Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (2,450)

Search Parameters:
Keywords = domain names

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
21 pages, 559 KiB  
Review
Interest Flooding Attacks in Named Data Networking and Mitigations: Recent Advances and Challenges
by Simeon Ogunbunmi, Yu Chen, Qi Zhao, Deeraj Nagothu, Sixiao Wei, Genshe Chen and Erik Blasch
Future Internet 2025, 17(8), 357; https://doi.org/10.3390/fi17080357 (registering DOI) - 6 Aug 2025
Abstract
Named Data Networking (NDN) represents a promising Information-Centric Networking architecture that addresses limitations of traditional host-centric Internet protocols by emphasizing content names rather than host addresses for communication. While NDN offers advantages in content distribution, mobility support, and built-in security features, its stateful [...] Read more.
Named Data Networking (NDN) represents a promising Information-Centric Networking architecture that addresses limitations of traditional host-centric Internet protocols by emphasizing content names rather than host addresses for communication. While NDN offers advantages in content distribution, mobility support, and built-in security features, its stateful forwarding plane introduces significant vulnerabilities, particularly Interest Flooding Attacks (IFAs). These IFA attacks exploit the Pending Interest Table (PIT) by injecting malicious interest packets for non-existent or unsatisfiable content, leading to resource exhaustion and denial-of-service attacks against legitimate users. This survey examines research advances in IFA detection and mitigation from 2013 to 2024, analyzing seven relevant published detection and mitigation strategies to provide current insights into this evolving security challenge. We establish a taxonomy of attack variants, including Fake Interest, Unsatisfiable Interest, Interest Loop, and Collusive models, while examining their operational characteristics and network performance impacts. Our analysis categorizes defense mechanisms into five primary approaches: rate-limiting strategies, PIT management techniques, machine learning and artificial intelligence methods, reputation-based systems, and blockchain-enabled solutions. These approaches are evaluated for their effectiveness, computational requirements, and deployment feasibility. The survey extends to domain-specific implementations in resource-constrained environments, examining adaptations for Internet of Things deployments, wireless sensor networks, and high-mobility vehicular scenarios. Five critical research directions are proposed: adaptive defense mechanisms against sophisticated attackers, privacy-preserving detection techniques, real-time optimization for edge computing environments, standardized evaluation frameworks, and hybrid approaches combining multiple mitigation strategies. Full article
Show Figures

Figure 1

17 pages, 1519 KiB  
Article
TOM-SSL: Tomato Disease Recognition Using Pseudo-Labelling-Based Semi-Supervised Learning
by Sathiyamohan Nishankar, Thurairatnam Mithuran, Selvarajah Thuseethan, Yakub Sebastian, Kheng Cher Yeo and Bharanidharan Shanmugam
AgriEngineering 2025, 7(8), 248; https://doi.org/10.3390/agriengineering7080248 - 5 Aug 2025
Abstract
In the agricultural domain, the availability of labelled data for disease recognition tasks is often limited due to the cost and expertise required for annotation. In this paper, a novel semi-supervised learning framework named TOM-SSL is proposed for automatic tomato leaf disease recognition [...] Read more.
In the agricultural domain, the availability of labelled data for disease recognition tasks is often limited due to the cost and expertise required for annotation. In this paper, a novel semi-supervised learning framework named TOM-SSL is proposed for automatic tomato leaf disease recognition using pseudo-labelling. TOM-SSL effectively addresses the challenge of limited labelled data by leveraging a small labelled subset and confidently pseudo-labelled samples from a large pool of unlabelled data to improve classification performance. Utilising only 10% of the labelled data, the proposed framework with a MobileNetV3-Small backbone achieves the best accuracy at 72.51% on the tomato subset of the PlantVillage dataset and 70.87% on the Taiwan tomato leaf disease dataset across 10 disease categories in PlantVillage and 6 in the Taiwan dataset. While achieving recognition performance on par with current state-of-the-art supervised methods, notably, the proposed approach offers a tenfold enhancement in label efficiency. Full article
Show Figures

