Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline

Search Results (131)

Search Parameters:
Keywords = random bit model

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
42 pages, 1535 KB  
Article
Probabilistic Bit-Similarity-Based Key Agreement Protocol Employing Fuzzy Extraction for Secure and Lightweight Wireless Sensor Networks
by Sofia Sakka, Vasiliki Liagkou, Yannis Stamatiou and Chrysostomos Stylios
J. Cybersecur. Priv. 2026, 6(1), 22; https://doi.org/10.3390/jcp6010022 - 22 Jan 2026
Viewed by 10
Abstract
Wireless sensor networks comprise many resource-constrained nodes that must protect both local readings and routing metadata. The sensors collect data from the environment or from the individual to whom they are attached and transmit it to the nearest gateway node via a wireless [...] Read more.
Wireless sensor networks comprise many resource-constrained nodes that must protect both local readings and routing metadata. The sensors collect data from the environment or from the individual to whom they are attached and transmit it to the nearest gateway node via a wireless network for further delivery to external users. Due to wireless communication, the transmitted messages may be intercepted, rerouted, or even modified by an attacker. Consequently, security and privacy issues are of utmost importance, and the nodes must be protected against unauthorized access during transmission over a public wireless channel. To address these issues, we propose the Probabilistic Bit-Similarity-Based Key Agreement Protocol (PBS-KAP). This novel method enables two nodes to iteratively converge on a shared secret key without transmitting it or relying on pre-installed keys. PBS-KAP enables two nodes to agree on a symmetric session key using probabilistic similarity alignment with explicit key confirmation (MAC). Optimized Garbled Circuits facilitate secure computation with minimal computational and communication overhead, while Secure Sketches combined with Fuzzy Extractors correct residual errors and amplify entropy  producing reliable and uniformly random session keys. The resulting protocol provides a balance between security, privacy, and usability, standing as a practical solution for real-world WSN and IoT applications without imposing excessive computational or communication burdens. Security relies on standard computational assumptions via a one-time elliptic–curve–based base Oblivious Transfer, followed by an IKNP Oblivious Transfer extension and a small garbled threshold circuit. No pre-deployed long-term keys are required. After the bootstrap, only symmetric operations are used. We analyze confidentiality in the semi-honest model. However, entity authentication, though feasible, requires an additional Authenticated Key Exchange step or malicious-secure OT/GC. Under the semi-honest OT/GC assumption, we prove session-key secrecy/indistinguishability; full entity authentication requires an additional AKE binding step or malicious-secure OT/GC.  Full article
(This article belongs to the Special Issue Data Protection and Privacy)
24 pages, 3728 KB  
Article
Secure and Efficient Authentication Protocol for Underwater Wireless Sensor Network Environments Using PUF
by Jinsu Ahn, Deokkyu Kwon and Youngho Park
Appl. Sci. 2026, 16(2), 873; https://doi.org/10.3390/app16020873 - 14 Jan 2026
Viewed by 125
Abstract
Underwater wireless sensor networks (UWSNs) are increasingly used in marine monitoring and naval coastal surveillance, where limited bandwidth, long propagation delays, and physically exposed nodes make efficient authentication critical. This paper analyzes the maritime-surveillance-oriented protocol of Jain and Hussain and identifies vulnerabilities to [...] Read more.
Underwater wireless sensor networks (UWSNs) are increasingly used in marine monitoring and naval coastal surveillance, where limited bandwidth, long propagation delays, and physically exposed nodes make efficient authentication critical. This paper analyzes the maritime-surveillance-oriented protocol of Jain and Hussain and identifies vulnerabilities to physical capture, replay, and denial-of-service (DoS) attacks. We propose a PUF-assisted mutual authentication and session key agreement protocol for UWSNs. The design relies on lightweight symmetric primitives (one-way hash and XOR) and uses a fuzzy extractor to support stable PUF-based key material. In addition, a lightweight continuous authentication procedure is introduced to facilitate fast re-authentication under intermittent link disruptions commonly observed in underwater communication. Security is evaluated using BAN logic, the Real-or-Random (ROR) model, and security verification with the Scyther tool. An analytical overhead evaluation reports a computational cost of 5.972 ms per mutual authentication and a 1152-bit communication overhead, supporting a practical security–efficiency trade-off for resource-constrained UWSN deployments. Full article
Show Figures

