Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,924)

Search Parameters:
Keywords = general scheme demonstration

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
46 pages, 3677 KiB  
Article
HiSatFL: A Hierarchical Federated Learning Framework for Satellite Networks with Cross-Domain Privacy Adaptation
by Ling Li, Lidong Zhu and Weibang Li
Electronics 2025, 14(16), 3237; https://doi.org/10.3390/electronics14163237 - 14 Aug 2025
Abstract
With the proliferation of LEO satellite constellations and increasing demands for on-orbit intelligence, satellite networks generate massive, heterogeneous, and privacy-sensitive data. Ensuring efficient model collaboration under strict privacy constraints remains a critical challenge. This paper proposes HiSatFL, a cross-domain adaptive and privacy-preserving federated [...] Read more.
With the proliferation of LEO satellite constellations and increasing demands for on-orbit intelligence, satellite networks generate massive, heterogeneous, and privacy-sensitive data. Ensuring efficient model collaboration under strict privacy constraints remains a critical challenge. This paper proposes HiSatFL, a cross-domain adaptive and privacy-preserving federated learning framework tailored to the highly dynamic and resource-constrained nature of satellite communication systems. The framework incorporates an orbital-aware hierarchical FL architecture, a multi-level domain adaptation mechanism, and an orbit-enhanced meta-learning strategy to enable rapid adaptation with limited samples. In parallel, privacy is preserved via noise-calibrated feature alignment, differentially private adversarial training, and selective knowledge distillation, guided by a domain-aware dynamic privacy budget allocation scheme. We further establish a unified optimization framework balancing privacy, utility, and adaptability, and derive convergence bounds under dynamic topologies. Experimental results on diverse remote sensing datasets demonstrate that HiSatFL significantly outperforms existing methods in accuracy, adaptability, and communication efficiency, highlighting its practical potential for collaborative on-orbit AI. Full article
(This article belongs to the Special Issue Resilient Communication Technologies for Non-Terrestrial Networks)
Show Figures

Figure 1

20 pages, 2407 KiB  
Article
KAN-and-Attention Based Precoding for Massive MIMO ISAC Systems
by Hanyue Wang, Wence Zhang and Zhiguang Zhang
Electronics 2025, 14(16), 3232; https://doi.org/10.3390/electronics14163232 - 14 Aug 2025
Abstract
Precoding technology is one of the core technologies that significantly impacts the performance of massive Multiple-Input Multiple-Output (MIMO) Integrated Sensing and Communication (ISAC) systems. Traditional precoding methods, due to their inherent limitations, struggle to adapt to complex channel conditions. Although more advanced neural [...] Read more.
Precoding technology is one of the core technologies that significantly impacts the performance of massive Multiple-Input Multiple-Output (MIMO) Integrated Sensing and Communication (ISAC) systems. Traditional precoding methods, due to their inherent limitations, struggle to adapt to complex channel conditions. Although more advanced neural network-based precoding schemes can accommodate complex channel environments, they suffer from high computational complexity. To address these issues, this paper proposes a KAN-and-Attention based ISAC Precoding (KAIP) scheme for massive MIMO ISAC systems. KAIP extracts channel interference features through multi-layer attention mechanisms and leverages the nonlinear fitting capability of the Kolmogorov–Arnold Network (KAN) to generate precoding matrices, significantly enhancing system performance. Simulation results demonstrate that compared with conventional precoding schemes, the proposed KAIP scheme exhibits significant performance enhancements, including a 70% increase in sum rate (SR) and a 96% decrease in computing time (CT) compared with fully connected neural network (FCNN) based precoding, and a 4% improvement in received power (RP) over the precoding based on convolutional neural network (CNN). Full article
(This article belongs to the Section Microwave and Wireless Communications)
Show Figures

