Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (483)

Search Parameters:
Keywords = reversible embedding

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
19 pages, 14454 KB  
Article
Primordial Black Holes and Instantons: Shadow of an Extra Dimension
by Reinoud Jan Slagter
Universe 2026, 12(1), 26; https://doi.org/10.3390/universe12010026 - 16 Jan 2026
Viewed by 103
Abstract
We investigated an exact solution in a conformal invariant Randall-Sundrum 5D warped brane world model on a time dependent Kerr-like spacetime. The singular points are determined by a quintic polynomial in the complex plane and fulfills Cauchy’s theorem on holomorphic functions. The solution, [...] Read more.
We investigated an exact solution in a conformal invariant Randall-Sundrum 5D warped brane world model on a time dependent Kerr-like spacetime. The singular points are determined by a quintic polynomial in the complex plane and fulfills Cauchy’s theorem on holomorphic functions. The solution, which is determined by a first-degree differential equation, shows many similarities with an instanton. In order to describe the quantum mechanical aspects of the black hole solution, we apply the antipodal boundary condition. The solution is invariant under time reversal and also valid in Riemannian space. Moreover, CPT invariance in maintained. The vacuum instanton solution follows from the 5D as well as the effective 4D brane equations, only when we allow the contribution of the projected 5D Weyl tensor on the brane (the KK-‘particles’). The topology of the effective 4D space of the brane is the projective RP3 (elliptic space) by identifying antipodal points on S3. The 5D is completed by applying the Klein bottle embedding and the Z2 symmetry of the RS model. This model fits very well with the description of the Hawking radiation, which remains pure. We have also indicated a possible way to include fermions. Our 5D space admits a double cover of S3 and after fibering to the S2, we obtain the effective black hole horizon. The connection with the icosahedron discrete symmetry group is investigated. It seem that Bekenstein’s conjecture that the area of a black hole is quantized, could be applied to our model. Full article
(This article belongs to the Section Foundations of Quantum Mechanics and Quantum Gravity)
Show Figures

Figure 1

15 pages, 1607 KB  
Article
Using Steganography and Artificial Neural Network for Data Forensic Validation and Counter Image Deepfakes
by Matimu Caswell Nkuna, Ebenezer Esenogho and Ahmed Ali
Computers 2026, 15(1), 61; https://doi.org/10.3390/computers15010061 - 15 Jan 2026
Viewed by 181
Abstract
The merging of the Internet of Things (IoT) and Artificial Intelligence (AI) advances has intensified challenges related to data authenticity and security. These advancements necessitate a multi-layered security approach to ensure the security, reliability, and integrity of critical infrastructure and intelligent surveillance systems. [...] Read more.
The merging of the Internet of Things (IoT) and Artificial Intelligence (AI) advances has intensified challenges related to data authenticity and security. These advancements necessitate a multi-layered security approach to ensure the security, reliability, and integrity of critical infrastructure and intelligent surveillance systems. This paper proposes a two-layered security approach that combines a discrete cosine transform least significant bit 2 (DCT-LSB-2) with artificial neural networks (ANNs) for data forensic validation and mitigating deepfakes. The proposed model encodes validation codes within the LSBs of cover images captured by an IoT camera on the sender side, leveraging the DCT approach to enhance the resilience against steganalysis. On the receiver side, a reverse DCT-LSB-2 process decodes the embedded validation code, which is subjected to authenticity verification by a pre-trained ANN model. The ANN validates the integrity of the decoded code and ensures that only device-originated, untampered images are accepted. The proposed framework achieved an average SSIM of 0.9927 across the entire investigated embedding capacity, ranging from 0 to 1.988 bpp. DCT-LSB-2 showed a stable Peak Signal-to-Noise Ratio (average 42.44 dB) under various evaluated payloads ranging from 0 to 100 kB. The proposed model achieved a resilient and robust multi-layered data forensic validation system. Full article
(This article belongs to the Special Issue Multimedia Data and Network Security)
Show Figures

