Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (580)

Search Parameters:
Keywords = distance-based paper device

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
18 pages, 5057 KB  
Article
Two-Dimensional Digital Electromagnetic Micro-Conveyance Device
by Célien Bergeron, Gabriel Géron, Laurent Petit, Erwan Dupont, Nicolas Piton and Christine Prelle
Actuators 2026, 15(2), 75; https://doi.org/10.3390/act15020075 - 26 Jan 2026
Viewed by 147
Abstract
This paper presents a 2D micro-conveyance device based on a 3 × 3 electromagnetic digital actuator array. This device allows the conveyed object to be moved between several discrete positions distributed in the xy-plane through a collaborative actuation of the digital actuators. Each [...] Read more.
This paper presents a 2D micro-conveyance device based on a 3 × 3 electromagnetic digital actuator array. This device allows the conveyed object to be moved between several discrete positions distributed in the xy-plane through a collaborative actuation of the digital actuators. Each digital actuator includes a mobile permanent magnet placed in a square cavity and can be moved between four discrete positions. An analytical model of the digital actuators was proposed and used to design the conveyance device. Then, a prototype was built using rapid prototyping techniques and was experimentally characterized. The reachable workspace of the conveyance device is 56 mm × 56 mm in the xy-plane, and the proposed architecture enables the workspace to be easily enlarged by adding elementary modules. The distance between two discrete positions is 4 mm, and the positioning repeatability was measured as 5.5 µm. The maximum conveyance velocity and transportable mass were found to be up to 16 mm.s−1 and 15 g, respectively. Full article
Show Figures

Figure 1

17 pages, 1244 KB  
Article
The Research on the Handwriting Stability in Different Devices and Conditions
by Hsiang-Ju Lai, Long-Huang Tsai, Kung-Yang Hsu and Wen-Chao Yang
Sensors 2026, 26(2), 538; https://doi.org/10.3390/s26020538 - 13 Jan 2026
Viewed by 281
Abstract
With the rapid advancement of technology in recent years, signatures on contracts and documents have increasingly shifted from traditional handwritten forms on paper to digital handwritten signatures executed on devices (hereafter referred to as digital tablets). This transition introduces new challenges for forensic [...] Read more.
With the rapid advancement of technology in recent years, signatures on contracts and documents have increasingly shifted from traditional handwritten forms on paper to digital handwritten signatures executed on devices (hereafter referred to as digital tablets). This transition introduces new challenges for forensic document examination due to the differences in writing instruments. According to the European Network of Forensic Science Institutes (ENFSI), a Digital Capture Signature (DCS) refers to data points captured during the writing process on digital devices such as tablets, smartphones, or signature pads. In addition to retaining the visual image of the signature, DCS provides more information previously unavailable, including pen pressure, stroke order, and writing speed. These features possess potential forensic value and warrant further study and evaluation. This study employs three devices—Samsung Galaxy Tab S10, Apple iPad Pro, and Apple iPad Mini—together with their respective styluses as experimental tools. Using custom-developed handwriting capture software for both Android and iOS platforms, we simulated signature-writing scenarios common in the financial and insurance industries. Thirty participants were asked to provide samples of horizontal Chinese, English, and number writings (FUJ-IRB NO: C113187), which were subsequently normalized and segmented into characters. For analysis, we adopted distance-based time-series alignment algorithms (FastDTW and SC-DTW) to match writing data across different instances (intra- and inter-writer). The accumulated distances between corresponding data points, such as coordinates and pressure, were used to assess handwriting stability and to study the differences between same-writer and different-writer samples. The findings indicate that preprocessing through character centroid alignment, followed by the analysis, substantially reduces the average accumulated distance of handwriting. This procedure quantifies the stability of an individual’s handwriting and enables differentiation between same-writer and different-writer scenarios based on the distribution of DCS distances. Furthermore, the use of styluses provides more precise distinctions between same- and different-writer samples compared with direct finger-based writing. In the context of rapid advancements in artificial intelligence and emerging technologies, this preliminary study aims to contribute foundational insights into the forensic application of digital signature examination. Full article
(This article belongs to the Special Issue Digital Image Processing and Sensing Technologies—Second Edition)
Show Figures

