[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (584)

Search Parameters:
Keywords = graph-search

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
27 pages, 5392 KiB  
Article
Interpretable Review Spammer Group Detection Model Based on Knowledge Distillation and Counterfactual Generation
by Chenghang Huo, Yunfei Luo, Jinbo Chao and Fuzhi Zhang
Electronics 2025, 14(6), 1086; https://doi.org/10.3390/electronics14061086 - 10 Mar 2025
Viewed by 145
Abstract
Spammer group detection is necessary for curbing collusive review spammers on online shopping websites. However, the current detection approaches ignore exploring deep-level suspicious user review relationships and learning group features with low discrimination, which affects detection performance. Furthermore, the interpretation of detection results [...] Read more.
Spammer group detection is necessary for curbing collusive review spammers on online shopping websites. However, the current detection approaches ignore exploring deep-level suspicious user review relationships and learning group features with low discrimination, which affects detection performance. Furthermore, the interpretation of detection results is easily influenced by noise features and unimportant group structures, leading to suboptimal interpretation performance. Aimed at addressing these concerns, we propose an interpretable review spammer group detection model based on knowledge distillation and counterfactual generation. First, we analyze user review information to generate a suspicious user review relationship graph, combining a graph agglomerative hierarchical clustering approach to discover candidate groups. Second, we devise a knowledge distillation network to learn discriminative candidate group features for detecting review spammer groups. Finally, we design a counterfactual generation model to search important subgraph structures for interpreting the detection results. The experiments indicate that the improvements in our model’s Precision@k and Recall@k are among the top-1000 state-of-the-art solutions on the Amazon, YelpChi, YelpNYC, and YelpZip datasets, which are [13.37%, 72.63%, 37.46%, and 18.83%] and [17.34%, 43.81%, 41.22%, and 21.05%], respectively. The Fidelities of our interpretation results under different Sparsity are around 6%, 7%, 7%, and 6% higher than that of the state-of-the-art solutions on the Amazon, YelpChi, YelpNYC, and YelpZip datasets, respectively. Full article
Show Figures

Figure 1

Figure 1
<p>The framework of KDCFG. (<b>a</b>) A graph agglomerative hierarchical clustering approach to identify candidate groups in the suspicious user review relationship graph. (<b>b</b>) A knowledge distillation model to detect review spammer groups. (<b>c</b>) A counterfactual generation model to explain the detection results.</p>
Full article ">Figure 2
<p>Comparison of P@k for six approaches on the four datasets.</p>
Full article ">Figure 3
<p>Comparison of R@k for six approaches on the four datasets.</p>
Full article ">Figure 3 Cont.
<p>Comparison of R@k for six approaches on the four datasets.</p>
Full article ">Figure 4
<p>Comparison of interpretation effect of six methods on the four datasets.</p>
Full article ">Figure 5
<p>The visualization of interpretation results of CFG on the four datasets. Note that a red circle represents a spammer, a green circle represents a normal user, a solid black line denotes the existence of edge relationships between nodes, and a dashed black line denotes the non-existence of edge relationships between nodes.</p>
Full article ">Figure 6
<p>The effect of parameters of KDRSGD on F1-measure@1000 on the four datasets.</p>
Full article ">Figure 7
<p>The effect of parameter on Fidelities with diverse Sparsity on the four datasets.</p>
Full article ">Figure 8
<p>Different variants of F1-measure@k on two datasets.</p>
Full article ">Figure 9
<p>Different variants of Fidelities under different Sparsity on two datasets.</p>
Full article ">
32 pages, 1286 KiB  
Article
Real-Time Fuzzy Record-Matching Similarity Metric and Optimal Q-Gram Filter
by Ondřej Rozinek, Jaroslav Marek, Jan Panuš and Jan Mareš
Algorithms 2025, 18(3), 150; https://doi.org/10.3390/a18030150 - 6 Mar 2025
Viewed by 79
Abstract
In this paper, we introduce an advanced Fuzzy Record Similarity Metric (FRMS) that improves approximate record matching and models human perception of record similarity. The FRMS utilizes a newly developed similarity space with favorable properties combined with a metric space, employing a bag-of-words [...] Read more.
In this paper, we introduce an advanced Fuzzy Record Similarity Metric (FRMS) that improves approximate record matching and models human perception of record similarity. The FRMS utilizes a newly developed similarity space with favorable properties combined with a metric space, employing a bag-of-words model with general applications in text mining and cluster analysis. To optimize the FRMS, we propose a two-stage method for approximate string matching and search that outperforms baseline methods in terms of average time complexity and F measure on various datasets. In the first stage, we construct an optimal Q-gram count filter as an optimal lower bound for fuzzy token similarities such as FRMS. The approximated Q-gram count filter achieves a high accuracy rate, filtering over 99% of dissimilar records, with a constant time complexity of O(1). In the second stage, FRMS runs for a polynomial time of approximately O(n4) and models human perception of record similarity by maximum weight matching in a bipartite graph. The FRMS architecture has widespread applications in structured document storage such as databases and has already been commercialized by one of the largest IT companies. As a side result, we explain the behavior of the singularity of the Q-gram filter and the advantages of a padding extension. Overall, our method provides a more accurate and efficient approach to approximate string matching and search with real-time runtime. Full article
(This article belongs to the Section Analysis of Algorithms and Complexity Theory)
Show Figures

