Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,301)

Search Parameters:
Keywords = distribution network extension

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
23 pages, 3840 KB  
Article
An Optical Water Type-Based Deep Learning Framework for Enhanced Turbidity Estimation in Inland Waters from Sentinel-2 Imagery
by Yue Ma, Qiuyue Chen, Kaishan Song, Qian Yang, Qiang Zheng and Yongchao Ma
Sensors 2025, 25(20), 6483; https://doi.org/10.3390/s25206483 - 20 Oct 2025
Abstract
Turbidity is a crucial and reliable indicator that is extensively utilized in water quality monitoring through remote sensing technology. The development of accurate and applicable models for turbidity estimation is essential. While many existing studies rely on uniform models based on statistical regression [...] Read more.
Turbidity is a crucial and reliable indicator that is extensively utilized in water quality monitoring through remote sensing technology. The development of accurate and applicable models for turbidity estimation is essential. While many existing studies rely on uniform models based on statistical regression or traditional machine learning techniques, the application of deep learning models for turbidity estimation remains limited. This study proposed deep learning models for turbidity estimation based on optical classification of inland waters using Sentinel-2 data. Specifically, the fuzzy c-means (FCM) clustering method was employed to classify optical water types (OWTs) based on their spectral reflectance characteristics. A weighted sum of the turbidity prediction results was generated by the OWT-based convolutional neural network-random forest (CNN-RF) model, with weights derived from the FCM membership degrees. Turbidity for four typical waters was mapped by the proposed method using Sentinel-2 images. The FCM method efficiently classified waters into three OWTs. The OWT-based weighted CNN-RF model demonstrated strong robustness and generalization performance, achieving a high prediction accuracy (R2 = 0.900, RMSE = 11.698 NTU). The turbidity maps preserved the spatial continuity of the turbidity distribution and accurately reflected water quality conditions. These findings facilitate the application of deep learning models based on optical classification in turbidity estimation and enhance the capabilities of remote sensing for water quality monitoring. Full article
(This article belongs to the Special Issue Remote Sensing Image Processing, Analysis and Application)
Show Figures

Figure 1

19 pages, 1603 KB  
Article
BiLSTM-LN-SA: A Novel Integrated Model with Self-Attention for Multi-Sensor Fire Detection
by Zhaofeng He, Yu Si, Liyuan Yang, Nuo Xu, Xinglong Zhang, Mingming Wang and Xiaoyun Sun
Sensors 2025, 25(20), 6451; https://doi.org/10.3390/s25206451 - 18 Oct 2025
Viewed by 30
Abstract
Multi-sensor fire detection technology has been widely adopted in practical applications; however, existing methods still suffer from high false alarm rates and inadequate adaptability in complex environments due to their limited capacity to capture deep time-series dependencies in sensor data. To enhance robustness [...] Read more.
Multi-sensor fire detection technology has been widely adopted in practical applications; however, existing methods still suffer from high false alarm rates and inadequate adaptability in complex environments due to their limited capacity to capture deep time-series dependencies in sensor data. To enhance robustness and accuracy, this paper proposes a novel model named BiLSTM-LN-SA, which integrates a Bidirectional Long Short-Term Memory (BiLSTM) network with Layer Normalization (LN) and a Self-Attention (SA) mechanism. The BiLSTM module extracts intricate time-series features and long-term dependencies. The incorporation of Layer Normalization mitigates feature distribution shifts across different environments, thereby improving the model’s adaptability to cross-scenario data and its generalization capability. Simultaneously, the Self-Attention mechanism dynamically recalibrates the importance of features at different time steps, adaptively enhancing fire-critical information and enabling deeper, process-aware feature fusion. Extensive evaluation on a real-world dataset demonstrates the superiority of the BiLSTM-LN-SA model, which achieves a test accuracy of 98.38%, an F1-score of 0.98, and an AUC of 0.99, significantly outperforming existing methods including EIF-LSTM, rTPNN, and MLP. Notably, the model also maintains low false positive and false negative rates of 1.50% and 1.85%, respectively. Ablation studies further elucidate the complementary roles of each component: the self-attention mechanism is pivotal for dynamic feature weighting, while layer normalization is key to stabilizing the learning process. This validated design confirms the model’s strong generalization capability and practical reliability across varied environmental scenarios. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

