Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (146)

Search Parameters:
Keywords = mobile sensing schemes

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
23 pages, 4343 KB  
Article
Sustainable Disorder: The Hybrid Logic of “Sense of Place” Construction in Tourist Spaces—A Case Study of Harbin Morning Market
by Yujia Guo, Zengyu Li and Xuhua Chen
Sustainability 2025, 17(21), 9675; https://doi.org/10.3390/su17219675 - 30 Oct 2025
Viewed by 157
Abstract
Taking Harbin morning market as a case study, this study explores sustainable production schemes for generating sense of place in urban spaces amid the trend of modernization. Employing grounded theory, it develops an analytical model consisting of three components: space, humans, and materials. [...] Read more.
Taking Harbin morning market as a case study, this study explores sustainable production schemes for generating sense of place in urban spaces amid the trend of modernization. Employing grounded theory, it develops an analytical model consisting of three components: space, humans, and materials. The findings reveal that place identity emerges from functional redundancy and self-organizing spatial layouts, where the hybrid logic of spatial design, the non-programmed interactions of human actors, and the material networks together enable tourists to transform from spectators into embodied participants. Theoretically, this study proposes a hybrid logic and challenges high modernism. It emphasizes that fully mobilizing the spontaneous vitality of every actor in the space is more effective than unilaterally improving rules and functions, offering a sustainable path for nurturing localized cultural ecosystems against homogenization. Full article
Show Figures

Figure 1

28 pages, 2737 KB  
Article
Channel Estimation in UAV-Assisted OFDM Systems by Leveraging LoS and Echo Sensing with Carrier Aggregation
by Zhuolei Chen, Wenbin Wu, Renshu Wang, Manshu Liang, Weihao Zhang, Shuning Yao, Wenquan Hu and Chaojin Qing
Sensors 2025, 25(20), 6392; https://doi.org/10.3390/s25206392 - 16 Oct 2025
Viewed by 539
Abstract
Unmanned aerial vehicle (UAV)-assisted wireless communication systems often employ the carrier aggregation (CA) technique to alleviate the issue of insufficient bandwidth. However, in high-mobility UAV communication scenarios, the dynamic channel characteristics pose significant challenges to channel estimation (CE). Given these challenges, this paper [...] Read more.
Unmanned aerial vehicle (UAV)-assisted wireless communication systems often employ the carrier aggregation (CA) technique to alleviate the issue of insufficient bandwidth. However, in high-mobility UAV communication scenarios, the dynamic channel characteristics pose significant challenges to channel estimation (CE). Given these challenges, this paper proposes a line-of-sight (LoS) and echo sensing-based CE scheme for CA-enabled UAV-assisted communication systems. Firstly, LoS sensing and echo sensing are employed to obtain sensing-assisted prior information, which refines the CE for the primary component carrier (PCC). Subsequently, the path-sharing property between the PCC and secondary component carriers (SCCs) is exploited to reconstruct SCC channels in the delay-Doppler (DD) domain through a three-stage process. The simulation results demonstrate that the proposed method effectively enhances the CE accuracy for both the PCC and SCCs. Furthermore, the proposed scheme exhibits robustness against parameter variations. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

