[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (4,608)

Search Parameters:
Keywords = accessibility of solution

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
13 pages, 270 KiB  
Review
History of Biological Databases, Their Importance, and Existence in Modern Scientific and Policy Context
by Mikołaj Danielewski, Marlena Szalata, Jan Krzysztof Nowak, Jarosław Walkowiak, Ryszard Słomski and Karolina Wielgus
Genes 2025, 16(1), 100; https://doi.org/10.3390/genes16010100 (registering DOI) - 18 Jan 2025
Abstract
With the development of genome sequencing technologies, the amount of data produced has greatly increased in the last two decades. The abundance of digital sequence information (DSI) has provided research opportunities, improved our understanding of the genome, and led to the discovery of [...] Read more.
With the development of genome sequencing technologies, the amount of data produced has greatly increased in the last two decades. The abundance of digital sequence information (DSI) has provided research opportunities, improved our understanding of the genome, and led to the discovery of new solutions in industry and medicine. It has also posed certain challenges, i.e., how to store and handle such amounts of data. This, coupled with the need for convenience, international cooperation, and the possibility of independent validation, has led to the establishment of numerous databases. Spearheaded with the idea that data obtained with public funds should be available to the public, open access has become the predominant mode of accession. However, the increasing popularity of commercial genetic tests brings back the topic of data misuse, and patient’s privacy. At the previous United Nations Biodiversity Conference (COP15, 2022), an issue of the least-developed countries exploiting their natural resources while providing DSI and the most-developed countries benefitting from this was raised. It has been proposed that financial renumeration for the data could help protect biodiversity. With the goal of introducing the topic to those interested in utilizing biological databases, in this publication, we present the history behind the biological databases, their necessity in today’s scientific world, and the issues that concern them and their content, while providing scientific and policy context in relation to United Nations Biodiversity Conference (COP16, 21.10—1.11.24). Full article
(This article belongs to the Section Bioinformatics)
21 pages, 1338 KiB  
Article
LiveDrive AI: A Pilot Study of a Machine Learning-Powered Diagnostic System for Real-Time, Non-Invasive Detection of Mild Cognitive Impairment
by Firas Al-Hindawi, Peter Serhan, Yonas E. Geda, Francis Tsow, Teresa Wu and Erica Forzani
Bioengineering 2025, 12(1), 86; https://doi.org/10.3390/bioengineering12010086 (registering DOI) - 17 Jan 2025
Viewed by 168
Abstract
Alzheimer’s disease (AD) represents a significant global health issue, affecting over 55 million individuals worldwide, with a progressive impact on cognitive and functional abilities. Early detection, particularly of mild cognitive impairment (MCI) as an indicator of potential AD onset, is crucial yet challenging, [...] Read more.
Alzheimer’s disease (AD) represents a significant global health issue, affecting over 55 million individuals worldwide, with a progressive impact on cognitive and functional abilities. Early detection, particularly of mild cognitive impairment (MCI) as an indicator of potential AD onset, is crucial yet challenging, given the limitations of current diagnostic biomarkers and the need for non-invasive, accessible tools. This study aims to address these gaps by exploring driving performance as a novel, non-invasive biomarker for MCI detection. Using the LiveDrive AI system, equipped with multimodal sensing (MMS) technology and a driving performance assessment strategy, the proposed work analyzes the predictive capacity of driving patterns in indicating cognitive decline. Machine learning models, trained on an expert-annotated in-house dataset, were employed to detect MCI status from driving performance. Key findings demonstrate the feasibility of using nuanced driving features, such as velocity and acceleration during turning, as indicators of cognitive decline. This approach holds promise for integration into smartphone or car applications, enabling real-time, continuous cognitive health monitoring. The implications of this work suggest a transformative step towards scalable, real-world solutions for early AD diagnosis, with the potential to improve patient outcomes and disease management. Full article
(This article belongs to the Special Issue Applications of AI in Biomedical Engineering for Healthy Ageing)
22 pages, 3813 KiB  
Article
Addressing the Scientific Gaps Between Life Cycle Thinking and Multi-Criteria Decision Analysis for the Sustainability Assessment of Electric Vehicles’ Lithium-Ion Batteries
by Maria Tournaviti, Christos Vlachokostas, Alexandra V. Michailidou, Christodoulos Savva and Charisios Achillas
World Electr. Veh. J. 2025, 16(1), 44; https://doi.org/10.3390/wevj16010044 - 17 Jan 2025
Viewed by 424
Abstract
Electric vehicles can substantially lower the overall carbon footprint of the transportation sector, and their batteries become key enablers of widespread electrification. Although high capacity and efficiency are essential for providing sufficient range and performance in electric vehicles, they can be compromised by [...] Read more.
Electric vehicles can substantially lower the overall carbon footprint of the transportation sector, and their batteries become key enablers of widespread electrification. Although high capacity and efficiency are essential for providing sufficient range and performance in electric vehicles, they can be compromised by the need to lower costs and environmental impacts and retain valuable materials. In the present work, multi-criteria decision analysis was adopted to assess the sustainability of different lithium-ion batteries. Life cycle carbon emissions and toxicity, material criticality, life cycle costs, specific energy, safety, and durability were considered in the analysis as key parameters of the transition to electric mobility. A subjective approach was chosen for the weight attribution of the criteria. Although certain alternatives, like lithium nickel cobalt manganese oxide (NCM) and lithium nickel cobalt aluminum oxide (NCA), outweigh others in specific energy, they lack in terms of safety, material preservation, and environmental impact. Addressing cost-related challenges is also important for making certain solutions competitive and largely accessible. Overall, while technical parameters are crucial for the development of lithium-ion batteries, it is equally important to consider the environmental burden, resource availability, and economic factors in the design process, alongside social aspects such as the ethical sourcing of materials to ensure their sustainability. Full article
(This article belongs to the Special Issue Lithium-Ion Batteries for Electric Vehicle)
Show Figures

