Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,922)

Search Parameters:
Keywords = symmetric solutions

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
25 pages, 3670 KB  
Article
Robust Low-Complexity WMMSE Precoding Under Imperfect CSI with Per-Antenna Power Constraints
by Zijiao Guo, Vaskar Sen and Honggui Deng
Sensors 2026, 26(1), 159; https://doi.org/10.3390/s26010159 (registering DOI) - 25 Dec 2025
Abstract
Weighted sum-rate (WSR) maximization in downlink massive multi-user multiple-input (MU-MIMO) with per-antenna power constraints (PAPCs) and imperfect channel state information (CSI) is computationally challenging. Classical weighted minimum mean-square error (WMMSE) algorithms, in particular, have per-iteration costs that scale cubically with the number of [...] Read more.
Weighted sum-rate (WSR) maximization in downlink massive multi-user multiple-input (MU-MIMO) with per-antenna power constraints (PAPCs) and imperfect channel state information (CSI) is computationally challenging. Classical weighted minimum mean-square error (WMMSE) algorithms, in particular, have per-iteration costs that scale cubically with the number of base-station antennas. This article proposes a robust low-complexity WMMSE-based precoding framework (RLC-WMMSE) tailored for massive MU-MIMO downlink under PAPCs and stochastic CSI mismatch. The algorithm retains the standard WMMSE structure but incorporates three key enhancements: a diagonal dual-regularization scheme that enforces PAPCs via a lightweight projected dual ascent with row-wise safety projection; a Woodbury-based transmit update that replaces the dominant M×M inversion with an (NK)×(NK) symmetric positive-definite solve, greatly reducing the per-iteration complexity; and a hybrid switching mechanism with adaptive damping that blends classical and low-complexity updates to improve robustness and convergence under channel estimation errors. We also analyze computational complexity and signaling overhead for both TDD and FDD deployments. Simulation results over i.i.d. and spatially correlated channels show that the proposed RLC-WMMSE scheme achieves WSR performance close to benchmark WMMSE-PAPCs designs while providing substantial runtime savings and strictly satisfying the per-antenna power limits. These properties make RLC-WMMSE a practical and scalable precoding solution for large-scale MU-MIMO systems in future wireless sensor and communication networks. Full article
33 pages, 3011 KB  
Article
Research on Supply Chain Advertising Strategies for Big Data-Driven E-Commerce Platforms: Head or Newcomer?
by Huini Zhou, Zixuan Wang and Junying Zhu
Mathematics 2026, 14(1), 75; https://doi.org/10.3390/math14010075 (registering DOI) - 25 Dec 2025
Abstract
Under the influence of the long-tail effect, market segmentation and personalized demand provide room for small brands to grow. Meanwhile, consumer behavior patterns have also shifted, with increased acceptance of low-priced, highly practical goods. This paper constructs a two-tier competitive supply chain model. [...] Read more.
Under the influence of the long-tail effect, market segmentation and personalized demand provide room for small brands to grow. Meanwhile, consumer behavior patterns have also shifted, with increased acceptance of low-priced, highly practical goods. This paper constructs a two-tier competitive supply chain model. The manufacturer invests in big data from e-commerce platforms and decides on the production of products by combining sales data and consumer preferences. The two retailers are a head brand retailer, which is larger, and a newcomer brand retailer, which is smaller, and both consider advertising to expand their markets. The paper distinguishes four types of advertising strategies (NA, R1A, R2A, BA). Secondly, the differential game model is used to discuss the optimal solutions of different advertising strategies under the relevant situations of demand perturbation and demand non-perturbation. Again, empirical analyses are used to verify the robustness of the model by fitting it with the simulation model. Finally, the paper further extends the model to the symmetric domain to explore the optimal retailer capacity in the market, and comes to the following conclusions (1) In the case of non-disturbed demand, the differences in retailer size and competitiveness can promote a more efficient allocation of resources, and the advertisements placed by small brands are the most effective in terms of market share and profitability, which can also improve the overall performance of the supply chain. (2) Demand perturbation makes the unilateral advertisers more susceptible to external disturbances, and the profit is uncertain while the advertisers’ investment increases. (3) In the expansion model, the maximum capacity of small-brand retailers is 3. When retailers exceed 3, it is difficult for other retail brands to enter the market. Full article
