Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (480)

Search Parameters:
Keywords = packing problems

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
17 pages, 341 KB  
Review
Some Mathematical Problems Behind Lattice-Based Cryptography
by Chuanming Zong
Cryptography 2026, 10(1), 10; https://doi.org/10.3390/cryptography10010010 - 12 Feb 2026
Viewed by 81
Abstract
In 1994, P. Shor discovered quantum algorithms that can break both the RSA cryptosystem and the ElGamal cryptosystem. In 2007, D-Wave demonstrated the first quantum computer. These events and further developments have brought a crisis to secret communication. In 2016, the National Institute [...] Read more.
In 1994, P. Shor discovered quantum algorithms that can break both the RSA cryptosystem and the ElGamal cryptosystem. In 2007, D-Wave demonstrated the first quantum computer. These events and further developments have brought a crisis to secret communication. In 2016, the National Institute of Standards and Technology (NIST) launched a global project to solicit and select a handful of encryption algorithms with the ability to resist quantum computer attacks. In 2022, it announced four candidates, CRYSTALS-Kyber, CRYSTALS-Dilithium, Falcon, and Sphincs+, for post-quantum cryptography standards. The first three are based on lattice theory and the last on a hash function. The security of lattice-based cryptosystems relies on the computational complexity of the shortest vector problem (SVP), the closest vector problem (CVP), and their generalizations. As we will explain, the SVP is a ball-packing problem, and the CVP is a ball-covering problem. Furthermore, both the SVP and CVP are equivalent to arithmetic problems for positive definite quadratic forms. This paper will briefly describe the mathematical problems on which lattice-based cryptography is built so that cryptographers can extend their views and learn something useful. Full article
(This article belongs to the Section Cryptography Reviews)
Show Figures

Figure 1

24 pages, 8047 KB  
Article
MEE-DETR: Multi-Scale Edge-Aware Enhanced Transformer for PCB Defect Detection
by Xiaoyu Ma, Xiaolan Xie and Yuhui Song
Electronics 2026, 15(3), 504; https://doi.org/10.3390/electronics15030504 - 23 Jan 2026
Viewed by 287
Abstract
Defect inspection of Printed Circuit Board (PCB) is essential for maintaining the safety and reliability of electronic products. With the continuous trend toward smaller components and higher integration levels, identifying tiny imperfections on densely packed PCB structures has become increasingly difficult and remains [...] Read more.
Defect inspection of Printed Circuit Board (PCB) is essential for maintaining the safety and reliability of electronic products. With the continuous trend toward smaller components and higher integration levels, identifying tiny imperfections on densely packed PCB structures has become increasingly difficult and remains a major challenge for current inspection systems. To tackle this problem, this study proposes the Multi-scale Edge-Aware Enhanced Detection Transformer (MEE-DETR), a deep learning-based object detection method. Building upon the RT-DETR framework, which is grounded in Transformer-based machine learning, the proposed approach systematically introduces enhancements at three levels: backbone feature extraction, feature interaction, and multi-scale feature fusion. First, the proposed Edge-Strengthened Backbone Network (ESBN) constructs multi-scale edge extraction and semantic fusion pathways, effectively strengthening the structural representation of shallow defect edges. Second, the Entanglement Transformer Block (ETB), synergistically integrates frequency self-attention, spatial self-attention, and a frequency–spatial entangled feed-forward network, enabling deep cross-domain information interaction and consistent feature representation. Finally, the proposed Adaptive Enhancement Feature Pyramid Network (AEFPN), incorporating the Adaptive Cross-scale Fusion Module (ACFM) for cross-scale adaptive weighting and the Enhanced Feature Extraction C3 Module (EFEC3) for local nonlinear enhancement, substantially improves detail preservation and semantic balance during feature fusion. Experiments conducted on the PKU-Market-PCB dataset reveal that MEE-DETR delivers notable performance gains. Specifically, Precision, Recall, and mAP50–95 improve by 2.5%, 9.4%, and 4.2%, respectively. In addition, the model’s parameter size is reduced by 40.7%. These results collectively indicate that MEE-DETR achieves excellent detection performance with a lightweight network architecture. Full article
Show Figures

