ISSN:2349-2058
S.No. | Title & Authors | Page No | View | ||
1 |
Title : Large Vision-Language Models for Industrial Anomaly Detection: A Comprehensive Survey Authors : Ze Gao, Mengxue Wang
Abstract :
Industrial Anomaly Detection (IAD) plays a critical role in quality control and manufacturing efficiency across various industries. Recent advancements in Large Vision-Language Models (LVLMs) have introduced new paradigms for addressing the challenges in IAD, overcoming limitations of traditional approaches. This survey provides a comprehensive review of the integration of LVLMs with IAD, analyzing their evolution, methodologies, and applications. We systematically categorize existing approaches into three main frameworks: traditional anomaly detection, zero-shot methods, and LVLM-based solutions. We examine how these models leverage multimodal capabilities to enhance anomaly detection, reasoning, and explanation in industrial settings. Furthermore, we compare the performance of various methods across standard benchmarks, discuss current challenges, and highlight promising future research directions. Our findings indicate that LVLM-based approaches offer significant advantages in terms of flexibility, interpretability, and generalization capabilities, particularly in scenarios with limited anomaly samples and complex industrial environments. |
1-6 |
![]() |
||
2 |
Title : Art Meets Algorithms: A Systematic Review of Text-Guided Stylized Image Synthesis Authors : Xinyue Sun
Abstract :
This survey reviews the current state of text-driven stylized image generation, tracing its evolution from classical neural style transfer and GAN-based approaches to modern diffusion models and CLIP-guided techniques.We first introduce the key challenges—maintaining semantic fidelity while imposing artistic style—and the core paradigms: neural style transfer (NST), generative adversarial networks (GANs), diffusion models, and CLIP-based guidance. Next, we examine representative methods in each category, highlighting innovations in one-shot stylization, dual-control frameworks, and modality fusion. We then discuss evaluation protocols, covering both quality metrics and emerging benchmarks for stylization consistency and user control. Finally, we outline open problems, including computational efficiency, data biases, and multimodal conditioning, and propose promising future directions such as unified architectures, real-time streaming stylization, and ethical considerations. |
7-9 |
![]() |
||
3 |
Title : Super-Resolution Network Based On Spatial and Frequency Domains for Multi-Contrast Magnetic Resonance Imaging Authors : Ying Li
Abstract :
Magnetic Resonance Imaging(MRI) has a wide range of applications in the medical field, such as diagnosis, treatment, pathological research,etc.However,due to hardware limitations, obtaining high-quality MR images is often challeng ing in clinical practice. Therefore, reconstructing high-quality MRimages through partial images has important significance in medical research. Existing super-resolution methods usually use multi-contrast MRI to reconstruct MR images. However, existing methods usually use single-scale MR images for reconstruction and do not combine with the specificity of MR images. To address this issue, we propose a multi-scale feature transfer network(SFSR) based on spatial and frequency domains, which comprises four components, including the shallow feature extrac tor, and the Multi-Scale Frequency Attention Block(MFAB), and the Multi-Scale Spatial Attention Block(MSAB), and the Multi Scale Fusion Block(MSFB).Firstly, we utilize the shallow feature extractor to extract features at three scales from both the target and reference images. These features are then separately fed into the Multi-Scale Frequency Attention Block and the Multi-Scale Spatial Attention Block to align the features. Finally, the Multi Scale Fusion Block are employed to fuse the aligned features across different scales.Extensive experiments on IXI and FastMRI datasets show that SFSR achieves the most competitive results over state-of-the-art approaches. |
10-16 |
![]() |
||
4 |
Title : Research on Identity Authentication and Privacy Protection Mechanisms for IoMT Authors : Chenchen Wang
Abstract :
With the rapid advancement of Medical Internet of Things (IoMT) technology, the interconnectivity of medical devices and data sharing have greatly enhanced smart healthcare. However, these developments also introduce critical security challenges, including data privacy breaches, inefficient identity authentication, and coarse-grained access control. To address the privacy preservation and secure authentication requirements for multi-stakeholder collaboration in medical ecosystems, this paper proposes a secure IoMT architecture that integrates multi-layered privacy protection mechanisms with lightweight authentication. The architecture aims to enable trusted data sharing, fine-grained access control, and efficient identity verification. This study focuses on two key contributions:(1) Lightweight Batch Verification Algorithm Using Schnorr Digital Signatures: A bidirectional identity authentication mechanism between sensor nodes and mobile terminals is developed. This mechanism ensures data integrity while substantially reducing computational overhead. (2) Local Differential Privacy Protection for Medical Data Sharing: To mitigate privacy leakage risks during data sharing, a privacy-preserving framework is designed. By strategically injecting calibrated noise into medical datasets, individual privacy is preserved without compromising data utility. This approach balances personalized privacy requirements with analytical validity, effectively preventing inference-based privacy attacks. |