Figure 1

35 pages, 3818 KB  
Article
Machine Learning-Based QSAR Screening of Colombian Medicinal Flora for Potential Antiviral Compounds Against Dengue Virus: An In Silico Drug Discovery Approach
by Sergio Andrés Montenegro-Herrera, Anibal Sosa, Isabella Echeverri-Jiménez, Rafael Santiago Castaño-Valencia and Alejandra María Jerez-Valderrama
Pharmaceuticals 2025, 18(12), 1906; https://doi.org/10.3390/ph18121906 - 18 Dec 2025
Viewed by 472
Abstract
Background/Objectives: Colombia harbors exceptional plant diversity, comprising over 31,000 formally identified species, of which approximately 6000 are classified as useful plants. Among these, 2567 species possess documented food and medicinal applications, with several traditionally utilized for managing febrile illnesses. Despite the global [...] Read more.
Background/Objectives: Colombia harbors exceptional plant diversity, comprising over 31,000 formally identified species, of which approximately 6000 are classified as useful plants. Among these, 2567 species possess documented food and medicinal applications, with several traditionally utilized for managing febrile illnesses. Despite the global burden of dengue virus infection affecting millions annually, no specific antiviral therapy has been established. This study aimed to identify potential anti-dengue compounds from Colombian medicinal flora through machine learning-based quantitative structure–activity relationship (QSAR) modeling. Methods: An optimized XGBoost algorithm was developed through Bayesian hyperparameter optimization (Optuna, 50 trials) and trained on 2034 ChEMBL-derived activity records with experimentally validated anti-dengue activity (IC50/EC50). The model incorporated 887 molecular features comprising 43 physicochemical descriptors and 844 ECFP4 fingerprint bits selected via variance-based filtering. IC50 and EC50 endpoints were modeled independently based on their pharmacological distinction and negligible correlation (r = −0.04, p = 0.77). Through a systematic literature review, 2567 Colombian plant species from the Humboldt Institute’s official checklist were evaluated (2501 after removing duplicates and infraspecific taxa), identifying 358 with documented antiviral properties. Phytochemical analysis of 184 characterized species yielded 3267 unique compounds for virtual screening. A dual-endpoint classification strategy categorized compounds into nine activity classes based on combined potency thresholds (Low: pActivity ≤ 5.0, Medium: 5.0 < pActivity ≤ 6.0, High: pActivity > 6.0). Results: The optimized model achieved robust performance (Matthews correlation coefficient: 0.583; ROC-AUC: 0.896), validated through hold-out testing (MCC: 0.576) and Y-randomization (p < 0.01). Virtual screening identified 276 compounds (8.4%) with high predicted potency for both endpoints (“High-High”). Structural novelty analysis revealed that all 276 compounds exhibited Tanimoto similarity < 0.5 to the training set (median: 0.214), representing 145 unique Murcko scaffolds of which 144 (99.3%) were absent from the training data. Application of drug-likeness filtering (QED ≥ 0.5) and applicability domain assessment identified 15 priority candidates. In silico ADMET profiling revealed favorable pharmaceutical properties, with Incartine (pIC50: 6.84, pEC50: 6.13, QED: 0.83), Bilobalide (pIC50: 6.78, pEC50: 6.07, QED: 0.56), and Indican (pIC50: 6.73, pEC50: 6.11, QED: 0.51) exhibiting the highest predicted potencies. Conclusions: This systematic computational screening of Colombian medicinal flora demonstrates the untapped potential of regional biodiversity for anti-dengue drug discovery. The identified candidates, representing structurally novel chemotypes, are prioritized for experimental validation. Full article
Show Figures

