[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (8,693)

Search Parameters:
Keywords = perturbation

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
16 pages, 1743 KiB  
Article
RLVS: A Reinforcement Learning-Based Sparse Adversarial Attack Method for Black-Box Video Recognition
by Jianxin Song, Dan Yu, Hongfei Teng and Yongle Chen
Electronics 2025, 14(2), 245; https://doi.org/10.3390/electronics14020245 - 8 Jan 2025
Abstract
To address the challenges of black-box video adversarial attacks, such as excessive query times and suboptimal attack performance due to the lack of result feedback during the attack process, we propose a reinforcement learning-based sparse adversarial attack method called RLVS. This approach leverages [...] Read more.
To address the challenges of black-box video adversarial attacks, such as excessive query times and suboptimal attack performance due to the lack of result feedback during the attack process, we propose a reinforcement learning-based sparse adversarial attack method called RLVS. This approach leverages reinforcement learning to identify key frames for efficient gradient estimation, significantly reducing the number of queries. First, a self-attention network is integrated into the agent policy network to enable more precise selection of key frames. Second, designed reward functions allow the agent to continuously adapt to the sparse key frames by querying the black-box threat model and receiving feedback on attack outcomes. Lastly, gradient estimation is applied solely to the selected key frames, estimating only the gradient sign rather than the full gradient, further enhancing attack efficiency. We conducted experiments on two video recognition models using three popular action datasets. The experimental results demonstrate that our method outperforms other black-box video attack methods in terms of attack efficiency and effectiveness, achieving higher fooling rates with fewer queries and minimal perturbations. Full article
Show Figures

Figure 1

Figure 1
<p>Framework of RLVS.</p>
Full article ">Figure 2
<p>Framework of the policy network.</p>
Full article ">Figure 3
<p>Adjusted results for different reward weights.</p>
Full article ">Figure 4
<p>An example of the adversarial video produced with RLVS.</p>
Full article ">Figure 5
<p>Comparison results of RLVS with only BiRNN and random agent.</p>
Full article ">Figure 6
<p>The convergence of RLVS.</p>
Full article ">
15 pages, 3568 KiB  
Article
Bisphenol S Induces Lipid Metabolism Disorders in HepG2 and SK-Hep-1 Cells via Oxidative Stress
by Kai-Xing Lin, Zi-Yao Wu, Mei-Lin Qin and Huai-Cai Zeng
Toxics 2025, 13(1), 44; https://doi.org/10.3390/toxics13010044 - 8 Jan 2025
Viewed by 62
Abstract
Bisphenol S (BPS) is a typical endocrine disruptor associated with obesity. To observe BPS effects on lipid metabolism in HepG2 and SK-Hep-1 human HCC cells, a CCK-8 assay was used to assess cell proliferation in response to BPS, and the optimal concentration of [...] Read more.
Bisphenol S (BPS) is a typical endocrine disruptor associated with obesity. To observe BPS effects on lipid metabolism in HepG2 and SK-Hep-1 human HCC cells, a CCK-8 assay was used to assess cell proliferation in response to BPS, and the optimal concentration of BPS was selected. Biochemical indices such as triglyceride (TG) and total cholesterol (T-CHO), and oxidative stress indices such as malondialdehyde (MDA) and catalase (CAT) were measured. ROS and MDA levels were significantly increased after BPS treatment for 24 h and 48 h (p < 0.05), indicating an oxidative stress response. Alanine aminotransferase (ALT), T-CHO, and low-density lipoprotein cholesterol (LDL-C) levels also increased significantly after 24 or 48 h BPS treatments (p < 0.05). RT-PCR and Western blot analyses detected mRNA or protein expression levels of peroxisome proliferator-activated receptor α (PPARα) and sterol regulatory element-binding protein 1c (SREBP1C). The results indicated that BPS could inhibit the mRNA expression of PPARα and carnitine palmitoyl transferase 1B (CPT1B), reduce lipid metabolism, promote mRNA or protein expression of SREBP1C and fatty acid synthase (FASN), and increase lipid synthesis. Increased lipid droplets were observed using morphological Oil Red O staining. Our study demonstrates that BPS may cause lipid accumulation by increasing oxidative stress and perturbing cellular lipid metabolism. Full article
(This article belongs to the Special Issue Drug Metabolism and Toxicological Mechanisms)
Show Figures