Figure 1

21 pages, 65310 KB  
Article
The Effect of Electromagnetic Pulse Attacks on USB Camera Performance
by Gang Wei, Lei Shu, Wei Lin, Xing Yang, Ru Han, Kailiang Li and Kai Huang
J. Sens. Actuator Netw. 2026, 15(1), 4; https://doi.org/10.3390/jsan15010004 - 29 Dec 2025
Viewed by 697
Abstract
The camera is a core device for modern surveillance and data collection, widely used in various fields including security, transportation, and healthcare. However, their widespread deployment has proportionally escalated associated security risks. This paper initially examines the current state of research on attack [...] Read more.
The camera is a core device for modern surveillance and data collection, widely used in various fields including security, transportation, and healthcare. However, their widespread deployment has proportionally escalated associated security risks. This paper initially examines the current state of research on attack methods targeting camera systems, providing a comprehensive review of various attack techniques and their security implications. Subsequently, we focus on a specific attack method against universal serial bus (USB) cameras, known as electromagnetic pulse (EMP) attacks, which utilize EMP to prevent the system from detecting the cameras. We simulated EMP attacks using a solar insecticidal lamp (which generates EMP by releasing high-voltage pulses) and a commercially available EMP generator. The performance of the cameras under various conditions was evaluated by adjusting the number of filtering magnetic rings on the USB cable and the distance between the camera and the interference source. The results demonstrate that some USB cameras are vulnerable to EMP attacks. Although EMP attacks might not invariably cause image distortion or permanent damage, their covert nature can lead to false detection of system failures, data security, and system maintenance. Based on these findings, it is recommended to determine the optimal number of shielding rings for cameras or their safe distance from EMP sources through the experimental approach outlined in this study, thereby enhancing the security and resilience of USB camera enabled systems in specific scenarios. Full article
Show Figures

Figure 1

22 pages, 2232 KB  
Article
A Dynamic Offloading Strategy Based on Optimal Stopping Theory in Vehicle-to-Vehicle Communication Scenarios
by An Li, Jiaxuan Ling, Yeqiang Zheng, Mingliang Chen and Gaocai Wang
Future Internet 2026, 18(1), 18; https://doi.org/10.3390/fi18010018 - 28 Dec 2025
Viewed by 224
Abstract
Faced with the access of a large number of devices, and for mobile vehicles with high speeds, some situations may be far from the communication range of the current edge node, resulting in a significant increase in communication latency and energy consumption. To [...] Read more.
Faced with the access of a large number of devices, and for mobile vehicles with high speeds, some situations may be far from the communication range of the current edge node, resulting in a significant increase in communication latency and energy consumption. To ensure the effectiveness of task execution for mobile vehicles under high-speed conditions, this paper regards intelligent vehicles as edge nodes and establishes a dynamic offloading model in Vehicle-to-Vehicle (V2V) scenarios. A dynamic task offloading strategy based on optimal stopping theory is proposed to minimize the overall latency generated during the offloading process while ensuring the effectiveness of task execution. By analyzing the potential migration paths of tasks in V2V scenarios, we construct a dynamic migration model and design a migration benefit function, transforming the problem into an asset-selling problem in optimal stopping theory (OST). At the same time, it is proven that there exists an optimal stopping rule for the problem. Finally, the optimal migration threshold is determined by solving the optimal stopping rule through dynamic programming, guiding the task vehicle to choose the best target service vehicle. Comparisons between the proposed TMS-OST strategy and three other peer offloading strategies show that TMS-OST can significantly reduce the total offloading latency, select service vehicles with shorter distances using fewer detection attempts, guarantee service quality while lowering detection costs, and achieve high average offloading efficiency and average offloading distance efficiency. Full article
Show Figures