Figure 1

16 pages, 672 KB  
Article
Message Passing Algorithm Receiver Design for RIS-Assisted Downlink MIMO-SCMA System
by Dun Feng, Xuan Zhang, Xiaofan Yu, Xin Wang, Xiaoye Shi and Hao Cheng
Appl. Sci. 2025, 15(24), 13197; https://doi.org/10.3390/app152413197 - 16 Dec 2025
Viewed by 207
Abstract
Sparse code multiple access (SCMA) and reconfigurable intelligent surfaces (RISs) are two promising techniques in the forthcoming 6G communication networks to provide massive connectivity and enhance the spectral efficiency. To our best knowledge, the phase optimization for the reflecting elements and multi-user detection [...] Read more.
Sparse code multiple access (SCMA) and reconfigurable intelligent surfaces (RISs) are two promising techniques in the forthcoming 6G communication networks to provide massive connectivity and enhance the spectral efficiency. To our best knowledge, the phase optimization for the reflecting elements and multi-user detection for the RIS-assisted downlink MIMO-SCMA system is still an open issue. In this way, we first formulate the RIS-assisted downlink MIMO-SCMA model with respect to the phases of the reflecting elements for the RIS. Next, a closed-form solution to these phases is found by solving the geometric median optimization. The iterative symbol detection steps are also provided for the RIS-assisted downlink MIMO-SCMA system. Simulation results illustrate that the proposed RIS-assisted downlink MIMO-SCMA system can significantly enhance the bit error ratio performance; e.g., the RIS-SCMA system with the proposed Gmedian-optimized phases can achieve a 1.5dB SNR gain as compared to the random phases with 10 reflecting elements. Full article
(This article belongs to the Section Electrical, Electronics and Communications Engineering)
Show Figures

Figure 1

24 pages, 7742 KB  
Article
Memristive Hopfield Neural Network with Hidden Multiple Attractors and Its Application in Color Image Encryption
by Zhenhua Hu and Zhuanzheng Zhao
Mathematics 2025, 13(24), 3972; https://doi.org/10.3390/math13243972 - 12 Dec 2025
Viewed by 316
Abstract
Memristor is widely used to construct various memristive neural networks with complex dynamical behaviors. However, hidden multiple attractors have never been realized in memristive neural networks. This paper proposes a novel chaotic system based on a memristive Hopfield neural network (HNN) capable of [...] Read more.
Memristor is widely used to construct various memristive neural networks with complex dynamical behaviors. However, hidden multiple attractors have never been realized in memristive neural networks. This paper proposes a novel chaotic system based on a memristive Hopfield neural network (HNN) capable of generating hidden multiple attractors. A multi-segment memristor model with multistability is designed and serves as the core component in constructing the memristive Hopfield neural network. Dynamical analysis reveals that the proposed network exhibits various complex behaviors, including hidden multiple attractors and a super multi-stable phenomenon characterized by the coexistence of infinitely many double-chaotic attractors—these dynamical features are reported for the first time in the literature. This encryption process consists of three key steps. Firstly, the original chaotic sequence undergoes transformation to generate a pseudo-random keystream immediately. Subsequently, based on this keystream, a global permutation operation is performed on the image pixels. Then, their positions are disrupted through a permutation process. Finally, bit-level diffusion is applied using an Exclusive OR(XOR) operation. Relevant research shows that these phenomena indicate a high sensitivity to key changes and a high entropy level in the information system. The strong resistance to various attacks further proves the effectiveness of this design. Full article
Show Figures