Figure 1

Figure 1
<p>Effect of different concentrations of BPS on the viability of HepG2 and SK-Hep-1 cells. Note: (<b>A</b>,<b>B</b>) presents the alterations in cell viability following treatment with varying concentrations of BPS. “*” represent cell viability following a 24 h exposure to BPS relative to the 0 μmol/L group, <span class="html-italic">p</span> &lt; 0.05. “#” represents cell viability following a 48 h exposure to BPS relative to the 0 μmol/L group, <span class="html-italic">p</span> &lt; 0.05. n = 3, the same below.</p>
Full article ">Figure 2
<p>Effect of BPS treatment on ROS levels in HepG2 and SK-Hep-1 cells. Note: (<b>A</b>,<b>B</b>) shows the results of reactive oxygen species detection in HepG2 and SK-Hep-1 cells exposed to BPS for 24 h or 48 h conditions with a microscopic scale of 100 μm. (<b>C</b>) indicates reactive oxygen species fluorescence intensity quantification, and “#” represents the oxidative stress of cells after exposure compared to that of the control group, <span class="html-italic">p</span> &lt; 0.05. n = 3.</p>
Full article ">Figure 3
<p>BPS-induced lipid droplet deposition in HepG2 cells. Note: (<b>A</b>–<b>D</b>) shows Oil Red O staining in HepG2 cells following BPS exposure for 24 h or 48 h with a microscopic scale of 50 μm. (<b>E</b>–<b>H</b>) presents the proportionally enlarged “□” window in (<b>A</b>–<b>D</b>), while “↑” in (<b>F</b>,<b>H</b>) refers to red fat droplets.</p>
Full article ">Figure 4
<p>BPS-induced lipid droplet deposition in SK-Hep-1 cells. Note: (<b>A</b>–<b>D</b>) presents Oil Red O staining of SK-Hep-1 cells after exposure to BPS for 24 h or 48 h with a microscopic scale of 50 μm. (<b>E</b>–<b>H</b>) presents the proportionally enlarged “□” window in (<b>A</b>–<b>D</b>), while “↑” in (<b>F</b>,<b>H</b>) refers to the red fat droplets.</p>
Full article ">Figure 5
<p>Effect of BPS on oxidative stress levels in HepG2 cells and SK-Hep-1 cells. Note: (<b>A</b>) shows the MDA levels within SK-Hep-1 and HepG2 cells following BPS treatments for 24 h and 48 h. (<b>B</b>) shows the CAT levels within SK-Hep-1 and HepG2 cells following BPS treatments for 24 h and 48 h; “#” represents BPS compared to the control group, <span class="html-italic">p</span> &lt; 0.05. n = 3.</p>
Full article ">Figure 6
<p>Effects of BPS on HepG2 and SK-Hep-1 cell damage and metabolic-related indicators. Note: (<b>A</b>–<b>D</b>) presents the results of TG, T-CHO, ALT, and LDL-C analyses after BPS exposure in SK-Hep-1 and HepG2 cells for 24 h and 48 h, respectively. “#” represents BPS compared to the control group, <span class="html-italic">p</span> &lt; 0.05. n = 3.</p>
Full article ">Figure 7
<p>Effect of BPS on the expression levels of related mRNAs in HepG2 and SK-Hep-1 cells. Note: (<b>A</b>–<b>D</b>) indicates the mRNA expression results of PPARα, CPT1B, CD36, SREBP1C, and FAFSN in HepG2 and SK-Hep-1 cells following 24 h and 48 h of exposure, respectively. “#” represents BPS compared to the control group, <span class="html-italic">p</span> &lt; 0.05. n = 3.</p>
Full article ">Figure 8
<p>Effects of BPS on the expression levels of the lipid synthesis proteins SREBP1C and FASN in HepG2 and SK-Hep-1 cells. Note: (<b>A</b>–<b>H</b>) indicates the relative protein expression of SREBP1C and FASN in SK-Hep-1 and HepG2 cells after 24 h and 48 h of exposure, respectively. “#” represents BPS compared to the control group, <span class="html-italic">p</span> &lt; 0.05. n = 3.</p>
Full article ">
5 pages, 1023 KiB  
Proceeding Paper
The Influence of Boundary Constraint Viscoelasticity on the Nonlinear Forced Vibration of Fluid-Conveying Layered Pipes
by Zhoumi Wang and Qingchun Meng
Eng. Proc. 2024, 80(1), 19; https://doi.org/10.3390/engproc2024080019 - 8 Jan 2025
Viewed by 21
Abstract
In this paper, the influence of the viscoelasticity of boundary constraints on the forced vibration of the nonlinear forced resonance of a fluid-conveying layered pipe under an external forced excitation is studied. The pipe lays on viscoelastic foundations and is simply supported at [...] Read more.
In this paper, the influence of the viscoelasticity of boundary constraints on the forced vibration of the nonlinear forced resonance of a fluid-conveying layered pipe under an external forced excitation is studied. The pipe lays on viscoelastic foundations and is simply supported at both ends, and one end is subject to a viscoelastic boundary constraint. The Kelvin–Voight model was employed to describe the viscoelasticity provided by the foundation and boundary constraint. Hamilton’s variational principle was used to obtain the governing equations, during which geometric nonlinear factors including curvature nonlinearity and inertia nonlinearity were considered. By employing a perturbation-incremental harmonic balance method (IHBM), amplitude–frequency bifurcation diagrams of the pipe were obtained. The results show that the viscoelastic constraints from the boundary and foundation have significant influence on the linear and nonlinear dynamic behavior of the pipe system. Full article
(This article belongs to the Proceedings of 2nd International Conference on Green Aviation (ICGA 2024))
Show Figures

Figure 1

Figure 1
<p>The geometry of the fluid-conveying pipe under the viscoelastic boundary constraint. The pipe is made of two coaxial layers of different materials.</p>
Full article ">Figure 2
<p>The effects of the boundary string stiffness (<span class="html-italic">k</span><sub>b</sub>) on the bifurcation curve of the fluid-conveying pipe.</p>
Full article ">Figure 3
<p>The effects of the boundary damping coefficient (<span class="html-italic">c</span><sub>b</sub>) on the bifurcation curve of the fluid-conveying pipe.</p>
Full article ">
22 pages, 15305 KiB  
Article
Analyses of PO-Based Fuzzy Logic-Controlled MPPT and Incremental Conductance MPPT Algorithms in PV Systems
by Fevzi Çakmak, Zafer Aydoğmuş and Mehmet Rıda Tür
Energies 2025, 18(2), 233; https://doi.org/10.3390/en18020233 - 7 Jan 2025
Viewed by 300
Abstract
This manuscript aims to increase the utilization of solar energy, which is both environmentally friendly and easily accessible, to satisfy the energy needs of developing countries. In order to achieve this goal, maximum power generation should be provided from photovoltaic panels. Several maximum [...] Read more.
This manuscript aims to increase the utilization of solar energy, which is both environmentally friendly and easily accessible, to satisfy the energy needs of developing countries. In order to achieve this goal, maximum power generation should be provided from photovoltaic panels. Several maximum power point tracking (MPPT) methods are utilized for maximum power generation in photovoltaic panel systems under different weather conditions. In this paper, a novel intelligent hybrid fuzzy logic-controlled maximum power point tracking algorithm founded on the perturb and observe (PO) algorithm is presented. The proposed fuzzy logic controller algorithm and the incremental conductivity maximum power point tracking algorithm were simulated in a MATLAB(2018b version)/Simulink environment and evaluated by comparing the results. Four Sharp ND-F4Q295 solar panels, two in series and two in parallel, were used for the simulation. In this study, the voltage ripple of the proposed hybrid method was measured at 1% compared to the classical incremental conductivity method, while it was 8.6% in the IncCon method. Similarly, the current ripple was 1.08% in the proposed hybrid FLC method, while the current ripple was 9.27% in the IncCon method. It is observed that the proposed smart method stabilizes the system voltage faster, at 25 ms, in the event of sudden weather changes. Full article
(This article belongs to the Special Issue Advances in Photovoltaic Solar Energy II)
Show Figures