21 pages, 912 KB  
Article
UAV-Enabled Maritime IoT D2D Task Offloading: A Potential Game-Accelerated Framework
by Baiyi Li, Jian Zhao and Tingting Yang
Sensors 2025, 25(18), 5820; https://doi.org/10.3390/s25185820 - 18 Sep 2025
Viewed by 417
Abstract
Maritime Internet of Things (IoT) with unmanned surface vessels (USVs) faces tight onboard computing and sparse wireless links. Compute-intensive vision and sensing workloads often exceed latency budgets, which undermines timely decisions. In this paper, we propose a novel distributed computation offloading framework for [...] Read more.
Maritime Internet of Things (IoT) with unmanned surface vessels (USVs) faces tight onboard computing and sparse wireless links. Compute-intensive vision and sensing workloads often exceed latency budgets, which undermines timely decisions. In this paper, we propose a novel distributed computation offloading framework for maritime IoT scenarios. By leveraging the limited computational resources of USVs within a device-to-device (D2D)-assisted edge network and the mobility advantages of UAV-assisted edge computing, we design a breadth-first search (BFS)-based distributed computation offloading game. Building upon this, we formulate a global latency minimization problem that jointly optimizes UAV hovering coordinates and arrival times. This problem is solved by decomposing it into subproblems addressed via a joint Alternating Direction Method of Multipliers (ADMM) and Successive Convex Approximation (SCA) approach, effectively reducing the time between UAV arrivals and hovering coordinates. Extensive simulations verify the effectiveness of our framework, demonstrating up to a 49.6% latency reduction compared with traditional offloading schemes. Full article
(This article belongs to the Special Issue Artificial Intelligence and Edge Computing in IoT-Based Applications)
Show Figures

Figure 1

24 pages, 1224 KB  
Article
Multi-UAV-Assisted ISAC System: Joint User Association, Trajectory Design, and Resource Allocation
by Jinwei Wang, Renhui Xu, Laixian Peng and Xianglin Wei
Entropy 2025, 27(9), 967; https://doi.org/10.3390/e27090967 - 17 Sep 2025
Viewed by 591
Abstract
Unmanned aerial vehicle (UAV)-assisted integrated sensing and communication (ISAC) systems have developed rapidly in the sixth generation (6G) era. However, factors such as the mobility of ground users and malicious jamming pose significant challenges to systems’ performance and reliability. Against this backdrop, this [...] Read more.
Unmanned aerial vehicle (UAV)-assisted integrated sensing and communication (ISAC) systems have developed rapidly in the sixth generation (6G) era. However, factors such as the mobility of ground users and malicious jamming pose significant challenges to systems’ performance and reliability. Against this backdrop, this paper designs a multi-UAV-assisted ISAC system model under malicious jamming environments. Under the constraint of sensing accuracy, the total communication rate of the system is maximized through joint optimization of user association, UAV trajectory, and transmit power. The problem is then decomposed into three subproblems, which are solved using the improved auction algorithm (IAA), dream optimization algorithm (DOA), and rapidly-exploring random trees-based optimizer algorithm (RRTOA). The global optimal solution is approached through the alternating optimization-based predictive scheduling algorithm (AOPSA). Meanwhile, this paper also introduces a long short-term memory (LSTM) network to predict users’ dynamic positions, addressing the impact of user mobility and enhancing the system’s real-time performance. Simulation results show that compared with the baseline scheme, the proposed algorithm achieves a 188% improvement in communication rate, which verifies its effectiveness and superiority. Full article
(This article belongs to the Section Information Theory, Probability and Statistics)
Show Figures