Figure 1

Figure 1
<p>The construction of a complete bipartite graph where every token vertex of the first record set, <math display="inline"><semantics> <msub> <mi mathvariant="script">R</mi> <mn>1</mn> </msub> </semantics></math>, is connected to every token vertex of the second record set, <math display="inline"><semantics> <msub> <mi mathvariant="script">R</mi> <mn>2</mn> </msub> </semantics></math>.</p>
Full article ">Figure 2
<p>Maximum weighted bipartite matching of two records <math display="inline"><semantics> <msub> <mi mathvariant="script">R</mi> <mn>1</mn> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi mathvariant="script">R</mi> <mn>2</mn> </msub> </semantics></math> and adjacent edges of token pairs <math display="inline"><semantics> <mrow> <msub> <mi>X</mi> <mi>i</mi> </msub> <mo>,</mo> <msub> <mi>Y</mi> <mi>j</mi> </msub> </mrow> </semantics></math> weighted by normalized similarity metric <math display="inline"><semantics> <mrow> <msub> <mi>s</mi> <mi>n</mi> </msub> <mrow> <mo>(</mo> <msub> <mi>X</mi> <mi>i</mi> </msub> <mo>,</mo> <msub> <mi>Y</mi> <mi>j</mi> </msub> <mo>)</mo> </mrow> </mrow> </semantics></math>.</p>
Full article ">Figure 3
<p>An example of a singularity of a trigram filter for <math display="inline"><semantics> <mrow> <mi>d</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mrow> <mo>|</mo> <mi>X</mi> <mo>|</mo> </mrow> <mrow> <mi>s</mi> <mi>i</mi> <mi>n</mi> <mi>g</mi> </mrow> </msub> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>. Suppose the worst case for fixed <math display="inline"><semantics> <mrow> <mi>d</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math> is the substitution in the position of character C destroying all trigrams {“<math display="inline"><semantics> <mrow> <mi>C</mi> <mi>A</mi> <mi>C</mi> </mrow> </semantics></math>”, “<math display="inline"><semantics> <mrow> <mi>A</mi> <mi>C</mi> <mi>H</mi> </mrow> </semantics></math>”, “<math display="inline"><semantics> <mrow> <mi>C</mi> <mi>H</mi> <mi>E</mi> </mrow> </semantics></math>”}; hence, <math display="inline"><semantics> <mrow> <mi>t</mi> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>Sawtooth function of different string lengths <math display="inline"><semantics> <mrow> <mo>|</mo> <mi>X</mi> <mo>|</mo> </mrow> </semantics></math> and fixed <span class="html-italic">q</span> and <math display="inline"><semantics> <mi>α</mi> </semantics></math>. The zero crossings of <math display="inline"><semantics> <msub> <mi>t</mi> <mi>α</mi> </msub> </semantics></math> illustrate the singularities of the Q-gram filter. This is similar to the results in [<a href="#B54-algorithms-18-00150" class="html-bibr">54</a>].</p>
Full article ">Figure 5
<p>Production system architecture of fuzzy search/matching engine.</p>
Full article ">Figure 6
<p>Block diagram of the processing of records from the source in real-time by a two-stage system of Q-gram filter and FRMS.</p>
Full article ">Figure 7
<p>Relative performance of selected similarity functions from the group of hybrid, edit, and Q-gram similarities.</p>
Full article ">Figure 8
<p>Comparison of the relative performance of Q-gram filter+FRMS and hybrid similarity functions.</p>
Full article ">Figure 9
<p>Comparison of the relative performance of Q-gram filter+FRMS in an ablation study.</p>
Full article ">Figure A1
<p>Two examples of an asymmetric Monge–Elkan measure <math display="inline"><semantics> <mrow> <mi>s</mi> <mi>i</mi> <msub> <mi>m</mi> <mrow> <mi>M</mi> <mi>E</mi> </mrow> </msub> </mrow> </semantics></math>.</p>
Full article ">Figure A2
<p>Maximum weighted bipartite matching between two records <math display="inline"><semantics> <mi mathvariant="bold-italic">X</mi> </semantics></math> and <math display="inline"><semantics> <mi mathvariant="bold-italic">Y</mi> </semantics></math>.</p>
Full article ">
18 pages, 354 KiB  
Article
Brauer Analysis of Some Time–Memory Trade-Off Attacks and Its Application to the Solution of the Yang–Baxter Equation
by Agustín Moreno Cañadas, Ismael Gutierrez, Odette M. Mendez, Andrés Sarrazola-Alzate and Jesus Antonio Zuluaga-Moreno
Symmetry 2025, 17(3), 391; https://doi.org/10.3390/sym17030391 - 4 Mar 2025
Viewed by 175
Abstract
This paper is focused on some algebraic and combinatorial properties of a TMTO (Time–Memory Trade-Off) for a chosen plaintext attack against a cryptosystem with a perfect secrecy property. TMTO attacks aim to retrieve the preimage of a given one-way function more efficiently than [...] Read more.
This paper is focused on some algebraic and combinatorial properties of a TMTO (Time–Memory Trade-Off) for a chosen plaintext attack against a cryptosystem with a perfect secrecy property. TMTO attacks aim to retrieve the preimage of a given one-way function more efficiently than an exhaustive search and with less memory than a dictionary attack. TMTOs for chosen plaintext attacks against cryptosystems with a perfect secrecy property are associated with some directed graphs, which can be defined by suitable collections of multisets called Brauer configurations. Such configurations induce so-called Brauer configuration algebras, the algebraic and combinatorial invariant analysis of which is said to be a Brauer analysis. In this line, this paper proposes formulas for dimensions of Brauer configuration algebras (and their centers) induced by directed graphs defined by TMTO attacks. These results are used to provide some set-theoretical solutions for the Yang–Baxter equation. Full article
(This article belongs to the Special Issue Symmetry and Lie Algebras)
Show Figures

Figure 1

Figure 1
<p>Diagram of a rainbow matrix for a TMTO.</p>
Full article ">Figure 2
<p>Brauer quiver induced by Brauer configuration <math display="inline"><semantics> <msub> <mi mathvariant="script">M</mi> <mi>L</mi> </msub> </semantics></math> of type <span class="html-italic">M</span>.</p>
Full article ">
13 pages, 575 KiB  
Article
A Novel Approach to Incremental Diffusion for Continuous Dataset Updates in Image Retrieval
by Zili Tang, Fan Yang, Jiong Lou and Jie Li
Appl. Sci. 2025, 15(5), 2535; https://doi.org/10.3390/app15052535 - 26 Feb 2025
Viewed by 276
Abstract
Diffusion is well known for its success in improving retrieval performance by exploiting the local structure of data distribution. Some recent works have focused on improving its efficiency by shifting the computing burden offline. However, we find that efficient offline diffusion handles continuously [...] Read more.
Diffusion is well known for its success in improving retrieval performance by exploiting the local structure of data distribution. Some recent works have focused on improving its efficiency by shifting the computing burden offline. However, we find that efficient offline diffusion handles continuously updating datasets with difficulty, which directly hinders its application in the real world. Unlike previous methods that apply diffusion to the entire gallery, we introduce an anchor graph to serve as an agent of the complete gallery graph. By doing that, we empower diffusion with the ability of retrieving newly added images at acceptable computational cost. We demonstrate that our proposed method is a good approximation of diffusion featuring fast online search speed and the ability of handling growing data. Moreover, experiments on benchmark datasets show that the proposed method outperforms the state of the art by a large margin with proper parameter settings. Full article
(This article belongs to the Special Issue AI-Based Data Science and Database Systems)
Show Figures

Figure 1

Figure 1
<p>Comparison between the offline diffusion (<b>left</b>) and the proposed diffusion (<b>right</b>). In the gallery, we use black to indicate existing samples and red to indicate newly added samples. The upper branch refers to the diffusion on an existing dataset, while the lower branch refers to the diffusion on an incremented dataset.</p>
Full article ">Figure 2
<p>Retrieval performance (mAP) vs. the number of anchors, where the parameter <span class="html-italic">s</span> is fixed to 10.</p>
Full article ">Figure 3
<p>Retrieval performance (mAP) vs. the maximum number of nearest anchors used for LAE.</p>
Full article ">Figure 4
<p>Illustration of extra computational costs for handling new data added to <math display="inline"><semantics> <mi mathvariant="script">R</mi> </semantics></math>Oxford. We use <math display="inline"><semantics> <mrow> <mi>s</mi> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math> for local anchor embedding. (<b>A</b>) Comparison of extra runtime costs. (<b>B</b>) Comparison of extra pre-computational costs.</p>
Full article ">
15 pages, 1858 KiB  
Article
AFAR-WQS: A Quick and Simple Toolbox for Water Quality Simulation
by Carlos A. Rogéliz-Prada and Jonathan Nogales
Water 2025, 17(5), 672; https://doi.org/10.3390/w17050672 - 26 Feb 2025
Viewed by 209
Abstract
Water quality management in large basins demands tools that balance scientific rigor with computational efficiency to avoid paralysis by analysis. While traditional models offer detailed insights, their complexity and resource intensity hinder timely decision-making. To address this gap, we present AFAR-WQS, an open-source [...] Read more.
Water quality management in large basins demands tools that balance scientific rigor with computational efficiency to avoid paralysis by analysis. While traditional models offer detailed insights, their complexity and resource intensity hinder timely decision-making. To address this gap, we present AFAR-WQS, an open-source MATLAB™ toolbox that introduces a novel integration of assimilation factors with graph theory and a Depth-First Search (DFS) algorithm to rapidly simulate 13 water quality determinants across complex topological networks. AFAR-WQS resolves cumulative processes in networks of up to 30,000 segments in just 163 s on standard hardware, enabling real-time scenario evaluations. Its object-oriented architecture ensures scalability, allowing customization for urban drainage systems or macro-basin studies while maintaining computational efficiency. Case studies demonstrate its utility in prioritizing sanitation investments, assessing water quality at the national scale and fostering stakeholder collaboration through participatory workshops. By bridging the gap between simplified and complex models, AFAR-WQS supports adaptive management in contexts of hydrological uncertainty, regulatory compliance, and climate change. The toolbox is freely available at GitHub, offering a transformative approach for integrated water resource management. Full article
(This article belongs to the Special Issue Water Quality Assessment of River Basins)
Show Figures