Graphical abstract

30 pages, 8453 KB  
Article
PBZGNet: A Novel Defect Detection Network for Substation Equipment Based on Gradual Parallel Branch Architecture
by Mintao Hu, Yang Zhuang, Jiahao Wang, Yaoyi Hu, Desheng Sun, Dawei Xu and Yongjie Zhai
Sensors 2026, 26(1), 300; https://doi.org/10.3390/s26010300 - 2 Jan 2026
Viewed by 470
Abstract
As power systems expand and grow smarter, the safe and steady operation of substation equipment has become a prerequisite for grid reliability. In cluttered substation scenes, however, existing deep learning detectors still struggle with small targets, multi-scale feature fusion, and precise localization. To [...] Read more.
As power systems expand and grow smarter, the safe and steady operation of substation equipment has become a prerequisite for grid reliability. In cluttered substation scenes, however, existing deep learning detectors still struggle with small targets, multi-scale feature fusion, and precise localization. To overcome these limitations, we introduce PBZGNet, a defect-detection network that couples a gradual parallel-branch backbone, a zoom-fusion neck, and a global channel-recalibration module. First, BiCoreNet is embedded in the feature extractor: dual-core parallel paths, reversible residual links, and channel recalibration cooperate to mine fault-sensitive cues. Second, cross-scale ZFusion and Concat-CBFuse are dynamically merged so that no scale loses information; a hierarchical composite feature pyramid is then formed, strengthening the representation of both complex objects and tiny flaws. Third, an attention-guided decoupled detection head (ADHead) refines responses to obscured and minute defect patterns. Finally, within the Generalized Focal Loss framework, a quality rating scheme suppresses background interference while distribution regression sharpens the localization of small targets. Across all scales, PBZGNet clearly outperforms YOLOv11. Its lightweight variant, PBZGNet-n, attains 83.9% mAP@50 with only 2.91 M parameters and 7.7 GFLOPs—9.3% above YOLOv11-n. The full PBZGNet surpasses the current best substation model, YOLO-SD, by 7.3% mAP@50, setting a new state of the art (SOTA). Full article
(This article belongs to the Special Issue Deep Learning Based Intelligent Fault Diagnosis)
Show Figures

Figure 1

24 pages, 3847 KB  
Article
Seismic Failure Mechanism Shift in RC Buildings Revealed by NDT-Supported, Field-Calibrated BIM-Based Models
by Mehmet Esen Eren and Cenk Fenerli
Appl. Sci. 2026, 16(1), 455; https://doi.org/10.3390/app16010455 - 1 Jan 2026
Viewed by 257
Abstract
This study proposes a field-calibrated, NDT-integrated BIM modeling framework to improve the reliability of post-earthquake assessment for reinforced concrete (RC) buildings. The approach combines destructive and nondestructive testing (NDT) data—including core drilling, Schmidt hammer, ultrasonic pulse velocity (UPV), and Windsor probe—through a site-specific [...] Read more.
This study proposes a field-calibrated, NDT-integrated BIM modeling framework to improve the reliability of post-earthquake assessment for reinforced concrete (RC) buildings. The approach combines destructive and nondestructive testing (NDT) data—including core drilling, Schmidt hammer, ultrasonic pulse velocity (UPV), and Windsor probe—through a site-specific WinSonReb regression model. The calibrated material properties (average compressive strength ≈ 18.6 MPa, CoV > 20%) were embedded into a Building Information Modeling (BIM) environment, producing an as-is, NDT-calibrated BIM model representing a Level-2 static digital twin of the structure. Nonlinear static pushover analyses performed in accordance with TBDY-2018 and ASCE 41-17 showed that the calibrated model exhibits a fundamental period of 0.85 s—approximately 18% longer than the uncalibrated BIM model. This elongation increased displacement demand and caused a shift in performance classification: while the uncalibrated model indicated Life Safety (LS), the calibrated model predicted behavior approaching Collapse Prevention (CP) in the Y direction. Furthermore, calibration reversed the predicted damage hierarchy, from ductile beam hinging to brittle column- and wall-controlled failure near elevator openings, consistent with post-event observations from the 2023 Kahramanmaraş earthquakes. These results demonstrate that integrating field-calibrated NDT data into BIM-based seismic models fundamentally alters both strength estimation and failure-mechanism prediction, reducing epistemic uncertainty and providing a more conservative basis for retrofit prioritization. Although demonstrated on a single case study, the proposed workflow offers a realistic and scalable pathway for NDT-supported seismic performance assessment of existing RC buildings. Full article
Show Figures