Figure 1

35 pages, 6608 KB  
Article
BcDKM: Blockchain-Based Dynamic Key Management Scheme for Crowd Sensing in Vehicular Sensor Networks
by Mingrui Zhang, Ru Meng and Lei Zhang
Sensors 2025, 25(18), 5699; https://doi.org/10.3390/s25185699 - 12 Sep 2025
Viewed by 430
Abstract
Vehicular sensor networks (VSNs) consist of vehicles equipped with various sensing devices, such as LiDAR. In a VSN, vehicles and/or roadside units (RSUs) can be organized into a vehicular cloud (VC) to enable the sharing of sensing and computational resources among participants, thereby [...] Read more.
Vehicular sensor networks (VSNs) consist of vehicles equipped with various sensing devices, such as LiDAR. In a VSN, vehicles and/or roadside units (RSUs) can be organized into a vehicular cloud (VC) to enable the sharing of sensing and computational resources among participants, thereby supporting crowd-sensing applications. However, the highly dynamic nature of vehicular mobility poses significant challenges in terms of establishing secure and scalable group communication within the VC. To address these challenges, we first introduce a lightweight extension of the continuous group key agreement (CGKA) scheme by incorporating an administrator mechanism. The resulting scheme, referred to as CGKAwAM, supports the designation of multiple administrators within a single group for flexible member management. Building upon CGKAwAM, we propose a blockchain-based dynamic key management scheme, termed BcDKM. This scheme supports asynchronous join and leave operations while achieving communication round optimality. Furthermore, RSUs are leveraged as blockchain nodes to enable decentralized VC discovery and management, ensuring scalability without relying on a centralized server. We formally analyze the security of both CGKAwAM and BcDKM. The results demonstrate that the proposed scheme satisfies several critical security properties, including known-key security, forward secrecy, post-compromise security, and vehicle privacy. Experimental evaluations further confirm that BcDKM is practical and achieves a well-balanced tradeoff between security and performance. Full article
(This article belongs to the Special Issue Advanced Vehicular Ad Hoc Networks: 2nd Edition)
Show Figures

Figure 1

19 pages, 13244 KB  
Article
MWR-Net: An Edge-Oriented Lightweight Framework for Image Restoration in Single-Lens Infrared Computational Imaging
by Xuanyu Qian, Xuquan Wang, Yujie Xing, Guishuo Yang, Xiong Dun, Zhanshan Wang and Xinbin Cheng
Remote Sens. 2025, 17(17), 3005; https://doi.org/10.3390/rs17173005 - 29 Aug 2025
Viewed by 884
Abstract
Infrared video imaging is an cornerstone technology for environmental perception, particularly in drone-based remote sensing applications such as disaster assessment and infrastructure inspection. Conventional systems, however, rely on bulky optical architectures that limit deployment on lightweight aerial platforms. Computational imaging offers a promising [...] Read more.
Infrared video imaging is an cornerstone technology for environmental perception, particularly in drone-based remote sensing applications such as disaster assessment and infrastructure inspection. Conventional systems, however, rely on bulky optical architectures that limit deployment on lightweight aerial platforms. Computational imaging offers a promising alternative by integrating optical encoding with algorithmic reconstruction, enabling compact hardware while maintaining imaging performance comparable to sophisticated multi-lens systems. Nonetheless, achieving real-time video-rate computational image restoration on resource-constrained unmanned aerial vehicles (UAVs) remains a critical challenge. To address this, we propose Mobile Wavelet Restoration-Net (MWR-Net), a lightweight deep learning framework tailored for real-time infrared image restoration. Built on a MobileNetV4 backbone, MWR-Net leverages depthwise separable convolutions and an optimized downsampling scheme to minimize parameters and computational overhead. A novel wavelet-domain loss enhances high-frequency detail recovery, while the modulation transfer function (MTF) is adopted as an optics-aware evaluation metric. With only 666.37 K parameters and 6.17 G MACs, MWR-Net achieves a PSNR of 37.10 dB and an SSIM of 0.964 on a custom dataset, outperforming a pruned U-Net baseline. Deployed on an RK3588 chip, it runs at 42 FPS. These results demonstrate MWR-Net’s potential as an efficient and practical solution for UAV-based infrared sensing applications. Full article
Show Figures