Figure 1

14 pages, 548 KiB  
Review
Carboxypeptidase A4: A Biomarker for Cancer Aggressiveness and Drug Resistance
by Adeoluwa A. Adeluola, Md. Sameer Hossain and A. R. M. Ruhul Amin
Cancers 2025, 17(15), 2566; https://doi.org/10.3390/cancers17152566 - 4 Aug 2025
Viewed by 63
Abstract
Carboxypeptidase A4 (CPA4) is an exopeptidase that cleaves peptide bonds at the C-terminal domain within peptides and proteins. It preferentially cleaves peptides with terminal aromatic or branched chain amino acid residues such as phenylalanine, tryptophan, or leucine. CPA4 was first discovered in prostate [...] Read more.
Carboxypeptidase A4 (CPA4) is an exopeptidase that cleaves peptide bonds at the C-terminal domain within peptides and proteins. It preferentially cleaves peptides with terminal aromatic or branched chain amino acid residues such as phenylalanine, tryptophan, or leucine. CPA4 was first discovered in prostate cancer cells, but it is now known to be expressed in various tissues throughout the body. Its physiologic expression is governed by latexin, a noncompetitive endogenous inhibitor of CPA4. Nevertheless, the overexpression of CPA4 has been associated with the progression and aggressiveness of many malignancies, including prostate, pancreatic, breast and lung cancer, to name a few. CPA4’s role in cancer has been attributed to its disruption of many cellular signaling pathways, e.g., PI3K-AKT-mTOR, STAT3-ERK, AKT-cMyc, GPCR, and estrogen signaling. The dysregulation of these pathways by CPA4 could be responsible for inducing epithelial--mesenchymal transition (EMT), tumor invasion and drug resistance. Although CPA4 has been found to regulate cancer aggressiveness and poor prognosis, no comprehensive review summarizing the role of CPA4 in cancer is available so far. In this review, we provide a brief description of peptidases, their classification, history of CPA4, mechanism of action of CPA4 as a peptidase, its expression in various tissues, including cancers, its role in various tumor types, the associated molecular pathways and cellular processes. We further discuss the limitations of current literature linking CPA4 to cancers and challenges that prevent using CPA4 as a biomarker for cancer aggressiveness and predicting drug response and highlight a number of future strategies that can help to overcome the limitations. Full article
(This article belongs to the Special Issue Insights from the Editorial Board Member)
Show Figures

Figure 1

12 pages, 1329 KiB  
Article
Steady-State Visual-Evoked-Potential–Driven Quadrotor Control Using a Deep Residual CNN for Short-Time Signal Classification
by Jiannan Chen, Chenju Yang, Rao Wei, Changchun Hua, Dianrui Mu and Fuchun Sun
Sensors 2025, 25(15), 4779; https://doi.org/10.3390/s25154779 - 3 Aug 2025
Viewed by 179
Abstract
In this paper, we study the classification problem of short-time-window steady-state visual evoked potentials (SSVEPs) and propose a novel deep convolutional network named EEGResNet based on the idea of residual connection to further improve the classification performance. Since the frequency-domain features extracted from [...] Read more.
In this paper, we study the classification problem of short-time-window steady-state visual evoked potentials (SSVEPs) and propose a novel deep convolutional network named EEGResNet based on the idea of residual connection to further improve the classification performance. Since the frequency-domain features extracted from short-time-window signals are difficult to distinguish, the EEGResNet starts from the filter bank (FB)-based feature extraction module in the time domain. The FB designed in this paper is composed of four sixth-order Butterworth filters with different bandpass ranges, and the four bandwidths are 19–50 Hz, 14–38 Hz, 9–26 Hz, and 3–14 Hz, respectively. Then, the extracted four feature tensors with the same shape are directly aggregated together. Furthermore, the aggregated features are further learned by a six-layer convolutional neural network with residual connections. Finally, the network output is generated through an adaptive fully connected layer. To prove the effectiveness and superiority of our designed EEGResNet, necessary experiments and comparisons are conducted over two large public datasets. To further verify the application potential of the trained network, a virtual simulation of brain computer interface (BCI) based quadrotor control is presented through V-REP. Full article
(This article belongs to the Special Issue Intelligent Sensor Systems in Unmanned Aerial Vehicles)
Show Figures