Figure 1

22 pages, 10664 KB  
Article
Performance Enhancement of Low-Altitude Intelligent Network Communications Using Spherical-Cap Reflective Intelligent Surfaces
by Hengyi Sun, Xingcan Feng, Weili Guo, Xiaochen Zhang, Yuze Zeng, Guoshen Tan, Yong Tan, Changjiang Sun, Xiaoping Lu and Liang Yu
Electronics 2025, 14(24), 4848; https://doi.org/10.3390/electronics14244848 - 9 Dec 2025
Viewed by 415
Abstract
Unmanned Aerial Vehicles (UAVs) are integral components of future 6G networks, offering rapid deployment, enhanced line-of-sight communication, and flexible coverage extension. However, UAV communications in low-altitude environments face significant challenges, including rapid link variations due to attitude instability, severe signal blockage by urban [...] Read more.
Unmanned Aerial Vehicles (UAVs) are integral components of future 6G networks, offering rapid deployment, enhanced line-of-sight communication, and flexible coverage extension. However, UAV communications in low-altitude environments face significant challenges, including rapid link variations due to attitude instability, severe signal blockage by urban obstacles, and critical sensitivity to transmitter–receiver alignment. While traditional planar reconfigurable intelligent surfaces (RIS) show promise for mitigating these issues, they exhibit inherent limitations such as angular sensitivity and beam squint in wideband scenarios, compromising reliability in dynamic UAV scenarios. To address these shortcomings, this paper proposes and evaluates a spherical-cap reflective intelligent surface (ScRIS) specifically designed for dynamic low-altitude communications. The intrinsic curvature of the ScRIS enables omnidirectional reflection capabilities, significantly reducing sensitivity to UAV attitude variations. A rigorous analytical model founded on Generalized Sheet Transition Conditions (GSTCs) is developed to characterize the electromagnetic scattering of the curved metasurface. Three distinct 1-bit RIS unit cell coding arrangements, namely alternate, chessboard, and random, are investigated via numerical simulations utilizing CST Microwave Studio and experimental validation within a mechanically stirred reverberation chamber. Our results demonstrate that all tested ScRIS coding patterns markedly enhance electromagnetic field uniformity within the chamber and reduce the lowest usable frequency (LUF) by approximately 20% compared to a conventional metallic spherical reflector. Notably, the random coding pattern maximizes phase entropy, achieves the most uniform scattering characteristics and substantially reduces spatial field autocorrelation. Furthermore, the combined curvature and coding functionality of the ScRIS facilitates simultaneous directional focusing and diffuse scattering, thereby improving multipath diversity and spatial coverage uniformity. This effectively mitigates communication blind spots commonly encountered in UAV applications, providing a resilient link environment despite UAV orientation changes. To validate these findings in a practical context, we conduct link-level simulations based on a reproducible system model at 3.5 GHz, utilizing electromagnetic scale invariance to bridge the fundamental scattering properties observed in the RC to the application band. The results confirm that the ScRIS architecture can enhance link throughput by nearly five-fold at a 10 km range compared to a baseline scenario without RIS. We also propose a practical deployment strategy for urban blind-spot compensation, discuss hybrid planar-curved architectures, and conduct an in-depth analysis of a DRL-based adaptive control framework with explicit convergence and complexity analysis. Our findings validate the significant potential of ScRIS as a passive, energy-efficient solution for enhancing communication stability and coverage in multi-band 6G networks. Full article
(This article belongs to the Special Issue 5G Technology for Internet of Things Applications)
Show Figures

Figure 1

15 pages, 1109 KB  
Article
A Novel Unsupervised You Only Listen Once (YOLO) Machine Learning Platform for Automatic Detection and Characterization of Prominent Bowel Sounds Towards Precision Medicine
by Gayathri Yerrapragada, Jieun Lee, Mohammad Naveed Shariff, Poonguzhali Elangovan, Keerthy Gopalakrishnan, Avneet Kaur, Divyanshi Sood, Swetha Rapolu, Jay Gohri, Gianeshwaree Alias Rachna Panjwani, Rabiah Aslam Ansari, Jahnavi Mikkilineni, Naghmeh Asadimanesh, Thangeswaran Natarajan, Jayarajasekaran Janarthanan, Shiva Sankari Karuppiah, Vivek N. Iyer, Scott A. Helgeson, Venkata S. Akshintala and Shivaram P. Arunachalam
Bioengineering 2025, 12(11), 1271; https://doi.org/10.3390/bioengineering12111271 - 19 Nov 2025
Viewed by 2647
Abstract
Phonoenterography (PEG) offers a non-invasive and radiation-free technique to assess gastrointestinal activity through acoustic signal analysis. In this feasibility study, 110 high-resolution PEG recordings (44.1 kHz, 16-bit) were acquired from eight healthy individuals, yielding 6314 prominent bowel sound (PBS) segments through automated segmentation. [...] Read more.
Phonoenterography (PEG) offers a non-invasive and radiation-free technique to assess gastrointestinal activity through acoustic signal analysis. In this feasibility study, 110 high-resolution PEG recordings (44.1 kHz, 16-bit) were acquired from eight healthy individuals, yielding 6314 prominent bowel sound (PBS) segments through automated segmentation. Each event was characterized using a 279-feature acoustic profile comprising Mel-frequency cepstral coefficients (MFCCs), their first-order derivatives (Δ-MFCCs), and six global spectral parameters. After normalization and dimensionality reduction with PCA and UMAP (cosine distance, 35 neighbors, minimum distance = 0.01), five clustering strategies were evaluated. K-Means (k = 5) achieved the most favorable balance between cluster quality (silhouette = 0.60; Calinski–Harabasz = 19,165; Davies–Bouldin = 0.68) and interpretability, consistently identifying five acoustic patterns: single-burst, multiple-burst, harmonic, random-continuous, and multi-modal. Temporal modeling of clustered events further revealed distinct sequential dynamics, with Single-Burst events showing the longest dwell times, random continuous the shortest, and strong diagonal elements in the transition matrix confirming measurable state persistence. Frequent transitions between random continuous and multi-modal states suggested dynamic exchanges between transient and overlapping motility patterns. Together, these findings demonstrate that unsupervised PEG-based analysis can capture both acoustic variability and temporal organization of bowel sounds. This annotation-free approach provides a scalable framework for real-time gastrointestinal monitoring and holds potential for clinical translation in conditions such as postoperative ileus, bowel obstruction, irritable bowel syndrome, and inflammatory bowel disease. Full article
Show Figures