Figure 1

Figure 1
<p>(<b>a</b>) Graph representation of a synthetic drainage network with seven reaches. (<b>b</b>) Schematic of the recursive solution framework used by AFAR-WQS to estimate assimilation factors and concentrations across the drainage network. (<b>c</b>) Example calculation of the concentration of a determinant <span class="html-italic">j</span> for a synthetic network with seven reaches.</p>
Full article ">Figure 2
<p>Folder structure and functions of the AFAR-WQS Toolbox.</p>
Full article ">Figure 3
<p>AFAR-WQS computational performance by number of drainage network segments.</p>
Full article ">Figure 4
<p>Visualization examples of suspended solids for a synthetic network. (<b>a</b>) llustrates the network-wide distribution of suspended solids concentration. (<b>b</b>) depicts the suspended solids profile extending from reach 929 to the network outlet.</p>
Full article ">
17 pages, 4036 KiB  
Article
Doppler Shift Estimation Method for Frequency Diverse Array Radar Based on Graph Signal Processing
by Ningbo Xie, Haijun Wang, Kefei Liao, Shan Ouyang, Hanbo Chen and Qinlin Li
Remote Sens. 2025, 17(5), 765; https://doi.org/10.3390/rs17050765 - 22 Feb 2025
Viewed by 356
Abstract
In this paper, a novel Doppler shift estimation method for frequency diverse array (FDA) radar based on graph signal processing (GSP) theory is proposed and investigated. First, a well-designed graph signal model for a monostatic linear FDA is formulated. Subsequently, spectral decomposition is [...] Read more.
In this paper, a novel Doppler shift estimation method for frequency diverse array (FDA) radar based on graph signal processing (GSP) theory is proposed and investigated. First, a well-designed graph signal model for a monostatic linear FDA is formulated. Subsequently, spectral decomposition is conducted on the constructed signal model utilizing graph Fourier transform (GFT) techniques, enabling the extraction of the target’s Doppler shift parameter through spectral peak search. A comprehensive series of simulation experiments demonstrates that the proposed method can achieve the accurate estimation of target parameters even under low signal-to-noise ratio (SNR) conditions. Furthermore, the proposed method exhibits superior performance compared to the MUSIC algorithm, offering enhanced resolution and estimation accuracy. Additionally, the method is highly amenable to parallel processing, significantly reducing the computational burden associated with traditional procedures. Full article
Show Figures

Figure 1

Figure 1
<p>Schematic diagram of a monostatic linear frequency offset FDA radar.</p>
Full article ">Figure 2
<p>Transmit beam pattern: (<b>a</b>) phased array beam pattern (polar coordinates); (<b>b</b>) FDA beam pattern (polar coordinates); (<b>c</b>) phased array beam pattern (Cartesian coordinates); and (<b>d</b>) FDA beam pattern (Cartesian coordinates). The shade of color in the figure reflects the amplitude of the beam pattern. A pronounced gradation towards deeper red tones signifies an augmentation in intensity, whereas a gradational shift towards lighter blue tones denotes a reduction.</p>
Full article ">Figure 3
<p>The diagram of signal processing procedures at the receiver end.</p>
Full article ">Figure 4
<p>The constructed graph signal model and the relationship diagram of adjacency matrix weights.</p>
Full article ">Figure 5
<p>Graph Fourier transform energy distribution and spectral estimation results: (<b>a</b>) graph Fourier transform corresponds to the correct Doppler shift; (<b>b</b>) graph Fourier transform corresponds to the incorrect Doppler shift; and (<b>c</b>) spectral estimation results.</p>
Full article ">Figure 6
<p>Algorithm performance in different SNR and interference scenarios.</p>
Full article ">Figure 7
<p>Doppler RMSE versus SNR.</p>
Full article ">Figure 8
<p>Doppler RMSE versus number of snapshots.</p>
Full article ">Figure 9
<p>Doppler RMSE versus number of pulses.</p>
Full article ">Figure 10
<p>Comparison of Doppler shift resolution between MUSIC and the proposed method.</p>
Full article ">
21 pages, 710 KiB  
Article
Efficient and Effective Unsupervised Entity Alignment in Large Knowledge Graphs
by Weishan Cai, Ruqi Zhou and Wenjun Ma
Appl. Sci. 2025, 15(4), 1976; https://doi.org/10.3390/app15041976 - 13 Feb 2025
Viewed by 578
Abstract
Entity Alignment (EA) in Knowledge Graphs (KGs) is a crucial task for the integration of multiple KGs, facilitating the amalgamation of multi-source knowledge and enhancing support for downstream applications. In recent years, unsupervised EA methods have demonstrated remarkable efficacy in leveraging graph structures [...] Read more.
Entity Alignment (EA) in Knowledge Graphs (KGs) is a crucial task for the integration of multiple KGs, facilitating the amalgamation of multi-source knowledge and enhancing support for downstream applications. In recent years, unsupervised EA methods have demonstrated remarkable efficacy in leveraging graph structures or utilizing auxiliary information. However, the increasing complexity of many modeling methods limits their applicability to large KGs in real-world scenarios. Given that most EA encoders primarily focus on modeling one-hop neighborhoods within the KG’s graph structure while neglecting similarities among multi-hop neighborhoods, we propose an efficient and effective unsupervised EA method, MPGT-Align, based on a multi-hop pruning graph transformer. The core innovation of MPGT-Align lies in mining multi-hop neighborhood features of entities through two components: Pruning-hop2Token and Attention-based Transformer encoder. The former aggregates only those multi-hop neighborhoods that contribute to alignment targets, inspired by search pruning algorithms. The latter empowers MPGT-Align to adaptively extract more effective alignment information from both entity itself and its multi-hop neighbors. Furthermore, Pruning-hop2Token serves as a non-parametric method that not only reduces model parameters, but also allows MPGT-Align to be trained with small batch sizes, thereby enabling efficient handling of large KGs. Extensive experiments conducted across various benchmark datasets demonstrate that our method consistently outperforms most existing supervised and unsupervised EA techniques. Full article
(This article belongs to the Special Issue Knowledge Graphs: State-of-the-Art and Applications)
Show Figures

Figure 1

Figure 1
<p>Illustration of the EA task.</p>
Full article ">Figure 2
<p>The overall architecture of <span class="html-italic">MPGT-Align</span>.</p>
Full article ">Figure 3
<p>The network structure of the Attention-based Transformer.</p>
Full article ">Figure 4
<p>Ablation study of <span class="html-italic">MPGT-Align</span>’s components on <span class="html-italic">DBP-15K</span>.</p>
Full article ">Figure 5
<p>The performance of <span class="html-italic">MPGT-Align</span> with different Transformer layers <span class="html-italic">L</span>.</p>
Full article ">Figure 6
<p>Performance of <span class="html-italic">MPGT-Align</span> with different perturbation ratio and temperature on <span class="html-italic">ZH-EN</span> dataset.</p>
Full article ">
23 pages, 686 KiB  
Article
Privacy-Preserving Hierarchical Top-k Nearest Keyword Search on Graphs
by Xijuan Zhu, Zifeng Xu, Chao Hu and Jun Lin
Electronics 2025, 14(4), 736; https://doi.org/10.3390/electronics14040736 - 13 Feb 2025
Viewed by 328
Abstract
Graph search techniques are increasingly vital for applications involving labeled or textual content on network vertices. A key task is the top-k nearest keyword (kNK) search on undirected graphs where a query vertex and keywords identify k closest vertices containing the keywords. With [...] Read more.
Graph search techniques are increasingly vital for applications involving labeled or textual content on network vertices. A key task is the top-k nearest keyword (kNK) search on undirected graphs where a query vertex and keywords identify k closest vertices containing the keywords. With cloud storage widely used for outsourcing graph services, ensuring data privacy and security is critical. Existing solutions employ encrypted indexes for privacy-preserving keyword searches but lack fine-grained access control, limiting their ability to accommodate diverse user needs. To address this, we propose privacy-preserving hierarchical top-k nearest keyword search on graphs (PH-kNK), a novel scheme enhancing privacy-preserving top-k keyword searches by integrating hierarchical access control. PH-kNK introduces hierarchical query entry indexes that regulate access at multiple security levels, significantly improving privacy, security and adaptability. The granular query entry indexes established by our approach enables users with higher security levels to query the graph structure and access corresponding vertices while maintaining transparency for lower-level users. The scheme leverages pseudo-random mapping, order-preserving encryption and re-encryption of search indexes to ensure robust data security. Experimental results on real-world datasets demonstrate the scheme’s high efficiency and validate its security. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