13 pages, 21347 KB  
Article
Tracing Genetic Divergence and Phylogeographic Patterns of Gekko gecko Linnaeus, 1758 (Squamata: Gekkonidae) Across Southeast Asia Using RAG1 Sequence
by Panida Laotongsan, Warayutt Pilap, Chavanut Jaroenchaiwattanachote, Pattana Pasorn, Jatupon Saijuntha, Wittaya Tawong, Watee Kongbuntad, Komgrit Wongpakam, Khamla Inkhavilay, Mak Sithirith, Chairat Tantrawatpan and Weerachai Saijuntha
Animals 2025, 15(20), 3004; https://doi.org/10.3390/ani15203004 - 16 Oct 2025
Viewed by 296
Abstract
The tokay gecko (Gekko gecko) is a widely distributed lizard species in Southeast Asia, with significant importance in traditional medicine and the pet trade. Previous studies using mitochondrial DNA sequences revealed extensive genetic variation across its range, indicating the presence of [...] Read more.
The tokay gecko (Gekko gecko) is a widely distributed lizard species in Southeast Asia, with significant importance in traditional medicine and the pet trade. Previous studies using mitochondrial DNA sequences revealed extensive genetic variation across its range, indicating the presence of distinct evolutionary lineages. In this study, we assessed the nuclear genetic variation and phylogenetic pattern of G. gecko using the recombination activating gene 1 (RAG1). We analyzed 105 RAG1 sequences from 16 localities across Thailand, Laos, and Cambodia, along with additional sequences from GenBank. Sequence analysis revealed 20 variable sites and 20 haplotypes (TgR1–TgR20). Haplotype network and phylogenetic analyses revealed strong regional structuring and at least three distinct evolutionary lineages (A–C), supported by the species delimitation test (PTP). Both red- and black-spotted morphs were present in different clades, indicating that external coloration does not correspond to genetic differentiation at this locus. Our results support the presence of distinct evolutionary lineages in G. gecko and emphasize the importance of integrative taxonomy for accurate species delimitation. These findings have implications for conservation, sustainable management, and regulation of international trade in this commercially exploited species. Full article
(This article belongs to the Section Herpetology)
Show Figures

Figure 1

25 pages, 12285 KB  
Article
Integrated Geophysical Hydrogeological Characterization of Fault Systems in Sandstone-Hosted Uranium In Situ Leaching: A Case Study of the K1b2 Ore Horizon, Bayin Gobi Basin
by Ke He, Yuan Yuan, Yue Sheng and Hongxing Li
Processes 2025, 13(10), 3313; https://doi.org/10.3390/pr13103313 - 16 Oct 2025
Viewed by 209
Abstract
This study presents an integrated geophysical and hydrogeological characterization of fault systems in the sandstone-hosted uranium deposit within the K1b2 Ore Horizon of the Bayin Gobi Basin. Employing 3D seismic exploration with 64-fold coverage and advanced attribute analysis techniques (including [...] Read more.
This study presents an integrated geophysical and hydrogeological characterization of fault systems in the sandstone-hosted uranium deposit within the K1b2 Ore Horizon of the Bayin Gobi Basin. Employing 3D seismic exploration with 64-fold coverage and advanced attribute analysis techniques (including coherence volumes, ant-tracking algorithms, and LOW_FRQ spectral attenuation), the research identified 18 normal faults with vertical displacements up to 21 m, demonstrating a predominant NE-oriented structural pattern consistent with regional tectonic features. The fracture network analysis reveals anisotropic permeability distributions (31.6:1–41.4:1 ratios) with microfracture densities reaching 3.2 fractures/km2 in the central and northwestern sectors, significantly influencing lixiviant flow paths as validated by tracer tests showing 22° NE flow deviations. Hydrogeological assessments indicate that fault zones such as F11 exhibit 3.1 times higher transmissivity (5.3 m2/d) compared to non-fault areas, directly impacting in situ leaching (ISL) efficiency through preferential fluid pathways. The study establishes a technical framework for fracture system monitoring and hydraulic performance evaluation, addressing critical challenges in ISL operations, including undetected fault extensions that caused lixiviant leakage incidents in field cases. These findings provide essential geological foundations for optimizing well placement and leaching zone design in structurally complex sandstone-hosted uranium deposits. The methodology combines seismic attribute analysis with hydrogeological validation, demonstrating how fault systems control fluid flow dynamics in ISL operations. The results highlight the importance of integrated geophysical approaches for accurate structural characterization and operational risk mitigation in uranium mining. Full article
Show Figures