Figure 1

19 pages, 1906 KB  
Article
Robust OTFS-ISAC for Vehicular-to-Base Station End-to-End Sensing and Communication
by Khurshid Hussain, Esraa Musa Ali, Waeed Hussain, Ali Raza and Dalia H. Elkamchouchi
Electronics 2025, 14(21), 4340; https://doi.org/10.3390/electronics14214340 - 5 Nov 2025
Cited by 2 | Viewed by 1116
Abstract
This paper presents an orthogonal time–frequency space (OTFS)-based integrated sensing and communication (ISAC) framework for vehicular-to-base-station (V2B) scenarios, where a synthetic road environment models vehicular mobility and multipath propagation with explicit ground truth. In the sensing stage, OTFS probing signals with Gray-coded quadrature [...] Read more.
This paper presents an orthogonal time–frequency space (OTFS)-based integrated sensing and communication (ISAC) framework for vehicular-to-base-station (V2B) scenarios, where a synthetic road environment models vehicular mobility and multipath propagation with explicit ground truth. In the sensing stage, OTFS probing signals with Gray-coded quadrature amplitude modulation (QAM) are processed via inverse symplectic finite Fourier transform (ISFFT) and cyclic prefix orthogonal frequency-division multiplexing (CP-OFDM). The receiver applies cyclic prefix (CP) removal, fast Fourier transform (FFT), and symplectic finite Fourier transform (SFFT) to extract delay–Doppler (DD) responses. Channel estimation uses time–frequency least squares (TF-LS), robust background suppression, constant false alarm rate (CFAR) detection, and non-maximum suppression (NMS), yielding Precision = 0.79, Recall = 0.84, and F1 = 0.82. Communication decoding employs per-bin least squares, minimum mean-squared error (MMSE) equalization, and Gray-mapped QAM demapping. Across ten frames at 20 dB SNR, the system decoded 1.887×108 bits with 1.575×105 errors, producing a bit error rate (BER) of 8.34×104. Error vector magnitude (EVM) analysis reports mean = 0.30%, median = 0.06%, confirming constellation stability. Random Forest (RF) and imbalanced RF (IRF) classifiers trained on augmented DD payloads achieve Precision = 0.94, Recall = 0.87, and F1 = 0.92. Results validate OTFS-ISAC as a robust framework for V2B communication and sensing. Full article
(This article belongs to the Special Issue Integrated Sensing and Communications for 6G)
Show Figures

Figure 1

19 pages, 3524 KB  
Article
Electric-Field and Magnetic-Field Decoupled Wireless Power and Full-Duplex Signal Transfer Technology for Pre-Embedded Sensors
by Xiaolong Wang, Xiaozhou Wei and Laiqiang Jia
Electronics 2025, 14(21), 4302; https://doi.org/10.3390/electronics14214302 - 31 Oct 2025
Viewed by 533
Abstract
Pre-embedded sensors for concrete structure monitoring face bottlenecks in power supply and data transmission. Existing power supply solutions such as photovoltaic systems and batteries suffer from drawbacks including energy randomness and structural damage to concrete caused by their installation methods. Additionally, commercial wireless [...] Read more.
Pre-embedded sensors for concrete structure monitoring face bottlenecks in power supply and data transmission. Existing power supply solutions such as photovoltaic systems and batteries suffer from drawbacks including energy randomness and structural damage to concrete caused by their installation methods. Additionally, commercial wireless communication signals exhibit issues like strong attenuation and poor security during propagation. This paper proposes a hybrid electromagnetic field decoupled parallel transmission technology for power and signals. It utilizes the inherent decoupling characteristic of electric and magnetic fields within the near-field range to construct independent power/signal transfer channels, and achieves independent full-duplex transmission of uplink/downlink data via orthogonal coupling plates. Mathematical models for the power and signal channels are established, and finite element simulations are conducted. A parameter design method for the power compensation network and signal filtering circuit is also proposed. An experimental setup is built, with a coupler outer dimension of 200 mm × 200 mm, a coupling distance of 10 mm, and a thickness of 16 mm for both the transmitting and receiving sides. Experimental results show that the system achieves power transmission with a power of 100 W and an efficiency of 82%, while simultaneously realizing full-duplex communication with a bidirectional rate of 9600 bit/s. Moreover, no bit errors occur within 300,000 characters of bidirectional data. Full article
Show Figures