Figure 1

Figure 1
<p>Increasing conductivity on the P-V graph of the PV panel.</p>
Full article ">Figure 2
<p>Flowchart of the IncCon algorithm.</p>
Full article ">Figure 3
<p>PO MPPT flowchart [<a href="#B37-energies-18-00233" class="html-bibr">37</a>].</p>
Full article ">Figure 4
<p>Fuzzy system [<a href="#B42-energies-18-00233" class="html-bibr">42</a>].</p>
Full article ">Figure 5
<p>Fuzzification process [<a href="#B43-energies-18-00233" class="html-bibr">43</a>].</p>
Full article ">Figure 6
<p>Fuzzy logic algorithm flow chart.</p>
Full article ">Figure 7
<p>FLC is based on the proposed method [<a href="#B44-energies-18-00233" class="html-bibr">44</a>,<a href="#B45-energies-18-00233" class="html-bibr">45</a>].</p>
Full article ">Figure 8
<p>Block diagram of the implementation.</p>
Full article ">Figure 9
<p>MATLAB editor view of a fuzzy logic simulation of the implementation.</p>
Full article ">Figure 10
<p>Input and output membership functions used for FLC.</p>
Full article ">Figure 11
<p>Voltage, current, temperature, and irradiation graphs of the PV system.</p>
Full article ">Figure 12
<p>MATLAB/Simulink simulation study of PV system with fuzzy logic-controlled MPPT.</p>
Full article ">Figure 13
<p>MATLAB/Simulink simulation study of FLC.</p>
Full article ">Figure 14
<p>The voltage of the PV system and FLC-controlled boost converter output voltage.</p>
Full article ">Figure 15
<p>The FLC-controlled boost converter output voltage.</p>
Full article ">Figure 16
<p>The current of the PV system and the FLC-controlled boost converter output current.</p>
Full article ">Figure 17
<p>Power generated from the PV module and fuzzy logic-controlled boost output power.</p>
Full article ">Figure 18
<p>Incoming PV panel irradiation and FLC-controlled boost output power.</p>
Full article ">Figure 19
<p>PV system voltage and IncCon-controlled boost output voltage.</p>
Full article ">Figure 20
<p>PV system current and IncCon-controlled boost output current.</p>
Full article ">Figure 21
<p>PV system-generated power and IncCon-controlled boost converter output power.</p>
Full article ">Figure 22
<p>Incoming PV panel irradiation and the IncCon-controlled boost output power.</p>
Full article ">
16 pages, 648 KiB  
Article
Parallelizing the Computation of Grid Resistance to Measure the Strength of Skyline Tuples
by Davide Martinenghi
Algorithms 2025, 18(1), 29; https://doi.org/10.3390/a18010029 - 7 Jan 2025
Viewed by 174
Abstract
Several indicators have been recently proposed for the measurement of various characteristics of the tuples of a dataset—particularly the so-called skyline tuples, i.e., those that are not dominated by other tuples. Numeric indicators are very important as they may, e.g., provide an additional [...] Read more.
Several indicators have been recently proposed for the measurement of various characteristics of the tuples of a dataset—particularly the so-called skyline tuples, i.e., those that are not dominated by other tuples. Numeric indicators are very important as they may, e.g., provide an additional criterion to be used to rank skyline tuples and focus on a subset thereof. We focus on an indicator of robustness that may be measured for any skyline tuple t: the grid resistance, i.e., how large-value perturbations can be tolerated for t to remain non-dominated (and thus in the skyline). The computation of this indicator typically involves one or more rounds of computation of the skyline itself or, at least, of dominance relationships. Building on recent advances in partitioning strategies allowing the parallel computation of skylines, we discuss how these strategies can be adapted to the computation of the indicator. Full article
(This article belongs to the Special Issue Surveys in Algorithm Analysis and Complexity Theory, Part II)
Show Figures

Figure 1

Figure 1
<p>Partitioning strategies illustrated on a uniform dataset.</p>
Full article ">Figure 2
<p>Number of dominance tests incurred by the various partitioning strategies with a default number of partitions (<math display="inline"><semantics> <mrow> <mi>p</mi> <mo>=</mo> <mn>16</mn> </mrow> </semantics></math>) and varying dataset sizes on <tt>ANT</tt> (<b>a</b>) and <tt>UNI</tt> (<b>b</b>).</p>
Full article ">Figure 3
<p>Number of dominance tests with a default number of partitions (<math display="inline"><semantics> <mrow> <mi>p</mi> <mo>=</mo> <mn>16</mn> </mrow> </semantics></math>) as the number of dimensions varies on <tt>ANT</tt> (<b>a</b>) and <tt>UNI</tt> (<b>b</b>) datasets with <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math> M tuples.</p>
Full article ">Figure 4
<p>Number of dominance tests as the number of partitions varies on <tt>ANT</tt> (<b>a</b>) and <tt>UNI</tt> (<b>b</b>) 3D datasets with <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math> M tuples.</p>
Full article ">Figure 5
<p>Number of dominance tests with a default number of representatives (<math display="inline"><semantics> <mrow> <mi>r</mi> <mi>e</mi> <mi>p</mi> <mo>=</mo> <mn>16</mn> </mrow> </semantics></math>) as the number of partitions varies on <tt>ANT</tt> (<b>a</b>) and <tt>UNI</tt> (<b>b</b>) 3D datasets with <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math> M tuples.</p>
Full article ">Figure 6
<p>Number of dominance tests with real datasets.</p>
Full article ">Figure 7
<p>Execution times on <tt>ANT</tt> (<b>a</b>) and <tt>RES</tt> (<b>b</b>) as the number of cores varies.</p>
Full article ">
45 pages, 1879 KiB  
Review
Glial Perturbation in Metal Neurotoxicity: Implications for Brain Disorders
by Olayemi K. Ijomone, Ileje I. Ukwubile, Vivian O. Aneke, Tobiloba S. Olajide, Happiness O. Inyang, Omolabake I. Omotosho, Toheeb O. Oyerinde, Victor E. Anadu, Tolulope J. Gbayisomore, Oritoke M. Okeowo, David A. Oyeniran, Olumide A. T. Ogundahunsi and Omamuyovwi M. Ijomone
Neuroglia 2025, 6(1), 4; https://doi.org/10.3390/neuroglia6010004 - 6 Jan 2025
Viewed by 382
Abstract
Overexposure of humans to heavy metals and essential metals poses a significant risk for the development of neurological and neurodevelopmental disorders. The mechanisms through which these metals exert their effects include the generation of reactive oxygen species, mitochondrial dysfunction, activation of inflammatory pathways, [...] Read more.
Overexposure of humans to heavy metals and essential metals poses a significant risk for the development of neurological and neurodevelopmental disorders. The mechanisms through which these metals exert their effects include the generation of reactive oxygen species, mitochondrial dysfunction, activation of inflammatory pathways, and disruption of cellular signaling. The function of glial cells in brain development and in the maintenance of homeostasis cannot be overlooked. The glial cells are particularly susceptible to metal-induced neurotoxicity. Accumulation of metals in the brain promotes microglial activation, triggering inflammatory responses that can coincide with other mechanisms of neurotoxicity, inducing alteration in synaptic transmission, cognitive deficit, and neuronal damage. In this review, we highlighted the role of glial dysfunction in some selected neurodegenerative diseases and neurodevelopmental disorders. We further dive into how exposure to metals such as nickel, manganese, methyl mercury, cadmium, iron, arsenic, and lead affect the functions of the microglia, astrocytes, and oligodendrocytes and the mechanisms through which they exert the effects on the brain in relation to some selected neurodegenerative diseases and neurodevelopmental disorders. Potential therapeutic interventions such as the use of new and improved chelating agents and antioxidant therapies might be a significant approach to alleviating these metal-induced glial perturbations. Full article
Show Figures