(This article belongs to the Section C1: Difference and Differential Equations)
36 pages, 21805 KB  
Article
MEBCMO: A Symmetry-Aware Multi-Strategy Enhanced Balancing Composite Motion Optimization Algorithm for Global Optimization and Feature Selection
by Gelin Zhang, Minghao Gao and Xianmeng Zhao
Symmetry 2026, 18(1), 40; https://doi.org/10.3390/sym18010040 - 24 Dec 2025
Abstract
To address the limitations of the traditional Balancing Composite Motion Optimization (BCMO) algorithm—namely weak directional global exploration, insufficient local exploitation accuracy, and a tendency to fall into local optima with reduced population diversity in feature selection tasks—this paper proposes a Multi-Strategy Enhanced Balancing [...] Read more.
To address the limitations of the traditional Balancing Composite Motion Optimization (BCMO) algorithm—namely weak directional global exploration, insufficient local exploitation accuracy, and a tendency to fall into local optima with reduced population diversity in feature selection tasks—this paper proposes a Multi-Strategy Enhanced Balancing Composite Motion Optimization algorithm (MEBCMO). From a symmetry perspective, MEBCMO exploits the symmetric and asymmetric relationships among candidate solutions in the search space to achieve a better balance between exploration and exploitation. The performance of MEBCMO is enhanced through three complementary strategies. First, an adaptive heat-conduction search mechanism is introduced to simulate thermal transmission behavior, where a Sigmoid function adjusts the heat-conduction coefficient α_T from 0.9 to 0.2 during iterations. By utilizing the symmetric fitness–distance relationship between the current solution and the global best, this mechanism improves the directionality and efficiency of global exploration. Second, a quadratic interpolation search strategy is designed. By constructing a quadratic model based on the current individual, a randomly selected individual, and the global best, the algorithm exploits local symmetric characteristics of the fitness landscape to strengthen local exploitation and alleviate performance degradation in high-dimensional spaces. Third, an elite population genetic strategy is incorporated, in which the top three individuals generate new candidates through symmetric linear combinations with non-elite individuals and Gaussian perturbations, preserving population diversity and preventing premature convergence. To evaluate MEBCMO, extensive global optimization experiments are conducted on the CEC2017 benchmark suite with dimensions of 30, 50, and 100, and comparisons are made with eight mainstream algorithms, including PSO, DE, and GWO. Experimental results demonstrate that MEBCMO achieves superior performance across unimodal, multimodal, hybrid, and composite functions. Furthermore, MEBCMO is combined with LightGBM to form the MEBCMO-LightGBM model for feature selection on 14 public datasets, yielding lower fitness values, higher classification accuracy, and fewer selected features. Statistical tests and convergence analyses confirm the effectiveness, stability, and rapid convergence of MEBCMO in symmetric and complex optimization landscapes. Full article
(This article belongs to the Special Issue Symmetry in Mathematical Optimization Algorithm and Its Applications)
19 pages, 327 KB  
Article
The Solution of Tensor Equation AcX=B via C-Product*
by Siyu Huang and Pingxin Wang
Symmetry 2026, 18(1), 38; https://doi.org/10.3390/sym18010038 - 24 Dec 2025
Abstract
The solvability conditions, symmetric solutions, and antisymmetric solutions of matrix equations AX=B are important research topics in matrix theory. As a higher-order generalization of matrices, tensors have made the research on solving tensor equations a hot topic in recent years. [...] Read more.
The solvability conditions, symmetric solutions, and antisymmetric solutions of matrix equations AX=B are important research topics in matrix theory. As a higher-order generalization of matrices, tensors have made the research on solving tensor equations a hot topic in recent years. This paper focuses on the representation, properties, and computational methods of tensor generalized inverses under the C-product, and systematically explores their applications in solving the tensor equation A*cX=B. Firstly, the definition, existence conditions, analytical expressions, and computational algorithms of tensor generalized inverses under the C-product are discussed. By applying tensor generalized inverses under the C-product, the solvability conditions of tensor equation A*cX=BA*c are derived. The minimum norm solution method for consistent equation AX=B and the minimal norm least squares solution inconsistent equation A*cX=B are presented, respectively. Finally, numerical experiments were provided to verify the correctness of the theoretical analysis and algorithm implementation through numerical experiments, demonstrating the effectiveness of solving tensor equations under the C-product. Full article