17-23 |
![]() |
||
5 |
Title : Research on Mixed Flow Workshop Scheduling Problem Based on Improved Subtractive Average Optimizer Algorithm Authors : Changxing Li, Shuaihang Wang, Pengliang Zhao
Abstract :
The Hybrid Flow-Shop Scheduling Problem (HFSP) is a pivotal challenge in the intelligent transformation of manufacturing, where efficient solutions are critical for enhancing production efficiency and resource utilization. However, traditional swarm intelligence algorithms for solving HFSP often exhibit weaknesses in global search capabilities, susceptibility to local optima, and insufficient convergence efficiency to meet practical scheduling demands. Furthermore, complex constraints in real industrial scenarios—such as dynamic variations in manual operation times and split orders—have not been adequately modeled, resulting in a significant gap between theoretical research and engineering applications. To address these limitations, this study conducts research from both theoretical optimization and engineering adaptation perspectives.For the classic HFSP with the objective of minimizing makespan, an Improved Subtraction-Average-Based Optimizer (ISABO) is proposed. This algorithm integrates a simulated annealing perturbation mechanism and a subgroup learning strategy. The simulated annealing perturbation enhances global search capabilities by probabilistically accepting inferior solutions during iterations, thereby avoiding local optima. Concurrently, the subgroup learning strategy guides partial populations toward optimal solutions, improving solution quality. The research follows a progression from "basic problem optimization" to "real-world scenario adaptation." Experiments are conducted using production data from a paint roller manufacturing plant, with three widely-used HFSP algorithms—Genetic Algorithm (GA), Whale Optimization Algorithm (WOA), and Grey Wolf Optimizer (GWO)—selected as benchmarks. For the classic HFSP, ISABO achieves shorter makespan than all baseline algorithms in 100% of test instances and demonstrates the highest stability (measured by standard deviation) in 61.11% of cases . |
24-29 |
![]() |
||
6 |
Title : Optimization of Storage Location Allocation in Automated Warehouses Based on an Improved Spider Wasp Optimization Algorithm Authors : Shuaihang WANG, Changxing LI
Abstract :
Automated storage and retrieval systems (AS/RS) have been widely adopted in modern logistics systems due to their high space utilization efficiency and intelligent management capabilities. However, traditional storage location assignment strategies often fail to adequately consider factors such as rack stability, stacker crane energy consumption, and operational time, leading to reduced warehousing efficiency. Therefore, optimizing warehouse operational efficiency has become a key research focus. This study addresses the storage location assignment problem (SLAP) in AS/RS, aiming to optimize rack stability, stacker crane energy consumption, and operational time. An improved spider wasp optimization algorithm (SWOA) is proposed to solve this optimization problem. First, Gaussian chaotic mapping is employed to enhance initial population diversity, improving the algorithm's global search capability. Second, an adaptive weight-based Gaussian disturbance strategy is introduced to refine the population update mechanism, thereby enhancing convergence accuracy. Finally, an opposition-based learning elite retention strategy is adopted to strengthen the preservation of global optimal solutions. Experimental results demonstrate that the proposed method significantly improves the optimization performance of storage location assignment. |
30-35 |
![]() |
||
7 |
Title : The Evolution of Searchable Encryption Technology and Security Challenges in the Post Quantum Era Authors : Jialong Shi, Ze Wang
Abstract :
Searchable encryption (SE) enables secure retrieval over encrypted data, balancing privacy and usability in cloud storage. This paper reviews SE's evolution, contrasting symmetric (SSE) and asymmetric (ASE/PEKS) models, and summarizes breakthroughs in dynamic data support, multi-keyword search, and leakage resilience. Current challenges include efficiency in complex queries, dynamic scenario adaptability, and quantum threats. Future directions focus on lightweight protocols, post-quantum designs (e.g., lattice-based cryptography), and integration with blockchain/homomorphic encryption to advance privacy-preserving frameworks. This work provides critical insights for SE's development in the post-quantum era. |
36-38 |
![]() |
||
8 |
Title : Adaptive Super-twisting Integral Terminal Sliding Mode Control Design for Quadrotors Authors : Qianyu Feng
Abstract :