Figure 1

Figure 1
<p>The schematic diagram illustrates the interaction between the brain and metal, leading to an array of neurotoxic effects, including oxidative stress, mitochondrial dysfunction, inflammation, synaptic alteration, abnormal neurotransmitters, DNA damage, and apoptosis, which are prominent mechanisms in the pathogenesis of neurodegenerative and neurodevelopmental disorders.</p>
Full article ">Figure 2
<p>A schematic diagram showing the major pathway of metal entry through the brain via inhalation (nose), dermal absorption (skin), and ingestion (gastrointestinal tract) as infection causes tight junctions and blood–brain barrier permeation, leading to susceptibility to cytokine release causing neuroinflammation and the production of reactive oxygen species that further exacerbate damage to the blood–brain barrier. The transport of specific metals through the blood–brain barrier is facilitated through transporter-mediated pathways and adsorptive-mediated transcytosis.</p>
Full article ">Figure 3
<p>Biochemical interactions of metals with glia. Metal accumulation in the glia perturbs cellular homeostasis by mediating oxidative stress, hence triggering immune responses, including the release of antioxidant and pro-inflammatory cytokines.</p>
Full article ">
17 pages, 3390 KiB  
Article
Artificial Intelligence-Driven Modeling for Hydrogel Three-Dimensional Printing: Computational and Experimental Cases of Study
by Harbil Bediaga-Bañeres, Isabel Moreno-Benítez, Sonia Arrasate, Leyre Pérez-Álvarez, Amit K. Halder, M. Natalia D. S. Cordeiro, Humberto González-Díaz and José Luis Vilas-Vilela
Polymers 2025, 17(1), 121; https://doi.org/10.3390/polym17010121 - 6 Jan 2025
Viewed by 389
Abstract
Determining the values of various properties for new bio-inks for 3D printing is a very important task in the design of new materials. For this purpose, a large number of experimental works have been consulted, and a database with more than 1200 bioprinting [...] Read more.
Determining the values of various properties for new bio-inks for 3D printing is a very important task in the design of new materials. For this purpose, a large number of experimental works have been consulted, and a database with more than 1200 bioprinting tests has been created. These tests cover different combinations of conditions in terms of print pressure, temperature, and needle values, for example. These data are difficult to deal with in terms of determining combinations of conditions to optimize the tests and analyze new options. The best model demonstrated a specificity (Sp) of 88.4% and a sensitivity (Sn) of 86.2% in the training series while achieving an Sp of 85.9% and an Sn of 80.3% in the external validation series. This model utilizes operators based on perturbation theory to analyze the complexity of the data. For comparative purposes, neural networks have been used, and very similar results have been obtained. The developed tool could easily be applied to predict the properties of bioprinting assays in silico. These findings could significantly improve the efficiency and accuracy of predictive models in bioprinting without resorting to trial-and-error tests, thereby saving time and funds. Ultimately, this tool may help pave the way for advances in personalized medicine and tissue engineering. Full article
(This article belongs to the Section Polymer Physics and Theory)
Show Figures

Figure 1

Figure 1
<p>Comparison of sensitivity (Sn) and specificity (Sp) for the training and validation sets after bootstrapping with increasing training iterations. (<b>A</b>) Results for the IFPTML-LDA model; (<b>B</b>) results for the IFPTML-DTC model.</p>
Full article ">Figure 2
<p>(<b>A</b>). Structure of the IFPTML-DTC model, showing all nodes and leaves with indicative classification colors. The branches highlight the different families differentiated in the model. (<b>B</b>). Simplified schematic of the main families identified, highlighting the key groupings obtained in the model.</p>
Full article ">Figure 3
<p>Distribution of the properties measured in each family, showing the variability and range of values observed within each identified group.</p>
Full article ">Figure 4
<p>Architecture of the IFPTML-DEEP-ANN neural network with 16:16-64-32-32-32-1:1 configuration, showing the arrangement of layers and neurons in the model.</p>
Full article ">Figure 5
<p>Evolution of the loss value as a function of the number of epochs during model training.</p>
Full article ">Figure 6
<p>(<b>A</b>). ChiMA 3D-printed scaffold. (<b>B</b>). Three-dimensional-printed scaffold by ChiMA + PEGDA. Both images show the structures of the bioprinted scaffolds, highlighting the differences in the composition and morphology of the materials used.</p>
Full article ">
22 pages, 4065 KiB  
Article
Inertial Memory Effects in Molecular Transport Across Nanoporous Membranes
by Slobodanka Galovic, Milena Čukić and Dalibor Chevizovich
Membranes 2025, 15(1), 11; https://doi.org/10.3390/membranes15010011 - 6 Jan 2025
Viewed by 314
Abstract
Nanoporous membranes are heterogeneous structures, with heterogeneity manifesting at the microscale. In examining particle transport through such media, it has been observed that this transport deviates from classical diffusion, as described by Fick’s second law. Moreover, the classical model is physically unsustainable, as [...] Read more.
Nanoporous membranes are heterogeneous structures, with heterogeneity manifesting at the microscale. In examining particle transport through such media, it has been observed that this transport deviates from classical diffusion, as described by Fick’s second law. Moreover, the classical model is physically unsustainable, as it is non-causal and predicts an infinite speed of concentration perturbation propagation through a substantial medium. In this work, we have derived two causal models as extensions of Fick’s second law, where causality is linked to the effects of inertial memory in the nanoporous membrane. The results of the derived models have been compared with each other and with those obtained from the classical model. It has been demonstrated that both causal models, one with exponentially fading inertial memory and the other with power-law fading memory, predict that the concentration perturbation propagates as a damped wave, leading to an increased time required for the cumulative amount of molecules passing through the membrane to reach a steady state compared to the classical model. The power-law fading memory model predicts a longer time required to achieve a stationary state. These findings have significant implications for understanding cell physiology, developing drug delivery systems, and designing nanoporous membranes for various applications. Full article
(This article belongs to the Section Membrane Fabrication and Characterization)
Show Figures