Figure 1
<p>Research on searchable encryption.</p>
Full article ">Figure 2
<p>Overview of Graph Structure Encryption and Hierarchical Encryption.</p>
Full article ">Figure 3
<p>Model of PH-kNK scheme.</p>
Full article ">Figure 4
<p>An example of query steps.</p>
Full article ">Figure 5
<p>(<b>a</b>) The Relationship of keyword frequency and query time in dataset ego-Facebook. (<b>b</b>) The Relationship of keyword frequency and query time in dataset Facebook LPPN. (<b>c</b>) The Relationship of keyword frequency and query time in dataset ego-Facebook and Facebook LPPN for PH-knk. (<b>d</b>) The Relationship of keyword frequency and query time in dataset ego-Facebook and Facebook LPPN for Aton.</p>
Full article ">Figure 6
<p>The Relationship of Search Times and Hierarchies.</p>
Full article ">
43 pages, 2428 KiB  
Review
A Survey on Directed Acyclic Graph-Based Blockchain in Smart Mobility
by Yuhao Bai, Soojin Lee and Seung-Hyun Seo
Sensors 2025, 25(4), 1108; https://doi.org/10.3390/s25041108 - 12 Feb 2025
Viewed by 590
Abstract
This systematic review examines the integration of directed acyclic graph (DAG)-based blockchain technology in smart mobility ecosystems, focusing on electric vehicles (EVs), robotic systems, and drone swarms. Adhering to PRISMA guidelines, we conducted a comprehensive literature search across Web of Science, Scopus, IEEE [...] Read more.
This systematic review examines the integration of directed acyclic graph (DAG)-based blockchain technology in smart mobility ecosystems, focusing on electric vehicles (EVs), robotic systems, and drone swarms. Adhering to PRISMA guidelines, we conducted a comprehensive literature search across Web of Science, Scopus, IEEE Xplore, and ACM Digital Library, screening 1248 records to identify 47 eligible studies. Our analysis demonstrates that DAG-based blockchain addresses critical limitations of traditional blockchains by enabling parallel transaction processing, achieving high throughput (>1000 TPS), and reducing latency (<1 s), which are essential for real-time applications like autonomous vehicle coordination and microtransactions in EV charging. Key technical challenges include consensus mechanism complexity, probabilistic finality, and vulnerabilities to attacks such as double-spending and Sybil attacks. This study identifies five research priorities: (1) standardized performance benchmarks, (2) formal security proofs for DAG protocols, (3) hybrid consensus models combining DAG with Byzantine fault tolerance, (4) privacy-preserving cryptographic techniques, and (5) optimization of feeless microtransactions. These advancements are critical for deploying robust, scalable DAG-based solutions in smart mobility, and fostering secure and efficient urban transportation networks. Full article
(This article belongs to the Special Issue Feature Review Papers in Intelligent Sensors)
Show Figures

Figure 1

Figure 1
<p>Structure of the sequential blockchain.</p>
Full article ">Figure 2
<p>The structure of blocks and non-blocks based on the divergence topology. <b>Left</b>: Type II; <b>Right</b>: Type I.</p>
Full article ">Figure 3
<p>The structure of blocks and non-blocks based on the parallel topology. <b>Left</b>: Type IV; <b>Right</b>: Type III.</p>
Full article ">Figure 4
<p>The structure of blocks and non-blocks based on the parallel topology. <b>Left</b>: Type VI; <b>Right</b>: Type V.</p>
Full article ">Figure 5
<p>PRISMA flowchart [<a href="#B90-sensors-25-01108" class="html-bibr">90</a>].</p>
Full article ">Figure 6
<p>Chain-based blockchain and DAG-based blockchain in smart mobility.</p>
Full article ">
23 pages, 742 KiB  
Article
A Graph-Induced Neighborhood Search Heuristic for the Capacitated Multicommodity Network Design Problem
by Houshan Zhang
Mathematics 2025, 13(4), 588; https://doi.org/10.3390/math13040588 - 11 Feb 2025
Viewed by 329
Abstract
In this work, an efficient graph-induced neighborhood search heuristic is proposed to address the capacitated multicommodity network design problem. This problem, which commonly arises in transportation and telecommunication, is well known for its inherent complexity and is often classified as NP-hard. Our [...] Read more.
In this work, an efficient graph-induced neighborhood search heuristic is proposed to address the capacitated multicommodity network design problem. This problem, which commonly arises in transportation and telecommunication, is well known for its inherent complexity and is often classified as NP-hard. Our approach commences with an arbitrary feasible solution and iteratively improves it by solving a series of small-scale auxiliary mixed-integer programming problems. These small-scale problems are closely tied to the cycles inherent in the network topology, enabling us to reroute the flow more effectively. Furthermore, we have developed a novel resource-efficient facility assignment technique that departs from standard variable neighborhood search algorithms. By solving a series of small knapsack problems, this technique not only enhances the quality of solutions further but also can serve as a primary heuristic to generate initial feasible solutions. Furthermore, we theoretically guarantee that our algorithm will always produce an integer-feasible solution within polynomial time. The experimental results highlight the superior performance of our method compared to other existing approaches. Our heuristic algorithm efficiently discovers high-quality feasible solutions, substantially reducing the computation time and number of nodes in the branch-and-bound tree. Full article
(This article belongs to the Section E: Applied Mathematics)
Show Figures