Figure 1

19 pages, 4681 KB  
Article
Precision Controllable Reversible Watermarking Algorithm for Oblique Photography 3D Models
by Ruitao Qu, Liming Zhang, Zhaoyang Hou and Mingwang Zhang
Sensors 2026, 26(1), 243; https://doi.org/10.3390/s26010243 - 30 Dec 2025
Viewed by 243
Abstract
Most oblique photography 3D model watermarking algorithms only support limited data recovery or fail to restore the original model, falling short of meeting diverse user needs. Consequently, this study introduces a novel reversible watermarking scheme specifically tailored for oblique photographic 3D models, which [...] Read more.
Most oblique photography 3D model watermarking algorithms only support limited data recovery or fail to restore the original model, falling short of meeting diverse user needs. Consequently, this study introduces a novel reversible watermarking scheme specifically tailored for oblique photographic 3D models, which is designed to adjust the accuracy of model recovery freely. Firstly, considering the global stability of the oblique photography 3D model, the feature points are extracted by utilizing the mean angle between vertex normals. Secondly, a mapping is established based on the ratio of distances between feature points and non-feature points. Then, the vertices are grouped, with each group consisting of one feature point and several non-feature points. Finally, by using the feature point as the origin, a spherical coordinate system is constructed for each group. The watermark information is embedded by modifying the radius in the spherical coordinate system. In the process of extracting watermarks, watermarks can be extracted from different radius ranges, thereby achieving a controllable error in model recovery. Experimental results demonstrate that this approach exhibits significant advantages in reversibility and controllable restoration accuracy, achieving error-free extraction under both translation and rotation attacks. Compared to existing algorithms, it achieves average improvements of 0.121 and 0.298 under cropping and simplification attacks, respectively, showcasing enhanced robustness. This enables it to meet better diverse user demands for watermarking and model restoration in oblique photography 3D models. Full article
(This article belongs to the Section Sensing and Imaging)
Show Figures

Figure 1

21 pages, 5078 KB  
Article
Parallelizable and Lightweight Reversible Data Hiding Framework for Encryption-Then-Compression Systems
by Ruifeng Li and Masaaki Fujiyoshi
Electronics 2026, 15(1), 136; https://doi.org/10.3390/electronics15010136 - 28 Dec 2025
Viewed by 189
Abstract
Encryption-then-compression (EtC) enables secure image processing while retaining coding efficiency. In grayscale-based EtC pipelines with YCbCr transformation and component serialization, reversible data hiding (RDH) becomes challenging because cross-channel correspondence is disrupted, and block-wise encryption operations (permutation, rotation, and brightness inversion) break embedding synchronization. [...] Read more.
Encryption-then-compression (EtC) enables secure image processing while retaining coding efficiency. In grayscale-based EtC pipelines with YCbCr transformation and component serialization, reversible data hiding (RDH) becomes challenging because cross-channel correspondence is disrupted, and block-wise encryption operations (permutation, rotation, and brightness inversion) break embedding synchronization. This paper presents a block-independent and lightweight RDH framework for such component-serialized grayscale EtC systems. The framework combines diagonal pixel absolute difference (DPAD)-based embedding with an encryption-invariant synchronization index (EISI), enabling reliable encrypted-domain extraction and self-synchronization under component serialization and block permutation, without auxiliary side information or any modification to the underlying EtC pipeline. All operations are performed locally at the block level, making the framework naturally parallelizable when needed. Experiments on standard datasets with diverse texture characteristics demonstrate reliable data extraction and perfect reversibility while preserving the structural properties required for secure encryption and lossless-mode compression. These results indicate that the proposed framework is well-suited to practical EtC deployments where lightweight implementation and block-level independence are essential. Full article
(This article belongs to the Special Issue Advanced Techniques in Real-Time Image Processing)
Show Figures