Figure 1

Figure 1
<p>The geometry of the problem.</p>
Full article ">Figure 2
<p>Spectral functions of the normalized profile of particle concentrations within the membrane. The parameters used are <math display="inline"><semantics> <mrow> <msub> <mi>τ</mi> <mrow> <mn>00</mn> </mrow> </msub> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>ν</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>τ</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math> s. The (<b>a</b>) classical, (<b>b</b>) exponentially fading memory, and (<b>c</b>) power-law fading memory model.</p>
Full article ">Figure 3
<p>The spectral function of back-side flux calculated by the classical model (green line), the exponentially fading memory model (blue line), and the power-law fading memory model (red line). The parameters used in calculation are <math display="inline"><semantics> <mrow> <msub> <mi>τ</mi> <mrow> <mn>00</mn> </mrow> </msub> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>ν</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>τ</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math> s.</p>
Full article ">Figure 4
<p>The normalized cumulative amount of particles delivered from the thin nanoporous membrane (Equations (58)–(60)). The calculation parameters are <span class="html-italic">a</span> = 1, <span class="html-italic">b</span> = 1. Red line:-classical model, blue line- exponentially fading memory model, green line-power-law fading memory model.</p>
Full article ">Figure 5
<p>The normalized cumulative amount of particles delivered from the thin nanoporous membrane. The calculation parameters are <span class="html-italic">a</span> = 1, <span class="html-italic">b</span> = 1 (blue line), <span class="html-italic">b</span> = 2 (magenta line), and <span class="html-italic">b</span> = 3 (yellow line). The green line is the result of the power-law fading memory model. The red line is the result of the classical model.</p>
Full article ">Figure 6
<p>The normalized cumulative amount of particles delivered from thin nanoporous membrane. The calculation parameters are <span class="html-italic">a</span> = 1, <span class="html-italic">b</span> = 0.1 (blue line), <span class="html-italic">b</span> = 0.5 (magenta line), <span class="html-italic">b</span> = 1 (yellow line). The green line is the result of the power-law fading memory model. The red line is the result of the classical model.</p>
Full article ">Figure 7
<p>The normalized cumulative amount of particles delivered from the thin nanoporous membrane. The calculation parameters are <span class="html-italic">b</span> = 1, <span class="html-italic">a</span> = 1 (full lines), and <span class="html-italic">a</span> = 2 (dot lines). Red lines illustrate the results of the classical model, blue lines are the results of the exponentially fading memory model, and green lines are the results of the power-law fading memory model if <math display="inline"><semantics> <mrow> <mi>υ</mi> <mo>=</mo> <mn>0</mn> </mrow> </semantics></math>.</p>
Full article ">
21 pages, 1074 KiB  
Article
G&G Attack: General and Geometry-Aware Adversarial Attack on the Point Cloud
by Geng Chen, Zhiwen Zhang, Yuanxi Peng, Chunchao Li and Teng Li
Appl. Sci. 2025, 15(1), 448; https://doi.org/10.3390/app15010448 - 6 Jan 2025
Viewed by 228
Abstract
Deep neural networks have been shown to produce incorrect predictions when imperceptible perturbations are introduced into the clean input. This phenomenon has garnered significant attention and extensive research in 2D images. However, related work on point clouds is still in its infancy. Current [...] Read more.
Deep neural networks have been shown to produce incorrect predictions when imperceptible perturbations are introduced into the clean input. This phenomenon has garnered significant attention and extensive research in 2D images. However, related work on point clouds is still in its infancy. Current methods suffer from issues such as generated point outliers and poor attack generalization. Consequently, it is not feasible to rely solely on overall or geometry-aware attacks to generate adversarial samples. In this paper, we integrate adversarial transfer networks with the geometry-aware method to introduce adversarial loss into the attack target. A state-of-the-art autoencoder is employed, and sensitivity maps are utilized. We use the autoencoder to generate a sufficiently deceptive mask that covers the original input, adjusting the critical subset through a geometry-aware trick to distort the point cloud gradient. Our proposed approach is quantitatively evaluated in terms of the attack success rate (ASR), imperceptibility, and transferability. Compared to other baselines on ModelNet40, our method demonstrates an approximately 38% improvement in ASR for black-box transferability query attacks, with an average query count of around 7.84. Comprehensive experimental results confirm the superiority of our method. Full article
Show Figures

Figure 1

Figure 1
<p>A geometry-aware attack typically commences by extracting pivotal contours using specialized techniques. Subsequently, these contours undergo targeted Adam. Following this, they are concatenated with non-pivotal points, undergoing multiple rounds of iteration to yield adversarial samples.</p>
Full article ">Figure 2
<p>The G&amp;G attack combines the advantages of geometry-aware techniques and autoencoders. (<b>A</b>) It reconstructs the target using a revised autoencoder. (<b>B</b>) Point cloud sensitivity maps are leveraged to extract critical subsets. (<b>C</b>) Global perturbations are acquired and adversarial samples are refined through the surrogate and test classifiers, employing both classification loss and distance loss. (<b>D</b>) Simba, based on gradients, curvature, and normal vectors, enhances the perturbations with Gaussian random masking and then generates adversarial samples iteratively.</p>
Full article ">Figure 3
<p>We employ a four-layer Set Abstraction (SA) to extract point cloud local features. In each layer, points are sampled and grouped by spheres of varying diameters.</p>
Full article ">Figure 4
<p>Our autoencoder initially applies a single LBR to the features obtained from CIC (<math display="inline"><semantics> <mrow> <msub> <mi>N</mi> <mn>1</mn> </msub> <mo>×</mo> <msub> <mi>C</mi> <mn>1</mn> </msub> </mrow> </semantics></math>), SA (<math display="inline"><semantics> <mrow> <msub> <mi>N</mi> <mn>2</mn> </msub> <mo>×</mo> <msub> <mi>C</mi> <mn>1</mn> </msub> </mrow> </semantics></math>), and PCT (<math display="inline"><semantics> <mrow> <msub> <mi>N</mi> <mn>3</mn> </msub> <mo>×</mo> <msub> <mi>C</mi> <mn>1</mn> </msub> </mrow> </semantics></math>) individually, followed by reshaping the features. The merged features yield <math display="inline"><semantics> <mrow> <msub> <mi>N</mi> <mn>4</mn> </msub> <mo>×</mo> <mi>C</mi> </mrow> </semantics></math> features, where <math display="inline"><semantics> <mrow> <msub> <mi>N</mi> <mn>4</mn> </msub> <mo>=</mo> <msub> <mi>N</mi> <mn>1</mn> </msub> <mo>+</mo> <msub> <mi>N</mi> <mn>2</mn> </msub> <mo>+</mo> <msub> <mi>N</mi> <mn>3</mn> </msub> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <msub> <mi>C</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>1024</mn> </mrow> </semantics></math>. We construct the decoder using a partially frozen feedforward neural network. The target size is <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>×</mo> <mi>C</mi> <mo>,</mo> <mi>C</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p>Visualizing the overall transferability of L3A-Attack (<b>left</b>), AdvPC (<b>middle</b>), and G&amp;G attack (<b>right</b>). Elements in the same row correspond to attacks using the same surrogate network, while elements in the same column correspond to the networks to which the attacks are transferred. Since each attack is optimized on the surrogate network it is transferred to, values on the diagonal tend to be larger. For clarity, brighter elements indicate better transferability. We observe that G&amp;G attack exhibits higher transferability compared to the others. The transferability score under each matrix is the average of all values within it, providing a summary of the overall transferability of these attacks.</p>
Full article ">Figure 6
<p>In comparison to AdvPC, the G&amp;G attack curve shows a more rapid increase, leveling off after 100 iterations. Furthermore, our method achieves better performance in terms of ASR.</p>
Full article ">Figure 7
<p>In our comparison with AdvPC regarding imperceptibility using different criteria, such as <math display="inline"><semantics> <msub> <mi>L</mi> <mn>2</mn> </msub> </semantics></math>, CD, and HD, we found that our method outperforms AdvPC between 200 and 500 iterations. Although our approach requires slightly more queries than AdvPC, this number gradually decreases as the iteration rounds increase. Considering both ASR and imperceptibility, we conclude that around 300 iterations are optimal.</p>
Full article ">Figure 8
<p>Visual comparisons of different methods. × represents attack failure, indicating the classification model correctly identifies the point cloud; indicates attack success, indicating that the classification model fails the point cloud.</p>
Full article ">Figure 8 Cont.
<p>Visual comparisons of different methods. × represents attack failure, indicating the classification model correctly identifies the point cloud; indicates attack success, indicating that the classification model fails the point cloud.</p>
Full article ">
28 pages, 1842 KiB  
Review
The Role of Neglected Grain Legumes in Food and Nutrition Security and Human Health
by Busisiwe Vilakazi, Paramu L. Mafongoya, Alfred O. Odindo and Mutondwa M. Phophi
Sustainability 2025, 17(1), 350; https://doi.org/10.3390/su17010350 - 6 Jan 2025
Viewed by 455
Abstract
Increasing demand for nutritious, safe, and healthy food, including the need to preserve biodiversity and other resources, signifies a prodigious challenge for agriculture, which is already at risk from climate change. Diverse and healthy plant-based diets may significantly reduce food insecurity, malnutrition, diet-related [...] Read more.
Increasing demand for nutritious, safe, and healthy food, including the need to preserve biodiversity and other resources, signifies a prodigious challenge for agriculture, which is already at risk from climate change. Diverse and healthy plant-based diets may significantly reduce food insecurity, malnutrition, diet-related diseases, and other health-related issues. More attention to agricultural systems diversity is mandatory to improve the economic, environmental, ecological, and social sustainability of food production in developing countries. In this context, neglected legume production could significantly provide nutritional and healthy benefits for people while adhering to sustainability principles. However, the contribution of neglected legumes to food and nutrition security is still limited due to socio-economic challenges faced by farmers that contribute to the underutilization of neglected legumes, leading to overreliance on a few legumes with poor resilience to climatic perturbations, thus posing a risk to sustainable food production. While major legumes offer higher economic returns and more developed value chains, they also contribute to environmental degradation and resource depletion. Neglected legumes, on the other hand, provide ecosystem services, promote biodiversity, and offer climate resilience but face economic challenges due to limited market demand and underdeveloped value chains. Consequently, food nutritional insecurity and human health concerns remain prevalent, especially in developing countries. There is an urgent need to promote neglected legumes in agricultural systems through policy change implementation, genetic improvement, and development, fostering international cooperation to share knowledge, technologies, and best practices in the production and utilization of neglected legumes. This review comprehensively explores the utility of neglected legumes for food, nutritional security, and human health. It identifies knowledge gaps that should be prioritized as part of research strategies for sustainable future food systems in sub-Saharan Africa. Full article
Show Figures