Figure 1

30 pages, 9834 KB  
Article
Wind–Storage Coordinated Control Strategy for Suppressing Repeated Voltage Ride-Through of Units Under Extreme Weather Conditions
by Yunpeng Wang, Ke Shang, Zhen Xu, Chen Hu, Benzhi Gao and Jianhui Meng
Energies 2026, 19(1), 65; https://doi.org/10.3390/en19010065 - 22 Dec 2025
Viewed by 394
Abstract
In practical engineering, large-scale wind power integration typically requires long-distance transmission lines to deliver power to load centers. The resulting weak sending-end systems lack support from synchronous power sources. Under extreme weather conditions, the rapid increase in active power output caused by high [...] Read more.
In practical engineering, large-scale wind power integration typically requires long-distance transmission lines to deliver power to load centers. The resulting weak sending-end systems lack support from synchronous power sources. Under extreme weather conditions, the rapid increase in active power output caused by high wind power generation may lead to voltage instability. In existing projects, a phenomenon of repeated voltage fluctuations has been observed under fault-free system conditions. This phenomenon is induced by the coupling of the characteristics of weak sending-end systems and low-voltage ride-through (LVRT) discrimination mechanisms, posing a serious threat to the safe and stable operation of power grids. However, most existing studies focus on the analysis of voltage instability mechanisms and the optimization of control strategies for single devices, with insufficient consideration given to voltage fluctuation suppression methods under the coordinated operation of wind power and energy storage systems. Based on the actual scenario of energy storage configuration in wind farms, this paper improves the traditional LVRT discrimination mechanism and develops a coordinated voltage ride-through control strategy for permanent magnet synchronous generator (PMSG) wind turbines and energy storage batteries. It can effectively cope with unconventional operating conditions, such as repeated voltage ride-through and deep voltage ride-through that may occur under extreme meteorological conditions, and improve the safe and stable operation capability of wind farms. Using a hardware-in-the-loop (HIL) test platform, the coordinated voltage ride-through control strategy is verified. The test results indicate that it effectively enhances the wind–storage system’s voltage ride-through reliability and suppresses repeated voltage fluctuations. Full article
(This article belongs to the Special Issue Control Technologies for Wind and Photovoltaic Power Generation)
Show Figures

Figure 1

17 pages, 5847 KB  
Article
A Dynamic Compensation Method Based on Pulse Width for Laser Ranging and Distance Determination in Precision-Guided Aircraft
by Jinghao Li, Zhipeng Li, Yuheng He, Kuizheng Li and Hejuan Chen
Micromachines 2025, 16(12), 1409; https://doi.org/10.3390/mi16121409 - 15 Dec 2025
Viewed by 921
Abstract
This paper proposes a dynamic compensation method for laser ranging based on pulse width for the miniaturization and high-precision requirements of the initiation device in precision-guided aircraft. The study aims to improve the measurement accuracy of the laser ranging unit in the initiation [...] Read more.
This paper proposes a dynamic compensation method for laser ranging based on pulse width for the miniaturization and high-precision requirements of the initiation device in precision-guided aircraft. The study aims to improve the measurement accuracy of the laser ranging unit in the initiation device system and ensure the accuracy and reliability of its fixed-distance initiation decision. The variation in echo pulse width is analyzed by studying laser echo characteristics. The pulse width and the detection distance exhibit an approximately linear negative correlation within the middle range of the applicable distance range. A dynamic compensation method is proposed based on a dual-correction approach using a static lookup table and dynamic compensation. This method establishes the mapping relationship between pulse width and distance deviation, and achieves distance correction by adding distance deviation compensation to the basic value from the static lookup table. The dynamic compensation system integrated with calibration and correction is designed and implemented, and the feasibility of the dynamic compensation method is verified by testing. The relative error between the calculated correction distance and the actual distance is small, and the average relative error is about 1.33%. The proposed method provides key technical support for the establishment of miniaturized and intelligent initiation devices. Full article
(This article belongs to the Special Issue Micro/Nano Optical Devices and Sensing Technology)
Show Figures