Figure 1

46 pages, 26730 KiB  
Review
AI-Driven Multi-Objective Optimization and Decision-Making for Urban Building Energy Retrofit: Advances, Challenges, and Systematic Review
by Rudai Shan, Xiaohan Jia, Xuehua Su, Qianhui Xu, Hao Ning and Jiuhong Zhang
Appl. Sci. 2025, 15(16), 8944; https://doi.org/10.3390/app15168944 - 13 Aug 2025
Viewed by 132
Abstract
Urban building energy retrofit (UBER) is a critical strategy for advancing the low-carbon and climate-resilience transformation of cities. The integration of machine learning (ML), data-driven clustering, and multi-objective optimization (MOO) is a key aspect of artificial intelligence (AI) that is transforming the process [...] Read more.
Urban building energy retrofit (UBER) is a critical strategy for advancing the low-carbon and climate-resilience transformation of cities. The integration of machine learning (ML), data-driven clustering, and multi-objective optimization (MOO) is a key aspect of artificial intelligence (AI) that is transforming the process of retrofit decision-making. This integration enables the development of scalable, cost-effective, and robust solutions on an urban scale. This systematic review synthesizes recent advances in AI-driven MOO frameworks for UBER, focusing on how state-of-the-art methods can help to identify and prioritize retrofit targets, balance energy, cost, and environmental objectives, and develop transparent, stakeholder-oriented decision-making processes. Key advances highlighted in this review include the following: (1) the application of ML-based surrogate models for efficient evaluation of retrofit design alternatives; (2) data-driven clustering and classification to identify high-impact interventions across complex urban fabrics; (3) MOO algorithms that support trade-off analysis under real-world constraints; and (4) the emerging integration of explainable AI (XAI) for enhanced transparency and stakeholder engagement in retrofit planning. Representative case studies demonstrate the practical impact of these approaches in optimizing envelope upgrades, active system retrofits, and prioritization schemes. Notwithstanding these advancements, considerable challenges persist, encompassing data heterogeneity, the transferability of models across disparate urban contexts, fragmented digital toolchains, and the paucity of real-world validation of AI-based solutions. The subsequent discussion encompasses prospective research directions, with particular emphasis on the potential of deep learning (DL), spatiotemporal forecasting, generative models, and digital twins to further advance scalable and adaptive urban retrofit. Full article
(This article belongs to the Special Issue Artificial Intelligence (AI) for Energy Systems)
Show Figures

Figure 1

21 pages, 2229 KiB  
Article
Efficient Reversible Data Hiding in Encrypted Point Clouds via KD Tree-Based Path Planning and Dual-Model Design
by Yuan-Yu Tsai, Chia-Yuan Li, Cheng-Yu Ho and Ching-Ta Lu
Mathematics 2025, 13(16), 2593; https://doi.org/10.3390/math13162593 - 13 Aug 2025
Viewed by 151
Abstract
Reversible data hiding in encrypted point clouds presents unique challenges due to their unstructured geometry, absence of mesh connectivity, and high sensitivity to spatial perturbations. In this paper, we propose an efficient and secure reversible data hiding framework for encrypted point clouds, incorporating [...] Read more.
Reversible data hiding in encrypted point clouds presents unique challenges due to their unstructured geometry, absence of mesh connectivity, and high sensitivity to spatial perturbations. In this paper, we propose an efficient and secure reversible data hiding framework for encrypted point clouds, incorporating KD tree-based path planning, adaptive multi-MSB prediction, and a dual-model design. To establish a consistent spatial traversal order, a Hamiltonian path is constructed using a KD tree-accelerated nearest-neighbor algorithm. Guided by this path, a prediction-driven embedding strategy dynamically adjusts the number of most significant bits (MSBs) embedded per point, balancing capacity and reversibility while generating a label map that reflects local predictability. The label map is then compressed using Huffman coding to reduce the auxiliary overhead. For enhanced security and lossless recovery, the encrypted point cloud is divided into two complementary shares through a lightweight XOR-based (2, 2) secret sharing scheme. The Huffman tree and compressed label map are distributed across both encrypted shares, ensuring that neither share alone can reveal the original point cloud or the embedded message. Experimental evaluations on diverse 3D models demonstrate that the proposed method achieves near-optimal embedding rates, perfect reconstruction of the original model, and significant obfuscation of the geometric structure. These results confirm the practicality and robustness of the proposed framework for scenarios involving secure 3D point cloud transmission, storage, and sharing. Full article
(This article belongs to the Special Issue Information Security and Image Processing)
Show Figures