Figure 1

33 pages, 3689 KB  
Article
Research on a Multi-Agent Job Shop Scheduling Method Based on Improved Game Evolution
by Wei Xie, Bin Du, Jiachen Ma, Jun Chen and Xiangle Zheng
Symmetry 2025, 17(8), 1368; https://doi.org/10.3390/sym17081368 - 21 Aug 2025
Viewed by 671
Abstract
As the global manufacturing industry’s transformation accelerates toward being intelligent, “unmanned”, and low-carbon, manufacturing workshops face conflicts between production schedules and transportation tasks, leading to low efficiency and resource waste. This paper presents a multi-agent collaborative scheduling optimization method based on a hybrid [...] Read more.
As the global manufacturing industry’s transformation accelerates toward being intelligent, “unmanned”, and low-carbon, manufacturing workshops face conflicts between production schedules and transportation tasks, leading to low efficiency and resource waste. This paper presents a multi-agent collaborative scheduling optimization method based on a hybrid game–genetic framework to address issues like high AGV (Automated Guided Vehicle) idle rates, excessive energy consumption, and uncoordinated equipment scheduling. The method establishes a trinity system integrating distributed decision-making, dynamic coordination, and environment awareness. In this system, the multi-agent decision-making and collaboration process exhibits significant symmetry characteristics. All agents (machine agents, mobile agents, etc.) follow unified optimization criteria and interaction rules, forming a dynamically balanced symmetric scheduling framework in resource competition and collaboration, which ensures fairness and consistency among different agents in task allocation, path planning, and other links. An improved best-response dynamic algorithm is employed in the decision-making layer to solve the multi-agent Nash equilibrium, while the genetic optimization layer enhances the global search capability by encoding scheduling schemes and adjusting crossover/mutation probabilities using dynamic competition factors. The coordination pivot layer updates constraints in real time based on environmental sensing, forming a closed-loop optimization mechanism. Experimental results show that, compared with the traditional genetic algorithm (TGA) and particle swarm optimization (PSO), the proposed method reduces the maximum completion time by 54.5% and 44.4% in simple scenarios and 57.1% in complex scenarios, the AGV idling rate by 68.3% in simple scenarios and 67.5%/77.6% in complex scenarios, and total energy consumption by 15.7%/10.9% in simple scenarios and 25%/18.2% in complex scenarios. This validates the method’s effectiveness in improving resource utilization and energy efficiency, providing a new technical path for intelligent scheduling in manufacturing workshops. Meanwhile, its symmetric multi-agent collaborative framework also offers a reference for the application of symmetry in complex manufacturing system optimization. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

19 pages, 6768 KB  
Article
Two-Stage Online Task Assignment in Mobile Crowdsensing
by Hongjian Zeng, Yonghua Xiong and Jinhua She
Appl. Sci. 2025, 15(16), 9094; https://doi.org/10.3390/app15169094 - 18 Aug 2025
Viewed by 420
Abstract
The development of modern communication technologies and smart mobile devices has driven the evolution of mobile crowdsensing (MCS). Optimizing the task assignment process under constrained resources to maximize utility is a key challenge in MCS. However, most existing studies presuppose a sufficient pool [...] Read more.
The development of modern communication technologies and smart mobile devices has driven the evolution of mobile crowdsensing (MCS). Optimizing the task assignment process under constrained resources to maximize utility is a key challenge in MCS. However, most existing studies presuppose a sufficient pool of available workers during the task assignment process, overlooking the impact of temporal fluctuations in worker numbers under online scenarios. Additionally, existing studies commonly publish sensing tasks to the MCS platform for immediate assignment upon their arrival. However, the uncertainty in the number of available workers in online scenarios may fail to meet task demands. To address these challenges, this paper proposes a two-stage online task assignment scheme. The first stage introduces an adaptive task pre-assignment strategy based on worker quantity prediction, which determines task acceptance and assigns tasks to suitable subareas. The second stage employs a dynamic online recruitment method to select workers for the assigned tasks, aiming to maximize platform utility. Finally, the simulation experiments conducted on two real-world datasets demonstrate that the proposed methods effectively solve the challenges of online task assignment in MCS. Full article
Show Figures

