NeurocomputingPub Date : 2025-10-18DOI: 10.1016/j.neucom.2025.131785
Qin Han , Li Jin , Nan Li , Hui Shi , Xiaoyin Nie , Gang Xie , Haifeng Yang
{"title":"DSRJR: A monitoring substitution framework via dual-stream reconstruction and joint representation for fault diagnosis","authors":"Qin Han , Li Jin , Nan Li , Hui Shi , Xiaoyin Nie , Gang Xie , Haifeng Yang","doi":"10.1016/j.neucom.2025.131785","DOIUrl":"10.1016/j.neucom.2025.131785","url":null,"abstract":"<div><div>Rotary machinery functions in harsh environments and is susceptible to failure, so dependable fault diagnosis methods are essential to ensure equipment safety. Most existing methods assume that the sensor types of inputs are consistent in the training and testing datasets. However, in practice, sensor failure or the lack of corresponding sensors installed on the equipment can cause the model to fail due to incomplete input information, which ultimately leads to monitoring interruption. Therefore, developing an effective diagnostic knowledge transfer mechanism is essential. To address fault monitoring interruptions caused by the absence of the single sensor, this study proposes a monitoring substitution framework via dual-stream reconstruction and joint representation for fault diagnosis. Dual-stream joint alignment framework (DSJA) designs unique feature extraction models according to the characteristics of each signal, and introduces locality-sensitive latent diffusion space (LSLDS) for feature reconstruction. Building on this foundation, joint representation of feature consistency and domain invariance is developed to effectively map and align feature spaces across different modalities. The monitoring-substitution of the two signals is validated using gradient-based class activation map (Grad-CAM) visualization, and the diagnostic and monitoring-substitution performance of the proposed method is assessed across four scenarios. Compared with existing methods, the proposed approach demonstrates superior fault diagnosis and monitoring-substitution capabilities.</div></div>","PeriodicalId":19268,"journal":{"name":"Neurocomputing","volume":"659 ","pages":"Article 131785"},"PeriodicalIF":6.5,"publicationDate":"2025-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145326701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Learning on RISC-V Platforms at the Edge: A Perspective on the Hardware and Software Support","authors":"Giovanni Agosta, Andrea Galimberti, Davide Zoni","doi":"10.1145/3772277","DOIUrl":"https://doi.org/10.1145/3772277","url":null,"abstract":"The growing demand for always-on intelligence in resource-constrained devices makes edge deployment of deep learning both a necessity and a challenge, requiring platforms that combine efficiency, scalability, and flexibility. RISC-V has emerged as the de facto standard architecture for modern computing platforms at the edge tasked with deep-learning workloads, a trend reinforced by the increasing availability of commercial solutions tailored for inference. This survey delivers a structured taxonomy of the hardware architectures for deep learning at the edge, classified according to how they process data in parallel, represent data, and optimize data movement and whether they implement an application-specific design, and of the supporting software tools, ranging from hardware-software co-design approaches to autotuning and compiler frameworks. Finally, it identifies a set of key findings and outlines the most promising directions for research in the field.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"26 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145314775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"JDExtractor: an automated approach for efficient extraction of defect-related methods in Java projects","authors":"Tianyang Liu, Jiawei Ye, Weixing Ji","doi":"10.1007/s10515-025-00563-z","DOIUrl":"10.1007/s10515-025-00563-z","url":null,"abstract":"<div><p>High-quality repositories containing real-world defects are essential for developing defect-related algorithms. Although plenty of defect repositories exist, they often fail to capture the context of inter-procedural defects, which include all methods in the propagation path from the defect-source method to the defect-triggering method. This limitation is particularly critical for the Null Pointer Exception (NPE), a common defect that often propagates across multiple methods in Java systems. To address this problem, we propose a novel and automatic approach, called <i>JDExtractor</i>, to extract defect-related methods from real applications. The main challenge is how to identify all defect-related methods efficiently and accurately. <i>JDExtractor</i> tackles this challenge by constructing a method-level data graph using the principle of Java type compatibility and simplifying the data graph