Figure 1

14 pages, 2652 KiB  
Article
Optimized Multi-Antenna MRC for 16-QAM Transmission in a Photonics-Aided Millimeter-Wave System
by Rahim Uddin, Weiping Li and Jianjun Yu
Sensors 2025, 25(16), 5010; https://doi.org/10.3390/s25165010 - 13 Aug 2025
Viewed by 117
Abstract
This work presents an 80 Gbps photonics-aided millimeter-wave (mm Wave) wireless communication system employing 16-Quadrature Amplitude Modulation (16-QAM) and a 1 × 2 single-input multiple-output (SIMO) architecture with maximum ratio combining (MRC) to achieve robust 87.5 GHz transmission over 4.6 km. By utilizing [...] Read more.
This work presents an 80 Gbps photonics-aided millimeter-wave (mm Wave) wireless communication system employing 16-Quadrature Amplitude Modulation (16-QAM) and a 1 × 2 single-input multiple-output (SIMO) architecture with maximum ratio combining (MRC) to achieve robust 87.5 GHz transmission over 4.6 km. By utilizing polarization-diverse optical heterodyne generation and spatial diversity reception, the system enhances spectral efficiency while addressing the low signal-to-noise ratio (SNR) and channel distortions inherent in long-haul links. A blind equalization scheme combining the constant modulus algorithm (CMA) and decision-directed least mean squares (DD-LMS) filtering enables rapid convergence and suppresses residual inter-symbol interference, effectively mitigating polarization drift and phase noise. The experimental results demonstrate an SNR gain of approximately 3 dB and a significant bit error rate (BER) reduction with MRC compared to single-antenna reception, along with improved SNR performance in multi-antenna configurations. The synergy of photonic mm Wave generation, adaptive spatial diversity, and pilot-free digital signal processing (DSP) establishes a robust framework for high-capacity wireless fronthaul, overcoming atmospheric attenuation and dynamic impairments. This approach highlights the viability of 16-QAM in next-generation ultra-high-speed networks (6G/7G), balancing high data rates with resilient performance under channel degradation. Full article
Show Figures

Figure 1

15 pages, 2679 KiB  
Article
Gradual Improvements in the Visual Quality of the Thin Lines Within the Random Grid Visual Cryptography Scheme
by Maged Wafy
Electronics 2025, 14(16), 3212; https://doi.org/10.3390/electronics14163212 - 13 Aug 2025
Viewed by 110
Abstract
The visual cryptography scheme (VCS) is a fundamental image encryption technique that divides a secret image into two or more shares, such that the original image can be revealed by superimposing a sufficient number of shares. A major limitation of conventional VCS methods [...] Read more.
The visual cryptography scheme (VCS) is a fundamental image encryption technique that divides a secret image into two or more shares, such that the original image can be revealed by superimposing a sufficient number of shares. A major limitation of conventional VCS methods is pixel expansion, wherein the generated shares and reconstructed image are typically at least twice the size of the original. Additionally, thin lines or curves—only one pixel wide in the original image—often appear distorted or duplicated in the reconstructed version, a distortion known as the thin-line problem (TLP). To eliminate the reliance on predefined codebooks inherent in traditional VCS, Kafri introduced the Random Grid visual cryptography scheme (RG-VCS), which eliminates the need for such codebooks. This paper introduces novel algorithms that are among the first to explicitly address the thin-line problem in the context of random grid based schemes. This paper presents novel visual cryptography algorithms specifically designed to address the thin-line preservation problem (TLP), which existing methods typically overlook. A comprehensive visual and numerical comparison was conducted against existing algorithms that do not explicitly handle the TLP. The proposed methods introduce adaptive encoding strategies that preserve fine image details, fully resolving TLP-2 and TLP-3 and partially addressing TLP-1. Experimental results show an average improvement of 18% in SSIM and 13% in contrast over existing approaches. Statistical t-tests confirm the significance of these enhancements, demonstrating the effectiveness and superiority of the proposed algorithms. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