Figure 1

Figure 1
<p>An illustrative example of flow changes and cycle formation in a single-commodity network. (<b>a</b>) The original network flow for one commodity. (<b>b</b>) The adjusted network flow after adjustment. (<b>c</b>) Cycle formed by all links with changed flow.</p>
Full article ">Figure 2
<p>Illustration of subnetwork construction via a central link with different CycLen parameter settings. The GINS algorithm fixes facilities on all black links and iteratively adjusts facilities within the subgraph centered at the central link, aiming to optimize the network design progressively. (<b>a</b>) <math display="inline"><semantics> <mrow> <mi>CycLen</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math>. (<b>b</b>) <math display="inline"><semantics> <mrow> <mi>CycLen</mi> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math>. (<b>c</b>) <math display="inline"><semantics> <mrow> <mi>CycLen</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 3
<p>Flowchart of the GINS algorithm integrated with the REFA technique.</p>
Full article ">Figure 4
<p>Illustration of the comparison results between GINS + CPX and four CPLEX settings on the directed link models: (<b>a</b>) performance profile graph of solved instances; (<b>b</b>) end gap graph of unsolved instances.</p>
Full article ">Figure 5
<p>Illustration of the comparison results between GINS + CPX and four CPLEX settings on the undirected link models: (<b>a</b>) performance profile graph of solved instances; (<b>b</b>) end gap graph of unsolved instances.</p>
Full article ">Figure 6
<p>Illustration of the comparison results between GINS + CPX and four CPLEX settings on the bidirected link models: (<b>a</b>) performance profile graph of solved instances; (<b>b</b>) end gap graph of unsolved instances.</p>
Full article ">Figure 7
<p>Comparison of average end gaps between GINS, SS, and SSBNS over time. (<b>a</b>) Directed link model. (<b>b</b>) Undirected link model. (<b>c</b>) Bidirected link model. (<b>d</b>) All link models.</p>
Full article ">
11 pages, 1989 KiB  
Systematic Review
A Meta-Analysis of First-Line Treatments for Unresectable Pleural Mesothelioma: Indirect Comparisons from Reconstructed Individual Patient Data of Six Randomized Controlled Trials
by Andrea Messori, Sabrina Trippoli, Eugenia Piragine, Sara Veneziano and Vincenzo Calderone
Cancers 2025, 17(3), 503; https://doi.org/10.3390/cancers17030503 - 3 Feb 2025
Viewed by 614
Abstract
Background: In unresectable pleural mesothelioma, pemetrexed+cisplatin as first line is considered the standard of care, but novel treatments have been recently proposed. Methods: Our objective was to compare, albeit indirectly, the results of randomized controlled trials on overall survival (OS). The IPDfromKM method [...] Read more.
Background: In unresectable pleural mesothelioma, pemetrexed+cisplatin as first line is considered the standard of care, but novel treatments have been recently proposed. Methods: Our objective was to compare, albeit indirectly, the results of randomized controlled trials on overall survival (OS). The IPDfromKM method was employed for reconstruct individual patient data (IPD) from the graphs of Kaplan–Meier curves. Cox statistics was run to estimate hazard ratios (HRs). Results: After a literature search on Medline (via PubMed) and Scopus databases, six randomized controlled trials were identified in which five new treatments (nivolumab plus ipilimumab, bevacizumab plus pemetrexed plus cisplatin, chemotherapy plus pembrolizumab, ONCOS-102 plus pemetrexed plus cisplatin/carboplatin and cediranib plus pemetrexed+cisplatin with maintenance with cediranib) were evaluated. In five trials, pemetrexed plus cisplatin was the standard of care given to the control arms. Nivolumab plus ipilimumab, bevacizumab plus pemetrexed plus cisplatin and chemotherapy plus pembrolizumab showed a significantly better OS compared with controls. ONCOS-102 plus pemetrexed plus cisplatin/carboplatin did not significantly improve OS. In contrast, OS worsened with cisplatin alone and with cediranib plus pemetrexed+cisplatin with maintenance with cediranib. Discussion: Our analysis indicates that, in patients with unresectable pleural mesothelioma, three of the five novel treatments provided a significant survival benefit compared with the standard of care. Further research is needed to confirm the OS benefit found in our analysis with some treatments, whereas cisplatin alone and cediranib plus pemetrexed+cisplatin with maintenance with cediranib do not seem to deserve further research. Full article
(This article belongs to the Special Issue Research on Clinical Treatment of Mesothelioma)
Show Figures

Figure 1

Figure 1
<p>PRISMA flowchart of the literature search. The keyword used for the initial search in the two databases was “mesothelioma [title]” combined with “randomized control trial” as selection term.</p>
Full article ">Figure 2
<p>Kaplan–Meier survival curves obtained by reconstructing individual patient data from 6 patient cohorts published in the included trials. The 6 curves refer to the 5 control arms treated with pemetrexed+cisplatinum and one control arm treated with chemotherapy alone in the trial by Chou et al., 2023 [<a href="#B14-cancers-17-00503" class="html-bibr">14</a>] (see <a href="#cancers-17-00503-t002" class="html-table">Table 2</a>). <a href="#cancers-17-00503-f003" class="html-fig">Figure 3</a> describes the results of our main analysis, in which each of the 6 experimental arms was compared with the 6 control arms pooled together. The HRs for the comparisons of each of the experimental treatment vs. the 6 control arms pooled together are shown in <a href="#cancers-17-00503-t002" class="html-table">Table 2</a>.</p>
Full article ">Figure 3
<p>Pooled Kaplan–Meier survival curves obtained by reconstructing individual patient data from 12 patient cohorts published in 6 trials. The curve for the 6 control arms pooled together (in orange) refers to 1020 patients treated with pemetrexed + cisplatin in 5 phase III trials and with chemotherapy alone in the trial by Chu et al., 2023 [<a href="#B14-cancers-17-00503" class="html-bibr">14</a>]. The combination of ONCOS-102 with pem+pla did not show a significant improvement in OS (<span class="html-italic">p</span> &gt; 0.05). The other 5 curves refer to the 3 treatments (beva plus pem+cis, nivo+ipi and pem+chemo) that performed significantly better than standard of care (control) and to the 2 treatments (cisplatin alone or cedi+pem+plat) that performed significantly worse than the controls (<a href="#cancers-17-00503-t003" class="html-table">Table 3</a>). Time is expressed in months. Trials are identified based on the first author. Abbreviations: beva, bevacizumab; cis, cisplatin; pem, pembrolizumab; plat, platinum agents; nivo, nivolumab; ipi, ipilimumab; cedi, cediranib.</p>
Full article ">
22 pages, 463 KiB  
Article
DEGNN: A Deep Learning-Based Method for Unmanned Aerial Vehicle Software Security Analysis
by Jiang Du, Qiang Wei, Yisen Wang and Xingyu Bai
Drones 2025, 9(2), 110; https://doi.org/10.3390/drones9020110 - 2 Feb 2025
Viewed by 671
Abstract
With the increasing utilization of drones, the cyber security threats they face have become more prominent. Code reuse in the software development of drone systems has led to vulnerabilities in drones. The binary code similarity analysis method offers a way to analyze drone [...] Read more.
With the increasing utilization of drones, the cyber security threats they face have become more prominent. Code reuse in the software development of drone systems has led to vulnerabilities in drones. The binary code similarity analysis method offers a way to analyze drone firmware lacking source code. This paper proposes DEGNN, a novel graph neural network for binary code similarity analysis. It uses call-enhanced control graphs and attention mechanisms to generate dual embeddings of functions and predict similarity based on graph structures and node features. DEGNN is effective in cross-architecture tasks. Experimental results show that in the cross-architecture binary function search, DEGNN’s mean reciprocal rank and recall@1 surpass the state of the art by 12% and 28.6%, respectively. In the cross-architecture real-world vulnerability search, specifically targeting drone systems, it has a 33.3% performance improvement over the SOTA model, indicating its great potential in enhancing drone cyber security. Full article
Show Figures

Figure 1

Figure 1
<p>Binary function dual-embedding feature extraction.</p>
Full article ">Figure 2
<p>Binary function similarity prediction network.</p>
Full article ">Figure 3
<p>Model performance on the validation set.</p>
Full article ">Figure 4
<p>ROC curves and AUC scores on the same-architecture comparison dataset.</p>
Full article ">Figure 5
<p>ROC curves and AUC scores on the cross-architecture comparison dataset.</p>
Full article ">Figure 6
<p>Time efficiency comparison.</p>
Full article ">
19 pages, 3392 KiB  
Article
Tension-Aware Motion Planning for Tethered Robots
by Rogério R. Lima and Guilherme A. S. Pereira
Robotics 2025, 14(2), 11; https://doi.org/10.3390/robotics14020011 - 28 Jan 2025
Viewed by 535
Abstract
This paper presents a path-planning approach for tethered robots. The proposed planner finds paths that minimize the tether tension due to tether–obstacle and tether–floor interaction. The method assumes that the tether is managed externally by a tether management system and pulled by the [...] Read more.
This paper presents a path-planning approach for tethered robots. The proposed planner finds paths that minimize the tether tension due to tether–obstacle and tether–floor interaction. The method assumes that the tether is managed externally by a tether management system and pulled by the robot. The planner is initially formulated for ground robots in a 2D environment and then extended for 3D scenarios, where it can be applied to tethered aerial and underwater vehicles. The proposed approach assumes a taut tether between two consecutive contact points and knowledge of the coefficient of friction of the obstacles present in the environment. The method first computes the visibility graph of the environment, in which each node represents a vertex of an obstacle. Then, a second graph, named the tension-aware graph, is built so that the tether–environment interaction, formulated in terms of tension, is computed and used as the cost of the edges. A graph search algorithm (e.g., Dijkstra) is then used to compute a path with minimum tension, which can help the tethered robot reach longer distances by minimizing the tension required to drag the tether along the way. This paper presents simulations and a real-world experiment that illustrate the characteristics of the method. Full article
(This article belongs to the Special Issue Autonomous Robotics for Exploration)
Show Figures