Figure 1

24 pages, 2291 KB  
Article
Achieving Computational Symmetry: A Novel Workflow Task Scheduling and Resource Allocation Method for D2D Cooperation
by Xianzhi Cao, Chang Lv, Jiali Li and Jian Wang
Symmetry 2025, 17(10), 1746; https://doi.org/10.3390/sym17101746 - 16 Oct 2025
Viewed by 218
Abstract
With the rapid advancement of mobile edge computing and Internet of Things (IoT) technologies, device-to-device (D2D) cooperative computing has garnered significant attention due to its low latency and high resource utilization efficiency. However, workflow task scheduling in D2D networks poses considerable challenges, such [...] Read more.
With the rapid advancement of mobile edge computing and Internet of Things (IoT) technologies, device-to-device (D2D) cooperative computing has garnered significant attention due to its low latency and high resource utilization efficiency. However, workflow task scheduling in D2D networks poses considerable challenges, such as severe heterogeneity in device resources and complex inter-task dependencies, which may result in low resource utilization and inefficient scheduling, ultimately breaking the computational symmetry—a balanced state of computational resource allocation among terminal devices and load balance across the network. To address these challenges and restore system-level symmetry, a novel workflow task scheduling method tailored for D2D cooperative environments is proposed. First, a Non-dominated Sorting Genetic Algorithm (NSGA) is employed to optimize the allocation of computational resources across terminal devices, maximizing the overall computing capacity while achieving a symmetrical and balanced resource distribution. A scoring mechanism and a normalization strategy are introduced to accurately assess the compatibility between tasks and processors, thereby enhancing resource utilization during scheduling. Subsequently, task priorities are determined based on the calculation of each task’s Shapley value, ensuring that critical tasks are scheduled preferentially. Finally, a hybrid algorithm integrating Q-learning with Asynchronous Advantage Actor–Critic (A3C) is developed to perform precise and adaptive task scheduling, improving system load balancing and execution efficiency. Extensive simulation results demonstrate that the proposed method outperforms state-of-art methods in both energy consumption and response time, with improvements of 26.34% and 29.98%, respectively, underscoring the robustness and superiority of the proposed method. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

27 pages, 5651 KB  
Article
Integrating VMD and Adversarial MLP for Robust Acoustic Detection of Bolt Loosening in Transmission Towers
by Yong Qin, Yu Zhou, Cen Cao, Jun Hu and Liang Yuan
Electronics 2025, 14(20), 4062; https://doi.org/10.3390/electronics14204062 - 15 Oct 2025
Viewed by 147
Abstract
The structural integrity of transmission towers, as the backbone of power grids, is critical to overall grid safety, relying heavily on the reliability of bolted connections. Dynamic loads such as wind-induced vibrations can cause bolt loosening, potentially leading to structural deformation, cascading failures, [...] Read more.
The structural integrity of transmission towers, as the backbone of power grids, is critical to overall grid safety, relying heavily on the reliability of bolted connections. Dynamic loads such as wind-induced vibrations can cause bolt loosening, potentially leading to structural deformation, cascading failures, and large-scale blackouts. Traditional manual inspection methods are inefficient, subjective, and hazardous. Existing automated approaches are often limited by environmental noise sensitivity, high computational complexity, sensor placement dependency, or the need for extensive labeled data. To address these challenges, this paper proposes a portable acoustic detection system based on Variational Mode Decomposition (VMD) and an Adversarial Multilayer Perceptual Network (AT-MLP). The VMD method effectively processes non-stationary and nonlinear acoustic signals to suppress noise and extract robust time–frequency features. The AT-MLP model then performs state identification, incorporating adversarial training to mitigate distribution discrepancies between training and testing data, thereby significantly improving generalization and noise robustness. Comparison results and analysis demonstrate that the proposed VMD and AT-MLP framework effectively mitigates structural variability and environmental interference, providing a reliable solution for bolt loosening detection. The proposed method bridges structural mechanics, acoustic signal processing, and lightweight intelligence, offering a scalable solution for condition assessment and risk-aware maintenance of transmission towers. Full article
Show Figures