Figure 1

32 pages, 11476 KB  
Article
Secure and Reversible Thumbnail-Preserving Encryption for Point Clouds via Spatial Subdivision and Chaotic Perturbation
by Tz-Yi You, Yu-Ting Huang, Ting-Yu Hsiao, Yung-Wen Cheng, Yuan-Yu Tsai and Ching-Ta Lu
Mathematics 2026, 14(1), 80; https://doi.org/10.3390/math14010080 - 25 Dec 2025
Viewed by 278
Abstract
Thumbnail-preserving encryption (TPE) aims to balance data security and usability by allowing encrypted content to retain a coarse visual preview while protecting sensitive details. While existing TPE techniques primarily target 2D images, effective and reversible TPE for 3D point clouds remains underexplored. This [...] Read more.
Thumbnail-preserving encryption (TPE) aims to balance data security and usability by allowing encrypted content to retain a coarse visual preview while protecting sensitive details. While existing TPE techniques primarily target 2D images, effective and reversible TPE for 3D point clouds remains underexplored. This paper proposes a thumbnail-preserving encryption framework specifically designed for point clouds, addressing the challenges arising from irregular spatial structure and viewpoint-dependent visualization. The proposed method integrates perception-guided spatial subdivision with key-dependent chaotic perturbation to obfuscate fine-grained geometric details while intentionally preserving coarse structural information under the TPE threat model. A reversible integer-domain design is further incorporated to enable exact recovery of the original point cloud and support reversible data hiding by exploiting coordinate-level redundancy. Extensive experiments conducted on diverse point clouds demonstrate that the proposed framework maintains stable thumbnail fidelity across different viewing conditions, achieving high structural similarity, while guaranteeing perfect reversibility with zero reconstruction error. In contrast to existing image-based TPE frameworks, the proposed method extends the TPE paradigm to 3D point clouds by providing full reversibility, auxiliary message embedding support, and stable thumbnail fidelity under varying viewing conditions. Quantitative results demonstrate that thumbnail-level structural similarity is well preserved, while the original point clouds are exactly recovered after decryption. Full article
(This article belongs to the Special Issue Information Security and Image Processing)
Show Figures

Figure 1

22 pages, 1099 KB  
Article
Cross-Attention Diffusion Model for Semantic-Aware Short-Term Urban OD Flow Prediction
by Hongxiang Li, Zhiming Gui and Zhenji Gao
ISPRS Int. J. Geo-Inf. 2026, 15(1), 2; https://doi.org/10.3390/ijgi15010002 - 19 Dec 2025
Viewed by 608
Abstract
Origin–destination (OD) flow prediction is fundamental to intelligent transportation systems, yet existing diffusion-based models face two critical limitations. First, they inadequately exploit spatial semantics, focusing primarily on temporal dependencies or topological correlations while neglecting urban functional heterogeneity encoded in Points of Interest (POIs). [...] Read more.
Origin–destination (OD) flow prediction is fundamental to intelligent transportation systems, yet existing diffusion-based models face two critical limitations. First, they inadequately exploit spatial semantics, focusing primarily on temporal dependencies or topological correlations while neglecting urban functional heterogeneity encoded in Points of Interest (POIs). Second, static embedding fusion cannot dynamically capture semantic importance variations during denoising—particularly during traffic surges in POI-dense areas. To address these gaps, we propose the Cross-Attention Diffusion Model (CADM), a semantically conditioned framework for short-term OD flow forecasting. CADM integrates POI embeddings as spatial semantic priors and employs cross-attention to enable semantic-guided denoising, facilitating dynamic spatiotemporal feature fusion. This design adaptively reweights regional representations throughout reverse diffusion, enhancing the model’s capacity to capture complex mobility patterns. Experiments on real-world datasets demonstrate that CADM achieves balanced performance across multiple metrics. At the 30 min horizon, CADM attains the lowest RMSE of 5.77, outperforming iTransformer by 1.9%, while maintaining competitive performance at the 15 min horizon. Ablation studies confirm that removing POI features increases prediction errors by 15–20%, validating the critical role of semantic conditioning. These findings advance semantic-aware generative modeling for spatiotemporal prediction and provide practical insights for intelligent transportation systems, particularly for newly established transportation hubs or functional zone reconfigurations where semantic understanding is essential. Full article
(This article belongs to the Special Issue Spatial Data Science and Knowledge Discovery)
Show Figures