Figure 1

15 pages, 1600 KiB  
Article
XLNet-CRF: Efficient Named Entity Recognition for Cyber Threat Intelligence with Permutation Language Modeling
by Tianhao Wang, Yang Liu, Chao Liang, Bailing Wang and Hongri Liu
Electronics 2025, 14(15), 3034; https://doi.org/10.3390/electronics14153034 - 30 Jul 2025
Viewed by 238
Abstract
As cyberattacks continue to rise in frequency and sophistication, extracting actionable Cyber Threat Intelligence (CTI) from diverse online sources has become critical for proactive threat detection and defense. However, accurately identifying complex entities from lengthy and heterogeneous threat reports remains challenging due to [...] Read more.
As cyberattacks continue to rise in frequency and sophistication, extracting actionable Cyber Threat Intelligence (CTI) from diverse online sources has become critical for proactive threat detection and defense. However, accurately identifying complex entities from lengthy and heterogeneous threat reports remains challenging due to long-range dependencies and domain-specific terminology. To address this, we propose XLNet-CRF, a hybrid framework that combines permutation-based language modeling with structured prediction using Conditional Random Fields (CRF) to enhance Named Entity Recognition (NER) in cybersecurity contexts. XLNet-CRF directly addresses key challenges in CTI-NER by modeling bidirectional dependencies and capturing non-contiguous semantic patterns more effectively than traditional approaches. Comprehensive evaluations on two benchmark cybersecurity corpora validate the efficacy of our approach. On the CTI-Reports dataset, XLNet-CRF achieves a precision of 97.41% and an F1-score of 97.43%; on MalwareTextDB, it attains a precision of 85.33% and an F1-score of 88.65%—significantly surpassing strong BERT-based baselines in both accuracy and robustness. Full article
Show Figures

Figure 1

32 pages, 5581 KiB  
Article
Composite Noise Reduction Method for Internal Leakage Acoustic Emission Signal of Safety Valve Based on IWTD-IVMD Algorithm
by Shuxun Li, Xiaoqi Meng, Jianjun Hou, Kang Yuan and Xiaoya Wen
Sensors 2025, 25(15), 4684; https://doi.org/10.3390/s25154684 - 29 Jul 2025
Viewed by 255
Abstract
As the core device for protecting the safety of the pressure-bearing system, the spring full-open safety valve is prone to various forms of valve seat sealing surface damage after long-term opening and closing impact, corrosion, and medium erosion, which may lead to internal [...] Read more.
As the core device for protecting the safety of the pressure-bearing system, the spring full-open safety valve is prone to various forms of valve seat sealing surface damage after long-term opening and closing impact, corrosion, and medium erosion, which may lead to internal leakage. In view of the problems that the high-frequency acoustic emission signal of the internal leakage of the safety valve has, namely, a large number of energy-overlapping areas in the frequency domain, the overall signal presents broadband characteristics, large noise content, and no obvious time–frequency characteristics. A composite denoising method, IWTD, improved wavelet threshold function with dual adjustable factors, and the improved VMD algorithm is proposed. In view of the problem that the optimal values of the dual adjustment factors a and b of the function are difficult to determine manually, an improved dung beetle optimization algorithm is proposed, with the maximum Pearson coefficient as the optimization target; the optimization is performed within the value range of the dual adjustable factors a and b, so as to obtain the optimal value. In view of the problem that the key parameters K and α in VMD decomposition are difficult to determine manually, the maximum Pearson coefficient is taken as the optimization target, and the improved dung beetle algorithm is used to optimize within the value range of K and α, so as to obtain the IVMD algorithm. Based on the IVMD algorithm, the characteristic decomposition of the internal leakage acoustic emission signal occurs after the denoising of the IWTD function is performed to further improve the denoising effect. The results show that the Pearson coefficients of all types of internal leakage acoustic emission signals after IWTD-IVMD composite noise reduction are greater than 0.9, which is much higher than traditional noise reduction methods such as soft and hard threshold functions. Therefore, the IWTD-IVMD composite noise reduction method can extract more main features out of the measured spring full-open safety valve internal leakage acoustic emission signals, and has a good noise reduction effect. Feature recognition after noise reduction can provide a good evaluation for the safe operation of the safety valve. Full article
(This article belongs to the Section Physical Sensors)
Show Figures