Figure 1

30 pages, 2764 KB  
Article
A Cloud Integrity Verification and Validation Model Using Double Token Key Distribution Model
by V. N. V. L. S. Swathi, G. Senthil Kumar and A. Vani Vathsala
Math. Comput. Appl. 2025, 30(5), 114; https://doi.org/10.3390/mca30050114 - 13 Oct 2025
Viewed by 210
Abstract
Numerous industries have begun using cloud computing. Among other things, this presents a plethora of novel security and dependability concerns. Thoroughly verifying cloud solutions to guarantee their correctness is beneficial, just like with any other computer system that is security- and correctness-sensitive. While [...] Read more.
Numerous industries have begun using cloud computing. Among other things, this presents a plethora of novel security and dependability concerns. Thoroughly verifying cloud solutions to guarantee their correctness is beneficial, just like with any other computer system that is security- and correctness-sensitive. While there has been much research on distributed system validation and verification, nobody has looked at whether verification methods used for distributed systems can be directly applied to cloud computing. To prove that cloud computing necessitates a unique verification model/architecture, this research compares and contrasts the verification needs of distributed and cloud computing. Distinct commercial, architectural, programming, and security models necessitate distinct approaches to verification in cloud and distributed systems. The importance of cloud-based Service Level Agreements (SLAs) in testing is growing. In order to ensure service integrity, users must upload their selected services and registered services to the cloud. Not only does the user fail to update the data when they should, but external issues, such as the cloud service provider’s data becoming corrupted, lost, or destroyed, also contribute to the data not becoming updated quickly enough. The data saved by the user on the cloud server must be complete and undamaged for integrity checking to be effective. Damaged data can be recovered if incomplete data is discovered after verification. A shared resource pool with network access and elastic extension is realized by optimizing resource allocation, which provides computer resources to consumers as services. The development and implementation of the cloud platform would be greatly facilitated by a verification mechanism that checks the data integrity in the cloud. This mechanism should be independent of storage services and compatible with the current basic service architecture. The user can easily see any discrepancies in the necessary data. While cloud storage does make data outsourcing easier, the security and integrity of the outsourced data are often at risk when using an untrusted cloud server. Consequently, there is a critical need to develop security measures that enable users to verify data integrity while maintaining reasonable computational and transmission overheads. A cryptography-based public data integrity verification technique is proposed in this research. In addition to protecting users’ data from harmful attacks like replay, replacement, and forgery, this approach enables third-party authorities to stand in for users while checking the integrity of outsourced data. This research proposes a Cloud Integrity Verification and Validation Model using the Double Token Key Distribution (CIVV-DTKD) model for enhancing cloud quality of service levels. The proposed model, when compared with the traditional methods, performs better in verification and validation accuracy levels. Full article
Show Figures