Figure 1

18 pages, 968 KB  
Article
UAV-Assisted Cooperative Charging and Data Collection Strategy for Heterogeneous Wireless Sensor Networks
by Yuanxue Xin, Liang Li, Yue Ning, Yi Yang and Pengfei Shi
Drones 2025, 9(12), 859; https://doi.org/10.3390/drones9120859 - 13 Dec 2025
Viewed by 449
Abstract
Unmanned Aerial Vehicles (UAVs) are playing an increasingly crucial role in large-scale Wireless Sensor Networks (WSNs) due to their high mobility and flexible deployment capabilities. To enhance network sustainability and profitability, this paper proposes a coordinated charging and data-collection system that integrates a [...] Read more.
Unmanned Aerial Vehicles (UAVs) are playing an increasingly crucial role in large-scale Wireless Sensor Networks (WSNs) due to their high mobility and flexible deployment capabilities. To enhance network sustainability and profitability, this paper proposes a coordinated charging and data-collection system that integrates a green energy base station, Wireless Charging Vehicles (WCVs), and UAVs, ensuring full coverage of all sensor nodes in the target region. On the other hand, the economic feasibility of charging strategies is an essential factor, which is usually neglected. Thus, we further design a joint optimization algorithm to simultaneously maximize system profit and node survivability. To this end, we design a cylindrical-sector-based charging sequence for WCVs. In particular, we develop a dynamic cluster head selection algorithm that accounts for buffer size, residual energy, and inter-node distance. This scheme prevents cluster-head running out of energy before the charging devices arrive, thereby ensuring reliable data transmission. Simulation results demonstrate that the proposed strategy not only maximizes overall profit but also significantly improves node survivability and enhances the sustainability of the wireless sensor network. Full article
(This article belongs to the Section Drone Communications)
Show Figures

Figure 1

26 pages, 1470 KB  
Article
A Lightweight Privacy-Enhanced Federated Clustering Algorithm for Edge Computing
by Jun Wang, Xianghua Chen, Xing Cheng, Jiantong Zhang, Tao Yu and Kewei Qian
Sensors 2025, 25(24), 7544; https://doi.org/10.3390/s25247544 - 11 Dec 2025
Viewed by 479
Abstract
In edge computing scenarios, the data generated by distributed devices is characterized by its dispersion, heterogeneity, and privacy sensitivity, posing significant challenges to federated clustering, including high communication overhead, difficulty in adapting to non-IID data, and significant privacy leakage risks. To address these [...] Read more.
In edge computing scenarios, the data generated by distributed devices is characterized by its dispersion, heterogeneity, and privacy sensitivity, posing significant challenges to federated clustering, including high communication overhead, difficulty in adapting to non-IID data, and significant privacy leakage risks. To address these issues, this paper proposes a privacy-enhanced federated k-means clustering algorithm based on locality-sensitive hashing, aiming to mine latent knowledge from multi-source distributed data while ensuring data privacy protection. The core innovation of this algorithm lies in leveraging the distance sensitivity of clustering pairs, which effectively mitigates the non-IID problem while preserving data privacy and achieves global clustering in just a single communication round, significantly enhancing its practicality in communication-constrained environments. Specifically, the algorithm first evaluates local data dispersion at the client side, dynamically generates cluster cardinality based on dispersion, and obtains initial clustering centers through the k-means algorithm. Subsequently, it employs locality-sensitive hashing to encrypt the center points, uploading only the encrypted clustering information and weight data to the server, thereby achieving privacy protection without relying on a trusted server. On the server side, a secondary weighted k-means clustering is performed in the encrypted space to generate hashed global centers. Experimental results on the MNIST and CIFAR-10 datasets demonstrate that this method maintains robust clustering performance under non-IID data distributions. Most crucially, through a strict single-round client-to-server communication protocol, this approach significantly reduces communication overhead, providing a distributed data mining solution that is efficient, adaptable, and privacy-preserving for resource-constrained edge computing environments. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