(This article belongs to the Section Mathematics)
23 pages, 3527 KB  
Article
Symmetric Alignment Between Affective Semantics and Biomimetic Forms: Sustainable Packaging Design and Decision Support
by Yihang Fang and Yundong Qu
Symmetry 2026, 18(1), 19; https://doi.org/10.3390/sym18010019 - 22 Dec 2025
Viewed by 51
Abstract
The symmetrical relationship between affective semantics and form bionics creates new possibilities for tea packaging. This study proposes a biologically inspired workflow for tea packaging design, effectively integrating natural forms, affective semantics, and sustainability assessment. First, ten natural forms suitable for bionic design [...] Read more.
The symmetrical relationship between affective semantics and form bionics creates new possibilities for tea packaging. This study proposes a biologically inspired workflow for tea packaging design, effectively integrating natural forms, affective semantics, and sustainability assessment. First, ten natural forms suitable for bionic design were collected. The Affinity Diagram (AD) method was adopted based on evaluations from 20 consumers and tea merchants, yielding nine effective semantic and sustainability evaluation systems. Then, 10 domain experts scored the affective semantics, and the indicator weights were determined via the Precedence Chart (PC) method. The Quality Function Deployment (QFD) method was used to construct a relationship matrix between natural forms and affective semantics, identifying prioritized natural forms. Three biomimetic tea packaging designs were developed based on the three selected priority forms. Subsequently, the Criteria Importance Through Intercriteria Correlation (CRITIC) method calculated the objective weights of sustainability indicators. These weights were combined with Grey Relational Analysis (GRA) for comprehensive ranking to determine the optimal packaging scheme. The results show that stylish design (P1) has the highest weight among affective semantics, while low resource consumption (Q1) ranks first in sustainability evaluation indicators. Bamboo joint packaging was selected as the optimal design solution in the comprehensive ranking. This design process provides a methodological framework for tea packaging design, integrates biological bionics with affective semantics, and demonstrates potential for cross-category applications. Full article
(This article belongs to the Special Issue Symmetry/Asymmetry in Computer-Aided Industrial Design)
28 pages, 9186 KB  
Article
Artificial Neural Network-Based Optimization of an Inlet Perforated Distributor Plate for Uniform Coolant Entry in 10 kWh 24S24P Cylindrical Battery Module
by Tai Duc Le, You-Ma Bang, Nghia-Huu Nguyen and Moo-Yeon Lee
Symmetry 2026, 18(1), 14; https://doi.org/10.3390/sym18010014 - 21 Dec 2025
Viewed by 121
Abstract
In this study, a multi-objective optimization framework based on an artificial neural network (ANN) was developed for an inlet perforated distributor plate in a 24S24P 10 kWh cylindrical lithium-ion battery module using immersion cooling. A combined Newman, Tiedeman, Gu and Kim with Computational [...] Read more.
In this study, a multi-objective optimization framework based on an artificial neural network (ANN) was developed for an inlet perforated distributor plate in a 24S24P 10 kWh cylindrical lithium-ion battery module using immersion cooling. A combined Newman, Tiedeman, Gu and Kim with Computational Fluid Dynamics (NTGK-CFD) model was used to generate a symmetrically designed space by varying the input variables, including hole size A (mm), hole spacing ΔH (mm), and coolant mass flow rate Vin (kg/s). A three-level full factorial design was used to generate 27 cases, then CFD simulations were performed to provide a training data for the ANN model to predict the output variables, including maximum temperature Tmax, maximum temperature difference ΔTmax, and pressure drop ΔP. The results show that the ANN model provides a reliable predictive model, capable of reproducing the thermal-hydraulic behavior of the immersion-cooled battery module with high fidelity via correlation coefficients R of 0.997 for all three output variables. In addition, Pareto-based optimization shows designs that balance cooling efficiency and pumping power. The selected optimal solution maintains Tmax within the optimal range at 37.97 °C while reducing ΔP by up to 44%, providing a practical solution for large-scale battery module thermal management in EVs. Full article
Show Figures