Figure 1

14 pages, 866 KiB  
Article
Switching to Long-Acting Cabotegravir and Rilpivirine in Turkey: Perspectives from People Living with HIV in a Setting of Increasing HIV Incidence
by Rıdvan Dumlu, Yeliz Çiçek, Mahir Kapmaz, Okan Derin, Halis Akalın, Uğur Önal, Egemen Özdemir, Çiğdem Ataman Hatipoğlu, Günay Tuncer Ertem, Alper Şener, Leyla Akgül, Yeşim Çağlar, Derya Tuna Ecer, Mustafa Kemal Çelen, Nur Bahar Oğuz, Figen Yıldırım, Deniz Borcak, Sevtap Şenoğlu, Eyüp Arslan, Sinan Çetin, Meryem Balcı and Ali Mertadd Show full author list remove Hide full author list
Medicina 2025, 61(8), 1373; https://doi.org/10.3390/medicina61081373 - 29 Jul 2025
Viewed by 480
Abstract
Background and Objectives: Long-acting cabotegravir and rilpivirine (LA-CAB/RPV) offers an alternative to daily oral antiretroviral therapy (ART) for people living with HIV (PLWH). Although LA-CAB/RPV has been approved in Turkey, the country remains in the pre-rollout period, and national data on patient [...] Read more.
Background and Objectives: Long-acting cabotegravir and rilpivirine (LA-CAB/RPV) offers an alternative to daily oral antiretroviral therapy (ART) for people living with HIV (PLWH). Although LA-CAB/RPV has been approved in Turkey, the country remains in the pre-rollout period, and national data on patient perspectives are lacking. This is the first nationwide study from Turkey, a setting of increasing HIV incidence, assessing PLWH perspectives on switching to LA-CAB/RPV and the influence of motivational factors on treatment preferences. Materials and Methods: A prospective, multicenter, cross-sectional study was conducted across 11 HIV treatment centers representing all regions of Turkey. Virologically suppressed PLWH meeting current eligibility criteria for LA-CAB/RPV were included. Treatment preferences (switch to LA-CAB/RPV or remain on oral ART) and five anticipated motivational domains, namely perceived efficacy, safety, convenience, privacy, and cost, were systematically assessed through structured, face-to-face interviews. Results: Among 200 eligible participants, 86% (n = 172) preferred switching to LA-CAB/RPV. In all subgroups, LA-CAB/RPV was preferred over oral ART, except for those with no formal literacy. Prior awareness of LA-CAB/RPV was significantly associated with the switching preference (p < 0.001), with healthcare providers being the most common source of information, at 45.5% (n = 172) (p < 0.001). Residential proximity to the healthcare center (p = 0.018) and all motivational factors significantly influenced the preference (p < 0.05). Notably, when participants who initially chose to remain on oral ART were asked whether they would reconsider switching if injections were administered every six months, overall preference for long-acting therapy increased from 86% to 98%. Conclusions: High clinical eligibility and strong acceptability for LA-CAB/RPV were observed among Turkish PLWH. Our findings demonstrate that structured motivational factors significantly influence the treatment preference. Addressing these patient-centered factors and logistical barriers may support the successful integration of long-acting therapies into routine HIV care. Future longer-interval agents may improve patient-centered acceptability. Full article
(This article belongs to the Section Infectious Disease)
Show Figures