Figure 1

31 pages, 670 KB  
Article
A Traffic Forecasting Framework for Cellular Networks Based on a Dynamic Component Management Mechanism
by Xiangyu Liu, Yuxuan Li, Shibing Zhu, Qi Su, Jianmei Dai, Changqing Li, Jiao Zhu and Jingyu Zhang
Electronics 2025, 14(20), 4003; https://doi.org/10.3390/electronics14204003 - 13 Oct 2025
Viewed by 240
Abstract
Accurate forecasting of cellular traffic in non-stationary environments remains a formidable challenge, as real-world traffic patterns dynamically evolve, emerge, and vanish over time. To tackle this, we propose a novel meta-learning framework, GMM-SCM-DCM, which features a Dynamic Component Management (DCM) mechanism. This framework [...] Read more.
Accurate forecasting of cellular traffic in non-stationary environments remains a formidable challenge, as real-world traffic patterns dynamically evolve, emerge, and vanish over time. To tackle this, we propose a novel meta-learning framework, GMM-SCM-DCM, which features a Dynamic Component Management (DCM) mechanism. This framework employs a Gaussian Mixture Model (GMM) for probabilistic meta-feature representation. The core innovation, the DCM mechanism, enables online structural evolution of the meta-learner by dynamically splitting, merging, or pruning Gaussian components based on a bimodal similarity metric, ensuring sustained alignment with shifting data distributions. A Single-Component Mechanism (SCM) is utilized for precise base learner initialisation. To ensure a rigorous and realistic validation, we reconstructed the Telecom Italia Milan dataset by applying unsupervised clustering and meta-feature engineering to identify and label four distinct functional zones: residential, commercial, mixed use, and crucially, non-stationary areas. This curated dataset provides a critical testbed for non-stationary forecasting. Comprehensive experiments demonstrate that our model significantly outperforms traditional methods and meta-learning baselines, achieving a 9.3% reduction in MAE and approximately 70% faster convergence. The model’s superiority is further confirmed through extensive ablation studies, robustness tests across base learners and data scales, and successful cross-dataset validation on the Shanghai Telecom dataset, showcasing its exceptional generalization capability and practical utility for real-world network management. Full article
Show Figures

Figure 1

22 pages, 9295 KB  
Article
FedGTD-UAVs: Federated Transfer Learning with SPD-GCNet for Occlusion-Robust Ground Small-Target Detection in UAV Swarms
by Liang Zhao, Xin Jia and Yuting Cheng
Drones 2025, 9(10), 703; https://doi.org/10.3390/drones9100703 - 12 Oct 2025
Viewed by 315
Abstract
Swarm-based UAV cooperative ground target detection faces critical challenges including sensitivity to small targets, susceptibility to occlusion, and data heterogeneity across distributed platforms. To address these issues, we propose FedGTD-UAVs—a privacy-preserving federated transfer learning (FTL) framework optimized for real-time swarm perception tasks. Our [...] Read more.
Swarm-based UAV cooperative ground target detection faces critical challenges including sensitivity to small targets, susceptibility to occlusion, and data heterogeneity across distributed platforms. To address these issues, we propose FedGTD-UAVs—a privacy-preserving federated transfer learning (FTL) framework optimized for real-time swarm perception tasks. Our solution integrates three key innovations: (1) an FTL paradigm employing centralized pre-training on public datasets followed by federated fine-tuning of sparse parameter subsets—under severe non-Independent and Identically Distributed (non-IID) data distributions, this paradigm ensures data privacy while maintaining over 98% performance; (2) an Space-to-Depth Convolution (SPD-Conv) backbone that replaces lossy downsampling with lossless space-to-depth operations, preserving fine-grained spatial features critical for small targets; (3) a lightweight Global Context Network (GCNet) module leverages contextual reasoning to effectively capture long-range dependencies, thereby enhancing robustness against occluded objects while maintaining real-time inference at 217 FPS. Extensive validation on VisDrone2019 and CARPK benchmarks demonstrates state-of-the-art performance: 44.2% mAP@0.5 (surpassing YOLOv8s by 12.1%) with 3.2× superior accuracy-efficiency trade-off. Compared to traditional centralized learning methods that rely on global data sharing and pose privacy risks, as well as the significant performance degradation of standard federated learning under non-IID data, this framework successfully resolves the core conflict between data privacy protection and detection performance maintenance, providing a secure and efficient solution for real-world deployment in complex dynamic environments. Full article
Show Figures