Figure 1

17 pages, 3195 KB  
Article
Intelligent Method for PDC Bit Selection Based on Graph Neural Network
by Ning Li, Chengkai Zhang, Tianguo Xia, Mengna Hao, Long Chen, Zhaopeng Zhu, Chaochen Wang, Shanlin Ye and Xiran Liu
Appl. Sci. 2025, 15(18), 9985; https://doi.org/10.3390/app15189985 - 12 Sep 2025
Viewed by 887
Abstract
As oil and gas exploration extends to deep, ultra-deep, and unconventional reservoirs, high drilling costs persist. Drill bit performance, as the critical rock-breaking component, directly governs efficiency and economics. While optimal bit selection boosts rate of penetration (ROP) and cuts costs, traditional expert-dependent [...] Read more.
As oil and gas exploration extends to deep, ultra-deep, and unconventional reservoirs, high drilling costs persist. Drill bit performance, as the critical rock-breaking component, directly governs efficiency and economics. While optimal bit selection boosts rate of penetration (ROP) and cuts costs, traditional expert-dependent methods struggle to address complex formation bit parameter interactions, suffering from low accuracy and poor adaptability. With artificial intelligence gaining traction in petroleum engineering, machine learning-based bit selection has emerged as a key solution. This study focuses on polycrystalline diamond compact (PDC) bits and proposes an intelligent bit selection method based on graph neural networks (GNNs), utilizing drilling records from over 100 wells encompassing 40 multidimensional features. Through comparative analysis of four intelligent models—random forest, gradient boosting (XGBoost), gated recurrent unit (GRU), and the GNN, the results demonstrate that the GNN achieves superior performance with an R2 (coefficient of determination) of 0.932 and MAPE (mean absolute percentage error) of 6.88%. The GNN significantly outperforms conventional models in rock-breaking performance prediction. By establishing this GNN model for ROP and footage per run prediction, this study achieves intelligent bit selection that substantially enhances drilling efficiency, reduces operational costs, and provides scientifically reliable technical support for drilling operations in complex formation conditions. Full article
Show Figures

Figure 1

24 pages, 1411 KB  
Article
A Multi-View Fusion Data-Augmented Method for Predicting BODIPY Dye Spectra
by Xinwen Yang, Xuan Li and Qin Zhao
Mathematics 2025, 13(18), 2947; https://doi.org/10.3390/math13182947 - 11 Sep 2025
Viewed by 586
Abstract
Fluorescent molecules, particularly BODIPY dyes, have found wide applications in fields such as bioimaging and optoelectronics due to their excellent photostability and tunable spectral properties. In recent years, artificial intelligence methods have enabled more efficient screening of molecules, allowing the required molecules to [...] Read more.
Fluorescent molecules, particularly BODIPY dyes, have found wide applications in fields such as bioimaging and optoelectronics due to their excellent photostability and tunable spectral properties. In recent years, artificial intelligence methods have enabled more efficient screening of molecules, allowing the required molecules to be quickly obtained. However, existing methods remain inadequate to meet research needs, primarily due to incomplete molecular feature extraction and the scarcity of data under small-sample conditions. In response to the aforementioned challenges, this paper introduces a spectral prediction method that integrates multi-view feature fusion and data augmentation strategies. The proposed method consists of three modules. The molecular feature engineering module constructs a multi-view molecular fusion feature that includes molecular fingerprints, molecular descriptors, and molecular energy gaps, which can more comprehensively obtain molecular feature information. The data augmentation module introduces strategies such as SMILES randomization, molecular fingerprint bit-level perturbation, and Gaussian noise injection to enhance the performance of the model in small sample environments. The spectral prediction module captures the complex mapping relationship between molecular structure and spectrum. It is demonstrated that the proposed method provides considerable advantages in the virtual screening of organic fluorescent molecules and offers valuable support for the development of novel BODIPY derivatives based on data-driven strategies. Full article
Show Figures