Figure 1

12 pages, 3507 KB  
Article
Characteristics and Impact of Fouling from Copper Production on the Operation of a Waste Heat Recovery Boiler
by Roksana Urbaniak, Beata Hadała and Marcin Kacperski
Energies 2026, 19(1), 31; https://doi.org/10.3390/en19010031 - 20 Dec 2025
Viewed by 90
Abstract
The paper focuses on the characteristics of fouling from copper production on the tube surface in a waste heat recovery boiler during the transfer of heat from the flash furnace process gas. The likely mechanism of deposit formation on the tubes is described, [...] Read more.
The paper focuses on the characteristics of fouling from copper production on the tube surface in a waste heat recovery boiler during the transfer of heat from the flash furnace process gas. The likely mechanism of deposit formation on the tubes is described, and the morphology and chemical composition of the bound deposit taken from the radiation zone of the waste heat recovery boiler are reviewed. In addition, the impact of the presence of bound and loose deposits on the tube’s surface on the increase in the deposit surface temperature and the decrease in the heat transferred at the inner side of the tube is evaluated. Changes in the chemical, mineralogical, and phase constitutions along the thickness of the build-up were established on the basis of XRF, SEM, and XRD quantitative analyses. The heat exchanger tube temperature distribution was computed with the finite element method using an axi-symmetrical solution of the heat conductivity equation. Computing was carried out for a clean tube surface as well as for a case with loose and bound deposits present on the surface, with thicknesses of 0.5 cm, 1 cm, and 2 cm. The boundary conditions at the deposit side varied. For loose deposits with a thickness of 0.5 cm, the decline in the heat transferred was similar to the values obtained for a bound deposit with a thickness of 2 cm. It was established that, for a deposit with a thickness of 20 mm, there was an approximately 80% decline in the energy transferred by the walls compared to the clean tube surface. This study represents a novel approach by integrating mineralogical and phase analyses with finite element modelling to comprehensively assess the impact of both bound and loose deposits on heat transfer efficiency in waste heat recovery boilers from copper production. Full article
Show Figures

Figure 1

29 pages, 7487 KB  
Article
Efficient Privacy-Preserving Face Recognition Based on Feature Encoding and Symmetric Homomorphic Encryption
by Limengnan Zhou, Qinshi Li, Hui Zhu, Yanxia Zhou and Hanzhou Wu
Entropy 2026, 28(1), 5; https://doi.org/10.3390/e28010005 - 19 Dec 2025
Viewed by 120
Abstract
In the context of privacy-preserving face recognition systems, entropy plays a crucial role in determining the efficiency and security of computational processes. However, existing schemes often encounter challenges such as inefficiency and high entropy in their computational models. To address these issues, we [...] Read more.
In the context of privacy-preserving face recognition systems, entropy plays a crucial role in determining the efficiency and security of computational processes. However, existing schemes often encounter challenges such as inefficiency and high entropy in their computational models. To address these issues, we propose a privacy-preserving face recognition method based on the Face Feature Coding Method (FFCM) and symmetric homomorphic encryption, which reduces computational entropy while enhancing system efficiency and ensuring facial privacy protection. Specifically, to accelerate the matching speed during the authentication phase, we construct an N-ary feature tree using a neural network-based FFCM, significantly improving ciphertext search efficiency. Additionally, during authentication, the server computes the cosine similarity of the matched facial features in ciphertext form using lightweight symmetric homomorphic encryption, minimizing entropy in the computation process and reducing overall system complexity. Security analysis indicates that critical template information remains secure and resilient against both passive and active attacks. Experimental results demonstrate that the facial authentication efficiency with FFCM classification is 4% to 6% higher than recent state-of-the-art solutions. This method provides an efficient, secure, and entropy-aware approach for privacy-preserving face recognition, offering substantial improvements in large-scale applications. Full article
(This article belongs to the Special Issue Information-Theoretic Methods for Trustworthy Machine Learning)
Show Figures