Figure 1

19 pages, 3806 KB  
Article
Farmdee-Mesook: An Intuitive GHG Awareness Smart Agriculture Platform
by Mongkol Raksapatcharawong and Watcharee Veerakachen
Agronomy 2025, 15(8), 1772; https://doi.org/10.3390/agronomy15081772 - 24 Jul 2025
Viewed by 1017
Abstract
Climate change presents urgent and complex challenges to agricultural sustainability and food security, particularly in regions reliant on resource-intensive staple crops. Smart agriculture—through the integration of crop modeling, satellite remote sensing, and artificial intelligence (AI)—offers data-driven strategies to enhance productivity, optimize input use, [...] Read more.
Climate change presents urgent and complex challenges to agricultural sustainability and food security, particularly in regions reliant on resource-intensive staple crops. Smart agriculture—through the integration of crop modeling, satellite remote sensing, and artificial intelligence (AI)—offers data-driven strategies to enhance productivity, optimize input use, and mitigate greenhouse gas (GHG) emissions. This study introduces Farmdee-Mesook, a mobile-first smart agriculture platform designed specifically for Thai rice farmers. The platform leverages AquaCrop simulation, open-access satellite data, and localized agronomic models to deliver real-time, field-specific recommendations. Usability-focused design and no-cost access facilitate its widespread adoption, particularly among smallholders. Empirical results show that platform users achieved yield increases of up to 37%, reduced agrochemical costs by 59%, and improved water productivity by 44% under alternate wetting and drying (AWD) irrigation schemes. These outcomes underscore the platform’s role as a scalable, cost-effective solution for operationalizing climate-smart agriculture. Farmdee-Mesook demonstrates that digital technologies, when contextually tailored and institutionally supported, can serve as critical enablers of climate adaptation and sustainable agricultural transformation. Full article
(This article belongs to the Special Issue Smart Farming Technologies for Sustainable Agriculture—2nd Edition)
Show Figures

Figure 1

18 pages, 1005 KB  
Article
FedEach: Federated Learning with Evaluator-Based Incentive Mechanism for Human Activity Recognition
by Hyun Woo Lim, Sean Yonathan Tanjung, Ignatius Iwan, Bernardo Nugroho Yahya and Seok-Lyong Lee
Sensors 2025, 25(12), 3687; https://doi.org/10.3390/s25123687 - 12 Jun 2025
Cited by 1 | Viewed by 977
Abstract
Federated learning (FL) is a decentralized approach that aims to establish a global model by aggregating updates from diverse clients without sharing their local data. However, the approach becomes complicated when Byzantine clients join with arbitrary manipulation, referred to as malicious clients. Classical [...] Read more.
Federated learning (FL) is a decentralized approach that aims to establish a global model by aggregating updates from diverse clients without sharing their local data. However, the approach becomes complicated when Byzantine clients join with arbitrary manipulation, referred to as malicious clients. Classical techniques, such as Federated Averaging (FedAvg), are insufficient to incentivize reliable clients and discourage malicious clients. Other existing Byzantine FL schemes to address malicious clients are either incentive-reliable clients or need-to-provide server-labeled data as the public validation dataset, which increase time complexity. This study introduces a federated learning framework with an evaluator-based incentive mechanism (FedEach) that offers robustness with no dependency on server-labeled data. In this framework, we introduce evaluators and participants. Unlike the existing approaches, the server selects the evaluators and participants among the clients using model-based performance evaluation criteria such as test score and reputation. Afterward, the evaluators assess and evaluate whether a participant is reliable or malicious. Subsequently, the server exclusively aggregates models from these identified reliable participants and the evaluators for global model updates. After this aggregation, the server calculates each client’s contribution, prioritizing each client’s contribution to ensure the fair recognition of high-quality updates and penalizing malicious clients based on their contributions. Empirical evidence obtained from the performance in human activity recognition (HAR) datasets highlights FedEach’s effectiveness, especially in environments with a high presence of malicious clients. In addition, FedEach maintains computational efficiency so that it is reliable for efficient FL applications such as sensor-based HAR with wearable devices and mobile sensing. Full article
(This article belongs to the Special Issue Wearable Devices for Physical Activity and Healthcare Monitoring)
Show Figures