using filtering criteria. Data flow analysis helps construct a coarse-grained method-level data graph, which reflects the potential patterns of inter-procedural data interaction, thereby ensuring analysis efficiency. Afterward, filtering analysis simplifies the data graph based on the propagation properties of inter-procedural defects, thus ensuring analysis accuracy. Evaluation results suggest that both the static slicing tool WALA and the dynamic slicing tool Slicer4J yield several false positives, whereas <i>JDExtractor</i> successfully extracts defect-related methods and defect propagation paths with fewer false positives in a short time. Moreover, <i>JDExtractor</i> has been applied to open source projects on GitHub, ultimately extracting defect-related methods for 67 defects from 319 compiled open source applications.</p></div>","PeriodicalId":55414,"journal":{"name":"Automated Software Engineering","volume":"33 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2025-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145316538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interference Cancelation in Massive MIMO Wireless Communication Systems Using the Kronecker Product–Constrained Least-Mean-Square Algorithm and Adaptive Kalman Filtering","authors":"Neeraj Kumar, Priyesh Tiwari, Subodh Kumar Tripathi","doi":"10.1002/dac.70296","DOIUrl":"https://doi.org/10.1002/dac.70296","url":null,"abstract":"<div>\u0000 \u0000 <p>A wireless communication system relies on wireless technology to transmit and receive information over a distance without the need for physical connections such as cables or wires. However, interference poses a significant challenge in such systems, occurring when multiple transmitters and receivers operate in the same frequency band. This interference hampers communication efficiency and necessitates sophisticated signal-processing techniques for mitigation. Interference cancelation techniques, particularly in Massive MIMO wireless communication systems, play a crucial role in reducing the impact of interference caused by multiple transmissions from different users. This paper proposes the utilization of the Kronecker product-constrained least-mean-square (KCLMS) algorithm to nullify interference and employs the adaptive Kalman filtering approach to further minimize interference effects. Simulation results demonstrate that the proposed KCLMS + adaptive Kalman method achieves superior performance, with an RMSE of 0.045, PCC of 0.980, and SIR of 32.0 dB, outperforming transformer, DNN, CNN-LSTM, and traditional filtering methods. Additionally, it exhibits high performance-to-cost efficiency with moderate computational time (0.84 ms per iteration) and memory usage (13.5 MB), making it a practical solution for efficient, interference-resilient wireless communications. Performance validation is conducted using subjective tests, with evaluation metrics like Pearson correlation coefficient (PCC) and root mean square error (RMSE) to demonstrate the improved outcome. The proposed methodology aims to be beneficial for wireless networks providing communication services.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"38 17","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145317610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Andres Diaz-Pace, Daniele Di Pompeo, Michele Tucci
{"title":"On the role of search budgets in model-based software refactoring optimization","authors":"J. Andres Diaz-Pace, Daniele Di Pompeo, Michele Tucci","doi":"10.1007/s10515-025-00564-y","DOIUrl":"10.1007/s10515-025-00564-y","url":null,"abstract":"<div><p>Software model optimization is a process that automatically generates design alternatives aimed at improving quantifiable non-functional properties of software systems, such as performance and reliability. Multi-objective evolutionary algorithms effectively help designers identify trade-offs among the desired non-functional properties. To reduce the use of computational resources, this work examines the impact of implementing a search budget to limit the search for design alternatives. In particular, we analyze how time budgets affect the quality of Pareto fronts by utilizing quality indicators and exploring the structural features of the generated design alternatives. This study identifies distinct behavioral differences among evolutionary algorithms when a search budget is implemented. It further reveals that design alternatives generated under a budget are structurally different from those produced without one. Additionally, we offer recommendations for designers on selecting algorithms in relation to time constraints, thereby facilitating the effective application of automated refactoring to improve non-functional properties.