Figure 1

28 pages, 14491 KiB  
Article
Catalytically Active Oxidized PtOx Species on SnO2 Supports Synthesized via Anion Exchange Reaction for 4-Nitrophenol Reduction
by Izabela Ðurasović, Robert Peter, Goran Dražić, Fabio Faraguna, Rafael Anelić, Marijan Marciuš, Tanja Jurkin, Vlasta Mohaček Grošev, Maria Gracheva, Zoltán Klencsár, Mile Ivanda, Goran Štefanić and Marijan Gotić
Nanomaterials 2025, 15(15), 1159; https://doi.org/10.3390/nano15151159 - 28 Jul 2025
Viewed by 313
Abstract
An anion exchange-assisted technique was used for the synthesis of platinum-decorated SnO2 supports, providing nanocatalysts with enhanced activity for the reduction of 4-nitrophenol (4-NP) to 4-aminophenol (4-AP). In this study, a series of SnO2 supports, namely SnA (synthesized almost at room [...] Read more.
An anion exchange-assisted technique was used for the synthesis of platinum-decorated SnO2 supports, providing nanocatalysts with enhanced activity for the reduction of 4-nitrophenol (4-NP) to 4-aminophenol (4-AP). In this study, a series of SnO2 supports, namely SnA (synthesized almost at room temperature), SnB (hydrothermally treated at 180 °C), and SnC (annealed at 600 °C), are systematically investigated, all loaded with 1 mol% Pt from H2PtCl6 under identical mild conditions. The chloride ions from the SnCl4 precursors were efficiently removed via a strong-base anion exchange reaction, resulting in highly dispersed, crystalline ~5 nm cassiterite SnO2 particles. All Pt/SnO2 composites displayed mesoporous structures with type IVa isotherms and H2-type hysteresis, with SP1a (Pt on SnA) exhibiting the largest surface area (122.6 m2/g) and the smallest pores (~3.5 nm). STEM-HAADF imaging revealed well-dispersed PtOx domains (~0.85 nm), while XPS confirmed the dominant Pt4+ and Pt2+ species, with ~25% Pt0 likely resulting from photoreduction and/or interactions with Sn–OH surface groups. Raman spectroscopy revealed three new bands (260–360 cm−1) that were clearly visible in the sample with 10 mol% Pt and were due to the vibrational modes of the PtOx species and Pt-Cl bonds introduced due the addition and hydrolysis of H2PtCl6 precursor. TGA/DSC analysis revealed the highest mass loss for SP1a (~7.3%), confirming the strong hydration of the PtOx domains. Despite the predominance of oxidized PtOx species, SP1a exhibited the highest catalytic activity (kapp = 1.27 × 10−2 s−1) and retained 84.5% activity for the reduction of 4-NP to 4-AP after 10 cycles. This chloride-free low-temperature synthesis route offers a promising and generalizable strategy for the preparation of noble metal-based nanocatalysts on oxide supports with high catalytic activity and reusability. Full article
Show Figures

Figure 1

15 pages, 717 KiB  
Article
Bridging Theory and Practice with Immersive Virtual Reality: A Study on Transfer Facilitation in VET
by David Kablitz
Educ. Sci. 2025, 15(8), 959; https://doi.org/10.3390/educsci15080959 - 25 Jul 2025
Viewed by 341
Abstract
This study explores the potential of immersive virtual reality (IVR) to enhance knowledge transfer in vocational education, particularly in bridging the gap between academic learning and practical workplace application. The focus lies on relevant predictors for actual learning transfer, namely knowledge acquisition and [...] Read more.
This study explores the potential of immersive virtual reality (IVR) to enhance knowledge transfer in vocational education, particularly in bridging the gap between academic learning and practical workplace application. The focus lies on relevant predictors for actual learning transfer, namely knowledge acquisition and the transfer-related self-efficacy. Additionally, the Cognitive Affective Model of Immersive Learning (CAMIL) is used to investigate potential predictors in IVR learning. This approach allows for empirical testing of the CAMIL and validation of its assumptions using empirical data. To address the research questions, a quasi-experimental field study was conducted with 141 retail trainees at a German vocational school. Participants were assigned to either an IVR group or a control group receiving traditional instruction. The intervention spanned four teaching sessions of 90 min each, focusing on the design of a retail sales area based on sales-promoting principles. To assess subject-related learning outcomes, a domain-specific knowledge test was developed. In addition, transfer-related self-efficacy and other relevant constructs were measured using Likert-scale questionnaires. The results show that IVR-based instruction significantly improves knowledge acquisition and transfer-related self-efficacy compared to traditional teaching methods. In terms of the CAMIL-based mechanisms, significant correlations were found between transfer-related self-efficacy and factors such as interest, motivation, academic self-efficacy, embodiment, and self-regulation. Additionally, correlations were found between knowledge acquisition and relevant predictors such as interest, motivation, and self-regulation. These findings underscore IVR’s potential to facilitate knowledge transfer in vocational school, highlighting the need for further research on its long-term effects and the actual application of learned skills in real-world settings. Full article
(This article belongs to the Special Issue Dynamic Change: Shaping the Schools of Tomorrow in the Digital Age)
Show Figures