Figure 1

19 pages, 3139 KB  
Article
Genome-Wide Identification and Expression Analysis of the SRS Gene Family in Hylocereus undatus
by Fanjin Peng, Lirong Zhou, Shuzhang Liu, Renzhi Huang, Guangzhao Xu and Zhuanying Yang
Plants 2025, 14(20), 3139; https://doi.org/10.3390/plants14203139 - 11 Oct 2025
Viewed by 242
Abstract
SHORT INTERNODE (SHI)-Related Sequence (SRS) transcription factors play crucial roles in plant growth, development, and stress responses and have been extensively studied in various plant species. However, the molecular functions and regulatory mechanisms of SRS genes in the economically important tropical fruit crop [...] Read more.
SHORT INTERNODE (SHI)-Related Sequence (SRS) transcription factors play crucial roles in plant growth, development, and stress responses and have been extensively studied in various plant species. However, the molecular functions and regulatory mechanisms of SRS genes in the economically important tropical fruit crop pitaya (Hylocereus undatus) remain poorly understood. This study identified 9 HuSRS genes in pitaya via bioinformatics analysis, with subcellular localization predicting nuclear distributions for all. Gene structure analysis showed 1–4 exons, and conserved motifs (RING-type zinc finger and IXGH domains) were shared across subclasses. Phylogenetic analysis classified the HuSRS genes into three subfamilies. Subfamily I (HuSRS1HuSRS4) is closely related to poplar and tomato homologs and subfamily III (HuSRS6HuSRS8) contains a recently duplicated paralogous pair (HuSRS7/HuSRS8) and shows affinity to rice SRS genes. Protein structure prediction revealed dominance of random coils, α-helices, and extended strands, with spatial similarity correlating to subfamily classification. Interaction networks showed HuSRS1, HuSRS2, HuSRS7 and HuSRS8 interact with functional proteins in transcription and hormone signaling. Promoter analysis identified abundant light/hormone/stress-responsive elements, with HuSRS5 harboring the most motifs. Transcriptome and qPCR analyses revealed spatiotemporal expression patterns: HuSRS4, HuSRS5, and HuSRS7 exhibited significantly higher expression levels in callus (WG), which may be associated with dedifferentiation capacity. In seedlings, HuSRS9 exhibited extremely high transcriptional accumulation in stem segments, while HuSRS1, HuSRS5, HuSRS7 and HuSRS8 were highly active in cotyledons. This study systematically analyzed the characteristics of the SRS gene family in pitaya, revealing its evolutionary conservation and spatio-temporal expression differences. The research results have laid a foundation for in-depth exploration of the function of the SRS gene in the tissue culture and molecular breeding of pitaya. Full article
(This article belongs to the Section Plant Genetics, Genomics and Biotechnology)
Show Figures

Figure 1

26 pages, 1646 KB  
Article
Message Passing-Based Assignment for Efficient Handover Management in LEO Networks
by Gilang Raka Rayuda Dewa, Illsoo Sohn and Djati Wibowo Djamari
Telecom 2025, 6(4), 76; https://doi.org/10.3390/telecom6040076 - 10 Oct 2025
Viewed by 274
Abstract
As part of non-terrestrial networks (NTN), the Low Earth Orbit (LEO) plays a critical role in supporting high-throughput wireless communication. However, the high-speed mobility of LEO satellites, coupled with the high density of user terminals, makes efficient user assignment crucial in maintaining overall [...] Read more.
As part of non-terrestrial networks (NTN), the Low Earth Orbit (LEO) plays a critical role in supporting high-throughput wireless communication. However, the high-speed mobility of LEO satellites, coupled with the high density of user terminals, makes efficient user assignment crucial in maintaining overall wireless performance. The suboptimal assignment from LEO satellites to user terminals can result in frequent unnecessary handovers, rendering the user terminal unable to receive the entire downlink signal. Consequently, it reduces user rate and user satisfaction metrics. However, finding the optimum user assignment to reduce handover issues is categorized as a non-linear programming problem with a combinatorial number of possible solutions, resulting in excessive computational complexity. Therefore, this study proposes a distributed user assignment for the LEO networks. By utilizing message-passing frameworks that map the optimization problem into a graphical representation, the proposed algorithm splits the optimization problem into a local mapping issue, thereby significantly reducing computational complexity. By exchanging small messages iteratively, the proposed algorithm autonomously determines the near-optimal solution. The extensive simulation results demonstrate that the proposed algorithm significantly outperforms the conventional algorithm in terms of user rate and user satisfaction metric under various wireless parameters. Full article
Show Figures