</p></div>","PeriodicalId":55414,"journal":{"name":"Automated Software Engineering","volume":"33 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2025-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s10515-025-00564-y.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145316541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"M3IF-(SWT-TVC): Multi-Modal Medical Image Fusion via Weighted Energy, Contrast in the SWT Domain, and Total Variation Minimization With Chambolle's Algorithm","authors":"Prabhishek Singh, Manoj Diwakar","doi":"10.1002/ima.70222","DOIUrl":"https://doi.org/10.1002/ima.70222","url":null,"abstract":"<div>\u0000 \u0000 <p>The multi-modal medical image fusion (M3IF) combines the required and important information from different medical imaging modalities (computed tomography [CT], magnetic resonance imaging (MRI), positron emission tomography [PET], and single photon emission computed tomography [SPECT]) to provide single informative image. M3IF provides enhanced patient diagnosis, and precise treatment planning. This paper proposes a hybrid <i>M3IF</i> where input medical images are decomposed using stationary wavelet transform (SWT) into low-frequency components (LFCs) and high-frequency components (HFCs). The LFCs and HFCs are fused using energy- and contrast-based metrics. And later reconstruction is performed using inverse SWT (ISWT). The total variation minimization (TVM) using Chambolle's algorithm is applied as a post-refinement operation to reduce noise and preserves the fine details. In this paper, the proposed methodology is termed as M3IF-(SWT-TVC), Here, the acronym TVC is the combination of TVM using Chambolle's algorithm. TVM refinement process is an iterative approach, with the fusion outcomes of M3IF-(SWT-TVC) assessed over a predefined 100 iterations. The TVM, and SWT are blended to balance smoothness and structural details. The final fusion results obtained through M3IF-(SWT-TVC) are evaluated against several prominent non-traditional methods. Based on both visual quality and quantitative metric analysis, it is observed that M3IF-(SWT-TVC) outperforms all the methods used for comparison.</p>\u0000 </div>","PeriodicalId":14027,"journal":{"name":"International Journal of Imaging Systems and Technology","volume":"35 6","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145317671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human-Robot Interaction: Integrating BCI-Controlled Virtual Robotic Arm With Manual Control in VR Environment","authors":"Jian Teng, Sukyoung Cho, Shaw-mung Lee","doi":"10.1002/cav.70072","DOIUrl":"https://doi.org/10.1002/cav.70072","url":null,"abstract":"<div>\u0000 \u0000 <p>This study presents a novel tri-manual interaction framework that enables users to control two physical hands via VR controllers and a virtual robotic arm through a hybrid brain-computer interface (32-channel EEG and eye-tracking). The virtual robotic arm, implemented as a 6-DOF industrial manipulator in Unity, is controlled through simplified BCI commands: forward/backward movement along the z-axis based on motor imagery strength, with automatic grasping triggered by sustained attention thresholds. Twenty-five participants completed 30 trials, each following a 60-s protocol with five phases: rest, target presentation, preparation, execution, and feedback. Results demonstrated that the hybrid BCI system achieved superior performance compared to EEG-only control: 8.5% improvement in task success rate, 34.5% increase in positioning accuracy, and 46.2% reduction in cognitive load. The CNN-LSTM architecture achieved 86.3% motor imagery classification accuracy. Learning effects were observed within trials, with performance plateauing after 3.8 ± 0.7 attempts. Time-frequency analysis revealed hierarchical neural coordination mechanisms underlying the tri-manual control. This research validates the feasibility of augmented manipulation in virtual environments, establishing a foundation for advanced human-robot collaboration in animation and VR applications.</p>\u0000 </div>","PeriodicalId":50645,"journal":{"name":"Computer Animation and Virtual Worlds","volume":"36 5","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145317760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey of Threshold Signatures: NIST Standards, Post-Quantum Cryptography, Exotic Techniques, and Real-World Applications","authors":"Kiarash Sedghighadikolaei, Attila Altay Yavuz","doi":"10.1145/3772274","DOIUrl":"https://doi.org/10.1145/3772274","url":null,"abstract":"Threshold digital signatures enable a distributed execution of signature functionalities and will play a crucial role in the security of emerging decentralized next-generation networked systems and applications. In this paper, we provide a comprehensive and systematic survey of threshold and distributed signatures with advanced features. Our survey encompasses threshold signatures in conventional and post-quantum cryptography (PQC) settings and captures custom-design and standard signatures (e.g., conventional NIST and NIST-PQC). We examine both generic (via secure multi-party computation) and custom thresholding techniques for a myriad of signature families while investigating exotic signatures, real-life applications, and potential future research directions.