Figure 1

40 pages, 5487 KB  
Communication
Physics-Informed Temperature Prediction of Lithium-Ion Batteries Using Decomposition-Enhanced LSTM and BiLSTM Models
by Seyed Saeed Madani, Yasmin Shabeer, Michael Fowler, Satyam Panchal, Carlos Ziebert, Hicham Chaoui and François Allard
World Electr. Veh. J. 2026, 17(1), 2; https://doi.org/10.3390/wevj17010002 - 19 Dec 2025
Viewed by 640
Abstract
Accurately forecasting the operating temperature of lithium-ion batteries (LIBs) is essential for preventing thermal runaway, extending service life, and ensuring the safe operation of electric vehicles and stationary energy-storage systems. This work introduces a unified, physics-informed, and data-driven temperature-prediction framework that integrates mathematically [...] Read more.
Accurately forecasting the operating temperature of lithium-ion batteries (LIBs) is essential for preventing thermal runaway, extending service life, and ensuring the safe operation of electric vehicles and stationary energy-storage systems. This work introduces a unified, physics-informed, and data-driven temperature-prediction framework that integrates mathematically governed preprocessing, electrothermal decomposition, and sequential deep learning architectures. The methodology systematically applies the governing relations to convert raw temperature measurements into trend, seasonal, and residual components, thereby isolating long-term thermal accumulation, reversible entropy-driven oscillations, and irreversible resistive heating. These physically interpretable signatures serve as structured inputs to machine learning and deep learning models trained on temporally segmented temperature sequences. Among all evaluated predictors, the Bidirectional Long Short-Term Memory (BiLSTM) network achieved the highest prediction fidelity, yielding an RMSE of 0.018 °C, a 35.7% improvement over the conventional Long Short-Term Memory (LSTM) (RMSE = 0.028 °C) due to its ability to simultaneously encode forward and backward temporal dependencies inherent in cyclic electrochemical operation. While CatBoost exhibited the strongest performance among classical regressors (RMSE = 0.022 °C), outperforming Random Forest, Gradient Boosting, Support Vector Regression, XGBoost, and LightGBM, it remained inferior to BiLSTM because it lacks the capacity to represent bidirectional electrothermal dynamics. This performance hierarchy confirms that LIB thermal evolution is not dictated solely by historical load sequences; it also depends on forthcoming cycling patterns and entropic interactions, which unidirectional and memoryless models cannot capture. The resulting hybrid physics-data-driven framework provides a reliable surrogate for real-time LIB thermal estimation and can be directly embedded within BMS to enable proactive intervention strategies such as predictive cooling activation, current derating, and early detection of hazardous thermal conditions. By coupling physics-based decomposition with deep sequential learning, this study establishes a validated foundation for next-generation LIB thermal-management platforms and identifies a clear trajectory for future work extending the methodology to module- and pack-level systems suitable for industrial deployment. Full article
(This article belongs to the Section Vehicle Management)
Show Figures