Figure 1

24 pages, 2317 KB  
Article
Transparent and Privacy-Preserving Mobile Crowd-Sensing System with Truth Discovery
by Ruijuan Jia, Juan Ma, Ziyin You and Mingyue Zhang
Sensors 2025, 25(7), 2294; https://doi.org/10.3390/s25072294 - 4 Apr 2025
Viewed by 913
Abstract
The proliferation of numerous portable mobile devices has made mobile crowd-sensing (MCS) systems a promising new trend. Traditional MCS systems typically outsource sensing tasks to the data aggregator (e.g., cloud server). They collect and analyze the provided sensing data through an appropriate truth [...] Read more.
The proliferation of numerous portable mobile devices has made mobile crowd-sensing (MCS) systems a promising new trend. Traditional MCS systems typically outsource sensing tasks to the data aggregator (e.g., cloud server). They collect and analyze the provided sensing data through an appropriate truth discovery (TD) method to identify valuable data sets. However, existing privacy-preserving MCS systems lack transparency, enabling data aggregators to deviate from the specified protocols and allowing malicious users to provide false or invalid sensing data, thereby contaminating the resulting data sets. The lack of transparency and public verifiability in MCS systems undermines widespread adoption by preventing data requesters from confidently verifying data integrity and accuracy. To address this issue, we propose a transparent and privacy-preserving mobile crowd-sensing system with truth discovery (TP-MCS) constructed using zero-knowledge proof (ZKP) and the Merkle commitment tree. This scheme enables data requesters to effectively verify the correctness of the truth discovery service while ensuring data privacy. Furthermore, theoretical analysis and extensive experiments demonstrate that this scheme is secure and efficient. Full article
(This article belongs to the Special Issue Advanced Mobile Edge Computing in 5G Networks)
Show Figures

Figure 1

28 pages, 2083 KB  
Article
Pipe Routing with Topology Control for Decentralized and Autonomous UAV Networks
by Shreyas Devaraju, Shivam Garg, Alexander Ihler, Elizabeth Serena Bentley and Sunil Kumar
Drones 2025, 9(2), 140; https://doi.org/10.3390/drones9020140 - 13 Feb 2025
Cited by 1 | Viewed by 1474
Abstract
This paper considers a decentralized and autonomous wireless network of low SWaP (size, weight, and power) fixed-wing UAVs (unmanned aerial vehicles) used for remote exploration and monitoring of targets in an inaccessible area lacking communication infrastructure. Here, the UAVs collaborate to find target(s) [...] Read more.
This paper considers a decentralized and autonomous wireless network of low SWaP (size, weight, and power) fixed-wing UAVs (unmanned aerial vehicles) used for remote exploration and monitoring of targets in an inaccessible area lacking communication infrastructure. Here, the UAVs collaborate to find target(s) and use routing protocols to forward the sensed data of target(s) to an aerial base station (BS) in real-time through multihop communication, which can then transmit the data to a control center. However, the unpredictability of target locations and the highly dynamic nature of autonomous, decentralized UAV networks result in frequent route breaks or traffic disruptions. Traditional routing schemes cannot quickly adapt to dynamic UAV networks and can incur large control overhead and delays. In addition, their performance suffers from poor network connectivity in sparse networks with multiple objectives (exploration and monitoring of targets), which results in frequent route unavailability. To address these challenges, we propose two routing schemes: Pipe routing and TC-Pipe routing. Pipe routing is a mobility-, congestion-, and energy-aware scheme that discovers routes to the BS on-demand and proactively switches to alternate high-quality routes within a limited region around the routes (referred to as the “pipe”) when needed. TC-Pipe routing extends this approach by incorporating a decentralized topology control mechanism to help maintain robust connectivity in the pipe region around the routes, resulting in improved route stability and availability. The proposed schemes adopt a novel approach by integrating the topology control with routing protocol and mobility model, and rely only on local information in a distributed manner. Comprehensive evaluations under diverse network and traffic conditions—including UAV density and speed, number of targets, and fault tolerance—show that the proposed schemes improve throughput by reducing flow interruptions and packet drops caused by mobility, congestion, and node failures. At the same time, the impact on coverage performance (measured in terms of coverage and coverage fairness) is minimal, even with multiple targets. Additionally, the performance of both schemes degrades gracefully as the percentage of UAV failures in the network increases. Compared to schemes that use dedicated UAVs as relay nodes to establish a route to the BS when the UAV density is low, Pipe and TC-Pipe routing offer better coverage and connectivity trade-offs, with the TC-Pipe providing the best trade-off. Full article
Show Figures