10 pages, 1640 KiB  
Article
A 3D Surface Plot for the Effective Visualization of Specific Serum Antibody Binding Properties
by József Prechl, Ágnes Kovács, Krisztián Papp, Zoltán Hérincs and Tamás Pfeil
Antibodies 2025, 14(3), 68; https://doi.org/10.3390/antib14030068 - 13 Aug 2025
Viewed by 133
Abstract
Background: When an antigen molecule is exposed to serum, many different kinds of antibodies bind to it. The complexity of these binding events is only poorly characterized by assays that generate a single variable, generally reflecting the fractional saturation of the antigen, as [...] Read more.
Background: When an antigen molecule is exposed to serum, many different kinds of antibodies bind to it. The complexity of these binding events is only poorly characterized by assays that generate a single variable, generally reflecting the fractional saturation of the antigen, as the readout. Methods: We have previously devised an assay that delivers the essential biochemical variables to determine fractional saturation as the output: an equilibrium dissociation constant for affinity, the ratio of antibody concentration to the equilibrium constant and the concentration of bound antibodies under reference conditions. Here we propose a visualization method for the practical and informative display of these variables. Results: Using total antigen concentration and free and bound antibody concentration as coordinates in a three-dimensional space, a surface plot can depict the behavior of serum antibodies in the measurement range and identify the values of the key variables of binding activity. This surface display (antibody binding in 3-concentration display, Ab3cD) was used for the characterization of antibody binding to the SARS-CoV-2 spike protein in seronegative and seropositive sera. We demonstrate that this visualization scheme is suitable for presenting both individual and group differences and that epitope density changes, not commonly measured by immunoassays, are also revealed by the method. Conclusions: We recommend the use of 3D visualization whenever detailed, informative and characteristic differences in serum antibody reactivity are studied. Full article
(This article belongs to the Section Humoral Immunity)
Show Figures

Graphical abstract

17 pages, 3941 KiB  
Article
The Effect of Non-Breaking Wave Mixing on Ocean Modeling in the South China Sea
by Yujie Jing, Kejian Wu, Rui Li and Zipeng Yu
J. Mar. Sci. Eng. 2025, 13(8), 1548; https://doi.org/10.3390/jmse13081548 - 12 Aug 2025
Viewed by 176
Abstract
This study investigates the wave-induced vertical mixing mechanism and systematically compares the application of two non-breaking wave parameterization schemes (Bv and Pw) in oceanic numerical simulations of the South China Sea, according to two key physical variables: sea surface temperature (SST) [...] Read more.
This study investigates the wave-induced vertical mixing mechanism and systematically compares the application of two non-breaking wave parameterization schemes (Bv and Pw) in oceanic numerical simulations of the South China Sea, according to two key physical variables: sea surface temperature (SST) and the vertical mixing coefficient. The goal is to explore the effects of different parameterization methods on the upper-ocean temperature distribution in the South China Sea. The results indicate that although both schemes enhance vertical mixing in the upper ocean, they do so through different mechanisms. The Bv scheme directly increases the vertical mixing coefficient, demonstrating significantly stronger mixing intensity, while the Pw scheme impacts mixing indirectly by modulating turbulent kinetic energy generation, resulting in comparatively weaker mixing. SST simulation results show that the Bv scheme is more effective in reducing SST in both winter and summer, with broader spatial improvements. Further analysis of the mixing coefficient confirms that, compared to the Pw scheme, the Bv scheme not only strengthens surface mixing but also penetrates deeper into the water column. Full article
(This article belongs to the Section Physical Oceanography)
Show Figures