Figure 1

19 pages, 3365 KiB  
Article
Robust Federated Learning Against Data Poisoning Attacks: Prevention and Detection of Attacked Nodes
by Pretom Roy Ovi and Aryya Gangopadhyay
Electronics 2025, 14(15), 2970; https://doi.org/10.3390/electronics14152970 - 25 Jul 2025
Viewed by 291
Abstract
Federated learning (FL) enables collaborative model building among a large number of participants without sharing sensitive data to the central server. Because of its distributed nature, FL has limited control over local data and the corresponding training process. Therefore, it is susceptible to [...] Read more.
Federated learning (FL) enables collaborative model building among a large number of participants without sharing sensitive data to the central server. Because of its distributed nature, FL has limited control over local data and the corresponding training process. Therefore, it is susceptible to data poisoning attacks where malicious workers use malicious training data to train the model. Furthermore, attackers on the worker side can easily manipulate local data by swapping the labels of training instances, adding noise to training instances, and adding out-of-distribution training instances in the local data to initiate data poisoning attacks. And local workers under such attacks carry incorrect information to the server, poison the global model, and cause misclassifications. So, the prevention and detection of such data poisoning attacks is crucial to build a robust federated training framework. To address this, we propose a prevention strategy in federated learning, namely confident federated learning, to protect workers from such data poisoning attacks. Our proposed prevention strategy at first validates the label quality of local training samples by characterizing and identifying label errors in the local training data, and then excludes the detected mislabeled samples from the local training. To this aim, we experiment with our proposed approach on both the image and audio domains, and our experimental results validated the robustness of our proposed confident federated learning in preventing the data poisoning attacks. Our proposed method can successfully detect the mislabeled training samples with above 85% accuracy and exclude those detected samples from the training set to prevent data poisoning attacks on the local workers. However, our prevention strategy can successfully prevent the attack locally in the presence of a certain percentage of poisonous samples. Beyond that percentage, the prevention strategy may not be effective in preventing attacks. In such cases, detection of the attacked workers is needed. So, in addition to the prevention strategy, we propose a novel detection strategy in the federated learning framework to detect the malicious workers under attack. We propose to create a class-wise cluster representation for every participating worker by utilizing the neuron activation maps of local models and analyze the resulting clusters to filter out the workers under attack before model aggregation. We experimentally demonstrated the efficacy of our proposed detection strategy in detecting workers affected by data poisoning attacks, along with the attack types, e.g., label-flipping or dirty labeling. In addition, our experimental results suggest that the global model could not converge even after a large number of training rounds in the presence of malicious workers, whereas after detecting the malicious workers with our proposed detection method and discarding them from model aggregation, we ensured that the global model achieved convergence within very few training rounds. Furthermore, our proposed approach stays robust under different data distributions and model sizes and does not require prior knowledge about the number of attackers in the system. Full article
Show Figures

Figure 1

18 pages, 516 KiB  
Article
A Nested Named Entity Recognition Model Robust in Few-Shot Learning Environments Using Label Description Information
by Hyunsun Hwang, Youngjun Jung, Changki Lee and Wooyoung Go
Appl. Sci. 2025, 15(15), 8255; https://doi.org/10.3390/app15158255 - 24 Jul 2025
Viewed by 227
Abstract
Nested named entity recognition (NER) is a task that identifies hierarchically structured entities, where one entity can contain other entities within its span. This study introduces a nested NER model for few-shot learning environments, addressing the difficulty of building extensive datasets for general [...] Read more.
Nested named entity recognition (NER) is a task that identifies hierarchically structured entities, where one entity can contain other entities within its span. This study introduces a nested NER model for few-shot learning environments, addressing the difficulty of building extensive datasets for general named entities. We enhance the Biaffine nested NER model by modifying its output layer to incorporate label semantic information through a novel label description embedding (LDE) approach, improving performance with limited training data. Our method replaces the traditional biaffine classifier with a label attention mechanism that leverages comprehensive natural language descriptions of entity types, encoded using BERT to capture rich semantic relationships between labels and input spans. We conducted comprehensive experiments on four benchmark datasets: GENIA (nested NER), ACE 2004 (nested NER), ACE 2005 (nested NER), and CoNLL 2003 English (flat NER). Performance was evaluated across multiple few-shot scenarios (1-shot, 5-shot, 10-shot, and 20-shot) using F1-measure as the primary metric, with five different random seeds to ensure robust evaluation. We compared our approach against strong baselines including BERT-LSTM-CRF with nested tags, the original Biaffine model, and recent few-shot NER methods (FewNER, FIT, LPNER, SpanNER). Results demonstrate significant improvements across all few-shot scenarios. On GENIA, our LDE model achieves 45.07% F1 in five-shot learning compared to 30.74% for the baseline Biaffine model (46.4% relative improvement). On ACE 2005, we obtain 44.24% vs. 32.38% F1 in five-shot scenarios (36.6% relative improvement). The model shows consistent gains in 10-shot (57.19% vs. 49.50% on ACE 2005) and 20-shot settings (64.50% vs. 58.21% on ACE 2005). Ablation studies confirm that semantic information from label descriptions is the key factor enabling robust few-shot performance. Transfer learning experiments demonstrate the model’s ability to leverage knowledge from related domains. Our findings suggest that incorporating label semantic information can substantially enhance NER models in low-resource settings, opening new possibilities for applying NER in specialized domains or languages with limited annotated data. Full article
(This article belongs to the Special Issue Applications of Natural Language Processing to Data Science)
Show Figures