Figure 1

21 pages, 2425 KB  
Article
Resource and Trajectory Optimization in RIS-Assisted Cognitive UAV Networks with Multiple Users Under Malicious Eavesdropping
by Juan Li, Gang Wang, Hengzhou Jin, Jing Zhou, Wei Li and Hang Hu
Electronics 2025, 14(3), 541; https://doi.org/10.3390/electronics14030541 - 29 Jan 2025
Viewed by 1175
Abstract
Unmanned aerial vehicles (UAVs) have shown significant advantages in disaster relief, emergency communication, and Integrated Sensing and Communication (ISAC). However, the escalating demand for UAV spectrum is severely restricted by the scarcity of available spectrum, which in turn significantly limits communication performance. Additionally, [...] Read more.
Unmanned aerial vehicles (UAVs) have shown significant advantages in disaster relief, emergency communication, and Integrated Sensing and Communication (ISAC). However, the escalating demand for UAV spectrum is severely restricted by the scarcity of available spectrum, which in turn significantly limits communication performance. Additionally, the openness of the wireless channel poses a serious threat, such as wiretapping and jamming. Therefore, it is necessary to improve the security performance of the system. Recently, Reconfigurable Intelligent Surfaces (RIS), as a highly promising technology, has been integrated into Cognitive UAV Network. This integration enhances the legitimate signal while suppressing the eavesdropping signal. This paper investigates a RIS-assisted Cognitive UAV Network with multiple corresponding receiving users as cognitive users (CUs) in the presence of malicious eavesdroppers (Eav), in which the Cognitive UAV functions as the mobile aerial Base Station (BS) to transmit confidential messages for the users on the ground. Our primary aim is to attain the maximum secrecy bits by means of jointly optimizing the transmit power, access scheme of the CUs, the RIS phase shift matrix, and the trajectory. In light of the fact that the access scheme is an integer, the original problem proves to be a mixed integer non-convex one, which falls into the NP-hard category. To solve this problem, we propose block coordinate descent and successive convex approximation (BCD-SCA) algorithms. Firstly, we introduce the BCD algorithm to decouple the coupled variables and convert the original problem into four sub-problems for the non-convex subproblems to solve by the SCA algorithm. The results of our simulations indicate that the joint optimization scheme we have put forward not only achieves robust convergence but also outperforms conventional benchmark approaches. Full article
(This article belongs to the Special Issue Unmanned Aerial Vehicles (UAVs) Communication and Networking)
Show Figures