Figure 1

24 pages, 4180 KB  
Article
CSSA: An Enhanced Sparrow Search Algorithm with Hybrid Strategies for Engineering Optimization
by Yancang Li and Jiawei Li
Algorithms 2026, 19(1), 51; https://doi.org/10.3390/a19010051 - 6 Jan 2026
Viewed by 292
Abstract
To address the limitations of the standard Sparrow Search Algorithm (SSA) in complex optimization problems—such as insufficient convergence accuracy and susceptibility to local optima—this paper proposes a Composite Strategy Sparrow Search Algorithm (CSSA) for multidimensional optimization. The algorithm first employs chaotic mapping during [...] Read more.
To address the limitations of the standard Sparrow Search Algorithm (SSA) in complex optimization problems—such as insufficient convergence accuracy and susceptibility to local optima—this paper proposes a Composite Strategy Sparrow Search Algorithm (CSSA) for multidimensional optimization. The algorithm first employs chaotic mapping during initialization to enhance population diversity; second, it integrates coordinate axis pattern search to strengthen local exploitation capabilities; third, it applies intelligent crossover operations to promote effective information exchange among individuals; and finally, it introduces an adaptive vigilance mechanism to dynamically balance exploration and exploitation throughout the optimization process. Compared with seven state-of-the-art algorithms, CSSA demonstrates superior performance in both 30-dimensional low-dimensional and 100-dimensional high-dimensional test scenarios. It achieves optimal solutions in three real-world engineering applications: thermal management of electric vehicle battery packs, photovoltaic power system configuration, and data center cooling systems. Wilcoxon rank-sum tests further confirm the statistical significance of these improvements. Experimental results show that CSSA significantly outperforms mainstream optimization methods in terms of convergence accuracy and speed, demonstrating substantial theoretical value and practical engineering significance. Full article
Show Figures

Figure 1

40 pages, 5707 KB  
Review
Graph Representation Learning for Battery Energy Systems in Few-Shot Scenarios: Methods, Challenges and Outlook
by Xinyue Zhang and Shunli Wang
Batteries 2026, 12(1), 11; https://doi.org/10.3390/batteries12010011 - 26 Dec 2025
Viewed by 540
Abstract
Graph representation learning (GRL) has emerged as a unifying paradigm for modeling the relational and heterogeneous nature of battery energy storage systems (BESS), yet a systematic synthesis focused on data-scarce (few-shot) battery scenarios is still lacking. Graph representation learning offers a natural way [...] Read more.
Graph representation learning (GRL) has emerged as a unifying paradigm for modeling the relational and heterogeneous nature of battery energy storage systems (BESS), yet a systematic synthesis focused on data-scarce (few-shot) battery scenarios is still lacking. Graph representation learning offers a natural way to describe the structure and interaction of battery cells, modules and packs. At the same time, battery applications often suffer from very limited labeled data, especially for new chemistries, extreme operating conditions and second-life use. This review analyzes how graph representation learning can be combined with few-shot learning to support key battery management tasks under such data-scarce conditions. We first introduce the basic ideas of graph representation learning, including models based on neighborhood aggregation, contrastive learning, autoencoders and transfer learning, and discuss typical data, model and algorithm challenges in few-shot scenarios. We then connect these methods to battery state estimation problems, covering state of charge, state of health, remaining useful life and capacity. Particular attention is given to approaches that use graph neural models, meta-learning, semi-supervised and self-supervised learning, Bayesian deep networks, and federated learning to extract transferable features from early-cycle data, partial charge–discharge curves and large unlabeled field datasets. Reported studies show that, with only a small fraction of labeled samples or a few initial cycles, these methods can achieve state and life prediction errors that are comparable to or better than conventional models trained on full datasets, while also improving robustness and, in some cases, providing uncertainty estimates. Based on this evidence, we summarize the main technical routes for few-shot battery scenarios and identify open problems in data preparation, cross-domain generalization, uncertainty quantification and deployment on real battery management systems. The review concludes with a research outlook, highlighting the need for pack-level graph models, physics-guided and probabilistic learning, and unified benchmarks to advance reliable graph-based few-shot methods for next-generation intelligent battery management. Full article
(This article belongs to the Section Battery Modelling, Simulation, Management and Application)
Show Figures