27 pages, 4380 KB  
Article
Adaptive Working Condition-Based Fault Location Method for Low-Voltage Distribution Grids Using Progressive Transfer Learning and Time-Frequency Analysis
by Fengqian Xu, Zhenyu Wu, Yong Zheng, Jianfeng Zheng, Zhiming Qiao, Lun Xu, Dongli Xu and Haitao Liu
Processes 2025, 13(12), 3873; https://doi.org/10.3390/pr13123873 - 1 Dec 2025
Viewed by 442
Abstract
Data-driven fault location methods based on deep learning offer strong feature learning and nonlinear mapping capabilities; however, in low-voltage distribution grids (LVDG) the scarcity of high-rate sampling devices and the variability introduced by distributed renewable generation lead to data insufficiency and data imbalance, [...] Read more.
Data-driven fault location methods based on deep learning offer strong feature learning and nonlinear mapping capabilities; however, in low-voltage distribution grids (LVDG) the scarcity of high-rate sampling devices and the variability introduced by distributed renewable generation lead to data insufficiency and data imbalance, which reduce the accuracy of deep-learning-based fault location. To address this, this paper proposes an adaptive working condition-based fault location method that integrates S-transform-enhanced feature extraction with progressive transfer learning. The method clusters working conditions using k-means on a 21-dimensional indicator set covering load, photovoltaic, and voltage. For each condition, a CNN is trained on the corresponding data, and the S-transform extracts distinctive time-frequency signatures from limited measurements to separate fault points at similar distances from the feeder head. Then, progressive transfer learning with Euclidean distance-based domain adaptation migrates effective parameters from data-rich conditions to data-scarce ones through fine-tuning and medium-tuning, thereby addressing the degradation of fault-location accuracy in scenarios with limited data. Experimental validation on a 400 V LVDG demonstrates superior performance, achieving 99.80% fault location accuracy and 99.72% fault type classification. The S-transform enhancement improves fault location by 6.63%, while transfer learning maintains 96% accuracy in edge conditions using only 200 samples. Full article
Show Figures

Figure 1

28 pages, 6452 KB  
Article
On Voltage Regulation Technology for Long-Distance Power Supply in Underground Coal Mines Based on On-Load Voltage Regulation
by Wenjun Fu, Ying Xu, Tianji Lv and Liang Zhang
Processes 2025, 13(12), 3808; https://doi.org/10.3390/pr13123808 - 25 Nov 2025
Viewed by 425
Abstract
With the rapid growth in coal demands driven by economic development, the applications scenarios of long-distance, high-power mining operations in underground coal mines has gradually been expanded. Taking voltage regulation technology for long-distance power supply in underground coal mines as the research object, [...] Read more.
With the rapid growth in coal demands driven by economic development, the applications scenarios of long-distance, high-power mining operations in underground coal mines has gradually been expanded. Taking voltage regulation technology for long-distance power supply in underground coal mines as the research object, this paper analyzed the mechanisms behind voltage fluctuation hazards and the status quo of existing voltage regulation technologies in coal mines and put forward a voltage regulation technology for long-distance power supply in tunneling faces of coal mines based on on-load voltage regulation. On this basis, a voltage regulation device for long-distance power supply in underground coal mines was designed and applied to the long-distance power supply system of Wanli Coal Mine’s tunneling faces. All indicators met the design requirements, validating the effectiveness of the device and the applicability of the research outcomes, and providing an effective solution for addressing voltage fluctuations in the long-distance power supply of underground coal mines. Full article
Show Figures

Figure 1

22 pages, 16519 KB  
Article
A Flat Peach Bagged Fruits Recognition Approach Based on an Improved YOLOv8n Convolutional Neural Network
by Chen Wang, Xiuru Guo, Chunyue Ma, Guangdi Xu, Yuqi Liu, Xiaochen Cui, Ruimin Wang, Rui Wang, Limo Yang, Xiangzheng Sun, Xuchao Guo, Bo Sun and Zhijun Wang
Horticulturae 2025, 11(11), 1394; https://doi.org/10.3390/horticulturae11111394 - 19 Nov 2025
Viewed by 552
Abstract
An accurate and effective peach recognition algorithm is a key part of automated picking in orchards; however, the current peach recognition algorithms are mainly targeted at bare fruit scenarios and face challenges in recognizing flat peach bagged fruits, based on which this paper [...] Read more.
An accurate and effective peach recognition algorithm is a key part of automated picking in orchards; however, the current peach recognition algorithms are mainly targeted at bare fruit scenarios and face challenges in recognizing flat peach bagged fruits, based on which this paper proposes a model for recognizing and detecting flat peach fruits in complex orchard environments after bagging, namely, YOLOv8n-CDDSh. First, to effectively deal with the problem of the insufficient detection capability of small targets in orchard environments, the dilation-wise residual (DWR) module is introduced to enhance the model’s understanding of semantic information about small target defects. Second, in order to improve the detection ability in complex occlusion scenarios, inspired by the idea of large kernel convolution and cavity convolution in the Dilated Reparam Block (DRB) module, the C2f-DWR-DRB architecture is built to improve the detection ability in occluded target regions. Thirdly, in order to improve the sensitivity and precision of aspect ratio optimization, and to better adapt to the detection scenarios of targets with large differences in shapes, the ShapeIoU loss function is used to improve the fruit localization precision. Finally, we validate the effectiveness of the proposed method through experiments conducted on a self-constructed dataset comprising 1089 samples. The results show that the YOLOv8n-CDDSh model achieves 92.1% precision (P), 91.7% Mean Average Precision (mAP), and a model size of 5.73 MB, with improvements of +1.5 pp (Precision) and +0.5 pp (mAP) over YOLOv8n, respectively. In addition, the detection performance is excellent in actual orchard environments with different light angles, shading conditions, and shooting distances. Meanwhile, YOLOv8n-CDDSh deployed on the edge computing device achieved precision = 87.04%, mAP = 91.71%, and FPS = 37.20, and can also maintain high precision in bagged fruit recognition under extreme weather simulations such as fog and rainstorms, providing theoretical and methodological support for the automated picking of bagged peaches. Full article
(This article belongs to the Section Fruit Production Systems)
Show Figures