Figure 1

19 pages, 360 KB  
Article
Optimal Planning and Dynamic Operation of Thyristor-Switched Capacitors in Distribution Networks Using the Atan-Sinc Optimization Algorithm with IPOPT Refinement
by Oscar Danilo Montoya, Luis Fernando Grisales-Noreña and Rubén Iván Bolaños
Sci 2025, 7(4), 143; https://doi.org/10.3390/sci7040143 - 7 Oct 2025
Viewed by 260
Abstract
This paper proposes an innovative hybrid optimization framework for the optimal installation and operation of thyristor-switched capacitors (TSCs) within medium-voltage distribution networks, targeting both energy losses reduction and cost efficiency. The core of the approach combines the exploratory capabilities of the atan-sinc optimization [...] Read more.
This paper proposes an innovative hybrid optimization framework for the optimal installation and operation of thyristor-switched capacitors (TSCs) within medium-voltage distribution networks, targeting both energy losses reduction and cost efficiency. The core of the approach combines the exploratory capabilities of the atan-sinc optimization algorithm (ASOA), a recent metaheuristic inspired by mathematical functions, with the local refinement power of the IPOPT solver within a master–slave architecture. This integrated method addresses the inherent complexity of a multi-objective, mixed-integer nonlinear programming problem that seeks to balance conflicting goals: minimizing annual system losses and investment costs. Extensive testing on IEEE 33- and 69-bus systems under fixed and dynamic reactive power injection scenarios demonstrates that our framework consistently delivers superior solutions when compared to traditional and state-of-the-art algorithms. Notably, the variable operation case yields energy savings of up to 12%, translating into annual monetary gains exceeding USD 1000 in comparison with the fixed support scenario.The solutions produce well-distributed Pareto fronts that illustrate valuable trade-offs, allowing system planners to make informed decisions. The findings confirm that the proposed strategy constitutes a scalable, and robust tool for reactive power planning, supporting the deployment of smarter and more resilient distribution systems. Full article
(This article belongs to the Section Computer Sciences, Mathematics and AI)
Show Figures

Figure 1

13 pages, 2638 KB  
Article
Aircraft Foreign Object Debris Detection Method Using Registration–Siamese Network
by Mo Chen, Xuhui Li, Yan Liu, Sheng Cheng and Hongfu Zuo
Appl. Sci. 2025, 15(19), 10750; https://doi.org/10.3390/app151910750 - 6 Oct 2025
Viewed by 191
Abstract
Foreign object debris (FOD) in civil aviation environments poses severe risks to flight safety. Conventional detection primarily relies on manual visual inspection, which is inefficient, susceptible to fatigue-related errors, and carries a high risk of missed detections. Therefore, there is an urgent need [...] Read more.
Foreign object debris (FOD) in civil aviation environments poses severe risks to flight safety. Conventional detection primarily relies on manual visual inspection, which is inefficient, susceptible to fatigue-related errors, and carries a high risk of missed detections. Therefore, there is an urgent need to develop an efficient and convenient intelligent method for detecting aircraft FOD. This study proposes a detection model based on a Siamese network architecture integrated with a spatial transformation module. The proposed model identifies FOD by comparing the registered features of evidence-retention images with their corresponding normally distributed features. A dedicated aircraft FOD dataset was constructed for evaluation, and extensive experiments were conducted. The results indicate that the proposed model achieves an average improvement of 0.1365 in image-level AUC (Area Under the Curve) and 0.0834 in pixel-level AUC compared to the Patch Distribution Modeling (PaDiM) method. Additionally, the effects of the spatial transformation module and training dataset on detection performance were systematically investigated, confirming the robustness of the model and providing guidance for parameter selection in practical deployment. Overall, this research introduces a novel and effective approach for intelligent aircraft FOD detection, offering both methodological innovation and practical applicability. Full article
Show Figures