Figure 1

30 pages, 526 KB  
Article
Post-Quantum Private Set Intersection with Ultra-Efficient Online Performance
by Yue Qin, Bei Liang, Hongyuan Cai and Jintai Ding
Electronics 2026, 15(1), 13; https://doi.org/10.3390/electronics15010013 - 19 Dec 2025
Viewed by 116
Abstract
While tremendous progress has been made towards achieving highly efficient and practical Private Set Intersection (PSI) protocols during the last decade, the development of post-quantum PSI is still far from satisfactory. Existing post-quantum PSI protocols encounter a dilemma: while those based on fully [...] Read more.
While tremendous progress has been made towards achieving highly efficient and practical Private Set Intersection (PSI) protocols during the last decade, the development of post-quantum PSI is still far from satisfactory. Existing post-quantum PSI protocols encounter a dilemma: while those based on fully homomorphic encryption (FHE) achieve low online communication, they suffer from significant online computation; conversely, protocols based on post-quantum Oblivious Pseudorandom Functions (OPRFs) exhibit excellent online computational performance but incur substantially high online communication. To overcome this dilemma, we present a lattice-based PSI protocol that achieves optimal online performance in both communication and computation. Our solution introduces two core innovations: a robust signal comparison algorithm based on RLWE key exchange, which determines the intersection through signal consistency rather than direct shared key comparison, and an optimized Oblivious Key–Value Stores (OKVS) implementation featuring a composite key–value mapping for efficient handling of high-dimensional RLWE polynomials. We implement the protocol and conduct extensive benchmarks in both symmetric and asymmetric set-size settings. The results show that our construction achieves the lowest online overhead in both computation and communication among all tests. For example, with asymmetric set sizes (212,11041), the online phase requires only 0.132 s, yielding 19× and 282× improvements over FHE-based (CCS’21) and OPRF-based (EUROCRYPT’25) protocols, respectively. Even at (224,11041), our online communication time is only 0.201 s, which is 226× and 184× that of FHE-based and OPRF-based PSI, respectively. Additionally, our online communication overhead is the lowest in all tests; however, this comes at the cost of heavy offline communication overhead for very large set sizes, revealing a clear trade-off between pre-computation and online efficiency. This work addresses a critical gap in post-quantum PSI by delivering a protocol that achieves balanced online communication and computational overhead, thereby enabling broader practical deployment. Full article
(This article belongs to the Special Issue Cryptography and Computer Security)
Show Figures

Figure 1

21 pages, 2847 KB  
Article
Modeling and Solving Two-Sided Disassembly Line Balancing Problem Under Partial Disassembly of Parts
by Shuwei Wang, Huaizi Wang, Jia Liu, Guofeng Xu and Guoxun Xu
Symmetry 2026, 18(1), 4; https://doi.org/10.3390/sym18010004 - 19 Dec 2025
Viewed by 140
Abstract
In two-sided disassembly lines, stations are symmetrically arranged on both sides of the conveyor, which is suitable for large-sized waste products. During the disassembly process, evenly assigning parts to workstations while satisfying various constraints and optimizing some disassembly objectives is a challenging task. [...] Read more.
In two-sided disassembly lines, stations are symmetrically arranged on both sides of the conveyor, which is suitable for large-sized waste products. During the disassembly process, evenly assigning parts to workstations while satisfying various constraints and optimizing some disassembly objectives is a challenging task. Therefore, this study deals with a two-sided partial disassembly line balancing problem, and a multi-objective mathematical model for this problem is built. While satisfying various constraints, four objectives, namely, the hazard index, profit, smoothness index, and demand index, are optimized. Due to the NP-hard nature of the problem, an improved discrete whale optimization algorithm is proposed. According to the characteristics of the feasible solutions, an encoding method based on a one-dimensional integer array is designed, which can effectively decrease the memory space and simplify the design of neighbor structures. In the three stages of encircling prey, random wandering, and bubble-net attacking, based on the search features of each stage, different neighbor operators and search strategies are designed to enhance the local exploitation and global exploration capabilities. Finally, the performance of the proposed algorithm was tested against other algorithms for different types of instances and a disassembly case. The results show that the proposed algorithm can not only solve various types of disassembly line balancing problems but also shows superior performance. Full article
(This article belongs to the Section Mathematics)
Show Figures

Figure 1

24 pages, 4145 KB  
Article
An Intelligent SPH Framework Based on Machine-Learned Residual Correction for Elliptic PDEs
by Ammar Qarariyah, Tianhui Yang and Fang Deng
Algorithms 2025, 18(12), 803; https://doi.org/10.3390/a18120803 - 18 Dec 2025
Viewed by 202
Abstract
We present an intelligent, non-intrusive framework to enhance the performance of Symmetric Smoothed Particle Hydrodynamics (SSPH) for elliptic partial differential equations, focusing on the linear and nonlinear Poisson equations. Classical Smoothed Particle Hydrodynamics methods, while meshfree, suffer from discretization errors due to kernel [...] Read more.
We present an intelligent, non-intrusive framework to enhance the performance of Symmetric Smoothed Particle Hydrodynamics (SSPH) for elliptic partial differential equations, focusing on the linear and nonlinear Poisson equations. Classical Smoothed Particle Hydrodynamics methods, while meshfree, suffer from discretization errors due to kernel truncation and irregular particle distributions. To address this, we employ a machine-learning-based residual correction, where a neural network learns the difference between the SSPH solution and a reference solution. The predicted residuals are added to the SSPH solution, yielding a corrected approximation with significantly reduced errors. The method preserves numerical stability and consistency while systematically reducing errors. Numerical results demonstrate that the proposed approach outperforms standard SSPH. Full article
Show Figures