Figure 1

Figure 1
<p>Sustainability criteria considered for the assessment of different LIBs.</p>
Full article ">Figure 2
<p>Configuration of a pouch cell [<a href="#B21-wevj-16-00044" class="html-bibr">21</a>].</p>
Full article ">Figure 3
<p>Graphical representation of the pairwise comparisons in the questionnaire.</p>
Full article ">Figure 4
<p>Aggregation of individual judgments.</p>
Full article ">Figure 5
<p>Relative environmental impacts of the alternative LIBs. Abbreviations: LCO: lithium cobalt oxide; LFP: lithium iron phosphate; LMO: lithium manganese oxide; NCA: lithium nickel cobalt aluminum oxide; NCM: lithium nickel cobalt manganese oxide.</p>
Full article ">Figure 6
<p>Relative priorities of criteria and their sub-criteria as determined by the questionnaire.</p>
Full article ">Figure 7
<p>(<b>a</b>) Attributes of the alternatives. (<b>b</b>) Weighted attributes of the alternatives. Abbreviations: LCO: lithium cobalt oxide; LFP: lithium iron phosphate; LMO: lithium manganese oxide; NCA: lithium nickel cobalt aluminum oxide; NCM: lithium nickel cobalt manganese oxide.</p>
Full article ">Figure 8
<p>(<b>a</b>) Partial ranking of the alternatives according to PROMETHEE I. (<b>b</b>) Complete ranking of the alternatives according to PROMETHEE II. Abbreviations: LCO: lithium cobalt oxide; LFP: lithium iron phosphate; LMO: lithium manganese oxide; NCA: lithium nickel cobalt aluminum oxide; NCM: lithium nickel cobalt manganese oxide.</p>
Full article ">Figure 9
<p>Performance of the alternative technologies across all criteria defined by PROMETHEE. Abbreviations: LCO: lithium cobalt oxide; LFP: lithium iron phosphate; LMO: lithium manganese oxide; NCA: lithium nickel cobalt aluminum oxide; NCM: lithium nickel cobalt manganese oxide.</p>
Full article ">Figure 10
<p>Ranking of the alternatives through GAIA representation. Abbreviations: LCO: lithium cobalt oxide; LFP: lithium iron phosphate; LMO: lithium manganese oxide; NCA: lithium nickel cobalt aluminum oxide; NCM: lithium nickel cobalt manganese oxide.</p>
Full article ">Figure 11
<p>Stability level of the ranking against (<b>a</b>) specific energy and (<b>b</b>) residual value. Abbreviations: LCO: lithium cobalt oxide; LFP: lithium iron phosphate; LMO: lithium manganese oxide; NCA: lithium nickel cobalt aluminum oxide; NCM: lithium nickel cobalt manganese oxide.</p>
Full article ">
19 pages, 647 KiB  
Article
Adoption of Orange-Fleshed Sweetpotato (OFSP) Technologies in Southern Ethiopia
by Anbes Tenaye, Setegn Gebeyehu and Mihiretu Cherinet
Sustainability 2025, 17(2), 683; https://doi.org/10.3390/su17020683 - 16 Jan 2025
Viewed by 291
Abstract
Addressing malnutrition and vitamin A deficiency in Ethiopia necessitates innovative, food-based solutions such as biofortified crops. This study assesses the adoption rates of Orange-Fleshed Sweetpotato (OFSP) and examines the factors influencing adoption among project participants, non-participants, and counterfactual households in the former Southern [...] Read more.
Addressing malnutrition and vitamin A deficiency in Ethiopia necessitates innovative, food-based solutions such as biofortified crops. This study assesses the adoption rates of Orange-Fleshed Sweetpotato (OFSP) and examines the factors influencing adoption among project participants, non-participants, and counterfactual households in the former Southern Nations, Nationalities, and Peoples’ (SNNPs) region. Primary data were collected in 2023 through a survey of 990 households across six districts, and logistic regression was employed to identify key determinants of adoption. The findings reveal OFSP adoption rates of 53% among participants, 56% among non-participants, and 42% among counterfactual households, with significant variation across regions. Factors positively influencing adoption include household education, proximity to health centers and OFSP multiplication sites, frequent extension contact, and access to agricultural services. This study underscores the potential of newly released OFSP varieties to enhance food security and resilience in malnutrition-prone areas. The comparable adoption rates between participants and non-participants highlight significant spillover effects from long-term interventions, suggesting widespread community benefits. However, the limited adoption of complementary OFSP package components points to the need for enhanced training programs and streamlined technology dissemination strategies. These findings contribute to understanding how biofortified crops can be scaled effectively to improve food security and nutrition, offering valuable insights for policy and program design. Full article
Show Figures

Figure 1

Figure 1
<p>Geographic distribution of the study districts in the former SNNPs region, Ethiopia.</p>
Full article ">
18 pages, 608 KiB  
Systematic Review
Digital Interventions for the Rehabilitation of First-Episode Psychosis: An Integrated Perspective
by Annarita Vignapiano, Francesco Monaco, Ernesta Panarello, Stefania Landi, Benedetta Di Gruttola, Raffaele Malvone, Vassilis Martiadis, Fabiola Raffone, Alessandra Marenna, Maria Pontillo, Valeria Di Stefano, Martina D’Angelo, Luca Steardo and Giulio Corrivetti
Brain Sci. 2025, 15(1), 80; https://doi.org/10.3390/brainsci15010080 - 16 Jan 2025
Viewed by 487
Abstract
Background: The integration of digital health technologies has transformed mental healthcare, particularly for young adults with First-Episode Psychosis (FEP). Digital interventions, such as telepsychiatry and mobile applications, address barriers like social stigma, restricted access to services, and the urgency of timely care. Methods: [...] Read more.
Background: The integration of digital health technologies has transformed mental healthcare, particularly for young adults with First-Episode Psychosis (FEP). Digital interventions, such as telepsychiatry and mobile applications, address barriers like social stigma, restricted access to services, and the urgency of timely care. Methods: A systematic literature review was conducted using PubMed and APA PsycINFO. Included studies focused on randomized controlled trials, cohort studies, and open studies of digital interventions for FEP rehabilitation. Exclusion criteria included meta-analyses, reviews, and irrelevant studies. Results: Smartphone applications like Horyzons-Canada facilitated peer support and symptom management, while tools such as My Journey 3 emphasized the need for better user engagement. Digital innovations, including Cognitive Behavioral Therapy for insomnia (CBT-I) and telepsychiatry, demonstrated improvements in recovery and treatment adherence. Discussion: Digital interventions significantly enhance the accessibility and quality of FEP care, supporting functional recovery and patient engagement. Future research should prioritize longitudinal studies, user engagement strategies, and advanced analytics to develop personalized, scalable solutions. Full article
(This article belongs to the Special Issue Prediction and Prevention of Psychotic Disorders)
Show Figures

