guihua Peng, Xueya Wang, Ju Chen and Jia Yan
Foods 2025, 14(15), 2612; https://doi.org/10.3390/foods14152612 - 25 Jul 2025
Viewed by 230
Abstract
A chili pepper variety and origin detection system that integrates a field-programmable gate array (FPGA) with an electronic nose (e-nose) is proposed in this paper to address the issues of variety confusion and origin ambiguity in the chili pepper market. The system uses [...] Read more.
A chili pepper variety and origin detection system that integrates a field-programmable gate array (FPGA) with an electronic nose (e-nose) is proposed in this paper to address the issues of variety confusion and origin ambiguity in the chili pepper market. The system uses the AIRSENSE PEN3 e-nose from Germany to collect gas data from thirteen different varieties of chili peppers and two specific varieties of chili peppers originating from seven different regions. Model training is conducted via the proposed lightweight convolutional neural network ChiliPCNN. By combining the strengths of a convolutional neural network (CNN) and a multilayer perceptron (MLP), the ChiliPCNN model achieves an efficient and accurate classification process, requiring only 268 parameters for chili pepper variety identification and 244 parameters for origin tracing, with 364 floating-point operations (FLOPs) and 340 FLOPs, respectively. The experimental results demonstrate that, compared with other advanced deep learning methods, the ChiliPCNN has superior classification performance and good stability. Specifically, ChiliPCNN achieves accuracy rates of 94.62% in chili pepper variety identification and 93.41% in origin tracing tasks involving Jiaoyang No. 6, with accuracy rates reaching as high as 99.07% for Xianjiao No. 301. These results fully validate the effectiveness of the model. To further increase the detection speed of the ChiliPCNN, its acceleration circuit is designed on the Xilinx Zynq7020 FPGA from the United States and optimized via fixed-point arithmetic and loop unrolling strategies. The optimized circuit reduces the latency to 5600 ns and consumes only 1.755 W of power, significantly improving the resource utilization rate and processing speed of the model. This system not only achieves rapid and accurate chili pepper variety and origin detection but also provides an efficient and reliable intelligent agricultural management solution, which is highly important for promoting the development of agricultural automation and intelligence. Full article
Show Figures

Figure 1

35 pages, 5195 KiB  
Article
A Multimodal AI Framework for Automated Multiclass Lung Disease Diagnosis from Respiratory Sounds with Simulated Biomarker Fusion and Personalized Medication Recommendation
by Abdullah, Zulaikha Fatima, Jawad Abdullah, José Luis Oropeza Rodríguez and Grigori Sidorov
Int. J. Mol. Sci. 2025, 26(15), 7135; https://doi.org/10.3390/ijms26157135 - 24 Jul 2025
Viewed by 371
Abstract
Respiratory diseases represent a persistent global health challenge, underscoring the need for intelligent, accurate, and personalized diagnostic and therapeutic systems. Existing methods frequently suffer from limitations in diagnostic precision, lack of individualized treatment, and constrained adaptability to complex clinical scenarios. To address these [...] Read more.
Respiratory diseases represent a persistent global health challenge, underscoring the need for intelligent, accurate, and personalized diagnostic and therapeutic systems. Existing methods frequently suffer from limitations in diagnostic precision, lack of individualized treatment, and constrained adaptability to complex clinical scenarios. To address these challenges, our study introduces a modular AI-powered framework that integrates an audio-based disease classification model with simulated molecular biomarker profiles to evaluate the feasibility of future multimodal diagnostic extensions, alongside a synthetic-data-driven prescription recommendation engine. The disease classification model analyzes respiratory sound recordings and accurately distinguishes among eight clinical classes: bronchiectasis, pneumonia, upper respiratory tract infection (URTI), lower respiratory tract infection (LRTI), asthma, chronic obstructive pulmonary disease (COPD), bronchiolitis, and healthy respiratory state. The proposed model achieved a classification accuracy of 99.99% on a holdout test set, including 94.2% accuracy on pediatric samples. In parallel, the prescription module provides individualized treatment recommendations comprising drug, dosage, and frequency trained on a carefully constructed synthetic dataset designed to emulate real-world prescribing logic.The model achieved over 99% accuracy in medication prediction tasks, outperforming baseline models such as those discussed in research. Minimal misclassification in the confusion matrix and strong clinician agreement on 200 prescriptions (Cohen’s κ = 0.91 [0.87–0.94] for drug selection, 0.78 [0.74–0.81] for dosage, 0.96 [0.93–0.98] for frequency) further affirm the system’s reliability. Adjusted clinician disagreement rates were 2.7% (drug), 6.4% (dosage), and 1.5% (frequency). SHAP analysis identified age and smoking as key predictors, enhancing model explainability. Dosage accuracy was 91.3%, and most disagreements occurred in renal-impaired and pediatric cases. However, our study is presented strictly as a proof-of-concept. The use of synthetic data and the absence of access to real patient records constitute key limitations. A trialed clinical deployment was conducted under a controlled environment with a positive rate of satisfaction from experts and users, but the proposed system must undergo extensive validation with de-identified electronic medical records (EMRs) and regulatory scrutiny before it can be considered for practical application. Nonetheless, the findings offer a promising foundation for the future development of clinically viable AI-assisted respiratory care tools. Full article
Show Figures

Figure 1

Back to TopTop