Figure 1

17 pages, 18084 KB  
Article
A Multipurpose and Efficient Evaluation Method of Phase Characteristics in a Quiet Zone for a Defocused Feed in a Compact Antenna Test Range
by Yongquan Jiang, Meijun Qu, Hongcheng Yin, Chongjiang Mo and Ziwei Liu
Electronics 2025, 14(22), 4389; https://doi.org/10.3390/electronics14224389 - 10 Nov 2025
Viewed by 378
Abstract
A compact antenna test range (CATR) is an important testing facility for assessing electromagnetic characteristics of various wireless devices, in which the degradation of phase performance in a quiet zone due to feed defocusing severely affects the assessment results, especially for a higher [...] Read more.
A compact antenna test range (CATR) is an important testing facility for assessing electromagnetic characteristics of various wireless devices, in which the degradation of phase performance in a quiet zone due to feed defocusing severely affects the assessment results, especially for a higher frequency and longer defocusing distance. Based on the theory of geometric optics (GO), this paper precisely derives analytical formulas of phase characteristics in a quiet zone for a defocused feed in a commonly used CATR, such as that underpinned by single paraboloid and dual parabolic cylinders. The proposed evaluation method is of high accuracy and efficiency for higher frequencies and can be used in various scenarios with excellent results. The discrepancy between the formula calculation results and software simulation results of the machining accuracy tolerance for feeds and their turntable remains below 1°, demonstrating much better performance than the state of the art. Meanwhile, the deviation of the formula calculation results from the preset position of the feed stays within 1 mm, effectively supporting the confirmation of the feed position for equivalent pitch tests. Full article
(This article belongs to the Special Issue AI-Driven IoT: Beyond Connectivity, Toward Intelligence)
Show Figures

Figure 1

19 pages, 11860 KB  
Article
Indoor Object Measurement Through a Redundancy and Comparison Method
by Pedro Faria, Tomás Simões, Tiago Marques and Peter D. Finn
Sensors 2025, 25(21), 6744; https://doi.org/10.3390/s25216744 - 4 Nov 2025
Viewed by 703
Abstract
Accurate object detection and measurement within indoor environments—particularly unfurnished or minimalistic spaces—pose unique challenges for conventional computer vision methods. Previous research has been limited to small objects that can be fully detected by applications such as YOLO, or to outdoor environments where reference [...] Read more.
Accurate object detection and measurement within indoor environments—particularly unfurnished or minimalistic spaces—pose unique challenges for conventional computer vision methods. Previous research has been limited to small objects that can be fully detected by applications such as YOLO, or to outdoor environments where reference elements are more abundant. However, in indoor scenarios with limited detectable references—such as walls that exceed the camera’s field of view—current models exhibit difficulties in producing complete detections and accurate distance estimates. This paper introduces a geometry-driven, redundancy-based framework that leverages proportional laws and architectural heuristics to enhance the measurement accuracy of walls and spatial divisions using standard smartphone cameras. The model was trained on 204 labeled indoor images over 25 training iterations (500 epochs) with augmentation, achieving a mean average precision (mAP@50) of 0.995, precision of 0.995, and recall of 0.992, confirming convergence and generalisation. Applying the redundancy correction method reduced distance deviation errors to approximately 10%, corresponding to a mean absolute error below 2% in the use case. Unlike depth-sensing systems, the proposed solution requires no specialised hardware and operates fully on 2D visual input, allowing on-device and offline use. The framework provides a scalable, low-cost alternative for accurate spatial measurement and demonstrates the feasibility of camera-based geometry correction in real-world indoor settings. Future developments may integrate the proposed redundancy correction with emerging multimodal models such as SpatialLM to extend precision toward full-room spatial reasoning in applications including construction, real estate evaluation, energy auditing, and seismic assessment. Full article
Show Figures