Figure 1

Figure 1
<p>PRISMA search process.</p>
Full article ">
19 pages, 2421 KiB  
Article
Antioxidant Particleboards Produced from Forest By-Products with Application in the Food Packaging Industry
by Raquel A. Fernandes, Nuno Ferreira, Sandro Lopes, Beatriz Freitas, Jorge Santos, Jorge M. Martins and Luisa H. Carvalho
Polymers 2025, 17(2), 216; https://doi.org/10.3390/polym17020216 - 16 Jan 2025
Viewed by 271
Abstract
The food packaging industry is one of the fastest growing sectors of our economy, with a large contribution to environmental concerns due to the extensive use of fossil-derived materials. Combining wood-based materials, such as particleboards, with bio-adhesives may offer a great opportunity to [...] Read more.
The food packaging industry is one of the fastest growing sectors of our economy, with a large contribution to environmental concerns due to the extensive use of fossil-derived materials. Combining wood-based materials, such as particleboards, with bio-adhesives may offer a great opportunity to develop sustainable packaging solutions with active antioxidant properties. In the present work, a phenolic extract of poplar bark was produced and bio-adhesives were formulated using citric acid as a cross-linker. The impact of citric acid content on the chemical and bonding properties of bio-adhesives was evaluated. Additionally, the impact of the temperature of curing on their antioxidant capacity was also accessed. The bio-adhesives were applied in the production of particleboards, using poplar veneer particles as raw material. The composite materials exhibit high mechanical resistance, fulfilling the requirement of PB type P1, with remarkable antioxidant activity, opening a possibility to be employed in an active packaging solution. Full article
(This article belongs to the Section Biobased and Biodegradable Polymers)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>(<b>a</b>) Photograph of CA_<span class="html-italic">X</span> adhesives (X = 0, 25, 50, 75, and 100). (<b>b</b>) Effect of citric acid amount (0, 25, 50, 75, and 100%) on viscosity and pH. Samples subscripted by * are significantly different in terms of viscosity and pH at <span class="html-italic">p</span> &lt; 0.05.</p>
Full article ">Figure 2
<p>Solubility in water of the CA_<span class="html-italic">X</span> adhesives (<span class="html-italic">X</span> = 0, 25, 50, 75, and 100). Samples subscripted by different letters are significantly different in terms of temperature at <span class="html-italic">p</span> &lt; 0.05.</p>
Full article ">Figure 3
<p>Effect of pressing temperature on shear strength of CA_<span class="html-italic">X</span> bio-adhesives (X = 0, 25, 50, 75, and 100).</p>
Full article ">Figure 4
<p>Relation between the insoluble fraction of CA_<span class="html-italic">X</span> adhesives (<span class="html-italic">X</span> = 0, 25, 50, 75, and 100) and shear strength at a specific temperature of curing, namely 80 °C (triangle), 120 °C (circle), 160 °C (square), and 200 °C (diamond).</p>
Full article ">Figure 5
<p>Antioxidant activity measured by FRAP of the water-soluble fraction of the CA_<span class="html-italic">X</span> adhesives (<span class="html-italic">X</span> = 0, 25, 50, 75, and 100). Samples subscripted by different letters are significantly different in terms of temperature at <span class="html-italic">p</span> &lt; 0.05.</p>
Full article ">Figure 6
<p>(<b>a</b>) FTIR spectra of CA_<span class="html-italic">X</span> bio-adhesives (X = 0, 25, 50, 75 and 100). FTIR peak area (%) of characteristic bands of (<b>b</b>) CA_0, (<b>c</b>) CA_25, (<b>d</b>) CA_50, (<b>e</b>) CA_75, and (<b>f</b>) CA_100. Bars subscripted by different letters are significantly different (<span class="html-italic">p</span> &lt; 0.05) in terms of temperature.</p>
Full article ">Figure 7
<p>Photograph of the composite panels produced using the CA_<span class="html-italic">X</span> bio-adhesives (<span class="html-italic">X</span> = 0, 25, 50, 75 and 100).</p>
Full article ">Figure 8
<p>(<b>a</b>) Effect of thickness and citric acid content on the antioxidant activity of PBCA_X composite panels and standard UF particleboard. Different letters above columns refer to significantly different values at <span class="html-italic">p</span> &lt; 0.05 depending on the thickness (capital letters—8 mm and lowercase letters—4 mm particleboards). (<b>b</b>) Impact of pressing temperature on the antioxidant activity of PBCA_50 composite panel. * refers to significantly different columns at <span class="html-italic">p</span> &lt; 0.05.</p>
Full article ">
18 pages, 1820 KiB  
Article
DicomOS: A Preliminary Study on a Linux-Based Operating System Tailored for Medical Imaging and Enhanced Interoperability in Radiology Workflows
by Tiziana Currieri, Orazio Gambino, Roberto Pirrone and Salvatore Vitabile
Electronics 2025, 14(2), 330; https://doi.org/10.3390/electronics14020330 - 15 Jan 2025
Viewed by 344
Abstract
In this paper, we propose a Linux-based operating system, namely, DicomOS, tailored for medical imaging and enhanced interoperability, addressing user-friendly functionality and the main critical needs in radiology workflows. Traditional operating systems in clinical settings face limitations, such as fragmented software ecosystems and [...] Read more.
In this paper, we propose a Linux-based operating system, namely, DicomOS, tailored for medical imaging and enhanced interoperability, addressing user-friendly functionality and the main critical needs in radiology workflows. Traditional operating systems in clinical settings face limitations, such as fragmented software ecosystems and platform-specific restrictions, which disrupt collaborative workflows and hinder diagnostic efficiency. Built on Ubuntu 22.04 LTS, DicomOS integrates essential DICOM functionalities directly into the OS, providing a unified, cohesive platform for image visualization, annotation, and sharing. Methods include custom configurations and the development of graphical user interfaces (GUIs) and command-line tools, making them accessible to medical professionals and developers. Key applications such as ITK-SNAP and 3D Slicer are seamlessly integrated alongside specialized GUIs that enhance usability without requiring extensive technical expertise. As preliminary work, DicomOS demonstrates the potential to simplify medical imaging workflows, reduce cognitive load, and promote efficient data sharing across diverse clinical settings. However, further evaluations, including structured clinical tests and broader deployment with a distributable ISO image, must validate its effectiveness and scalability in real-world scenarios. The results indicate that DicomOS provides a versatile and adaptable solution, supporting radiologists in routine tasks while facilitating customization for advanced users. As an open-source platform, DicomOS has the potential to evolve alongside medical imaging needs, positioning it as a valuable resource for enhancing workflow integration and clinical collaboration. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