Figure 1

Figure 1
<p>Example of the tension-aware path-planning pipeline: (<b>a</b>) 2D environment with an obstacle (<span class="html-fig-inline" id="robotics-14-00011-i001"><img alt="Robotics 14 00011 i001" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i001.png"/></span>), start (<span class="html-fig-inline" id="robotics-14-00011-i002"><img alt="Robotics 14 00011 i002" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i002.png"/></span>), and goal (<span class="html-fig-inline" id="robotics-14-00011-i003"><img alt="Robotics 14 00011 i003" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i003.png"/></span>) positions. (<b>b</b>) Visibility graph, <span class="html-italic">G</span>, where edges are represented by red lines and nodes are represented by circles numbered from 1 to 6. Here, <math display="inline"><semantics> <msub> <mi>v</mi> <mn>1</mn> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>v</mi> <mn>6</mn> </msub> </semantics></math> are the start and goal positions, while <math display="inline"><semantics> <msub> <mi>v</mi> <mi>i</mi> </msub> </semantics></math> with <math display="inline"><semantics> <mrow> <mspace width="0.166667em"/> <mi>i</mi> <mo>=</mo> <mn>2</mn> <mo>,</mo> <mo>…</mo> <mo>,</mo> <mn>5</mn> </mrow> </semantics></math> represents the obstacle vertices with known coefficients of friction <math display="inline"><semantics> <mrow> <msub> <mi>μ</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>0.91</mn> </mrow> </semantics></math> (<span class="html-fig-inline" id="robotics-14-00011-i004"><img alt="Robotics 14 00011 i004" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i004.png"/></span>), <math display="inline"><semantics> <mrow> <msub> <mi>μ</mi> <mn>3</mn> </msub> <mo>=</mo> <mn>0.13</mn> </mrow> </semantics></math> (<span class="html-fig-inline" id="robotics-14-00011-i005"><img alt="Robotics 14 00011 i005" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i005.png"/></span>), <math display="inline"><semantics> <mrow> <msub> <mi>μ</mi> <mn>4</mn> </msub> <mo>=</mo> <mn>0.91</mn> </mrow> </semantics></math> (<span class="html-fig-inline" id="robotics-14-00011-i006"><img alt="Robotics 14 00011 i006" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i006.png"/></span>), and <math display="inline"><semantics> <mrow> <msub> <mi>μ</mi> <mn>5</mn> </msub> <mo>=</mo> <mn>0.63</mn> </mrow> </semantics></math> (<span class="html-fig-inline" id="robotics-14-00011-i007"><img alt="Robotics 14 00011 i007" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i007.png"/></span>). (<b>c</b>) Edges of <span class="html-italic">G</span> marked with triangles (<span class="html-fig-inline" id="robotics-14-00011-i008"><img alt="Robotics 14 00011 i008" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i008.png"/></span>) correspond to nodes of the tension-aware graph <math display="inline"><semantics> <msub> <mi>G</mi> <mi mathvariant="normal">t</mi> </msub> </semantics></math> in (<b>d</b>). (<b>d</b>) Besides the edges of <span class="html-italic">G</span>, two nodes named <span class="html-italic">virtual start</span> (<span class="html-fig-inline" id="robotics-14-00011-i009"><img alt="Robotics 14 00011 i009" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i009.png"/></span>) and <span class="html-italic">virtual goal</span> (<span class="html-fig-inline" id="robotics-14-00011-i010"><img alt="Robotics 14 00011 i010" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i010.png"/></span>) are added to <math display="inline"><semantics> <msub> <mi>G</mi> <mi mathvariant="normal">t</mi> </msub> </semantics></math> so that it has unique start and goal nodes. A path with minimum tension (<span class="html-fig-inline" id="robotics-14-00011-i011"><img alt="Robotics 14 00011 i011" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i011.png"/></span>) was found in <math display="inline"><semantics> <msub> <mi>G</mi> <mi mathvariant="normal">t</mi> </msub> </semantics></math> using Dijkstra through nodes <math display="inline"><semantics> <mrow> <mo>(</mo> <mi mathvariant="italic">virtual</mi> <mspace width="3.33333pt"/> <mi mathvariant="italic">start</mi> <mo>)</mo> <mo>→</mo> <mo>(</mo> <mn>1</mn> <mo>,</mo> <mn>3</mn> <mo>)</mo> <mo>→</mo> <mo>(</mo> <mn>3</mn> <mo>,</mo> <mn>2</mn> <mo>)</mo> <mo>→</mo> <mo>(</mo> <mn>2</mn> <mo>,</mo> <mn>6</mn> <mo>)</mo> <mo>→</mo> <mo>(</mo> <mi mathvariant="italic">virtual</mi> <mspace width="3.33333pt"/> <mi mathvariant="italic">goal</mi> <mo>)</mo> </mrow> </semantics></math>, which corresponds to the lowest tension route via nodes <math display="inline"><semantics> <mrow> <mn>1</mn> <mo>→</mo> <mn>3</mn> <mo>→</mo> <mn>2</mn> <mo>→</mo> <mn>6</mn> </mrow> </semantics></math> in <span class="html-italic">G</span>.</p>
Full article ">Figure 2
<p>Tether configuration feasibility check. (<b>a</b>) Case where a tether touches three obstacles (gray polygons) at their vertices <math display="inline"><semantics> <mrow> <mi>A</mi> <mo>,</mo> <mspace width="0.166667em"/> <mi>B</mi> <mo>,</mo> <mspace width="0.166667em"/> </mrow> </semantics></math> and <span class="html-italic">C</span>. The obstacle containing vertex <span class="html-italic">B</span> is highlighted and labeled <math display="inline"><semantics> <msub> <mi>O</mi> <mi>B</mi> </msub> </semantics></math>. (<b>b</b>) <span class="html-italic">Feasible</span> free-tether configuration, checked by assessing <math display="inline"><semantics> <mrow> <mi>A</mi> <mi>B</mi> <mi>C</mi> <mo>∩</mo> <msub> <mi>O</mi> <mi>B</mi> </msub> <mo>≠</mo> <mo>∅</mo> </mrow> </semantics></math>. (<b>c</b>) <span class="html-italic">Unfeasible</span> free-tether configuration for vertices <span class="html-italic">A</span>, <span class="html-italic">B</span>, and <math display="inline"><semantics> <msup> <mi>C</mi> <mo>′</mo> </msup> </semantics></math>. (<b>d</b>) Triangle <math display="inline"><semantics> <mrow> <mi>A</mi> <mi>B</mi> <msup> <mi>C</mi> <mo>′</mo> </msup> </mrow> </semantics></math> does not intersect <math display="inline"><semantics> <msub> <mi>O</mi> <mi>B</mi> </msub> </semantics></math> (<math display="inline"><semantics> <mrow> <mi>A</mi> <mi>B</mi> <msup> <mi>C</mi> <mo>′</mo> </msup> <mo>∩</mo> <msub> <mi>O</mi> <mi>B</mi> </msub> <mo>=</mo> <mo>∅</mo> </mrow> </semantics></math>), indicating a non-feasible configuration.</p>
Full article ">Figure 3
<p>(<b>a</b>) Transforming angle <math display="inline"><semantics> <mrow> <mo>∠</mo> <mi>A</mi> <mi>B</mi> <mi>C</mi> </mrow> </semantics></math> into a capstan angle <math display="inline"><semantics> <mi>θ</mi> </semantics></math> by establishing the angle relationship <math display="inline"><semantics> <mrow> <mi>θ</mi> <mo>=</mo> <mn>180</mn> <mo>°</mo> <mo>−</mo> <mo>∠</mo> <mi>A</mi> <mi>B</mi> <mi>C</mi> </mrow> </semantics></math> through a geometric scheme that relates the capstan model with the representation of polygonal obstacles. (<b>b</b>) Illustration of a viable free-tether configuration, wherein it interfaces with three obstacles (gray polygons) at vertices <span class="html-italic">A</span>, <span class="html-italic">B</span>, and <span class="html-italic">C</span>.</p>
Full article ">Figure 4
<p>Computation of the path length through the edges in the visibility graph <span class="html-italic">G</span>. The path is represented as a sequence of nodes (<span class="html-fig-inline" id="robotics-14-00011-i012"><img alt="Robotics 14 00011 i012" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i012.png"/></span>) in <span class="html-italic">G</span>, starting at the initial node <math display="inline"><semantics> <msub> <mi>v</mi> <mn>1</mn> </msub> </semantics></math> (<span class="html-fig-inline" id="robotics-14-00011-i002"><img alt="Robotics 14 00011 i002" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i002.png"/></span>) and ending at the goal node <math display="inline"><semantics> <msub> <mi>v</mi> <mi>n</mi> </msub> </semantics></math> (<span class="html-fig-inline" id="robotics-14-00011-i003"><img alt="Robotics 14 00011 i003" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i003.png"/></span>). The edges connecting consecutive nodes (<span class="html-fig-inline" id="robotics-14-00011-i013"><img alt="Robotics 14 00011 i013" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i013.png"/></span>) encode the path length based on Euclidean distance. The virtual nodes <math display="inline"><semantics> <mrow> <msub> <mi>v</mi> <mi>vstart</mi> </msub> </mrow> </semantics></math> (<span class="html-fig-inline" id="robotics-14-00011-i009"><img alt="Robotics 14 00011 i009" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i009.png"/></span>) and <math display="inline"><semantics> <mrow> <msub> <mi>v</mi> <mi>vgoal</mi> </msub> </mrow> </semantics></math> (<span class="html-fig-inline" id="robotics-14-00011-i010"><img alt="Robotics 14 00011 i010" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i010.png"/></span>), which connect to the start (<math display="inline"><semantics> <msub> <mi>v</mi> <mi>start</mi> </msub> </semantics></math>) and goal (<math display="inline"><semantics> <msub> <mi>v</mi> <mi>goal</mi> </msub> </semantics></math>) nodes, form zero-length edges represented by dashed lines (<span class="html-fig-inline" id="robotics-14-00011-i014"><img alt="Robotics 14 00011 i014" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i014.png"/></span>) and do not contribute to the total path length. Thus, the total path length is given by <math