In this study, a novel adaptive hyper-spiral integral terminal sliding mode control (ASTITSMC) algorithm was designed. No prior knowledge of the boundary and gradient of the disturbance was required. The dynamic gain ensured robustness against external disturbances, reduced the chattering of the control input, and effectively suppressed the chattering. The designed sliding surface combines the non-singular terminal sliding mode and integral sliding mode, solving the singularity problem existing in traditional terminal sliding mode control and achieving global non-singular control of the system. By introducing an integral term on the sliding surface, all moments of the sliding control are in a stable state, not only ensuring the global asymptotic stability of the system, but also effectively avoiding the chattering phenomenon caused by high-frequency switching control. Finally, simulation experiments and result analysis were conducted for the adaptive hyper-spiral using integral terminal sliding mode (ASTLSMC) and terminal sliding mode (ASTTSMC). ASTITSMC has smaller steady-state error, faster response speed, and more accurate trajectory tracking ability compared to ASTLSMC and ASTTSMC algorithms, and performs better in reducing the chattering phenomenon in the control process. |
39-45 |
![]() |
||
9 |
Title : Improved Zebra Optimization Algorithm with Multi-Strategy Fusion Authors : Wenhan Luo, Pengliang Zhao
Abstract :
Although the Zebra Optimization Algorithm (ZOA) has the advantages of fewer parameters and easy implementation, its premature convergence and tendency to fall into local optima limit its practical applications. To address these issues, this paper proposes a multi-strategy improved Zebra Optimization Algorithm (IZOA). Firstly, a longitudinal-transverse crossover strategy is integrated to enable multi-dimensional information interaction within the population, enhancing global search capabilities in complex solution spaces. Secondly, a nonlinear dynamic scaling factor is designed to balance exploration and exploitation through an adaptive step-size adjustment mechanism. Additionally, a lens imaging reverse learning strategy is introduced to expand the search scope by generating reverse solutions based on optical imaging principles. Finally, 13 standard benchmark functions are utilized to comprehensively evaluate the improved IZOA, the original ZOA, the Whale Optimization Algorithm (WOA), and the Golden Jackal Optimization (GJO) algorithm. Experimental results demonstrate that IZOA outperforms the other three algorithms in terms of convergence speed and global search capability. |
46-50 |
![]() |
||
10 |
Title : Deep Learning for Image Aesthetic Assessment: A Comprehensive Survey Authors : Guangao Wang
Abstract :
Image aesthetic evaluation aims to automatically predict the aesthetic quality of an image or people's aesthetic preferences through computers. With the development of deep learning, this field has made remarkable progress in the past decade. This paper systematically reviews the image aesthetic evaluation methods based on deep learning, including task definition, common datasets, model method classification, loss function and evaluation metrics, as well as current challenges and future development directions. We discuss the early methods of using convolutional neural networks (CNNs) for aesthetic rating classification/regression, as well as improved methods that integrate multi-task learning, attention mechanisms, image semantic understanding, and contrastive learning. At the same time, we introduce recent new methods based on the Transformer architecture (such as ViT, CLIP, etc.), and compare the differences between end-to-end training and feature fusion strategies. Finally, the challenges faced by this field (such as aesthetic subjectivity, cross-domain generalization, user personalization, multimodal fusion, etc.) and future development trends are discussed. |
51-56 |
![]() |
||
11 |
Title : Research on Application of Improved Nutcracker Optimization Algorithm in Cloud Computing Task Scheduling Authors : Pengliang Zhao, Wenhan Luo, Changxing Li
Abstract :
The rise of cloud computing has completely transformed the architecture and operation mode of traditional IT infrastructure, and task scheduling algorithms play a crucial role in this process. An excellent task scheduling algorithm can ensure the efficient and stable operation of cloud computing systems, enhance user experience, and maximize the economic benefits of service providers. This paper addresses the issues of uneven heterogeneous resource load and insufficient resource utilization in cloud task scheduling. By taking task completion time, load balance degree, and resource waste as optimization objectives, this paper improves the recently proposed Nutcracker Optimization Algorithm (NOA) and creatively applies it to the cloud task scheduling scenario to improve the scheduling efficiency of cloud computing systems. This paper proposes an Improved Nutcracker Optimization Algorithm with Adaptive Chaotic Strategy (INOACS). By introducing random reverse learning, elite pool selection, and non-exclusive local search strategies, the quality of solutions is improved, and the local exploitation and global search capabilities are enhanced, avoiding the algorithm falling into local optima. To address the problems of uneven initial population distribution and the difficulty in balancing global search and local exploitation, chaotic mapping initialization and an adaptive α parameter based on population diversity are introduced, further improving the convergence speed and optimization ability of the algorithm. A scheduling model with task completion time, load balance degree, and resource waste as optimization objectives is constructed based on INOACS. Simulation experiments verify the good performance of the INOACS algorithm under different task scalesand numbers of virtual machines. |
57-61 |
![]() |