Figure 1
<p>Screenshot of the DicomOS interface, showing the customized theme, icons, and new graphical user interface applications tailored for clinical use.</p>
Full article ">Figure 2
<p>Example process for creating GUI executables in DicomOS, showing Python code execution through a shell script and desktop entry to facilitate easy user access.</p>
Full article ">Figure 3
<p>Workflow integration in DicomOS, demonstrating the development of GUI executables for medical professionals and command-line tools for programmers. The two sections are connected by a shared Python script layer, which supports GUI and command-line functionalities. This structure enables DicomOS to cater to the needs of both medical and technical users, providing an intuitive GUI for clinicians while offering direct, customizable access for programmers.</p>
Full article ">
18 pages, 8177 KiB  
Technical Note
The Weather On-Demand Framework
by Ólafur Rögnvaldsson, Karolina Stanislawska and João A. Hackerott
Atmosphere 2025, 16(1), 91; https://doi.org/10.3390/atmos16010091 - 15 Jan 2025
Viewed by 623
Abstract
This paper describes the Weather On-Demand (WOD) forecasting framework which is a software stack used to run operational and on-demand weather forecasts. The WOD framework is a distributed system for the following: (1) running the Weather Research and Forecast (WRF) model for data [...] Read more.
This paper describes the Weather On-Demand (WOD) forecasting framework which is a software stack used to run operational and on-demand weather forecasts. The WOD framework is a distributed system for the following: (1) running the Weather Research and Forecast (WRF) model for data assimilation and forecasts by triggering either scheduled or on-demand jobs; (2) gathering upstream weather forecasts and observations from a wide variety of sources; (3) reducing output data file sizes for permanent storage; (4) making results available through Application Programming Interfaces (APIs); (5) making data files available to custom post-processors. Much effort is put into starting processing as soon as the required data become available, and in parallel where possible. In addition to being able to create short- to medium-range weather forecasts for any location on the globe, users are granted access to a plethora of both global and regional weather forecasts and observations, as well as seasonal outlooks from the National Oceanic and Atmospheric Administration (NOAA) in the USA through WOD integrated-APIs. All this information can be integrated with third-party software solutions via WOD APIs. The software is maintained in the Git distributed version control system and can be installed on suitable hardware, bringing the full flexibility and power of the WRF modelling system to the user in a matter of hours. Full article
(This article belongs to the Section Atmospheric Techniques, Instruments, and Modeling)
Show Figures

Figure 1

Figure 1
<p>Diagram of essential components of the WOD system and their interconnections. See text for further details.</p>
Full article ">Figure 2
<p>Volcanic cloud (<b>top panel</b>) emanating from the Mt. Fagradalsfjall eruption, SW Iceland, on 30 May 2021 (photo courtesy of Kristján Sævald) and a dispersion forecast (<b>bottom panel</b>) of SO<sub>2</sub> at 500 m AGL, valid at the time of the photoshoot, created by the WOD system. The red star shows the approximate location from where the photo was taken.</p>
Full article ">Figure 3
<p>Example of how the location of observation sides in Iceland, from a wide range of providers, can be presented within the WOD framework. Screenshot taken from <a href="https://obs.belgingur.is" target="_blank">https://obs.belgingur.is</a> on 11 July 2024.</p>
Full article ">Figure 4
<p>Comparison between observations (<b>left</b>) of 24 h rainfall [mm/day] over South America on 19 January 2023 estimated by the MERGE system of the Brazilian Centre for Weather Forecast and Climatic Studies (CPTEC in Portuguese), the results of a one-day-ahead WOD system with data assimilation (<b>centre</b>), and the same results without data assimilation (<b>right</b>). Areas limit the main hydro basins used for hydropower in Brazil, and numbers show the average precipitation over each basin. Numbers in red are precipitation significantly below daily average, while blues are significantly above daily average. Red circles highlight the regions where precipitation has the greatest impact on the Brazilian electric sector and where we identified the most significant improvements using the data assimilation system.</p>
Full article ">Figure 5
<p>Example of a power production forecast where WOD model output has been post-processed using a novel machine learning software that takes observed winds and power production, among other factors, into account.</p>
Full article ">Figure A1
<p>Example of a typical landing page for the graphical user interface (GUI) of the WOD API.</p>
Full article ">Figure A2
<p>Step two in running an on-demand forecast; click the encircled <tt>/meta/job</tt> button.</p>
Full article ">Figure A3
<p>The user now types in the latitude and longitude of the centre point of the outermost domain, in addition to the specific, pre-defined model configuration and forecast duration. In the encircled example shown here, the name of the job_type is <tt>small.9</tt>.</p>
Full article ">Figure A4
<p>The final step to set up an operational forecast is to set the unique identification number of the prototype forecast as the “Job” the schedule should be based on. In addition, the user should define the forecast duration and choose a (preferably) sensible name for the new schedule. More fine-tuning can be conducted by modifying individual entries linked to the schedule in the WOD database.</p>
Full article ">Figure A5
<p>The landing page (<b>top panel</b>) of the Verif web service offers the user the choice of a set of observed and modelled variables as well as plot options (<b>lower panel, left</b>); data range options (<b>lower panel, middle</b>); and the option of customizing which observation locations are to be investigated (<b>lower panel, right</b>).</p>
Full article ">Figure A6
<p>The Verif web service offers six types of graphs. These are scatter plots (<b>top left</b>), Taylor diagrams (<b>top centre</b>), quantile–quantile plots (<b>top right</b>), and maps showing mean absolute error (<b>bottom left</b>), bias (<b>bottom centre</b>), and root-mean-square error (<b>bottom right</b>).</p>
Full article ">
18 pages, 4133 KiB  
Article
An Investigation of Hand Gestures for Controlling Video Games in a Rehabilitation Exergame System
by Radhiatul Husna, Komang Candra Brata, Irin Tri Anggraini, Nobuo Funabiki, Alfiandi Aulia Rahmadani and Chih-Peng Fan
Computers 2025, 14(1), 25; https://doi.org/10.3390/computers14010025 - 15 Jan 2025
Viewed by 308
Abstract
Musculoskeletal disorders (MSDs) can significantly impact individuals’ quality of life (QoL), often requiring effective rehabilitation strategies to promote recovery. However, traditional rehabilitation methods can be expensive and may lack engagement, leading to poor adherence to therapy exercise routines. An exergame system can [...] Read more.
Musculoskeletal disorders (MSDs) can significantly impact individuals’ quality of life (QoL), often requiring effective rehabilitation strategies to promote recovery. However, traditional rehabilitation methods can be expensive and may lack engagement, leading to poor adherence to therapy exercise routines. An exergame system can be a solution to this problem. In this paper, we investigate appropriate hand gestures for controlling video games in a rehabilitation exergame system. The Mediapipe Python library is adopted for the real-time recognition of gestures. We choose 10 easy gestures among 32 possible simple gestures. Then, we specify and compare the best and the second-best groups used to control the game. Comprehensive experiments are conducted with 16 students at Andalas University, Indonesia, to find appropriate gestures and evaluate user experiences of the system using the System Usability Scale (SUS) and User Experience Questionnaire (UEQ). The results show that the hand gestures in the best group are more accessible than in the second-best group. The results suggest appropriate hand gestures for game controls and confirm the proposal’s validity. In future work, we plan to enhance the exergame system by integrating a diverse set of video games, while expanding its application to a broader and more diverse sample. We will also study other practical applications of the hand gesture control function. Full article
Show Figures