display="inline"><semantics> <mrow> <mi>L</mi> <mo>=</mo> <msub> <mi>v</mi> <mn>1</mn> </msub> <msub> <mi>v</mi> <mn>2</mn> </msub> <mo>+</mo> <msub> <mi>v</mi> <mn>2</mn> </msub> <msub> <mi>v</mi> <mn>3</mn> </msub> <mo>+</mo> <mo>…</mo> <mo>+</mo> <msub> <mi>v</mi> <mrow> <mi>n</mi> <mo>−</mo> <mn>2</mn> </mrow> </msub> <msub> <mi>v</mi> <mrow> <mi>n</mi> <mo>−</mo> <mn>1</mn> </mrow> </msub> <mo>+</mo> <msub> <mi>v</mi> <mrow> <mi>n</mi> <mo>−</mo> <mn>1</mn> </mrow> </msub> <msub> <mi>v</mi> <mi>n</mi> </msub> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p>Representation of a 3D environment with four prism-shaped obstacles (<span class="html-fig-inline" id="robotics-14-00011-i015"><img alt="Robotics 14 00011 i015" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i015.png"/></span>). A tether (<span class="html-fig-inline" id="robotics-14-00011-i013"><img alt="Robotics 14 00011 i013" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i013.png"/></span>) connects the start (<span class="html-fig-inline" id="robotics-14-00011-i002"><img alt="Robotics 14 00011 i002" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i002.png"/></span>) and goal (<span class="html-fig-inline" id="robotics-14-00011-i003"><img alt="Robotics 14 00011 i003" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i003.png"/></span>) positions passing through the contact points <span class="html-italic">A</span> and <span class="html-italic">B</span> (<span class="html-fig-inline" id="robotics-14-00011-i006"><img alt="Robotics 14 00011 i006" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i006.png"/></span>). A plane <math display="inline"><semantics> <mi mathvariant="script">H</mi> </semantics></math> (<span class="html-fig-inline" id="robotics-14-00011-i016"><img alt="Robotics 14 00011 i016" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i016.png"/></span>) is defined by three consecutive path nodes (<span class="html-italic">A</span>, <span class="html-italic">B</span>, and <span style="color: #00FF00"><math display="inline"><semantics> <msub> <mi>x</mi> <mi>goal</mi> </msub> </semantics></math></span> in this case), assuming a taut tether (straight line) between pairs of consecutive nodes.</p>
Full article ">Figure 6
<p>Path-planning results obtained by the BFS (<span class="html-fig-inline" id="robotics-14-00011-i017"><img alt="Robotics 14 00011 i017" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i017.png"/></span>), Dijkstra (<span class="html-fig-inline" id="robotics-14-00011-i018"><img alt="Robotics 14 00011 i018" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i018.png"/></span>), and tension-aware (<span class="html-fig-inline" id="robotics-14-00011-i011"><img alt="Robotics 14 00011 i011" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i011.png"/></span>) algorithms in an environment containing 9 obstacles, numbered for reference in the figure. The paths connect the start (<span class="html-fig-inline" id="robotics-14-00011-i002"><img alt="Robotics 14 00011 i002" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i002.png"/></span>) to the goal (<span class="html-fig-inline" id="robotics-14-00011-i003"><img alt="Robotics 14 00011 i003" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i003.png"/></span>) positions along with all other vertices that contact the tether (<span class="html-fig-inline" id="robotics-14-00011-i006"><img alt="Robotics 14 00011 i006" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i006.png"/></span>). The lighter the obstacle, the smaller its friction coefficient.</p>
Full article ">Figure 7
<p>Path-planning results obtained by the BFS (<span class="html-fig-inline" id="robotics-14-00011-i017"><img alt="Robotics 14 00011 i017" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i017.png"/></span>), Dijkstra (<span class="html-fig-inline" id="robotics-14-00011-i018"><img alt="Robotics 14 00011 i018" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i018.png"/></span>), and tension-aware (<span class="html-fig-inline" id="robotics-14-00011-i011"><img alt="Robotics 14 00011 i011" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i011.png"/></span>) algorithms in an environment containing 25 polygonal obstacles, numbered for reference in the figure. The paths connect the start (<span class="html-fig-inline" id="robotics-14-00011-i002"><img alt="Robotics 14 00011 i002" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i002.png"/></span>) to the goal (<span class="html-fig-inline" id="robotics-14-00011-i003"><img alt="Robotics 14 00011 i003" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i003.png"/></span>) positions along with all other vertices that contact the tether (<span class="html-fig-inline" id="robotics-14-00011-i006"><img alt="Robotics 14 00011 i006" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i006.png"/></span>). The lighter the obstacle, the smaller its friction coefficient.</p>
Full article ">Figure 8
<p>Path-planning results highlighting the effect of the “intra-node” term of the cost function on the tension-aware algorithm (<span class="html-fig-inline" id="robotics-14-00011-i011"><img alt="Robotics 14 00011 i011" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i011.png"/></span>), the BFS algorithm (<span class="html-fig-inline" id="robotics-14-00011-i017"><img alt="Robotics 14 00011 i017" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i017.png"/></span>), and the Dijkstra algorithm (<span class="html-fig-inline" id="robotics-14-00011-i018"><img alt="Robotics 14 00011 i018" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i018.png"/></span>). The lighter the obstacle, the smaller its friction coefficient. Obstacles are numbered for reference in the figure (<b>a</b>) In a squared environment, each algorithm yields a distinct path. (<b>b</b>) In an environment three times wider, the BFS and Dijkstra algorithms find paths similar to that of their counterpart in (<b>a</b>), while the path of the tension-aware algorithm matches that of the Dijkstra algorithm, indicating that the minimum tension path is also the shortest. In this case, the “intra-node” term, which is proportional to the distance, becomes more important than the capstan term.</p>
Full article ">Figure 9
<p>(<b>a</b>) Paths obtained by the tension-aware (<span class="html-fig-inline" id="robotics-14-00011-i011"><img alt="Robotics 14 00011 i011" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i011.png"/></span>), BFS (<span class="html-fig-inline" id="robotics-14-00011-i017"><img alt="Robotics 14 00011 i017" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i017.png"/></span>), and Dijkstra (<span class="html-fig-inline" id="robotics-14-00011-i018"><img alt="Robotics 14 00011 i018" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i018.png"/></span>) algorithms in a virtual environment with obstacles numbered 1–4 for reference, and overlaid on the experimental setup image. Start (<span class="html-fig-inline" id="robotics-14-00011-i002"><img alt="Robotics 14 00011 i002" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i002.png"/></span>) and goal (<span class="html-fig-inline" id="robotics-14-00011-i003"><img alt="Robotics 14 00011 i003" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i003.png"/></span>) positions along with all other vertices that contact the tether (<span class="html-fig-inline" id="robotics-14-00011-i006"><img alt="Robotics 14 00011 i006" src="/robotics/robotics-14-00011/article_deploy/html/images/robotics-14-00011-i006.png"/></span>). (<b>b</b>) Path determined by the tension-aware algorithm and recreated with a tensioned cable passing by vertices <span class="html-italic">A</span><span style="color: #00FF00"><math display="inline"><semantics> <mrow> <mo>−</mo> <mi>F</mi> <mo>−</mo> <mi>G</mi> </mrow> </semantics></math></span>. A scale is used at the goal position to measure the tension.</p>
Full article ">
33 pages, 5228 KiB  
Article
Schedula Anima: Dynamic Visualization of Gantt Charts and Resource Usage Graphs in Project Scheduling
by Alexander Maravas and John-Paris Pantouvakis
Buildings 2025, 15(3), 393; https://doi.org/10.3390/buildings15030393 - 26 Jan 2025
Viewed by 587
Abstract
Scheduling is essential in managing projects. ‘Schedula Anima’ is a new software designed to provide a comprehensive view of schedules between early and late dates for construction project managers. Capturing the dynamic nature of projects, it offers improved visualization through an animation process [...] Read more.
Scheduling is essential in managing projects. ‘Schedula Anima’ is a new software designed to provide a comprehensive view of schedules between early and late dates for construction project managers. Capturing the dynamic nature of projects, it offers improved visualization through an animation process that creates incremental frames of bar charts and the corresponding resource graphs. As activity delays are simulated, it is observed that delays earlier in the schedule have more significant effects on project completion. A new prioritization method is introduced to evaluate the ease of rescheduling activities. A metric for monitoring resource usage float is presented, and the search space for resource utilization is delineated. As resource smoothing is studied in the resource usage graph and the time domain, a correlation is discovered between resource smoothness and the float consumption rate. It is shown that the schedule and resource usage graph comprises five sub-areas representing different risk exposures. Animation also improves communication in project teams and is beneficial in education. Finally, it is discovered that the permutations of activities in the simulation form a group. Enhancing our perception of resource utilization and the management of delays, ‘Schedula Anima’ brings a renewed perspective to project scheduling. Full article
(This article belongs to the Section Construction Management, and Computers & Digitization)
Show Figures