Figure 1

Figure 1
<p>Images of neglected legumes (Pictures no. (<b>A</b>–<b>F</b>)); Source [<a href="#B22-sustainability-17-00350" class="html-bibr">22</a>].</p>
Full article ">Figure 2
<p>Potential scope of neglected legumes’ inclusion into cropping systems.</p>
Full article ">Figure 3
<p>Bambara groundnut leading producers and annual production [<a href="#B29-sustainability-17-00350" class="html-bibr">29</a>].</p>
Full article ">
18 pages, 5863 KiB  
Article
Dung Beetle Optimization Algorithm Based on Improved Multi-Strategy Fusion
by Rencheng Fang, Tao Zhou, Baohua Yu, Zhigang Li, Long Ma and Yongcai Zhang
Electronics 2025, 14(1), 197; https://doi.org/10.3390/electronics14010197 - 5 Jan 2025
Viewed by 440
Abstract
The Dung Beetle Optimization Algorithm (DBO) is characterized by its great convergence accuracy and quick convergence speed. However, like other swarm intelligent optimization algorithms, it also has the disadvantages of having an unbalanced ability to explore the world and to use local resources, [...] Read more.
The Dung Beetle Optimization Algorithm (DBO) is characterized by its great convergence accuracy and quick convergence speed. However, like other swarm intelligent optimization algorithms, it also has the disadvantages of having an unbalanced ability to explore the world and to use local resources, as well as being prone to settling into local optimal search in the latter stages of optimization. In order to address these issues, this research suggests a multi-strategy fusion dung beetle optimization method (MSFDBO). To enhance the quality of the first solution, the refractive reverse learning technique expands the algorithm search space in the first stage. The algorithm’s accuracy is increased by adding an adaptive curve to control the dung beetle population size and prevent it from reaching a local optimum. In order to improve and balance local exploitation and global exploration, respectively, a triangle wandering strategy and a fusion subtractive averaging optimizer were later added to Rolling Dung Beetle and Breeding Dung Beetle. Individual beetles will congregate at the current optimal position, which is near the optimal value, during the last optimization stage of the MSFDBO; however, the current optimal value could not be the global optimal value. Thus, to variationally perturb the global optimal solution (so that it leaps out of the local optimal solution in the final optimization stage of the MSFDBO) and to enhance algorithmic performance (generally and specifically, in the effect of optimizing the search), an adaptive Gaussian–Cauchy hybrid variational perturbation factor is introduced. Using the CEC2017 benchmark function, the MSFDBO’s performance is verified by comparing it to seven different intelligence optimization algorithms. The MSFDBO ranks first in terms of average performance. The MSFDBO can lower the labor and production expenses associated with welding beam and reducer design after testing two engineering application challenges. When it comes to lowering manufacturing costs and overall weight, the MSFDBO outperforms other swarm intelligence optimization methods. Full article
Show Figures

Figure 1

Figure 1
<p>Refractive inverse learning schematics.</p>
Full article ">Figure 2
<p>MSFDBO algorithm flowchart.</p>
Full article ">Figure 3
<p>CEC2017 50 dimension average degree levels.</p>
Full article ">Figure 4
<p>CEC2017 100 dimension average degree levels.</p>
Full article ">Figure 5
<p>Average convergence curves of CEC2017 50-dimensional benchmarking functions.</p>
Full article ">Figure 5 Cont.
<p>Average convergence curves of CEC2017 50-dimensional benchmarking functions.</p>
Full article ">Figure 6
<p>Schematic of the welded beam (Above: Engineering drawing, Below: 3D).</p>
Full article ">Figure 7
<p>Schematic of the reducer design (<b>Right</b>: Engineering drawing, <b>Left</b>: 3D).</p>
Full article ">
19 pages, 4679 KiB  
Article
Development and Implementation of the MPPT Based on Incremental Conductance for Voltage and Frequency Control in Single-Stage DC-AC Converters
by Javier Alonso Ramírez Torres, Orlando Lastres Danguillecourt, Roberto Adrián González Domínguez, Guillermo Rogelio Ibáñez Duharte, Laura Elena Verea Valladares, Joel Pantoja Enríquez, Jesús Antonio Enríquez Santiago, Andrés López López and Antonio Verde Añorve
Energies 2025, 18(1), 184; https://doi.org/10.3390/en18010184 - 4 Jan 2025
Viewed by 412
Abstract
This paper presents the design, simulation, and experimental evaluation of a low-cost, fixed-step MPPT algorithm based on the incremental conductance technique for operation in a low-power photovoltaic (PV) system with a full-bridge DC-AC converter. The performance of the MPPT algorithm was improved by [...] Read more.
This paper presents the design, simulation, and experimental evaluation of a low-cost, fixed-step MPPT algorithm based on the incremental conductance technique for operation in a low-power photovoltaic (PV) system with a full-bridge DC-AC converter. The performance of the MPPT algorithm was improved by selecting an appropriate fixed perturbation step size and frequency, ensuring efficient power tracking. The implementation was further optimized by restructuring the conventional algorithm and adapting the DC-AC converter control parameters, which enhanced overall performance and optimized coupling for AC loads. The simulation was performed in Simulink/Matlab with a 560 Wp PV system and a resistive load, under variable irradiation conditions. The perturbation step size was set to 1%, and the perturbation frequency ranged between 2 Hz and 15 Hz, with the converter output at 60 Hz. Experimentally, it was validated at an irradiance of 1000 W/m2 and an ambient temperature of 45 °C. The algorithm achieved simulation efficiencies of up to 98.93% and an average experimental efficiency of 96.76%. The response time improved by 86% with a perturbation frequency of 15 Hz. This developed MPPT algorithm demonstrates its reliability, accuracy, and feasibility for implementation. Full article
(This article belongs to the Special Issue Energy, Electrical and Power Engineering: 3rd Edition)
Show Figures