Figure 1

Figure 1
<p>Overview of <span class="html-italic">exergame</span> system with hand gestures.</p>
Full article ">Figure 2
<p>Design of exergame system.</p>
Full article ">Figure 3
<p>Twenty-one <span class="html-italic">keypoints</span> of one hand.</p>
Full article ">Figure 4
<p><span class="html-italic">Maze</span> in <span class="html-italic">exergame</span> system.</p>
Full article ">Figure 5
<p>All possible gestures of one hand.</p>
Full article ">Figure 6
<p>Five hand gestures for keys in best group.</p>
Full article ">Figure 7
<p>Five hand gestures for keys in second-best group.</p>
Full article ">Figure 8
<p>UEQ results for best hand gestures.</p>
Full article ">
26 pages, 21796 KiB  
Article
Design of a Cost-Effective Ultrasound Force Sensor and Force Control System for Robotic Extra-Body Ultrasound Imaging
by Yixuan Zheng, Hongyuan Ning, Eason Rangarajan, Aban Merali, Adam Geale, Lukas Lindenroth, Zhouyang Xu, Weizhao Wang, Philipp Kruse, Steven Morris, Liang Ye, Xinyi Fu, Kawal Rhode and Richard James Housden
Sensors 2025, 25(2), 468; https://doi.org/10.3390/s25020468 - 15 Jan 2025
Viewed by 394
Abstract
Ultrasound imaging is widely valued for its safety, non-invasiveness, and real-time capabilities but is often limited by operator variability, affecting image quality and reproducibility. Robot-assisted ultrasound may provide a solution by delivering more consistent, precise, and faster scans, potentially reducing human error and [...] Read more.
Ultrasound imaging is widely valued for its safety, non-invasiveness, and real-time capabilities but is often limited by operator variability, affecting image quality and reproducibility. Robot-assisted ultrasound may provide a solution by delivering more consistent, precise, and faster scans, potentially reducing human error and healthcare costs. Effective force control is crucial in robotic ultrasound scanning to ensure consistent image quality and patient safety. However, existing robotic ultrasound systems rely heavily on expensive commercial force sensors or the integrated sensors of commercial robotic arms, limiting their accessibility. To address these challenges, we developed a cost-effective, lightweight, 3D-printed force sensor and a hybrid position–force control strategy tailored for robotic ultrasound scanning. The system integrates patient-to-robot registration, automated scanning path planning, and multi-sensor data fusion, allowing the robot to autonomously locate the patient, target the region of interest, and maintain optimal contact force during scanning. Validation was conducted using an ultrasound-compatible abdominal aortic aneurysm (AAA) phantom created from patient CT data and healthy volunteer testing. For the volunteer testing, during a 1-min scan, 65% of the forces were within the good image range. Both volunteers reported no discomfort or pain during the whole procedure. These results demonstrate the potential of the system to provide safe, precise, and autonomous robotic ultrasound imaging in real-world conditions. Full article
(This article belongs to the Special Issue Multi-sensor Fusion in Medical Imaging, Diagnosis and Therapy)
Show Figures