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"16 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145314776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel coverage path planning method based on shrink-wrapping technique for autonomous inspection of complex structures using unmanned aerial vehicle","authors":"Burak Kaleci, Gulin Elibol Secil, Sezgin Secil, Zühal Kartal, Metin Ozkan","doi":"10.1016/j.rcim.2025.103149","DOIUrl":"https://doi.org/10.1016/j.rcim.2025.103149","url":null,"abstract":"The inspection of large-scale structures can be challenging, time-consuming, costly, and dangerous. Autonomous robotic systems can provide an effective solution for performing such tasks by overcoming the negative aspects. In this paper, we present a novel coverage path planning method for complete sensor scanning of the outer surface of complex structures using an unmanned aerial vehicle (UAV) with a depth camera. The proposed method introduces a new approach by applying the shrink-wrapping technique to construct a 3D triangular mesh representing the structure's surface boundary. Viewpoints are then generated based on this mesh. Additionally, the triangles within the depth camera's field of view for each viewpoint are determined. The set covering problem (SCP) accepts the set of triangles covered by each viewpoint and reduces the number of viewpoints to decrease the flight distance and time. Finally, the coverage route that includes all the selected viewpoints is defined as the solution to the traveling salesman problem (TSP). We conduct extensive experiments to demonstrate the effectiveness of the proposed method across three different large-scale structures. The results show the validity and effectiveness of the proposed method.","PeriodicalId":21452,"journal":{"name":"Robotics and Computer-integrated Manufacturing","volume":"113 1 1","pages":""},"PeriodicalIF":10.4,"publicationDate":"2025-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145314952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Danial Iqbal Tan Muhammad Hakimi Tan, Xiao Jian Tan, Li Li Lim, Khairul Shakir Ab Rahman, Joseph Jiun Wen Siet
{"title":"A systematic review of semantic segmentation methods for histopathology images: a focused survey on breast, colon, and prostate cancers","authors":"Danial Iqbal Tan Muhammad Hakimi Tan, Xiao Jian Tan, Li Li Lim, Khairul Shakir Ab Rahman, Joseph Jiun Wen Siet","doi":"10.1007/s10489-025-06906-3","DOIUrl":"10.1007/s10489-025-06906-3","url":null,"abstract":"<div><p>Cancer, a non-communicable disease in which abnormal cells grow uncontrollably, harms and disrupts normal body functions, often leading to severe health complications and, if untreated, can be fatal. Amongst the non-communicable cancers, breast, colon, and prostate cancer are found to be prevalent as one of the top-ranking cancers recognized by the World Health Organization (WHO). Semantic segmentation is one of the useful methods widely used in histopathology segmentation and was found superior typically in digital pathology for grading purposes. Here, this study aims to provide a comprehensive systematic review, offering a broad overview of different semantic segmentation methods, focusing on breast, colon, and prostate cancers by using histopathology images. This study is meant to review research articles from the past decade: 2015–2024 compliant with the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guideline. Based on the proposed search strategy, a total of 43 articles were included for synthesis activity. The findings from this study reveal patterns, networks, relationships, and trends in the methods of semantic segmentation in breast, colon, and prostate cancers in the past decade. The findings of this study could be valuable for both the research community and medical service providers. They offer insights into the progress and trends of semantic segmentation in breast, colon, and prostate cancers over the past decade. At the same time, the study helps identify research gaps, potential markets, and key advantages, while also highlighting future possibilities. Ultimately, it contributes to ongoing research by either deepening or broadening the understanding of this important topic.</p></div>","PeriodicalId":8041,"journal":{"name":"Applied Intelligence","volume":"55 16","pages":""},"PeriodicalIF":3.5,"publicationDate":"2025-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145316472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}