Figure 1

25 pages, 18016 KB  
Article
Joint Modeling of Pixel-Wise Visibility and Fog Structure for Real-World Scene Understanding
by Jiayu Wu, Jiaheng Li, Jianqiang Wang, Xuezhe Xu, Sidan Du and Yang Li
Atmosphere 2025, 16(10), 1161; https://doi.org/10.3390/atmos16101161 - 4 Oct 2025
Viewed by 245
Abstract
Reduced visibility caused by foggy weather has a significant impact on transportation systems and driving safety, leading to increased accident risks and decreased operational efficiency. Traditional methods rely on expensive physical instruments, limiting their scalability. To address this challenge in a cost-effective manner, [...] Read more.
Reduced visibility caused by foggy weather has a significant impact on transportation systems and driving safety, leading to increased accident risks and decreased operational efficiency. Traditional methods rely on expensive physical instruments, limiting their scalability. To address this challenge in a cost-effective manner, we propose a two-stage network for visibility estimation from stereo image inputs. The first stage computes scene depth via stereo matching, while the second stage fuses depth and texture information to estimate metric-scale visibility. Our method produces pixel-wise visibility maps through a physically constrained, progressive supervision strategy, providing rich spatial visibility distributions beyond a single global value. Moreover, it enables the detection of patchy fog, allowing a more comprehensive understanding of complex atmospheric conditions. To facilitate training and evaluation, we propose an automatic fog-aware data generation pipeline that incorporates both synthetically rendered foggy images and real-world captures. Furthermore, we construct a large-scale dataset encompassing diverse scenarios. Extensive experiments demonstrate that our method achieves state-of-the-art performance in both visibility estimation and patchy fog detection. Full article
(This article belongs to the Section Atmospheric Techniques, Instruments, and Modeling)
Show Figures

Figure 1

15 pages, 2373 KB  
Article
LLM-Empowered Kolmogorov-Arnold Frequency Learning for Time Series Forecasting in Power Systems
by Zheng Yang, Yang Yu, Shanshan Lin and Yue Zhang
Mathematics 2025, 13(19), 3149; https://doi.org/10.3390/math13193149 - 2 Oct 2025
Viewed by 297
Abstract
With the rapid evolution of artificial intelligence technologies in power systems, data-driven time-series forecasting has become instrumental in enhancing the stability and reliability of power systems, allowing operators to anticipate demand fluctuations and optimize energy distribution. Despite the notable progress made by current [...] Read more.
With the rapid evolution of artificial intelligence technologies in power systems, data-driven time-series forecasting has become instrumental in enhancing the stability and reliability of power systems, allowing operators to anticipate demand fluctuations and optimize energy distribution. Despite the notable progress made by current methods, they are still hindered by two major limitations: most existing models are relatively small in architecture, failing to fully leverage the potential of large-scale models, and they are based on fixed nonlinear mapping functions that cannot adequately capture complex patterns, leading to information loss. To this end, an LLM-Empowered Kolmogorov–Arnold frequency learning (LKFL) is proposed for time series forecasting in power systems, which consists of LLM-based prompt representation learning, KAN-based frequency representation learning, and entropy-oriented cross-modal fusion. Specifically, LKFL first transforms multivariable time-series data into text prompts and leverages a pre-trained LLM to extract semantic-rich prompt representations. It then applies Fast Fourier Transform to convert the time-series data into the frequency domain and employs Kolmogorov–Arnold networks (KAN) to capture multi-scale periodic structures and complex frequency characteristics. Finally, LKFL integrates the prompt and frequency representations through an entropy-oriented cross-modal fusion strategy, which minimizes the semantic gap between different modalities and ensures full integration of complementary information. This comprehensive approach enables LKFL to achieve superior forecasting performance in power systems. Extensive evaluations on five benchmarks verify that LKFL sets a new standard for time-series forecasting in power systems compared with baseline methods. Full article
(This article belongs to the Special Issue Artificial Intelligence and Data Science, 2nd Edition)
Show Figures

Figure 1

Back to TopTop