Figure 1

25 pages, 10397 KiB  
Article
High-Performance All-Optical Logic Gates Based on Silicon Racetrack and Microring Resonators
by Amer Kotb, Zhiyang Wang and Kyriakos E. Zoiros
Electronics 2025, 14(15), 2961; https://doi.org/10.3390/electronics14152961 - 24 Jul 2025
Viewed by 305
Abstract
We propose a high-speed all-optical logic gate design based on silicon racetrack and ring resonators patterned on a silica substrate. The architecture features racetrack resonators at both the input and output, with a central ring resonator enabling the required phase-sensitive interference for logic [...] Read more.
We propose a high-speed all-optical logic gate design based on silicon racetrack and ring resonators patterned on a silica substrate. The architecture features racetrack resonators at both the input and output, with a central ring resonator enabling the required phase-sensitive interference for logic processing. Logic operations are achieved through the interplay of constructive and destructive interference induced by phase-shifted input beams. Using the finite-difference time-domain (FDTD) method in Lumerical software, we simulate and demonstrate seven fundamental Boolean logic functions, namely XOR, AND, OR, NOT, NOR, NAND, and XNOR, at an operating wavelength of 1.33 µm. The system supports a data rate of 47.94 Gb/s, suitable for ultrafast optical computing. The performance is quantitatively evaluated using the contrast ratio (CR) as the reference metric, with more than acceptable values of 13.09 dB (XOR), 13.84 dB (AND), 13.14 dB (OR), 13.80 dB (NOT), 14.53 dB (NOR), 13.80 dB (NAND), and 14.67 dB (XNOR), confirming strong logic level discrimination. Comparative analysis with existing optical gate designs underscores the advantages of our compact silicon-on-silica structure in terms of speed, CR performance, and integration potential. This study validates the effectiveness of racetrack–ring configurations for next-generation all-optical logic circuits. Full article
Show Figures

Figure 1

26 pages, 1276 KiB  
Systematic Review
Harnessing Language Models for Studying the Ancient Greek Language: A Systematic Review
by Diamanto Tzanoulinou, Loukas Triantafyllopoulos and Vassilios S. Verykios
Mach. Learn. Knowl. Extr. 2025, 7(3), 71; https://doi.org/10.3390/make7030071 - 24 Jul 2025
Viewed by 413
Abstract
Applying language models (LMs) and generative artificial intelligence (GenAI) to the study of Ancient Greek offers promising opportunities. However, it faces substantial challenges due to the language’s morphological complexity and lack of annotated resources. Despite growing interest, no systematic overview of existing research [...] Read more.
Applying language models (LMs) and generative artificial intelligence (GenAI) to the study of Ancient Greek offers promising opportunities. However, it faces substantial challenges due to the language’s morphological complexity and lack of annotated resources. Despite growing interest, no systematic overview of existing research currently exists. To address this gap, a systematic literature review was conducted following the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) 2020 methodology. Twenty-seven peer-reviewed studies were identified and analyzed, focusing on application areas such as machine translation, morphological analysis, named entity recognition (NER), and emotion detection. The review reveals six key findings, highlighting both the technical advances and persistent limitations, particularly the scarcity of large, domain-specific corpora and the need for better integration into educational contexts. Future developments should focus on building richer resources and tailoring models to the unique features of Ancient Greek, thereby fully realizing the potential of these technologies in both research and teaching. Full article
Show Figures