Figure 1

Figure 1
<p>(<b>a</b>) Air and ice in a Gantt chart. (<b>b</b>) Air and ice in resource usage graph. Blue: early, green: late, cyan: ice, and yellow: air.</p>
Full article ">Figure 2
<p>Dynamic resource usage.</p>
Full article ">Figure 3
<p>Schedula Anima software application.</p>
Full article ">Figure 4
<p>AoN precedence diagram.</p>
Full article ">Figure 5
<p>Early and late dates: (<b>a</b>) with activity relationships and (<b>b</b>) with ice and air.</p>
Full article ">Figure 6
<p>Resource usage: red for critical activities, blue for early dates, and green for late dates.</p>
Full article ">Figure 7
<p>Resource usage with air (yellow) and ice (cyan). Blue: early, green: late, and red: critical.</p>
Full article ">Figure 8
<p>Resource-smoothing index <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>S</mi> <mi>M</mi> </mrow> <mrow> <mn>2</mn> </mrow> </msub> </mrow> </semantics></math> profile.</p>
Full article ">Figure 9
<p>(<b>a</b>) Float consumption profile. (<b>b</b>) Float consumption rate.</p>
Full article ">Figure 10
<p>Resource usage float consumption.</p>
Full article ">
19 pages, 13222 KiB  
Article
Connecting Cities: A Case Study on the Application of Morphological Shortest Paths
by Jorge L. Perez-Ramos, Selene Ramirez-Rosales, Daniel Canton-Enriquez, Luis A. Diaz Jimenez, Herlindo Hernandez-Ramirez, Ana M. Herrera-Navarro and Hugo Jimenez-Hernandez
Symmetry 2025, 17(1), 114; https://doi.org/10.3390/sym17010114 - 13 Jan 2025
Viewed by 577
Abstract
Navigatingdensely connected networks can be complex due to the different connection structures present within a network. No explicit algorithms are designed specifically for this navigation, so heuristic approaches and existing network systems are often employed. However, this task can become computationally asymmetrical, as [...] Read more.
Navigatingdensely connected networks can be complex due to the different connection structures present within a network. No explicit algorithms are designed specifically for this navigation, so heuristic approaches and existing network systems are often employed. However, this task can become computationally asymmetrical, as the complexity of creating a representation of the city is lower than the complexity involved in identifying a set of feasible paths in a combinatorial order. This paper extends the applicability of morphological approaches to compute the shortest path in smart cities, driven by the complexity and size of the vital communication infrastructure. As is well known, this communication infrastructure changes dynamically, particularly with the evolving connection paths due to continuous population growth. Consequently, efficient communication trajectories can quickly become obsolete. The challenge of computing the best trajectories to respond more quickly to the growing population comes with high computational complexity. This paper presents an application that uses a discrete algorithm designed to compute the shortest path through a morphological approach. Specifically, it seeks to identify the best trajectory within a densely populated city based on a complex density graph. By incorporating morphological approaches into path-search algorithms, we can define a new family of methods that operate in discrete spaces with a morphological representation, resulting in approaches that have lower computational requirements. Other well-known applications in this context include the delivery of resources, such as managing electrical power consumption or minimizing time delays in resource delivery. This task is essential but classified as an NP problem, making it an appropriate scenario for applying the proposed algorithm to navigate a dense graph. The paper highlights the well-known problem of finding the shortest path as one of the potential applications of the introduced algorithm. The algorithm aims to identify the optimal path trajectory within a graph representing a dense city’s real scenario. This discussion compares and contrasts the proposal with other established approaches, highlighting the advantages and characteristics of the proposed method. Full article
Show Figures

Figure 1

Figure 1
<p>Process of encoding a real scenario in a graphical representation of nodes and edges.</p>
Full article ">Figure 2
<p>Search space coverage through dilation operator and its convergence to the target node (<b>a</b>–<b>g</b>).</p>
Full article ">Figure 3
<p>Reference city used to experimental test [<a href="#B51-symmetry-17-00114" class="html-bibr">51</a>].</p>
Full article ">Figure 4
<p>The process used by search algorithms in a graph space involves (<b>a</b>) knowledge of the scenario consisting of avenues, with information on the reference and destination nodes, and (<b>b</b>) the frequency of application of the dilation operator together with the final calculation of the trajectory of the optimal path found.</p>
Full article ">Figure 5
<p>Comparison of the search process with covering dilation operator and the search with Dijkstra’s algorithm.</p>
Full article ">Figure 6
<p>The distribution resulted of applying the algorithm for delivering resources in a dense city multiple times.</p>
Full article ">
Back to TopTop