Figure 1

33 pages, 7428 KB  
Article
Constrained Metropolitan Service Placement: Integrating Bayesian Optimization with Spatial Heuristics
by Tatiana Churiakova, Ivan Platonov, Mark Bezmaslov, Vadim Bikbulatov, Ovanes Petrosian, Vasilii Starikov and Sergey A. Mityagin
Smart Cities 2026, 9(1), 6; https://doi.org/10.3390/smartcities9010006 - 26 Dec 2025
Viewed by 556
Abstract
Metropolitan service-placement optimization is computationally challenging under strict evaluation budgets and regulatory constraints. Existing approaches either neglect capacity constraints, producing infeasible solutions, or employ population-based metaheuristics requiring hundreds of evaluations—beyond typical municipal planning resources. We introduce a two-stage optimization framework combining Bayesian optimization [...] Read more.
Metropolitan service-placement optimization is computationally challenging under strict evaluation budgets and regulatory constraints. Existing approaches either neglect capacity constraints, producing infeasible solutions, or employ population-based metaheuristics requiring hundreds of evaluations—beyond typical municipal planning resources. We introduce a two-stage optimization framework combining Bayesian optimization with domain-informed heuristics to address this constrained, mixed discrete–continuous problem. Stage 1 optimizes continuous service area allocations via the Tree-structured Parzen Estimator with empirical gradient prioritization, reducing effective dimensionality from 81 services to 10–15 per iteration. Stage 2 converts allocations into discrete unit placements via efficiency-ranked bin packing, ensuring regulatory compliance. Evaluation across 35 benchmarks on Saint Petersburg, Russia (117–3060 decision variables), demonstrates that our method achieves 99.4% of the global optimum under a 50-evaluation budget, outperforming BIPOP-CMA-ES (98.4%), PURE-TPE (97.1%), and NSGA-II (96.5%). Optimized configurations improve equity (Gini coefficient of 0.318 → 0.241) while maintaining computational feasibility (2.7 h for 109-block districts). Open-source implementation supports reproducibility and facilitates adoption in metropolitan planning practice. Full article
(This article belongs to the Special Issue City Logistics and Smart Cities: Models, Approaches and Planning)
Show Figures

Figure 1

21 pages, 5467 KB  
Article
Reconfiguration with Low Hardware Cost and High Receiving-Excitation Area Ratio for Wireless Charging System of Drones Based on D3-Type Transmitter
by Han Liu, Lin Wang, Jie Wang, Dengjie Huang and Rong Wang
Drones 2026, 10(1), 3; https://doi.org/10.3390/drones10010003 - 22 Dec 2025
Viewed by 315
Abstract
Wireless charging for drones is significant for solving problems such as the frequent manual plugging and unplugging of cables. A large number of densely packed transmitting coils and fully independent on-off control can precisely track the receiver with random access location. To balance [...] Read more.
Wireless charging for drones is significant for solving problems such as the frequent manual plugging and unplugging of cables. A large number of densely packed transmitting coils and fully independent on-off control can precisely track the receiver with random access location. To balance the excitation area of the transmitter, additional hardware cost, and receiving voltage fluctuation, the wireless charging system of drones based on a D3-type transmitter is proposed in this article. The circuit model considering states of multiple switches is developed for three excitation modes. The dual-coil excitation mode is selected after comparative analysis. The transmitter reconfiguration method with low hardware cost and high receiving-excitation area ratio is proposed based on one detection sensor of DC current and one relay furtherly. Finally, an experimental prototype is built to verify the theoretical analysis and proposed method. When the output voltage fluctuation is limited to ±10%, the ratios of the maximum misalignment value in the x-axis and y-axis directions to the side length of the receiver reach 66.7% and 46.7%, respectively. The receiving-excitation area ratio of 37.5% is achieved, significantly reducing the excitation area not covered by the receiver. The maximum receiving power is 289.44 W, while the DC-DC efficiency exceeds 87.05%. Full article
(This article belongs to the Section Drone Communications)
Show Figures