Figure 1

Figure 1
<p>Patient-to-robot base registration process, along with three transformations utilized in this study shown with red arrows, relative marker transformation calculation with the help of the camera with blue arrows, and final patient-to-robot base transformation with the green arrow [<a href="#B19-sensors-25-00468" class="html-bibr">19</a>].</p>
Full article ">Figure 2
<p>Workflow for automatic ultrasound image acquisition of the current system. The colorful path in the ’Correct Target Points’ section represents the corrected path plan, with blue indicating the start and red indicating the stop point. For detailed explanation, see Figure 20.</p>
Full article ">Figure 3
<p>Custom-made force sensor mechanical structure design. (<b>a</b>) Left and right parts are separate to fit the ultrasound probe; (<b>b</b>) upper and lower parts are separate for easy replacement of the load cells; (<b>c</b>) complete sensor structure with probe and load cells; (<b>d</b>) special design on the supporting cylinders.</p>
Full article ">Figure 4
<p>Force sensor signal processing setup. (<b>a</b>) Front view of the force sensor with integrated load cells. (<b>b</b>) Back view of the force sensor showing the custom-designed printed circuit board (PCB) for signal integration and zero calibration, along with two 4-pin input cables (each carrying signals from two load cells) and a 6-pin output cable connected to the Teensy 4.1. (<b>c</b>) Bottom view of the 3D-printed box for the Teensy 4.1 board, with sensor signal and robot master cables. (<b>d</b>) Top view of the Teensy 4.1 box, highlighting the USB cable used for direct sensor signal access when needed for debugging.</p>
Full article ">Figure 5
<p>User interface for two path planning methods: (<b>a</b>) direct path planning method; (<b>b</b>) area coverage path planning method.</p>
Full article ">Figure 6
<p>Ultrasound-compatible abdominal aortic aneurysm phantom: (<b>a</b>) external appearance and (<b>b</b>) ultrasound visualization of internal structures. The vertical dotted line in (<b>b</b>) represent a depth scale bar, with each segment indicating 1 cm.</p>
Full article ">Figure 7
<p>Sensor calibration and performance assessment: (<b>a</b>) on its own with known weights; (<b>b</b>) on the robot with an ultrasound probe and commercial force sensor.</p>
Full article ">Figure 8
<p>Experimental setup for validating the surface force-following algorithm in the Z-direction using an ATI force sensor, a 3D-printed framework, and two AprilTag markers used for position registration.</p>
Full article ">Figure 9
<p>Selected area on abdominal phantom in simulation window.</p>
Full article ">Figure 10
<p>Automated ultrasound image acquisition on phantom experiment setup.</p>
Full article ">Figure 11
<p>Setup for automated ultrasound image acquisition in healthy volunteer tests: (<b>a</b>) Volunteer 1 with BMI = 21, (<b>b</b>) Volunteer 2 with BMI = 33.</p>
Full article ">Figure 12
<p>Abdominal aorta and iliac artery localization in volunteer testing: (<b>a</b>) B−mode image of the abdominal aorta annotated by a clinical vascular scientist (Volunteer 1) and (<b>b</b>) pulsed wave Doppler of the iliac artery (Volunteer 2).</p>
Full article ">Figure 13
<p>Ultrasound images acquired by the robot at different force levels: Volunteer 1’s abdominal aorta (yellow border) and Volunteer 2’s iliac artery (blue border). The vertical dotted line in all the ultrasound images represent a depth scale bar.</p>
Full article ">Figure 14
<p>Performance testing of the force sensor using known weights: (<b>a</b>) linearity and calibration equation relating sensor raw data to ground truth and (<b>b</b>) hysteresis evaluation over five loading–unloading cycles, comparing input and measured weights. The five colored lines overlap, resulting in a single visible black line. Detailed zoomed-in graphs are provided in <a href="#sensors-25-00468-f015" class="html-fig">Figure 15</a>.</p>
Full article ">Figure 15
<p>Separate hysteresis maps for five cycles with zoomed-in largest hysteresis points highlighted in the orange rectangle.</p>
Full article ">Figure 16
<p>Correlation between the ATI commercial force sensor readings (<span class="html-italic">x</span>-axis) and our custom-made ultrasound force sensor readings (<span class="html-italic">y</span>-axis). Each blue point represents a measurement instance where the same force was applied to both sensors. The red solid line indicates the linear fit of these data points, while the blue dashed line represents the ideal 1:1 correspondence (y = x) between these two sensors.</p>
Full article ">Figure 17
<p>Force comparison between custom-made force sensor and ATI force sensor.</p>
Full article ">Figure 18
<p>Force sensor data, platform position, and robot position over time.</p>
Full article ">Figure 19
<p>Force values and distributions in the combined path-planning and force-control experiment on phantom without adipose layer. The top subfigure shows force variation over time, with 3 N and 6 N thresholds marked; the middle subfigure depicts the force value distribution, highlighting ranges below 3 N, 3–6 N, and above 6 N; and the bottom subfigure displays the time proportion within each force range. Red, green and blue colours in the middle and buttom graphs match with each other.</p>
Full article ">Figure 20
<p>Probe’s 3D trajectory and the phantom surface visualization in the real-world coordinate system. The abdominal phantom surface is represented as a black grid and the probe centre’s 3D trajectory during the scanning process is colour-coded by time, transitioning from blue (start) to red (end).</p>
Full article ">Figure 21
<p>Force values and distributions in automated ultrasound image acquisition experiment on phantom with adipose layer. The top subfigure shows force variation over time, with 3 N and 6 N thresholds marked; the middle subfigure depicts the force value distribution, highlighting ranges below 3 N, 3–6 N, and above 6 N; and the bottom subfigure displays the time proportion within each force range. Red, green and blue colours in the middle and buttom graphs match with each other.</p>
Full article ">Figure 22
<p>Ultrasound images acquired by robot at varying force levels on AAA phantom.</p>
Full article ">Figure 23
<p>Abdominal aorta ultrasound images acquired by the robotic system: (<b>a</b>) Volunteer 1’s original image; (<b>b</b>) Volunteer 1’s images annotated by registered clinical vascular scientist; (<b>c</b>) Volunteer 2’s original image; (<b>d</b>) Volunteer 2’s images annotated by registered clinical vascular scientist.</p>
Full article ">Figure 24
<p>Force values and distributions in automated ultrasound image acquisition experiment on two volunteers. Red, green and blue colours in the middle and buttom graphs match with each other.</p>
Full article ">Figure 24 Cont.
<p>Force values and distributions in automated ultrasound image acquisition experiment on two volunteers. Red, green and blue colours in the middle and buttom graphs match with each other.</p>
Full article ">
25 pages, 1993 KiB  
Article
Hacking Exposed: Leveraging Google Dorks, Shodan, and Censys for Cyber Attacks and the Defense Against Them
by Abdullah Alabdulatif and Navod Neranjan Thilakarathne
Computers 2025, 14(1), 24; https://doi.org/10.3390/computers14010024 - 15 Jan 2025
Viewed by 268
Abstract
In recent years, cyberattacks have increased in sophistication, using a variety of tools to exploit vulnerabilities across the global digital landscapes. Among the most commonly used tools at an attacker’s disposal are Google dorks, Shodan, and Censys, which offer unprecedented access to exposed [...] Read more.
In recent years, cyberattacks have increased in sophistication, using a variety of tools to exploit vulnerabilities across the global digital landscapes. Among the most commonly used tools at an attacker’s disposal are Google dorks, Shodan, and Censys, which offer unprecedented access to exposed systems, devices, and sensitive data on the World Wide Web. While these tools can be leveraged by professional hackers, they have also empowered “Script Kiddies”, who are low-skill, inexperienced attackers who use readily available exploits and scanning tools without deep technical knowledge. Consequently, cyberattacks targeting critical infrastructure are growing at a rapid rate, driven by the ease with which these solutions can be operated with minimal expertise. This paper explores the potential for cyberattacks enabled by these tools, presenting use cases where these platforms have been used for both offensive and defensive purposes. By examining notable incidents and analyzing potential threats, we outline proactive measures to protect against these emerging risks. In this study, we delve into how these tools have been used offensively by attackers and how they serve defensive functions within cybersecurity. Additionally, we also introduce an automated all-in-one tool designed to consolidate the functionalities of Google dorks, Shodan, and Censys, offering a streamlined solution for vulnerability detection and analysis. Lastly, we propose proactive defense strategies to mitigate exploitation risks associated with such tools, aiming to enhance the resilience of critical digital infrastructure against evolving cyber threats. Full article
(This article belongs to the Special Issue Multimedia Data and Network Security)
Show Figures