Figure 1

33 pages, 4531 KB  
Article
Enhancing Multi-Factor Authentication with Templateless 2D/3D Biometrics and PUF Integration for Securing Smart Devices
by Saloni Jain, Amisha Bagri, Maxime Cambou, Dina Ghanai Miandoab and Bertrand Cambou
Cryptography 2025, 9(4), 68; https://doi.org/10.3390/cryptography9040068 - 27 Oct 2025
Viewed by 1205
Abstract
Secure authentication in smart device ecosystems remains a critical challenge, particularly due to the irrevocability of compromised biometric templates in server-based systems. This paper presents a post-quantum secure multi-factor authentication protocol that combines templateless 2D and 3D facial biometrics, liveness detection, and Physical [...] Read more.
Secure authentication in smart device ecosystems remains a critical challenge, particularly due to the irrevocability of compromised biometric templates in server-based systems. This paper presents a post-quantum secure multi-factor authentication protocol that combines templateless 2D and 3D facial biometrics, liveness detection, and Physical Unclonable Functions (PUFs) to achieve robust identity assurance. The protocol exhibits zero-knowledge properties, preventing adversaries from identifying whether authentication failure is due to the biometric, password, PUF, or liveness factor. The proposed protocol utilizes advanced facial landmark detection via dlib or mediapipe, capturing multi-angle facial data and mapping it. By applying a double-masking technique and measuring distances between randomized points, stabilized facial landmarks are selected through multiple images captured during enrollment to ensure template stability. The protocol creates high-entropy cryptographic keys, securely erasing all raw biometric data and sensitive keys immediately after processing. All key cryptographic operations and challenge-response exchanges employ post-quantum algorithms, providing resistance to both classical and quantum adversaries. To further enhance reliability, advanced error-correction methods mitigate noise in biometric and PUF responses, resulting in minimal FAR and FRR that meets industrial standards and resilience against spoofing. Our experimental results demonstrate this protocol’s suitability for smart devices and IoT deployments requiring high-assurance, scalable, and quantum-resistant authentication. Full article
(This article belongs to the Topic Recent Advances in Security, Privacy, and Trust)
Show Figures

Figure 1

15 pages, 2169 KB  
Article
Simulation of the Influence of DC Electric Field Generators with Space Charges on Electric Field Calibration
by Wei Song, Manling Dong, Xiaokuo Kou, Jiatao Zhang, Chaofeng Zhang, Weifeng Xin, Zeyan Shi and Yanzhao Wang
Energies 2025, 18(21), 5633; https://doi.org/10.3390/en18215633 - 27 Oct 2025
Viewed by 412
Abstract
To improve the measurement accuracy of direct current (DC) electric field measurement devices in ion flow fields, it is necessary to consider the impact of space charges on the calibration of DC electric field measurements. In this paper, a simulation model of a [...] Read more.
To improve the measurement accuracy of direct current (DC) electric field measurement devices in ion flow fields, it is necessary to consider the impact of space charges on the calibration of DC electric field measurements. In this paper, a simulation model of a DC electric field generation apparatus involving space charges is established based on the dilute material transfer principle, and the influence of the applied voltage and gap distance of the apparatus on the calibration results of the DC electric field measurement device is analyzed. Limitations on the electric field calibration of the generation apparatus in the presence of high electric intensities are identified and discussed. The electric field intensity relative error at different gap distances increases as the electric field intensity increases, and an optimal calibration electric field level and an optimal calibration position are identified, both of which increase with an increase in the gap distance. Full article
(This article belongs to the Section F6: High Voltage)
Show Figures

Figure 1

Back to TopTop