Figure 1

Figure 1
<p>P-V curve of a photovoltaic module at different irradiance levels.</p>
Full article ">Figure 2
<p>Basic classification of tracking techniques [<a href="#B3-energies-18-00184" class="html-bibr">3</a>].</p>
Full article ">Figure 3
<p>Diagram of the standalone photovoltaic system under study.</p>
Full article ">Figure 4
<p>Equivalent electrical circuit of a photovoltaic panel [<a href="#B1-energies-18-00184" class="html-bibr">1</a>,<a href="#B2-energies-18-00184" class="html-bibr">2</a>,<a href="#B3-energies-18-00184" class="html-bibr">3</a>].</p>
Full article ">Figure 5
<p>Conventional incremental conductance algorithm [<a href="#B6-energies-18-00184" class="html-bibr">6</a>].</p>
Full article ">Figure 6
<p>Diagram of the developed MPPT.</p>
Full article ">Figure 7
<p>System modeled in Simulink.</p>
Full article ">Figure 8
<p>System response under variable irradiance profile and different perturbation frequencies.</p>
Full article ">Figure 9
<p>Power response with MPPT at a perturbation frequency of 15 Hz under dynamic irradiance conditions.</p>
Full article ">Figure 10
<p>Dynamic system response to a sudden decrease in irradiance from 1000 W/m<sup>2</sup> to 500 W/m<sup>2</sup> at a perturbation frequency of 15 Hz.</p>
Full article ">Figure 11
<p>Dynamic system response to a sudden increase in irradiance from 500 W/m<sup>2</sup> to 800 W/m<sup>2</sup> at a perturbation frequency of 15 Hz.</p>
Full article ">Figure 12
<p>Dynamic response of the DC bus in terms of power, voltage, current, and modulation index under transient conditions.</p>
Full article ">Figure 13
<p>Dynamic response of the inverter output in terms of ac power, voltage, current, and modulation index under transient conditions.</p>
Full article ">Figure 14
<p>Experimental setup.</p>
Full article ">Figure 15
<p>Power of the photovoltaic array during stage 1 of evaluation.</p>
Full article ">Figure 16
<p>Experimental result of the N-INC during stage 2 of the evaluation.</p>
Full article ">
24 pages, 19474 KiB  
Article
HPM-Match: A Generic Deep Learning Framework for Historical Landslide Identification Based on Hybrid Perturbation Mean Match
by Shuhao Ran, Gang Ma, Fudong Chi, Wei Zhou and Yonghong Weng
Remote Sens. 2025, 17(1), 147; https://doi.org/10.3390/rs17010147 - 3 Jan 2025
Viewed by 344
Abstract
The scarcity of high-quality labeled data poses a challenge to the application of deep learning (DL) in landslide identification from remote sensing (RS) images. Semi-supervised learning (SSL) has emerged as a promising approach to address the issue of low accuracy caused by the [...] Read more.
The scarcity of high-quality labeled data poses a challenge to the application of deep learning (DL) in landslide identification from remote sensing (RS) images. Semi-supervised learning (SSL) has emerged as a promising approach to address the issue of low accuracy caused by the limited availability of high-quality labels. Nevertheless, the application of SSL approaches developed for natural images to landslide identification encounters several challenges. This study focuses on two specific challenges: inadequate information extraction from limited unlabeled RS landslide images and the generation of low-quality pseudo-labels. To tackle these challenges, we propose a novel and generic DL framework called hybrid perturbation mean match (HPM-Match). The framework combines dual-branch input perturbation (DIP) and independent triple-stream perturbation (ITP) techniques to enhance model accuracy with limited labels. The DIP generation approach is designed to maximize the utilization of manually pre-defined perturbation spaces while minimizing the introduction of erroneous information during the weak-to-strong consistency learning (WSCL) process. Moreover, the ITP structure unifies input, feature, and model perturbations, thereby broadening the perturbation space and enabling knowledge extraction from unlabeled landslide images across various perspectives. Experimental results demonstrate that HPM-Match has substantial improvements in IoU, with maximum increases of 26.68%, 7.05%, and 12.96% over supervised learning across three datasets with the same label ratio and reduces the number of labels by up to about 70%. Furthermore, HPM-Match strikes a better balance between precision and recall, identifying more landslides than other state-of-the-art (SOTA) SSL approaches. Full article
(This article belongs to the Section AI Remote Sensing)
Show Figures