Figure 1

16 pages, 1977 KB  
Article
Consistency Testing Method for Energy Storage Systems with Time-Series Properties
by Nan Wang and Zhen Li
Energies 2026, 19(1), 46; https://doi.org/10.3390/en19010046 - 21 Dec 2025
Viewed by 314
Abstract
As a cushion for the volatility of renewable energy, energy storage systems can achieve peak shaving and valley filling, thereby improving the operational efficiency and economic performance of the power grid. In addition, energy storage systems can absorb renewable energy production, thereby enhancing [...] Read more.
As a cushion for the volatility of renewable energy, energy storage systems can achieve peak shaving and valley filling, thereby improving the operational efficiency and economic performance of the power grid. In addition, energy storage systems can absorb renewable energy production, thereby enhancing the safety and reliability of the electrical power system. Nowadays, energy storage systems are facing severe problems such as explosions that are caused by overcharging and discharging. The main reason for the overcharging and discharging of energy storage systems is the inconsistency in the state of the electric core in the charging and discharging process, which not only affects the safety of the electric core, but also influences the overall charging and discharging capacity of the energy storage system. To address this inconsistency of energy storage cores, this paper proposes an energy storage consistency monitoring method under the framework of clustering-classification, which adopts the Belief Peaks Evidential Clustering and Evidential K-Nearest Neighbors classification algorithm. This paper proposes a BPEC-EKNN-based method for battery inconsistency detection and localization. The proposed approach first constructs battery performance evaluation coefficients to characterize inter-cell behavioral differences, and then integrates an enhanced k-nearest neighbor strategy to identify abnormal cells. It also identifies and locates inconsistent battery cells by analyzing the magnitude of the confidence level m (Ω), without relying on predefined thresholds. Also, time-series data as opposed to the evaluation of voltage data at a singular point is engaged to realize the detection and localization of energy storage core consistency anomalies under the consideration of time-series data. The proposed algorithm is capable of identifying inconsistencies among energy storage batteries, with the parameter m (Ω) serving as an indicator of the likelihood of inconsistency. Experimental results on battery pack datasets demonstrate that the proposed method achieves higher detection accuracy and robustness compared with representative statistical threshold-based methods and machine learning approaches, and it can more accurately identify inconsistent battery cells. By applying perturbation analysis to real-time operational data, the algorithm proposed in this paper can detect inconsistencies in battery cells reliably. Full article
(This article belongs to the Section D: Energy Storage and Application)
Show Figures

Figure 1

9 pages, 9270 KB  
Proceeding Paper
DMPA–GWO++: A Dynamic Multi-Pack Adaptive Grey Wolf Optimizer for IoT Sensor Network Recovery in Smart Farms
by Anshu Kashyap, Ketan Sahu, Lumani Verma and Kavita Jaiswal
Eng. Proc. 2025, 110(1), 6; https://doi.org/10.3390/engproc2025110006 - 18 Dec 2025
Viewed by 194
Abstract
This paper addresses the Sensor Deployment Optimization Problem (SDOP) by presenting a novel hybrid metaheuristic algorithm designed to create resilient and self-healing wireless sensor networks (WSNs). We introduce the Dynamic Multi-Pack Adaptive Grey Wolf Optimizer (DMPA–GWO++), which effectively balances network performance with durability [...] Read more.
This paper addresses the Sensor Deployment Optimization Problem (SDOP) by presenting a novel hybrid metaheuristic algorithm designed to create resilient and self-healing wireless sensor networks (WSNs). We introduce the Dynamic Multi-Pack Adaptive Grey Wolf Optimizer (DMPA–GWO++), which effectively balances network performance with durability against sensor failures. The core innovation is a hybrid structure that combines multi-pack GWO exploration with PSO-style local exploitation and memory, avoiding local optima while converging fast. This combination allows the algorithm to avoid local optima while rapidly converging on highly efficient solutions. A multi-objective fitness function explicitly accounts for network robustness by integrating a Monte Carlo simulation framework, pre-conditioning deployment layouts to withstand realistic sensor dropouts. Post-failure recovery is enhanced through an auto-suggest relay placement mechanism that strategically adds nodes to repair connectivity gaps. The approach is validated through the development of reliable sensor layouts that maintain high coverage and connectivity under diverse failure scenarios, demonstrating its utility for real-world WSN applications. Full article
(This article belongs to the Proceedings of The 2nd International Conference on AI Sensors and Transducers)
Show Figures