Figure 1

27 pages, 8990 KB  
Article
A Non-Embedding Watermarking Framework Using MSB-Driven Reference Mapping for Distortion-Free Medical Image Authentication
by Osama Ouda
Electronics 2026, 15(1), 7; https://doi.org/10.3390/electronics15010007 - 19 Dec 2025
Viewed by 257
Abstract
Ensuring the integrity of medical images is essential to securing clinical workflows, telemedicine platforms, and healthcare IoT environments. Existing watermarking and reversible data-hiding approaches often modify pixel intensities, reducing diagnostic fidelity, introducing embedding constraints, or causing instability under compression and format conversion. This [...] Read more.
Ensuring the integrity of medical images is essential to securing clinical workflows, telemedicine platforms, and healthcare IoT environments. Existing watermarking and reversible data-hiding approaches often modify pixel intensities, reducing diagnostic fidelity, introducing embedding constraints, or causing instability under compression and format conversion. This work proposes a distortion-free, non-embedding authentication framework that leverages the inherent stability of the most significant bit (MSB) patterns in the Non-Region of Interest (NROI) to construct a secure and tamper-sensitive reference for the diagnostic Region of Interest (ROI). The ROI is partitioned into fixed blocks, each producing a 256-bit SHA-256 signature. Instead of embedding this signature, each hash bit is mapped to an NROI pixel whose MSB matches the corresponding bit value, and only the encrypted coordinates of these pixels are stored externally in a secure database. During verification, hashes are recomputed and compared bit-by-bit with the MSB sequence extracted from the referenced NROI coordinates, enabling precise block-level tamper localization without modifying the image. Extensive experiments conducted on MRI (OASIS), X-ray (ChestX-ray14), and CT (CT-ORG) datasets demonstrate the following: (i) perfect zero-distortion fidelity; (ii) stable and deterministic MSB-class mapping with abundant coordinate diversity; (iii) 100% detection of intentional ROI tampering with no false positives across the six clinically relevant manipulation types; and (iv) robustness to common benign Non-ROI operations. The results show that the proposed scheme offers a practical, secure, and computationally lightweight solution for medical image integrity verification in PACS systems, cloud-based archives, and healthcare IoT applications, while avoiding the limitations of embedding-based methods. Full article
(This article belongs to the Special Issue Advances in Cryptography and Image Encryption)
Show Figures

Figure 1

25 pages, 25629 KB  
Article
DSEPGAN: A Dual-Stream Enhanced Pyramid Based on Generative Adversarial Network for Spatiotemporal Image Fusion
by Dandan Zhou, Lina Xu, Ke Wu, Huize Liu and Mengting Jiang
Remote Sens. 2025, 17(24), 4050; https://doi.org/10.3390/rs17244050 - 17 Dec 2025
Viewed by 275
Abstract
Many deep learning-based spatiotemporal fusion (STF) methods have been proven to achieve high accuracy and robustness. Due to the variable shapes and sizes of objects in remote sensing images, pyramid networks are generally introduced to extract multi-scale features. However, the down-sampling operation in [...] Read more.
Many deep learning-based spatiotemporal fusion (STF) methods have been proven to achieve high accuracy and robustness. Due to the variable shapes and sizes of objects in remote sensing images, pyramid networks are generally introduced to extract multi-scale features. However, the down-sampling operation in the pyramid structure may lead to the loss of image detail information, affecting the model’s ability to reconstruct fine-grained targets. To address this issue, we propose a novel Dual-Stream Enhanced Pyramid based on Generative Adversarial Network (DSEPGAN) for the spatiotemporal fusion of remote sensing images. The network adopts a dual-stream architecture to separately process coarse and fine images, tailoring feature extraction to their respective characteristics: coarse images provide temporal dynamics, while fine images contain rich spatial details. A reversible feature transformation is embedded in the pyramid feature extraction stage to preserve high-frequency information, and a fusion module employing large-kernel and depthwise separable convolutions captures long-range dependencies across inputs. To further enhance realism and detail fidelity, adversarial training encourages the network to generate sharper and more visually convincing fusion results. The proposed DSEPGAN is compared with widely used and state-of-the-art STF models in three publicly available datasets. The results illustrate that DSEPGAN achieves superior performance across various evaluation metrics, highlighting its notable advantages for predicting seasonal variations in highly heterogeneous regions and abrupt changes in land use. Full article
Show Figures