Figure 1

15 pages, 3717 KiB  
Article
Multi-Objective ADRC-Based Aircraft Gust Load Control
by Chengxiang Li, Zheng Gong, Yalei Bai, Sikai Guo and Longbin Zhang
Appl. Sci. 2025, 15(16), 8882; https://doi.org/10.3390/app15168882 - 12 Aug 2025
Viewed by 105
Abstract
In this paper, we propose a dual-loop Active Disturbance Rejection Control (ADRC) strategy for gust load alleviation in flexible aircraft. By decoupling the control of modal and normal accelerations and spatially allocating control surfaces, the method effectively resolves signal interference. Simulation results show [...] Read more.
In this paper, we propose a dual-loop Active Disturbance Rejection Control (ADRC) strategy for gust load alleviation in flexible aircraft. By decoupling the control of modal and normal accelerations and spatially allocating control surfaces, the method effectively resolves signal interference. Simulation results show that compared to the uncontrolled case, the ADRC controller reduces the wing root bending moment peak by 38%, the normal load factor peak by 32%, and the pitch angle fluctuation by 38%. Robustness tests under actuator delays (4 Δt and 8 Δt) and gain perturbations (−50% and +100%) further confirm that the system maintains time-domain stability and effective load mitigation across varying conditions. These results demonstrate that the proposed ADRC scheme not only improves load suppression but also offers strong robustness against parameter uncertainty, providing theoretical and practical support for next-generation active control systems in aeroelastic environments. Full article
(This article belongs to the Section Aerospace Science and Engineering)
Show Figures

Figure 1

26 pages, 5933 KiB  
Article
Optimizing Data Distribution Service Discovery for Swarm Unmanned Aerial Vehicles Through Preloading and Network Awareness
by HyeonGyu Lee, Doyoon Kim and SungTae Moon
Drones 2025, 9(8), 564; https://doi.org/10.3390/drones9080564 - 11 Aug 2025
Viewed by 461
Abstract
Collaborative unmanned aerial vehicle (UAV) swarm operations using the open-source PX4–ROS2 system have been extensively studied for reconnaissance and autonomous missions. PX4–ROS2 utilizes data distribution service (DDS) middleware to ensure network flexibility and support scalable operations. DDS enables decentralized information exchange through its [...] Read more.
Collaborative unmanned aerial vehicle (UAV) swarm operations using the open-source PX4–ROS2 system have been extensively studied for reconnaissance and autonomous missions. PX4–ROS2 utilizes data distribution service (DDS) middleware to ensure network flexibility and support scalable operations. DDS enables decentralized information exchange through its discovery protocol. However, in dense swarm environments, the default initialization process of this protocol generates considerable communication overhead, which hinders reliable peer detection among UAVs. This study introduces an optimized DDS discovery scheme incorporating two key strategies: a preloading method that embeds known participant data before deployment, and a dynamic network awareness approach that regulates discovery behavior based on real-time connectivity. Integrated into PX4–ROS2, the proposed scheme was assessed through both simulations and real-world testing. Results demonstrate that the optimized discovery process reduced peak packet traffic by over 90% during the initial exchange phase, thereby facilitating more stable and scalable swarm operations in wireless environments. Full article
(This article belongs to the Section Drone Communications)
Show Figures

Figure 1

25 pages, 2142 KiB  
Article
Viscoelectric and Steric Effects on Electroosmotic Flow in a Soft Channel
by Edson M. Jimenez, Clara G. Hernández, David A. Torres, Nicolas Ratkovich, Juan P. Escandón, Juan R. Gómez and René O. Vargas
Mathematics 2025, 13(16), 2546; https://doi.org/10.3390/math13162546 - 8 Aug 2025
Viewed by 227
Abstract
The present work analyzes the combined viscoelectric and steric effects on electroosmotic flow in a soft channel with polyelectrolyte coating. The structured channel surface, which controls the electric potential, creates two different flow regions: the electrolyte flow within the permeable polyelectrolyte layer (PEL) [...] Read more.
The present work analyzes the combined viscoelectric and steric effects on electroosmotic flow in a soft channel with polyelectrolyte coating. The structured channel surface, which controls the electric potential, creates two different flow regions: the electrolyte flow within the permeable polyelectrolyte layer (PEL) and the bulk electrolyte. Thus, this study discusses the interaction of various electrostatic effects to predict the electroosmotic flow field. The nonlinear governing equations describing the fluid flow are the modified Poisson–Boltzmann equation for the electric potential distribution, the mass conservation equation, and the modified Navier–Stokes equations for the flow field, which are solved numerically using a one-dimensional (1D) scheme. The results indicate that the flow enhances when increasing the electric potential magnitude across the channel cross-section via the rise in different dimensionless parameters, such as the PEL thickness, the steric factor, and the ratio of the electrokinetic parameter of the PEL to that of the electrolyte layer. This research demonstrates that the PEL significantly enhances control over electroosmotic flow. However, it is crucial to consider that viscoelectric effects at high electric fields and the friction generated by the grafted polymer brushes of the PEL can reduce these benefits. Full article
(This article belongs to the Special Issue Advances and Applications in Computational Fluid Dynamics)
Show Figures