Figure 1

Figure 1
<p>Different learning styles for landslide identification: (<b>a</b>) supervised learning; (<b>b</b>) semi-supervised learning.</p>
Full article ">Figure 2
<p>Comparison of (<b>a</b>) RS images of landslides and (<b>b</b>) natural images.</p>
Full article ">Figure 3
<p>Visualization DEM of landslide damage through unsuitable data augmentation strategies, (<b>a</b>–<b>c</b>) are the original data and (<b>d</b>–<b>g</b>) are the contour lines generated based on DEM after data augmentation. (<b>a</b>) Image; (<b>b</b>) label; (<b>c</b>) original contour line; (<b>d</b>) color jitter; (<b>e</b>) CutMix; (<b>f</b>) invert; (<b>g</b>) cutout.</p>
Full article ">Figure 4
<p>The architecture of the proposed generic semi-supervised learning framework HPM-Match.</p>
Full article ">Figure 5
<p>Overview of the proposed dual-branch input perturbation (DIP) generation approach.</p>
Full article ">Figure 6
<p>The geographical locations of study areas and example image and the corresponding visual interpretation: (<b>a</b>) study area; (<b>b</b>) Bijie landslide dataset; (<b>c</b>) Nepal landslide dataset; and (<b>d</b>) Sichuan landslide and debris flow disaster dataset.</p>
Full article ">Figure 7
<p>Typical visual results of landslide identification on the Bijie dataset: (<b>a</b>) input image; (<b>b</b>) label; (<b>c</b>) SL; (<b>d</b>) Mean Teacher; (<b>e</b>) UniMatch; (<b>f</b>) U<sup>2</sup>PL; (<b>g</b>) HPM-Match.</p>
Full article ">Figure 8
<p>Typical visual results of landslide identification on the Nepal dataset: (<b>a</b>) input image; (<b>b</b>) label; (<b>c</b>) SL; (<b>d</b>) Mean Teacher; (<b>e</b>) UniMatch; (<b>f</b>) U<sup>2</sup>PL; (<b>g</b>) HPM-Match.</p>
Full article ">Figure 9
<p>Typical visual results of landslide identification on the Sichuan dataset: (<b>a</b>) input image; (<b>b</b>) label; (<b>c</b>) SL; (<b>d</b>) Mean Teacher; (<b>e</b>) UniMatch; (<b>f</b>) U<sup>2</sup>PL; (<b>g</b>) HPM-Match.</p>
Full article ">Figure 10
<p>Performance metrics under different perturbations.</p>
Full article ">Figure 11
<p>Typical activation map results of landslide identification using the Bijie dataset. (<b>a</b>) Input image; (<b>b</b>) label; (<b>c</b>) F0-M0-I0; (<b>d</b>) F1-M0-I0; (<b>e</b>) F0-M1-I0; (<b>f</b>) F0-M0-I1; (<b>g</b>) F2-M0-I0; (<b>h</b>) F0-M0-I2; (<b>i</b>) F2-M1-I2; (<b>j</b>) F3-M1-I2; (<b>k</b>) F2-M1-I3.</p>
Full article ">Figure 12
<p>Performance metrics of final loss with different loss weights in the 2% labeled Bijie dataset.</p>
Full article ">Figure 13
<p>Landslide images processed by extra SDA. (<b>a</b>) Original image; (<b>b</b>) label; (<b>c</b>) channel shuffle; (<b>d</b>) Gaussian noise; (<b>e</b>) invert; (<b>f</b>) CutOut; (<b>g</b>) RGBShift.</p>
Full article ">Figure 14
<p>Performance metrics of SDA and DEM ablation experiments using the Bijie dataset.</p>
Full article ">Figure 15
<p>Computational load comparisons between HPM-Match, SL, and SOTA methods on the Bijie datasets: (<b>a</b>) 2% label ratio; (<b>b</b>) 6% label ratio; and (<b>c</b>) 30% label ratio.</p>
Full article ">
24 pages, 4092 KiB  
Article
Improvement of Dung Beetle Optimization Algorithm Application to Robot Path Planning
by Kezhen Liu, Yongqiang Dai and Huan Liu
Appl. Sci. 2025, 15(1), 396; https://doi.org/10.3390/app15010396 - 3 Jan 2025
Viewed by 360
Abstract
We propose the adaptive t-distribution spiral search Dung Beetle Optimization (TSDBO) Algorithm to address the limitations of the vanilla Dung Beetle Optimization Algorithm (DBO), such as vulnerability to local optima, weak convergence speed, and poor convergence accuracy. Specifically, we introduced an improved Tent [...] Read more.
We propose the adaptive t-distribution spiral search Dung Beetle Optimization (TSDBO) Algorithm to address the limitations of the vanilla Dung Beetle Optimization Algorithm (DBO), such as vulnerability to local optima, weak convergence speed, and poor convergence accuracy. Specifically, we introduced an improved Tent chaotic mapping-based population initialization method to enhance the distribution quality of the initial population in the search space. Additionally, we employed a dynamic spiral search strategy during the reproduction phase and an adaptive t-distribution perturbation strategy during the foraging phase to enhance global search efficiency and the capability of escaping local optima. Experimental results demonstrate that TSDBO exhibits significant improvements in all aspects compared to other modified algorithms across 12 benchmark tests. Furthermore, we validated the practicality and reliability of TSDBO in robotic path planning applications, where it shortened the shortest path by 5.5–7.2% on a 10 × 10 grid and by 11.9–14.6% on a 20 × 20 grid. Full article
Show Figures

Figure 1

Figure 1
<p>Logistic chaotic mapping.</p>
Full article ">Figure 2
<p>Tent chaotic mapping.</p>
Full article ">Figure 3
<p>Improved Tent chaotic mapping.</p>
Full article ">Figure 4
<p>Algorithm flowchart.</p>
Full article ">Figure 5
<p>Iteration convergence curve for different strategies and improved algorithm.</p>
Full article ">Figure 6
<p>Number of occurrences of the optimal indicator for each algorithm.</p>
Full article ">Figure 7
<p>Iteration convergence curve of various algorithms.</p>
Full article ">Figure 7 Cont.
<p>Iteration convergence curve of various algorithms.</p>
Full article ">Figure 8
<p>Processed raster map.</p>
Full article ">Figure 9
<p>Robot movement direction.</p>
Full article ">Figure 10
<p>The 10 × 10 map path planning shortest path map.</p>
Full article ">Figure 11
<p>Convergence curve of 10 × 10 map path planning.</p>
Full article ">Figure 12
<p>The 20 × 20 map path planning shortest path map.</p>
Full article ">Figure 13
<p>Convergence curve of 20 × 20 map path planning.</p>
Full article ">
20 pages, 4570 KiB  
Article
Transferable Targeted Adversarial Attack on Synthetic Aperture Radar (SAR) Image Recognition
by Sheng Zheng, Dongshen Han, Chang Lu, Chaowen Hou, Yanwen Han, Xinhong Hao and Chaoning Zhang
Remote Sens. 2025, 17(1), 146; https://doi.org/10.3390/rs17010146 - 3 Jan 2025
Viewed by 293
Abstract
Deep learning models have been widely applied to synthetic aperture radar (SAR) target recognition, offering end-to-end feature extraction that significantly enhances recognition performance. However, recent studies show that optical image recognition models are widely vulnerable to adversarial examples, which fool the models by [...] Read more.
Deep learning models have been widely applied to synthetic aperture radar (SAR) target recognition, offering end-to-end feature extraction that significantly enhances recognition performance. However, recent studies show that optical image recognition models are widely vulnerable to adversarial examples, which fool the models by adding imperceptible perturbation to the input. Although the targeted adversarial attack (TAA) has been realized in the white box setup with full access to the SAR model’s knowledge, it is less practical in real-world scenarios where white box access to the target model is not allowed. To the best of our knowledge, our work is the first to explore transferable TAA on SAR models. Since contrastive learning (CL) is commonly applied to enhance a model’s generalization, we utilize it to improve the generalization of adversarial examples generated on a source model to unseen target models in the black box scenario. Thus, we propose the contrastive learning-based targeted adversarial attack, termed CL-TAA. Extensive experiments demonstrated that our proposed CL-TAA can significantly improve the transferability of adversarial examples to fool the SAR models in the black box scenario. Full article
Show Figures

Figure 1

Figure 1
<p>Illustration of traditional contrastive learning (CL) and our proposed contrastive learning-based targeted adversarial attack (CL-TAA). There are two main differences between traditional CL and our method. First, traditional CL aims to improve the model’s generalization to hard samples, while our CL-TAA focuses on enhancing the generalization of adversarial examples across different black box models. Another difference is that traditional CL is typically used during the pre-training stage, whereas our CL-TAA is applied during the training.</p>
Full article ">Figure 2
<p>SAR images for ten classes in MSTAR dataset and their corresponding optical images.</p>
Full article ">Figure 3
<p>Targeted transfer success rates (%) on different models.</p>
Full article ">Figure 4
<p>Visualization of the heatmap for different models.</p>
Full article ">Figure 5
<p>Visualization of logits used for CL-TAA.</p>
Full article ">Figure 6
<p>Adversarial examples generated by CL-TAA.</p>
Full article ">Figure 7
<p>Effect of the number of iterations. We report the results of different iterations under the black box setting by using AMS-CNN as the source model.</p>
Full article ">
Back to TopTop