Figure 1

36 pages, 25862 KB  
Article
A Novel PVO-Based Multi-Pixel Embedding Reversible Data Hiding Scheme Using the Artificial Lemming Algorithm
by Zhaochuang Lao, Shuyuan Shen, Songsen Yu, Yutong Jiang, Yining Luo, Yongjie Qu and Zihao Feng
Electronics 2025, 14(24), 4920; https://doi.org/10.3390/electronics14244920 - 15 Dec 2025
Viewed by 190
Abstract
Pixel value ordering (PVO) is a widely used framework for reversible data hiding (RDH). As the demand for higher embedding capacity continues to grow, achieving a proper balance between capacity and image quality has become increasingly important. In this paper, we propose a [...] Read more.
Pixel value ordering (PVO) is a widely used framework for reversible data hiding (RDH). As the demand for higher embedding capacity continues to grow, achieving a proper balance between capacity and image quality has become increasingly important. In this paper, we propose a novel PVO-based multi-pixel embedding RDH scheme for grayscale images, which improves capacity by embedding multiple bits of data within multiple pixels in each block. A PVO recovery strategy is designed to guarantee reversibility while minimizing image distortion when multiple bits are embedded per block. Moreover, an improved flexible spatial location strategy is introduced, which defines pixel positions within a block using twelve modes. By selecting the optimal mode for each block, the number of expandable prediction errors is increased, further enhancing embedding capacity. In addition, the artificial lemming algorithm (ALA) is employed to optimize embedding parameters, enabling a better balance between capacity and visual quality for a given payload. Experimental results demonstrate that the proposed method achieves significantly improved embedding capacity while maintaining high image quality, offering a well-balanced performance compared to similar PVO-based schemes. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

33 pages, 2278 KB  
Review
Local Scour Around Tidal Stream Turbine Foundations: A State-of-the-Art Review and Perspective
by Ruihuan Liu, Ying Li, Qiuyang Yu and Dongzi Pan
J. Mar. Sci. Eng. 2025, 13(12), 2376; https://doi.org/10.3390/jmse13122376 - 15 Dec 2025
Viewed by 299
Abstract
Local scour around support structures has remained a critical barrier to tidal stream turbine deployment in energetic marine channels since loss of embedment and bearing capacity has undermined stability and delayed commercialization. This review identifies key mechanisms, practical implications, and forward-looking strategies related [...] Read more.
Local scour around support structures has remained a critical barrier to tidal stream turbine deployment in energetic marine channels since loss of embedment and bearing capacity has undermined stability and delayed commercialization. This review identifies key mechanisms, practical implications, and forward-looking strategies related to local scour. It highlights that rotor operation, small tip clearance, and helical wakes can significantly intensify near-bed shear stress and erosion relative to monopile foundations without turbine rotation. Scour behavior is compared across monopile, tripod, jacket, and gravity-based foundations under steady flow, reversing tides, and combined wave and current conditions, revealing their influence on depth and morphology. The review further assesses coupled interactions among waves, oscillatory currents, turbine-induced flow, and seabed response, including sediment transport, transient pore pressure, and liquefaction risk. Advances in prediction methods spanning laboratory experiments, high-fidelity simulations, semi-empirical models, and data-driven techniques are synthesized, and mitigation strategies are evaluated across passive, active, and eco-integrated approaches. Remaining challenges and specific research needs are outlined, including array-scale effects, monitoring standards, and integration of design frameworks. The review concludes with future directions to support safe, efficient, and sustainable turbine deployment. Full article
(This article belongs to the Special Issue Marine Renewable Energy and Environment Evaluation)
Show Figures