Figure 1

Figure 1
<p>Distribution of detected worldwide cyberattacks by type in 2022.</p>
Full article ">Figure 2
<p>Key steps involved in executing a cyberattack.</p>
Full article ">Figure 3
<p>Example of a Google dork query.</p>
Full article ">Figure 4
<p>Example of a Shodan query that returns a list of IP addresses for devices running Apache within the specified country: United States.</p>
Full article ">Figure 5
<p>Example of a Shodan query with filtered options.</p>
Full article ">Figure 6
<p>Example of a Censys search to find all devices with a software product with the word “Windows” in it.</p>
Full article ">Figure 7
<p>Automated Cyber Threat Hunting Tool V1.0.</p>
Full article ">
42 pages, 4687 KiB  
Review
A Review on Blockchain Applications in Operational Technology for Food and Agriculture Critical Infrastructure
by Chengliang Zheng, Xiangzhen Peng, Ziyue Wang, Tianyu Ma, Jiajia Lu, Leiyang Chen, Liang Dong, Long Wang, Xiaohui Cui and Zhidong Shen
Foods 2025, 14(2), 251; https://doi.org/10.3390/foods14020251 - 14 Jan 2025
Viewed by 654
Abstract
The food and agriculture sector is a cornerstone of critical infrastructure (CI), underpinning global food security, public health, and economic stability. However, the increasing digitalization and connectivity of operational technologies (OTs) in this sector expose it to significant cybersecurity risks. Blockchain technology (BT) [...] Read more.
The food and agriculture sector is a cornerstone of critical infrastructure (CI), underpinning global food security, public health, and economic stability. However, the increasing digitalization and connectivity of operational technologies (OTs) in this sector expose it to significant cybersecurity risks. Blockchain technology (BT) has emerged as a transformative solution for addressing these challenges by enhancing network security, traceability, and system resilience. This study presents a comprehensive review of BT applications in OT security for food and agriculture CI, employing bibliometric and content analysis methods. A total of 124 relevant articles were identified from six databases, including the Web of Science Core Collection and MEDLINE®. Bibliometric analysis was conducted across five dimensions: publication year, literature type, journal distribution, country contributions, and keyword trends. The findings are meticulously organized through tables, charts, and graphs. The year 2018 marked a surge in research within this domain, with the IEEE Internet of Things Journal and IEEE ACESS emerging as the most prolific journals, each boasting nine publications. The United States, China, and India are at the forefront in terms of journal citation counts. Our analysis determined that a reference count of 37 serves as an appropriate threshold. Otoum Safa stands out as the author with the highest number of published articles, totaling four. Keywords such as “blockchain”, “internet of things”, “smart contract”, “security”, and “critical infrastructure” appear with significant frequency. The statistics, trends, and insights gleaned from this bibliometric analysis can guide researchers in the OTCI field to forge a coherent and logical research trajectory. Content analysis further identified six key research areas within this domain: identity authentication and data verification, secure access control, attack detection and perception, data security and protection, data backup and recovery, and attack assessment and attribution. Based on these insights, a general framework is proposed to guide future research and practical applications of BT in securing OT within food and agriculture CI. This study systematically analyzes the current research landscape, challenges, and opportunities for BT in securing the OT critical to food and agriculture CI. By bridging the gap between blockchain innovations and the operational needs of the food and agriculture sector, this work contributes to advancing strategic implementation and improving the security of CI systems. Full article
(This article belongs to the Section Food Security and Sustainability)
Show Figures

Figure 1

Figure 1
<p>Blockchain diagram in OTCI.</p>
Full article ">Figure 2
<p>Literature retrieval and selection strategies.</p>
Full article ">Figure 3
<p>Review steps.</p>
Full article ">Figure 4
<p>Year of publication.</p>
Full article ">Figure 5
<p>Statistical chart of published journals.</p>
Full article ">Figure 6
<p>Author co-authorship network diagram.</p>
Full article ">Figure 7
<p>Keyword co-occurrence network diagram.</p>
Full article ">Figure 8
<p>Schematic diagram of BT protection function in OTCI.</p>
Full article ">Figure 9
<p>Schematic diagram of the general framework of OTCI research based on BT.</p>
Full article ">Figure 10
<p>The advantages, challenges, and trends of OTCI network security based on BT.</p>
Full article ">
14 pages, 4313 KiB  
Review
Cetacean Sanctuaries: Do They Guarantee Better Welfare?
by Javier Almunia and Marta Canchal
J. Zool. Bot. Gard. 2025, 6(1), 4; https://doi.org/10.3390/jzbg6010004 - 14 Jan 2025
Viewed by 1617
Abstract
The SEA LIFE Trust Beluga Whale Sanctuary (BWS) has been in operation for over five years and serves as a unique case study to evaluate the effectiveness of marine sanctuaries for cetaceans. While cetacean sanctuaries are often regarded as a middle-ground solution between [...] Read more.
The SEA LIFE Trust Beluga Whale Sanctuary (BWS) has been in operation for over five years and serves as a unique case study to evaluate the effectiveness of marine sanctuaries for cetaceans. While cetacean sanctuaries are often regarded as a middle-ground solution between captivity and release, evidence from the BWS highlights complexities in adapting cetaceans to these environments. Despite initial assumptions that natural conditions would inherently improve welfare, the belugas at the BWS spent the majority of the operational period (92.6%) in a conventional indoor pool, due to health and welfare concerns. Repeated delays, challenges in acclimatization, and distress-related conditions observed during periods in the bay suggest that natural environments alone may not guarantee improved welfare. Additionally, the lack of publicly accessible data on health and welfare outcomes hinders comprehensive evaluation of the sanctuary’s success and raises questions about transparency and evidence-based practices. This review underscores the need for refined sanctuary models, improved infrastructure, and structured adaptation programs tailored to species and individual cetaceans. It highlights the importance of robust planning, ongoing research, and transparency to meet the ambitious goals of marine sanctuaries in the best interests of the well-being of cetaceans under human care. These considerations also raise concerns about the decision to relocate captive cetaceans to marine sanctuaries, as the available evidence suggests that such environments may not inherently guarantee better welfare outcomes. Full article
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Photographs of the different environments available for the belugas at the SEA LIFE Trust Beluga Whale Sanctuary: (<b>a</b>) the inland indoor conventional pool (referred to by the BWS as the temporary care pools or winter pools); (<b>b</b>) the netted pontoon (referred to by the BWS as the sea care pools); (<b>c</b>) the second intermediate sea pen, also known as the Halo; and (<b>d</b>) the entire bay. Photo Credits: SEA LIFE Trust Beluga Whale Sanctuary Instagram account (<b>a</b>–<b>c</b>) and Robin de Vries (<b>d</b>).</p>
Full article ">Figure 2
<p>Timeline showing the duration of time the belugas spent in different environments. The red segment represents the inland indoor conventional pool (referred to by the BWS as the temporary care pools or winter pools), the yellow segment represents the netted pontoon (referred to by the BWS as the sea care pools), and the green segment represents the time the belugas had access to the entire bay.</p>
Full article ">Figure 3
<p>Pie chart illustrating the percentage of time the belugas spent in the different settings. Colors correspond with the description in the previous figure.</p>
Full article ">
21 pages, 3250 KiB  
Review
Coherent Optics for Passive Optical Networks: Flexible Access, Rapid Burst Detection, and Simplified Structure
by Guangying Yang, Yixiao Zhu, Ziheng Zhang, Lina Man, Xiatao Huang, Xingang Huang and Weisheng Hu
Photonics 2025, 12(1), 68; https://doi.org/10.3390/photonics12010068 - 14 Jan 2025
Viewed by 383
Abstract
With the development of the Internet of Things, cloud networking, and 4K/8K high-definition video, global internet traffic has seen a dramatic increase. This surge in traffic has placed higher demands on the performance of optical networks, featuring higher data rates, lower latency, and [...] Read more.
With the development of the Internet of Things, cloud networking, and 4K/8K high-definition video, global internet traffic has seen a dramatic increase. This surge in traffic has placed higher demands on the performance of optical networks, featuring higher data rates, lower latency, and lower cost. The passive optical network (PON) is a representative scenario of optical access networks. Issues such as burst-mode detection in upstream PON scenarios, flexible rate allocation in downstream scenarios, and the simplification of hardware complexity at the optical network unit (ONU) side have attracted considerable attention. Compared to intensity modulation/direct detection (IM/DD), a recently proposed coherent PON incorporates a local oscillator laser at the receiver, enabling superior receiver sensitivity, spectrally efficient modulation, linear optical field recovery, and flexible channel selection. These features significantly enhance the flexibility and data rates of PON systems. This paper provides a comprehensive review of the development of coherent PONs, particularly in aspects of preamble design for burst-mode detection in upstream scenarios, the design of flexible rate PONs in downstream scenarios, and solutions for reducing hardware complexity at the ONU side. Full article
(This article belongs to the Special Issue Optical Networking Technologies for High-Speed Data Transmission)
Show Figures