Figure 1

20 pages, 780 KiB  
Article
A Semantic Behavioral Sequence-Based Approach to Trajectory Privacy Protection
by Ji Xi, Weiqi Zhang, Zhengwang Xia, Li Zhao and Huawei Tao
Symmetry 2025, 17(8), 1266; https://doi.org/10.3390/sym17081266 - 7 Aug 2025
Viewed by 233
Abstract
Trajectory data contain numerous sensitive attributes. Unauthorized disclosure of precise user trajectory information generates persistent privacy and security concerns that significantly impact daily life. Most existing trajectory privacy protection schemes focus on geographic trajectories while neglecting the critical importance of semantic trajectories, resulting [...] Read more.
Trajectory data contain numerous sensitive attributes. Unauthorized disclosure of precise user trajectory information generates persistent privacy and security concerns that significantly impact daily life. Most existing trajectory privacy protection schemes focus on geographic trajectories while neglecting the critical importance of semantic trajectories, resulting in ongoing privacy vulnerabilities. To address this limitation, we propose the Semantic Behavior Sequence-based Trajectory Privacy Protection method (SBS-TPP). Our approach integrates short-term and long-term behavioral patterns within a user behavior modeling layer to identify user preferences. A dual-model framework (geographic and semantic) generates noise-injected trajectories with maximized noise potential. This methodology applies symmetric noise addition to both geographic trajectory fragments and semantic trajectory segments, optimizing trajectory data utility while ensuring robust protection of sensitive information. The SBS-TPP framework operates in the following two phases: firstly, behavior modeling, which comprises interest extraction from behavioral trajectory sequences, and secondly, noise generation, which creates synthetic noise locations with maximal semantic expectation from original locations, yielding privacy-enhanced trajectories for publication. Experimental results demonstrate that our interest extraction model achieves 93.7% accuracy while maintaining 81.6% data utility under strict privacy guarantees. The proposed method significantly enhances data usability and enables effective recommendation services without compromising user privacy or security. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

32 pages, 4635 KiB  
Article
Maritime Rescue Task Allocation and Sequencing Using MOEA/D with Adaptive Operators and Idle-Time-Aware Decoding Strategy
by Jianhua Sun, Suihuai Yu, Jianjie Chu and Ruisi Liu
J. Mar. Sci. Eng. 2025, 13(8), 1518; https://doi.org/10.3390/jmse13081518 - 7 Aug 2025
Viewed by 157
Abstract
The timeliness of maritime rescue critically depends on the efficient generation of solutions and the execution of missions. Therefore, this study aims to implement maritime rescue task allocation and sequencing (MRTAS) while ensuring solution generation and mission execution efficiencies. First, a mathematical model [...] Read more.
The timeliness of maritime rescue critically depends on the efficient generation of solutions and the execution of missions. Therefore, this study aims to implement maritime rescue task allocation and sequencing (MRTAS) while ensuring solution generation and mission execution efficiencies. First, a mathematical model minimizing mission completion time and resource consumption for MRTAS is established. Second, adaptive operators considering iteration progress and population objective distribution status and an idle-time-aware decoding strategy based on an in-degree embedded gap insertion are proposed. The adaptive operators and idle-time-aware decoding strategy are employed to enhance the multi-objective evolutionary algorithm based on decomposition (MOEA/D) for efficiency improvement in both solution generation and mission execution. The enhanced MOEA/D is then employed to identify Pareto-optimal MRTAS schemes. Validation using two case studies (Case 1–18 task, Case 2–100 task) confirms the practicality and feasibility of the enhanced MOEA/D. Furthermore, ablation studies, sensitivity analyses, and comprehensive comparisons against fixed operators, state-of-the-art algorithms, and traditional decoding strategies all demonstrate that the enhanced MOEA/D can accelerate convergence while maintaining converged solution quality and reduce mission completion time. Full article
(This article belongs to the Section Ocean Engineering)
Show Figures