Figure 1

24 pages, 2524 KB  
Article
Exact and Heuristic Algorithms for Convex Polygon Decomposition
by Johana Milena Martínez Contreras, Germán Fernando Pantoja Benavides, Astrid Xiomara Rodríguez, John Willmer Escobar and David Álvarez-Martínez
Mathematics 2025, 13(24), 4038; https://doi.org/10.3390/math13244038 - 18 Dec 2025
Viewed by 581
Abstract
Convex decomposition plays a central role in computational geometry and is a key preprocessing step in applications such as robotic motion planning, 2D packing, pattern recognition, and manufacturing. This work revisits the minimum convex decomposition problem and proposes both an exact mathematical model [...] Read more.
Convex decomposition plays a central role in computational geometry and is a key preprocessing step in applications such as robotic motion planning, 2D packing, pattern recognition, and manufacturing. This work revisits the minimum convex decomposition problem and proposes both an exact mathematical model and an efficient heuristic algorithm capable of handling simple polygons as well as polygons with holes. The methodology incorporates a visibility-preserving bridge transformation that converts holed polygons into equivalent simple instances, enabling the extension of classical decomposition schemes to more general topologies. In addition, a convex-union post-processing phase is implemented to reduce the number of convex parts obtained by either method. The performance of the proposed approach is evaluated on benchmark instances from the literature and on a new dataset of polygons with holes introduced in this work. The exact model consistently produces optimal decompositions for small and medium instances, while the heuristic achieves near-optimal solutions with significantly reduced computation times. The union phase further decreases the number of resulting convex pieces in most cases. All codes, datasets, and results are publicly released to facilitate reproducibility and comparison with future methods. Full article
Show Figures

Figure 1

19 pages, 5695 KB  
Article
Node Collaborative Strategy for 3D Coverage Based on Hopping Adaptive Grey Wolf Optimizer in Wireless Sensor Network
by Minghua Wang, Zhuowen Wu, Bo Fan and Yan Wang
Sensors 2025, 25(24), 7431; https://doi.org/10.3390/s25247431 - 6 Dec 2025
Viewed by 389
Abstract
Wireless sensor networks (WSNs) represent an emerging technology, among which coverage optimization remains a fundamental challenge. In specific application scenarios such as intelligent urban management, three-dimensional (3D) coverage models better reflect real-world requirements and thus hold greater research significance. To maximize the coverage [...] Read more.
Wireless sensor networks (WSNs) represent an emerging technology, among which coverage optimization remains a fundamental challenge. In specific application scenarios such as intelligent urban management, three-dimensional (3D) coverage models better reflect real-world requirements and thus hold greater research significance. To maximize the coverage performance of 3DWSNs, this study proposes a Three-Dimensional Confident Information Coverage (3DCIC) model based on the concept of multi-node cooperative information reconstruction, effectively extending the perceptual domain of sensor nodes. Furthermore, by incorporating adaptive dimension learning and opposition-based learning metchanisms into the wolf pack update strategy, we have developed the Hopping Adaptive Grey Wolf Optimizer (HAGWO) based on the GWO to optimize node deployment. Experimental results demonstrate the superior performance of the 3DCIC model, achieving coverage ranges 2.78 times, 4.41 times, and 4.00 times greater than those of conventional binary spherical models under regular tetrahedral, hexahedral, and octahedral node deployments, respectively. The proposed scheduling algorithm proves highly effective in both classical test functions and three-dimensional coverage problems. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

18 pages, 2965 KB  
Article
Optimizing the Transformer Iron Core Cutting Stock Problem Using a Discrete Artificial Bee Colony Algorithm
by Qiang Luo, Zuogan Tang and Chunrong Pan
Machines 2025, 13(12), 1106; https://doi.org/10.3390/machines13121106 - 28 Nov 2025
Viewed by 479
Abstract
In the manufacturing of iron core for high-power transformers, a cutting stock problem arises where large-width silicon steel coils must be cut into narrower coils, known as strips. Typically, the required length of each strip far exceeds that of a single coil. Therefore, [...] Read more.
In the manufacturing of iron core for high-power transformers, a cutting stock problem arises where large-width silicon steel coils must be cut into narrower coils, known as strips. Typically, the required length of each strip far exceeds that of a single coil. Therefore, the problem necessitates additional consideration of how to split the strips and arrange them on the large coils, with the goal of minimizing the total number of strips. In this paper, we propose a discrete artificial bee colony algorithm to address this problem. The algorithm replaces the stochastic roulette wheel with biased selection in the onlooker bee phase and introduces partially mapped crossover in both the onlooker and scout bee phases. These enhancements facilitate more effective utilization of information from high-quality solutions, thereby improving the algorithm’s stability and its capacity to obtain higher-quality results. Experimental results show that compared to existing methods reported in the literature, the proposed approach reduces the total number of strips by an average of over 3.9% and 7.6% for Set 2 and Set 3, respectively, while also exhibiting a faster convergence rate than other competitive algorithms. Full article
(This article belongs to the Section Advanced Manufacturing)
Show Figures