Graphical abstract

20 pages, 7507 KB  
Article
Sliding-Window Dissimilarity Cross-Attention for Near-Real-Time Building Change Detection
by Wen Lu and Minh Nguyen
Remote Sens. 2025, 17(1), 135; https://doi.org/10.3390/rs17010135 - 2 Jan 2025
Viewed by 1799
Abstract
A near-real-time change detection network can consistently identify unauthorized construction activities over a wide area, empowering authorities to enforce regulations efficiently. Furthermore, it can promptly assess building damage, enabling expedited rescue efforts. The extensive adoption of deep learning in change detection has prompted [...] Read more.
A near-real-time change detection network can consistently identify unauthorized construction activities over a wide area, empowering authorities to enforce regulations efficiently. Furthermore, it can promptly assess building damage, enabling expedited rescue efforts. The extensive adoption of deep learning in change detection has prompted a predominant emphasis on enhancing detection performance, primarily through the expansion of the depth and width of networks, overlooking considerations regarding inference time and computational cost. To accurately represent the spatio-temporal semantic correlations between pre-change and post-change images, we create an innovative transformer attention mechanism named Sliding-Window Dissimilarity Cross-Attention (SWDCA), which detects spatio-temporal semantic discrepancies by explicitly modeling the dissimilarity of bi-temporal tokens, departing from the mono-temporal similarity attention typically used in conventional transformers. In order to fulfill the near-real-time requirement, SWDCA employs a sliding-window scheme to limit the range of the cross-attention mechanism within a predetermined window/dilated window size. This approach not only excludes distant and irrelevant information but also reduces computational cost. Furthermore, we develop a lightweight Siamese backbone for extracting building and environmental features. Subsequently, we integrate an SWDCA module into this backbone, forming an efficient change detection network. Quantitative evaluations and visual analyses of thorough experiments verify that our method achieves top-tier accuracy on two building change detection datasets of remote sensing imagery, while also achieving a real-time inference speed of 33.2 FPS on a mobile GPU. Full article
(This article belongs to the Special Issue Remote Sensing and SAR for Building Monitoring)
Show Figures

Figure 1

45 pages, 447 KB  
Article
Revisions of the Phenomenological and Statistical Statements of the Second Law of Thermodynamics
by Grzegorz Marcin Koczan and Roberto Zivieri
Entropy 2024, 26(12), 1122; https://doi.org/10.3390/e26121122 - 22 Dec 2024
Cited by 3 | Viewed by 1455
Abstract
The status of the Second Law of Thermodynamics, even in the 21st century, is not as certain as when Arthur Eddington wrote about it a hundred years ago. It is not only about the truth of this law, but rather about its strict [...] Read more.
The status of the Second Law of Thermodynamics, even in the 21st century, is not as certain as when Arthur Eddington wrote about it a hundred years ago. It is not only about the truth of this law, but rather about its strict and exhaustive formulation. In the previous article, it was shown that two of the three most famous thermodynamic formulations of the Second Law of Thermodynamics are non-exhaustive. However, the status of the statistical approach, contrary to common and unfounded opinions, is even more difficult. It is known that Boltzmann did not manage to completely and correctly derive the Second Law of Thermodynamics from statistical mechanics, even though he probably did everything he could in this regard. In particular, he introduced molecular chaos into the extension of the Liouville equation, obtaining the Boltzmann equation. By using the H theorem, Boltzmann transferred the Second Law of Thermodynamics thesis to the molecular chaos hypothesis, which is not considered to be fully true. Therefore, the authors present a detailed and critical review of the issue of the Second Law of Thermodynamics and entropy from the perspective of phenomenological thermodynamics and statistical mechanics, as well as kinetic theory. On this basis, Propositions 1–3 for the statements of the Second Law of Thermodynamics are formulated in the original part of the article. Proposition 1 is based on resolving the misunderstanding of the Perpetuum Mobile of the Second Kind by introducing the Perpetuum Mobile of the Third Kind. Proposition 2 specifies the structure of allowed thermodynamic processes by using the Inequality of Heat and Temperature Proportions inspired by Eudoxus of Cnidus’s inequalities defining real numbers. Proposition 3 is a Probabilistic Scheme of the Second Law of Thermodynamics that, like a game, shows the statistical tendency for entropy to increase, even though the possibility of it decreasing cannot be completely ruled out. Proposition 3 is, in some sense, free from Loschmidt’s irreversibility paradox. Full article
(This article belongs to the Special Issue Trends in the Second Law of Thermodynamics)
Back to TopTop