Figure 1

14 pages, 2471 KB  
Article
Unmanned Aerial Vehicle Logistics Distribution Path Planning Based on Improved Grey Wolf Optimization Algorithm
by Wei-Qi Feng, Yong Yang, Lin-Feng Yang, Yu-Jie Fu and Kai-Jun Xu
Symmetry 2025, 17(12), 2178; https://doi.org/10.3390/sym17122178 - 18 Dec 2025
Viewed by 109
Abstract
Aiming to solve the bottlenecks of the traditional Grey Wolf Optimizer (GWO) in UAV three-dimensional path planning—including uneven initial population distribution, slow convergence speed, and proneness to local optima—this paper proposes an improved algorithm (CPS-GWO) that integrates the Kent chaotic map with Particle [...] Read more.
Aiming to solve the bottlenecks of the traditional Grey Wolf Optimizer (GWO) in UAV three-dimensional path planning—including uneven initial population distribution, slow convergence speed, and proneness to local optima—this paper proposes an improved algorithm (CPS-GWO) that integrates the Kent chaotic map with Particle Swarm Optimization (PSO) to mitigate these limitations. To enhance the diversity of the initial population, the Kent chaotic map is employed, as ergodicity ensures the symmetric distribution of the initial population, expanding search coverage; meanwhile, a nonlinear adaptive strategy is adopted to dynamically adjust the control parameter a, enabling flexible search behaviour. Furthermore, the grey wolf position update rule is optimized by incorporating the inertia weight and social learning mechanism of PSO, which strengthens the algorithm’s ability to balance exploration and exploitation. Additionally, a multi-objective comprehensive cost function is constructed, encompassing path length, collision penalty, height constraints, and path smoothness, to fully align with the practical demands of UAV path planning. To validate the performance of CPS-GWO, a three-dimensional urban simulation environment is established on the MATLAB platform. Comparative experiments with different population sizes are conducted, with the traditional GWO as the benchmark. The results demonstrate that, compared with the original GWO, (1) the average fitness of CPS-GWO is significantly reduced by 31.30–38.53%; (2) the path length is shortened by 15.62–22.12%; (3) path smoothness is improved by 43.44–51.52%; and (4) the fitness variance is only 9.58–12.16% of that of the traditional GWO, indicating notably enhanced robustness. Consequently, the proposed CPS-GWO effectively balances global exploration and local exploitation capabilities, thereby providing a novel technical solution for efficient path planning in UAV logistics and distribution under complex urban environments, which holds important engineering application value. Full article
Show Figures