Figure 1

41 pages, 5342 KB  
Review
A Review on Air and Liquid Cooling Strategies for Lithium-Ion Batteries
by Erdi Tosun, Petar Ilinčić, Sinan Keyinci, Ali Cem Yakaryilmaz and Mustafa Ozcanli
Appl. Sci. 2025, 15(23), 12617; https://doi.org/10.3390/app152312617 - 28 Nov 2025
Viewed by 1201
Abstract
The energy that powers electric vehicles comes directly from their high-performance batteries, serving as the heart of their operation. They convert stored chemical energy into mechanical energy to propel vehicles. One of the most vital parts of an electric vehicle is a battery [...] Read more.
The energy that powers electric vehicles comes directly from their high-performance batteries, serving as the heart of their operation. They convert stored chemical energy into mechanical energy to propel vehicles. One of the most vital parts of an electric vehicle is a battery pack. Superior advantages such as higher energy density, longer life cycles, and the fast-charging ability of lithium-ion batteries set them apart from the others. However, battery performance and longevity exhibit a high degree of temperature sensitivity. In other words, operating batteries below and above the specified temperature range values causes problems such as decreased lifespan, safety issues, and performance losses. In electric vehicles, varying power demands during driving cause different current levels to be drawn from the battery packs. This leads to fluctuations in battery temperatures due to chemical reactions occurring. Besides that, regional and seasonal temperature variations also affect the operating temperatures of batteries. Therefore, maintaining the batteries within the specified temperature range, typically between 25 and 40 °C, is only achievable with an adequate battery thermal management system. This review intends to guide researchers working on designing more efficient thermal management systems by providing refined information about previous efforts in this field. The designs found in the literature have been illustrated with simplified figures. Cooling inlet and outlet locations are indicated in blue and red, enabling easier comparison and better understanding of different cooling designs. Air-cooling studies in the literature show that a well-designed system can keep the Tmax and ΔT values of LiB cells ~305 K and 2.8 K during 3C discharge at a Tambient of about 298.15 K. When liquid cooling systems are examined, a 50% glycol–water mixture can maintain pouch cells at nearly 30.3 °C with a ΔT of 2.78 °C under similar 3C and 25 °C conditions. Overall, the results demonstrate that well-designed BTMS configurations including optimized airflow or coolant–flow arrangements are capable of keeping LiBs safely within their optimal thermal operating conditions. Full article
(This article belongs to the Special Issue Recent Advances in Transportation Machinery)
Show Figures

Figure 1

21 pages, 1985 KB  
Article
Packing Multidimensional Spheres in an Optimized Hyperbolic Container
by Yuriy Stoyan, Georgiy Yaskov, Tetyana Romanova, Igor Litvinchev, Yurii E. Stoian, José Manuel Velarde Cantú and Mauricio López Acosta
Mathematics 2025, 13(23), 3747; https://doi.org/10.3390/math13233747 - 21 Nov 2025
Viewed by 850
Abstract
The problem of packing multidimensional spheres in a container defined by a hyperbolic surface is introduced. The objective is to minimize the height of the hyperbolic container under non-overlapping and containment conditions for the spheres, considering minimal allowable distances between them. To the [...] Read more.
The problem of packing multidimensional spheres in a container defined by a hyperbolic surface is introduced. The objective is to minimize the height of the hyperbolic container under non-overlapping and containment conditions for the spheres, considering minimal allowable distances between them. To the best of our knowledge, no mathematical models addressing optimized packing spheres in hyperbolic containers have been proposed before. Our approach is based on a space dimensionality reduction transformation. This transformation relies on projecting a multidimensional hyperboloid into a lower-dimensional space sequentially up to two-dimensional case. Employing the phi-function technique, packing spheres in the hyperbolic container is formulated as a nonlinear programming problem. The latter is solved using a model-based heuristic combined with a decomposition approach. Numerical results are presented for a wide range of parameters, i.e., space dimension, number of spheres, and metric characteristics of the hyperbolic container. The results demonstrate efficiency of the proposed modeling and solution approach highlighting new opportunities for packing problems within non-traditional geometries. Full article
Show Figures