Figure 1

41 pages, 11699 KB  
Article
Knowledge, Materials, and Construction Techniques as Guiding Factors in Conservation Interventions: An Interpretative Approach for the House of Arianna in the Archaeological Park of Pompeii
by Renata Picone, Valentina Russo, Lia Romano, Ersilia Fiore and Sara Iaccarino
Heritage 2025, 8(12), 508; https://doi.org/10.3390/heritage8120508 - 4 Dec 2025
Viewed by 720
Abstract
This paper presents a knowledge-based and interpretative model for the conservation of the House of Arianna, located in the Archaeological Park of Pompeii, developed within the CHANGES project, Spoke 6—History, Conservation and Restoration of Cultural Heritage. The research focused on two [...] Read more.
This paper presents a knowledge-based and interpretative model for the conservation of the House of Arianna, located in the Archaeological Park of Pompeii, developed within the CHANGES project, Spoke 6—History, Conservation and Restoration of Cultural Heritage. The research focused on two critical components of the site: the free-standing peristyle columns and the mosaic and frescoed surfaces preserved in situ. This workflow yielded a high-resolution digital model, analytical condition maps, and diagnostic datasets that directly inform conservation decisions. The results show that the columns exhibit internal discontinuities and weaknesses at their joints, a condition linked to heterogeneous construction techniques which increases the risk of drum slippage under wind and seismic loading. The mosaics display a marked loss of tesserae in exposed sectors over recent years, driven by moisture ingress, biological growth and mechanical stress. These findings support the adoption of low-impact, reversible measures, embedded within a prevention-first strategy based on planned conservation. The study formalizes a replicable methodology that aligns diagnostics, monitoring and conservation planning. By linking ‘skin’ and ‘structure’ within a unified interpretative matrix, the approach enhances both structural safety and material legibility. The workflow proposed here offers transferable guidance for the sustainable preservation and inclusive interpretation of exposed archaeological ensembles in the Vesuvian context and beyond. Full article
(This article belongs to the Special Issue History, Conservation and Restoration of Cultural Heritage)
Show Figures

Figure 1

12 pages, 264 KB  
Entry
Stock Valuation and Investor Expectations
by Morris G. Danielson
Encyclopedia 2025, 5(4), 203; https://doi.org/10.3390/encyclopedia5040203 - 3 Dec 2025
Viewed by 1016
Definition
Stock valuation models can be used to guide the investment decisions of institutions or individuals. In the traditional approach, the investor will use a valuation model to calculate a stock’s intrinsic value as a function of the estimated future cash flows the firm [...] Read more.
Stock valuation models can be used to guide the investment decisions of institutions or individuals. In the traditional approach, the investor will use a valuation model to calculate a stock’s intrinsic value as a function of the estimated future cash flows the firm will distribute to its shareholders. The investment decision will hinge on how the estimated intrinsic value compares to the current stock price. This approach is appropriate when the investor has access to the detailed company-specific information required to forecast future cash flows. In an alternative approach, the process is reversed, and stock valuation models can be used to identify the cash flow expectations supporting a firm’s current stock price. Depending on whether or not these expectations are reasonable—in light of current and expected firm-specific, industry, and macroeconomic conditions—the investor can decide whether to buy, sell, or hold the stock. This approach is appropriate for external investors who do not have access to detailed company-specific information. This entry discusses the uses and limitations of the most prominent stock valuation models when used in the traditional framework, and explains how to identify and evaluate the expectations embedded within a current stock price. Full article
(This article belongs to the Section Social Sciences)
Show Figures

Graphical abstract

Back to TopTop