Figure 1

23 pages, 361 KB  
Article
BiHom–Lie Brackets and the Toda Equation
by Botong Gai, Chuanzhong Li, Jiacheng Sun, Shuanhong Wang and Haoran Zhu
Symmetry 2025, 17(12), 2176; https://doi.org/10.3390/sym17122176 - 17 Dec 2025
Viewed by 225
Abstract
We introduce a BiHom-type skew-symmetric bracket on general linear Lie algebra GL(V) built from two commuting inner automorphisms α=Adψ and β=Adϕ, with [...] Read more.
We introduce a BiHom-type skew-symmetric bracket on general linear Lie algebra GL(V) built from two commuting inner automorphisms α=Adψ and β=Adϕ, with ψ,ϕGL(V) and integers i,j. We prove that (GL(V),[·,·](ψ,ϕ)(i,j),α,β) is a BiHom–Lie algebra, and we study the Lax equation obtained by replacing the commutator in the finite nonperiodic Toda lattice by this bracket. For the symmetric choice ϕ=ψ with (i,j)=(0,0), the deformed flow is equivariant under conjugation and becomes gauge-equivalent, via L˜=ψ1Lψ, to a Toda-type Lax equation with a conjugated triangular projection. In particular, scalar deformations amount to a constant rescaling of time. On embedded 2×2 blocks, we derive explicit trigonometric and hyperbolic formulae that make symmetry constraints (e.g., tracelessness) transparent. In the asymmetric hyperbolic case, we exhibit a trace obstruction showing that the right-hand side is generically not a commutator, which amounts to symmetry breaking of the isospectral property. We further extend the construction to the weakly coupled Toda lattice with an indefinite metric and provide explicit 2×2 solutions via an inverse-scattering calculation, clarifying and correcting certain formulas in the literature. The classical Toda dynamics are recovered at special parameter values. Full article
(This article belongs to the Special Issue Symmetry in Integrable Systems and Soliton Theories)
22 pages, 919 KB  
Article
GeoCross: A Privacy-Preserving and Fine-Grained Authorization Scheme for Cross-Chain Geological Data Sharing
by Licheng Lin, Bin Feng and Pujie Jing
Sensors 2025, 25(24), 7625; https://doi.org/10.3390/s25247625 - 16 Dec 2025
Viewed by 225
Abstract
With the rapid development of geological blockchains and Internet of Things-based data acquisition technologies, massive amounts of heterogeneous data are constantly emerging. However, this data is stored in a distributed manner across different organizational or business blockchains. Data sharing among multiple geological blockchains [...] Read more.
With the rapid development of geological blockchains and Internet of Things-based data acquisition technologies, massive amounts of heterogeneous data are constantly emerging. However, this data is stored in a distributed manner across different organizational or business blockchains. Data sharing among multiple geological blockchains faces numerous challenges, either exposing sensitive data during verification or lacking effective authorization mechanisms. Therefore, how to achieve fine-grained access control and privacy protection across multiple blockchains has become a critical issue that must be addressed in geological data sharing. In this paper, we propose GeoCross, a cross-chain geological data sharing framework that enables fine-grained authorization management and privacy protection. First, GeoCross provides a hierarchical hybrid encryption mechanism that uses symmetric encryption for geological data protection and ciphertext-policy attribute-based encryption to enable flexible cross-chain access policies. Second, we integrate a Groth16-based zero-knowledge proof mechanism, which allows a chain to verify the existence, integrity, and accessibility of off-chain data without revealing the content. Furthermore, we introduce a Reputation-based Non-interactive Relay node Selection protocol (RNRS), which enhances the trustworthiness and fairness of cross-chain routing. Finally, we implement GeoCross in a multi-chain Hyperledger Fabric environment and evaluate its performance under real-world workloads. Results show that Groth16 verification requires only three bilinear pairings, achieving a throughput of up to 390 tps on a single chain and 1550 tps in a concurrent multi-chain environment. Even with 50% malicious nodes, the RNRS protocol still maintains a success rate of over 91%. These results demonstrate that GeoCross provides an efficient and practical solution for secure and privacy-preserving cross-chain geological data sharing. Full article
(This article belongs to the Special Issue Blockchain-Based Solutions to Secure IoT)
Show Figures

Figure 1

41 pages, 2688 KB  
Article
A Unified Computational Model for Assessing Security Risks in Internet of Transportation Things-Based Healthcare Applications
by Waeal J. Obidallah
Electronics 2025, 14(24), 4894; https://doi.org/10.3390/electronics14244894 - 12 Dec 2025
Viewed by 217
Abstract
The rapid growth of web-based applications has attracted increasing attention from cybercriminals, particularly within the expanding field of the internet of transportation things, which has diverse applications across industries such as healthcare. As internet of transportation things technologies are adopted more widely, significant [...] Read more.
The rapid growth of web-based applications has attracted increasing attention from cybercriminals, particularly within the expanding field of the internet of transportation things, which has diverse applications across industries such as healthcare. As internet of transportation things technologies are adopted more widely, significant challenges emerge, particularly regarding data and service security. Hackers are specifically targeting sensitive medical data during the transportation of health emergency services, with internet of transportation things devices utilized for remote patient monitoring, medical equipment tracking, and logistics optimization. This research aims to tackle these security concerns by evaluating the risks associated with maintaining data integrity in healthcare emergency services. The research also utilizes a symmetrical fuzzy decision-making methodology, Fuzzy ANP-TOPSIS, to evaluate diverse security concerns associated with the internet of transportation things, with an emphasis on healthcare applications. The case study of seven alternatives reveals that mediXcel electronic medical records are the most viable solution, whilst the Caresoft system for hospital information is considered the least effective. The findings provide critical insights for improving the security of internet of transportation things applications and assuring their seamless integration into healthcare, especially in emergency services, hence protecting patient data and fostering user confidence. Full article
Show Figures

Figure 1

Back to TopTop