Figure 1

19 pages, 1247 KB  
Article
POS: A Recognition Method for Packed Software in Opened-Set Scenario
by Zhenghao Qian, Fengzheng Liu, Mingdong He, Bo Li, Xuewu Li, Chuangye Zhao, Gehua Fu, Yifan Hu and Hao Liu
Electronics 2025, 14(22), 4450; https://doi.org/10.3390/electronics14224450 - 14 Nov 2025
Viewed by 420
Abstract
Malware plays a critical role in network attacks, making its analysis essential for ensuring network security. To evade detection, malware developers often use packing techniques to hide malicious code, making it difficult for analysts to identify the software’s true behavior. Software that has [...] Read more.
Malware plays a critical role in network attacks, making its analysis essential for ensuring network security. To evade detection, malware developers often use packing techniques to hide malicious code, making it difficult for analysts to identify the software’s true behavior. Software that has been packed is referred to as “packed software,” and network security analysts need to employ unpacking strategies to remove these protective layers and restore the software’s actual behavior. This process is crucial in preventing malware from bypassing traditional security mechanisms, as unpacking reveals the underlying code that can be analyzed for malicious intent. However, as malware evolves, packed software can vary greatly in its packing techniques, requiring analysts to stay ahead of emerging trends in obfuscation methods. Furthermore, new packing methods are frequently introduced, posing an ongoing challenge to existing detection systems. Existing packed software identification methods largely rely on known training sets, which can identify known types of packed software but struggle with the opened-set problem, where new or unknown packed software types are encountered. To address this issue, this paper introduces the problem of identifying packed software in both closed-set and opened-set scenarios and proposes an evaluation mechanism using known/unknown recall rates to assess the ability to recognize both types. The known recall rate evaluates the system’s ability to identify known types, while the unknown recall rate measures its ability to recognize new, unknown packed software. This dual approach helps bridge the gap between identifying familiar threats and detecting previously unseen ones, which is increasingly important as malware continues to evolve. Additionally, the paper proposes a strategy that simultaneously addresses both recognition problems, aiming to improve the overall performance of the identification system. Experimental results on a packed software dataset demonstrate that this strategy significantly improves the accuracy and comprehensiveness of identification, validating its effectiveness in practical applications. Full article
(This article belongs to the Special Issue Recent Advances in Cybersecurity and Information Security)
Show Figures

Figure 1

16 pages, 5825 KB  
Article
Crystal Plasticity Simulations of Dislocation Slip and Twinning in α-Ti Single and Polycrystals
by Evgeniya Emelianova, Maxim Pisarev, Ruslan Balokhonov and Varvara Romanova
Metals 2025, 15(11), 1243; https://doi.org/10.3390/met15111243 - 13 Nov 2025
Viewed by 776
Abstract
A crystal plasticity finite element model is developed and implemented to numerically study the deformation behavior of hexagonal close-packed metals using α-titanium as an example. The model takes into account micromechanical deformation mechanisms through dislocation slip along prismatic, basal, and first-order <c [...] Read more.
A crystal plasticity finite element model is developed and implemented to numerically study the deformation behavior of hexagonal close-packed metals using α-titanium as an example. The model takes into account micromechanical deformation mechanisms through dislocation slip along prismatic, basal, and first-order <c+a> pyramidal systems, as well as tensile twinning. Twin initiation follows a two-conditional criterion requiring that both the resolved shear stress in a twin system and the accumulated pyramidal slip simultaneously reach their critical values. Three-dimensional polycrystalline models are generated using the step-by-step packing method. The crystal plasticity constitutive model describing the deformation behavior of grains is integrated into the boundary-value problem of continuum mechanics, including dynamic governing equations. The three-dimensional problem is solved numerically using the finite element method. The micromechanical model is tested for an α-titanium single crystal along the [0001] direction and a polycrystal consisting of 50 grains. The numerical results reveal that twin propagation is controlled by the critical value of accumulated pyramidal slip, emphasizing the need for experimental calibration. The agreement between numerical and experimental results provides the model validation at the meso- and macroscales. Full article
(This article belongs to the Section Computation and Simulation on Metals)
Show Figures

Figure 1

Back to TopTop