Figure 1

19 pages, 8922 KB  
Article
A Two-Stage Time-Domain Equalization Method for Mitigating Nonlinear Distortion in Single-Carrier THz Communication Systems
by Yunchuan Liu, Hongcheng Yang, Ziqi Liu, Minghan Jia, Shang Li, Jiajie Li, Jingsuo He, Zhe Yang and Cunlin Zhang
Sensors 2025, 25(15), 4825; https://doi.org/10.3390/s25154825 - 6 Aug 2025
Cited by 1 | Viewed by 960
Abstract
Terahertz (THz) communication is regarded as a key technology for achieving high-speed data transmission and wireless communication due to its ultra-high frequency and large bandwidth characteristics. In this study, we focus on a single-carrier THz communication system and propose a two-stage deep learning-based [...] Read more.
Terahertz (THz) communication is regarded as a key technology for achieving high-speed data transmission and wireless communication due to its ultra-high frequency and large bandwidth characteristics. In this study, we focus on a single-carrier THz communication system and propose a two-stage deep learning-based time-domain equalization method, specifically designed to mitigate the nonlinear distortions in such systems, thereby enhancing communication reliability and performance. The method adopts a progressive learning strategy, whereby global characteristics are initially captured before progressing to local levels. This enables the effective identification and equalization of channel characteristics, particularly in the mitigation of nonlinear distortion and random interference, which can otherwise negatively impact communication quality. In an experimental setting at a frequency of 230 GHz and a channel distance of 2.1 m, this method demonstrated a substantial reduction in the system’s bit error rate (BER), exhibiting particularly noteworthy performance enhancements in comparison to before equalization. To validate the model’s generalization capability, data collection and testing were also conducted at a frequency of 310 GHz and a channel distance of 1.5 m. Experimental results show that the proposed time-domain equalizer, trained using the two-stage DL framework, achieved significant BER reductions of approximately 92.15% at 230 GHz (2.1 m) and 83.33% at 310 GHz (1.5 m), compared to the system’s performance prior to equalization. The method exhibits stable performance under varying conditions, supporting its use in future THz communication studies. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

22 pages, 4895 KB  
Article
Machine Learning-Assisted Secure Random Communication System
by Areeb Ahmed and Zoran Bosnić
Entropy 2025, 27(8), 815; https://doi.org/10.3390/e27080815 - 29 Jul 2025
Viewed by 1120
Abstract
Machine learning techniques have revolutionized physical layer security (PLS) and provided opportunities for optimizing the performance and security of modern communication systems. In this study, we propose the first machine learning-assisted random communication system (ML-RCS). It comprises a pretrained decision tree (DT)-based receiver [...] Read more.
Machine learning techniques have revolutionized physical layer security (PLS) and provided opportunities for optimizing the performance and security of modern communication systems. In this study, we propose the first machine learning-assisted random communication system (ML-RCS). It comprises a pretrained decision tree (DT)-based receiver that extracts binary information from the transmitted random noise carrier signals. The ML-RCS employs skewed alpha-stable (α-stable) noise as a random carrier to encode the incoming binary bits securely. The DT model is pretrained on an extensively developed dataset encompassing all the selected parameter combinations to generate and detect the α-stable noise signals. The legitimate receiver leverages the pretrained DT and a predetermined key, specifically the pulse length of a single binary information bit, to securely decode the hidden binary bits. The performance evaluations included the single-bit transmission, confusion matrices, and a bit error rate (BER) analysis via Monte Carlo simulations. The fact that the BER reached 10−3 confirms the ability of the proposed system to establish successful secure communication between a transmitter and legitimate receiver. Additionally, the ML-RCS provides an increased data rate compared to previous random communication systems. From the perspective of security, the confusion matrices and computed false negative rate of 50.2% demonstrate the failure of an eavesdropper to decode the binary bits without access to the predetermined key and the private dataset. These findings highlight the potential ability of unconventional ML-RCSs to promote the development of secure next-generation communication devices with built-in PLSs. Full article
(This article belongs to the Special Issue Wireless Communications: Signal Processing Perspectives, 2nd Edition)
Show Figures