Figure 1

42 pages, 8886 KiB  
Article
Standard Classes for Urban Topographic Mapping with ALS: Classification Scheme and a First Implementation
by Agata Walicka and Norbert Pfeifer
Remote Sens. 2025, 17(15), 2731; https://doi.org/10.3390/rs17152731 - 7 Aug 2025
Viewed by 293
Abstract
Research regarding airborne laser scanning (ALS) point cloud semantic segmentation typically revolves around supervised machine learning, which requires time-consuming generation of training data. Therefore, the models are usually trained using one of the benchmarking datasets that cover a small area. Recently, many European [...] Read more.
Research regarding airborne laser scanning (ALS) point cloud semantic segmentation typically revolves around supervised machine learning, which requires time-consuming generation of training data. Therefore, the models are usually trained using one of the benchmarking datasets that cover a small area. Recently, many European countries published classified ALS data, which can be potentially used for training models. However, a review of the classification schemes of these datasets revealed that these schemes vary substantially, therefore limiting their applicability. Thus, our goal was three-fold. First, to develop a common classification scheme that can be applied for the semantic segmentation of various ALS datasets. Second, to unify the classification scheme of existing ALS datasets. Third, to employ them for the training of a classifier that will be able to classify data from different sources and will not require additional training. We propose a classification scheme of four classes: ground and water, vegetation, buildings and bridges, and ‘other’. The developed classifier is trained jointly using ALS data from Austria, Switzerland, and Poland. A test on unseen datasets demonstrates that the achieved intersection over union accuracy varies between 90.0–97.3% for ground and water, 68.0–95.9% for vegetation, 77.6–94.8% for buildings and bridges, and 13.5–52.7% for ‘other’. As a result, we conclude that the developed method generalizes well to previously unseen data. Full article
Show Figures

Figure 1

17 pages, 2641 KiB  
Article
Pilot Protection for Transmission Line of Grid-Forming Photovoltaic Systems Based on Jensen–Shannon Distance
by Kuan Li, Qiang Huang and Rongqi Fan
Appl. Sci. 2025, 15(15), 8697; https://doi.org/10.3390/app15158697 - 6 Aug 2025
Viewed by 171
Abstract
When faults occur in transmission lines of grid-forming PV systems, the LVRT control and virtual impedance function cause the fault characteristics of grid-forming inverters to differ significantly from those of synchronous generators, which deteriorates the performance of existing protection schemes. To address this [...] Read more.
When faults occur in transmission lines of grid-forming PV systems, the LVRT control and virtual impedance function cause the fault characteristics of grid-forming inverters to differ significantly from those of synchronous generators, which deteriorates the performance of existing protection schemes. To address this issue, this paper analyzes the fault characteristics of PV transmission lines under grid-forming control objectives and the adaptability of traditional current differential protection. Subsequently, a novel pilot protection based on the Jensen–Shannon distance is proposed for transmission line of grid-forming PV systems. Initially, the post-fault current samples are modeled as discrete probability distributions. The Jensen–Shannon distance algorithm quantifies the similarity between the distributions on both line ends. Based on the calculated distance results, internal and external faults are distinguished, optimizing the performance of traditional waveform-similarity-based pilot protection. Simulation results verify that the proposed protection reliably identifies internal and external faults on the protected line. It demonstrates satisfactory performance across different fault resistances and fault types, and exhibits strong noise immunity and synchronization error tolerance. In addition, the proposed pilot protection is compared with the existing waveform-similarity-based protection schemes. Full article
(This article belongs to the Special Issue Power System Protection: Current and Future Prospectives)
Show Figures

Figure 1

Back to TopTop