Figure 1

11 pages, 659 KiB  
Article
Afrina barna-like Virus, a Novel Virus Associated with Afrina sporoboliae, the Drop Seed Gall-Forming Nematode
by Edison Reyes-Proaño, Anna M. Griffin, Aida Duarte, Hongyan Sheng, Brenda K. Schroeder, Timothy D. Murray and Alexander V. Karasev
Viruses 2025, 17(8), 1032; https://doi.org/10.3390/v17081032 - 23 Jul 2025
Viewed by 418
Abstract
A novel barna-like virus was found to be associated with field-collected Afrina sporoboliae plant-parasitic nematodes. The positive-sense, single-stranded RNA genome of this virus, named Afrina barna-like virus (AfBLV), comprises 4020 nucleotides encoding four open reading frames (ORFs). ORF 1 encodes a protein product [...] Read more.
A novel barna-like virus was found to be associated with field-collected Afrina sporoboliae plant-parasitic nematodes. The positive-sense, single-stranded RNA genome of this virus, named Afrina barna-like virus (AfBLV), comprises 4020 nucleotides encoding four open reading frames (ORFs). ORF 1 encodes a protein product spanning a transmembrane, a peptidase, and VPg domains, whereas an overlapping ORF 2 encodes an RNA-dependent RNA polymerase (RdRP). ORF2 may be expressed via a −1 translational frameshift. In phylogenetic reconstructions, the RdRP of AfBLV was placed inside a separate clade of barna and barna-like viruses related to but distinct from the genera in the Solemoviridae and Alvernaviridae families, within the overall lineage of Sobelivirales. ORF 3 of AfBLV encodes a protein product of 206 amino acids (aa) long with homology to a putative protein encoded by a similarly positioned gene of an uncharacterized virus sequence identified previously as Barnaviridae sp. ORF 4 encodes a 161 aa protein with no significant similarities to sequences in the GenBank databases. AfBLV is the first barnavirus found in a nematode. Sequence comparisons of the AfBLV genome and genomes of other barna-like viruses suggested that a recombination event was involved in the evolution of AfBLV. Analyses of the phylogeny of RdRPs and genome organizations of barna-like and solemo-like viruses support the re-classification of Barnavirus and Dinornavirus genera as members of the Solemoviridae family. Full article
(This article belongs to the Special Issue Diversity and Evolution of Viruses in Ecosystem 2025)
Show Figures

Figure 1

19 pages, 2689 KiB  
Article
A Multi-Temporal Knowledge Graph Framework for Landslide Monitoring and Hazard Assessment
by Runze Wu, Min Huang, Haishan Ma, Jicai Huang, Zhenhua Li, Hongbo Mei and Chengbin Wang
GeoHazards 2025, 6(3), 39; https://doi.org/10.3390/geohazards6030039 - 23 Jul 2025
Viewed by 316
Abstract
In the landslide chain from pre-disaster conditions to landslide mitigation and recovery, time is an important factor in understanding the geological hazards process and managing landsides. Static knowledge graphs are unable to capture the temporal dynamics of landslide events. To address this limitation, [...] Read more.
In the landslide chain from pre-disaster conditions to landslide mitigation and recovery, time is an important factor in understanding the geological hazards process and managing landsides. Static knowledge graphs are unable to capture the temporal dynamics of landslide events. To address this limitation, we propose a systematic framework for constructing a multi-temporal knowledge graph of landslides that integrates multi-source temporal data, enabling the dynamic tracking of landslide processes. Our approach comprises three key steps. First, we summarize domain knowledge and develop a temporal ontology model based on the disaster chain management system. Second, we map heterogeneous datasets (both tabular and textual data) into triples/quadruples and represent them based on the RDF (Resource Description Framework) and quadruple approaches. Finally, we validate the utility of multi-temporal knowledge graphs through multidimensional queries and develop a web interface that allows users to input landslide names to retrieve location and time-axis information. A case study of the Zhangjiawan landslide in the Three Gorges Reservoir Area demonstrates the multi-temporal knowledge graph’s capability to track temporal updates effectively. The query results show that multi-temporal knowledge graphs effectively support multi-temporal queries. This study advances landslide research by combining static knowledge representation with the dynamic evolution of landslides, laying the foundation for hazard forecasting and intelligent early-warning systems. Full article
(This article belongs to the Special Issue Landslide Research: State of the Art and Innovations)
Show Figures

Figure 1

Back to TopTop