Figure 1

22 pages, 2815 KB  
Article
Multi-Layer Cryptosystem Using Reversible Cellular Automata
by George Cosmin Stănică and Petre Anghelescu
Electronics 2025, 14(13), 2627; https://doi.org/10.3390/electronics14132627 - 29 Jun 2025
Viewed by 902
Abstract
The growing need for adaptable and efficient hardware-based encryption methods has led to increased interest in unconventional models such as cellular automata (CA). This study presents the hardware design and the field programmable gate array (FPGA)-based implementation of a multi-layer symmetric block encryption [...] Read more.
The growing need for adaptable and efficient hardware-based encryption methods has led to increased interest in unconventional models such as cellular automata (CA). This study presents the hardware design and the field programmable gate array (FPGA)-based implementation of a multi-layer symmetric block encryption algorithm built on the principles of reversible cellular automata (RCA). The algorithm operates on 128-bit plaintext blocks processed over iterative rounds and integrates five RCA components, each assigned with specific transformation roles to ensure high data diffusion. A 256-bit secret key that governs the rule configuration yields a vast keyspace, significantly enhancing resistance to brute-force attacks. Key elements such as rule-based evolution, neighborhood radius, and hybrid cellular automata for random state generation are also integrated into the hardware logic. All cryptographic components, including initialization, encryption logic, and control, are built exclusively using CA, ensuring design consistency and low complexity. The cryptosystem takes advantage of the localized interactions and naturally parallel CA structure, which align with the architecture of FPGA devices, making them a suitable platform for implementing such encryption schemes. The results demonstrate the feasibility of deploying multi-layer RCA encryption schemes on reconfigurable devices and provide a viable path toward efficient and secure hardware-level encryption systems. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

32 pages, 5110 KB  
Article
Using AI to Improve MIMO Antennas with SRR for 26 GHz by Analyzing Data
by Linda Chouikhi, Chaker Essid, Bassem Ben-Salah, Mongi Ben Moussa and Hedi Sakli
Electronics 2025, 14(13), 2529; https://doi.org/10.3390/electronics14132529 - 22 Jun 2025
Cited by 1 | Viewed by 2195
Abstract
This paper introduces a database-based design methodology aimed at optimizing a 26 GHz MIMO antenna system through machine learning (ML) techniques. The procedure is divided into two primary phases. Initially, a rectangular microstrip patch antenna is designed and enhanced using analytical models alongside [...] Read more.
This paper introduces a database-based design methodology aimed at optimizing a 26 GHz MIMO antenna system through machine learning (ML) techniques. The procedure is divided into two primary phases. Initially, a rectangular microstrip patch antenna is designed and enhanced using analytical models alongside ML algorithms that are trained on a detailed dataset of geometric parameters. This yields effective impedance matching (S11 < −45 dB) and a high gain (~6.64 dBi), which serve as the foundation for the MIMO structure. In the second phase, split ring resonator (SRR) configurations are integrated between the antenna elements to reduce mutual coupling. A specialized dataset, featuring varied dimensions of SRR, quantities of unit cells, and spatial placements, is utilized to train Random Forest models that forecast arrangements achieving optimal isolation (S21 < −40 dB) while maintaining low reflection losses. Additionally, a secondary dataset is constructed to investigate the best strategies for SRR placement, ensuring an optimal balance between isolation and return loss. The ultimate MIMO design is validated via comprehensive full-wave electromagnetic simulations and experimental measurements. The proposed system exhibits noteworthy performance enhancements, including an envelope correlation coefficient (ECC) < 0.005, diversity gain (DG) ≈ 9.99 dB, channel capacity loss (CCL) < 0.3 bits/s/Hz, total active reflection coefficient (TARC) < −30 dB, radiation efficiency exceeding 80%, and a maximum gain increase up to 10.22 dB. The close correlation between predicted and measured outcomes validates the effectiveness of the ML-driven approach in expediting antenna optimization for 5G and future applications. Full article
Show Figures

Figure 1

Back to TopTop