Figure 1

Figure 1
<p>(<b>a</b>) The evolution of the PON from B-PON to 50G-PON and future 100G-PON and beyond. (<b>b</b>) IM/DD optics versus coherent optics in a PON system. PD: photodetector; LO: local oscillator.</p>
Full article ">Figure 2
<p>The continuous-mode upstream and burst-mode downstream scenarios in the PON system. OLT: optical line terminal; ONU: optical network unit; OPL: optical path loss.</p>
Full article ">Figure 3
<p>Three different modulation schemes for flexible line-rate TDM-PON. (<b>a</b>) The dual-rate downstream PON utilizing 25 Gb/s NRZ and 50 Gb/s EDB with a 25 Gb/s APD. (<b>b</b>) The triple-rate downstream PON using 25 Gb/s, 37.5 Gb/s, and 50 Gb/s PAM. (<b>c</b>) Schematic diagram of generating 2 PAM-3 symbols from 8-QAM symbols. (<b>d</b>) The triple-rate downstream PON utilizing 25 Gb/s, 37 Gb/s, and 50 Gb/s single-band CAP-4.</p>
Full article ">Figure 4
<p>FEC-free CNC algorithm for the DMT-PON with clipping operation. LDPC: low-density parity-check code.</p>
Full article ">Figure 5
<p>(<b>a</b>) BER versus optimized clipping ratio for 32-QAM signal. (<b>b</b>) BER versus ROP for 32-QAM signal. (<b>c</b>) Experimental validation for flexible-rate access. CR: clipping ratio; CNC: clipping noise cancelation; ROP: received optical power; OPL: optical path loss.</p>
Full article ">Figure 6
<p>Various preamble designs for upstream scenarios in PON systems. Pol.: polarization. (<b>a</b>) Frame structure for 200G coherent PON. (<b>b</b>) 71.68 ns preamble for 100G coherent PON. (<b>c</b>) Frame structure for 400G coherent PON. (<b>d</b>) Frame structure and preamble for the DMT PON.</p>
Full article ">Figure 7
<p>The transmitted and received constellations of (<b>a</b>) bipolar PAM-4 and (<b>b</b>) the proposed unipolar PAM-4 signals.</p>
Full article ">Figure 8
<p>(<b>a</b>) BER versus frequency offset for 200 Gb/s PAM-4 signal after 25 km SSMF at −12 dBm ROP, with and without FOE. BER versus ROP sensitivity in BTB and 25 km SSMF transmission scenarios for (<b>b</b>) 200 Gb/s PAM-4 and (<b>c</b>) 100 Gb/s OOK signals. ROP: received optical power; FOE: frequency offset estimation; RC: raised cosine; LOP: launch optical power; BTB: back-to-back.</p>
Full article ">
27 pages, 1281 KiB  
Review
A Review of Transportation 5.0: Advancing Sustainable Mobility Through Intelligent Technology and Renewable Energy
by Mohammad Shamsuddoha, Mohammad Abul Kashem and Tasnuba Nasir
Future Transp. 2025, 5(1), 8; https://doi.org/10.3390/futuretransp5010008 - 14 Jan 2025
Viewed by 404
Abstract
Transportation 5.0 is an advanced and sophisticated system combining technologies with a focus on human-centered design and inclusivity. Its various components integrate intelligent infrastructure, autonomous vehicles, shared mobility services, green energy solutions, and data-driven systems to create an efficient and sustainable transportation network [...] Read more.
Transportation 5.0 is an advanced and sophisticated system combining technologies with a focus on human-centered design and inclusivity. Its various components integrate intelligent infrastructure, autonomous vehicles, shared mobility services, green energy solutions, and data-driven systems to create an efficient and sustainable transportation network to tackle modern urban challenges. However, this evolution of transportation is also intended to improve accessibility by creating environmentally benign substitutes for traditional fuel-based mobility solutions, even when addressing traffic management and control issues. Consequently, to promote synergy for sustainability, the diversified nature of the Transportation 5.0 components ought to be efficiently and effectively managed. Thus, this study aims to reveal the involvement of Transportation 5.0 core component prediction in the sustainable transportation system through a systematic literature review. This study also contemplates the causal model under system dynamics modeling in order to address sustainable solutions and the movement toward sustainability in the context of Transportation 5.0. From this review, in addition to the developed causal model, it is identified that every core component management method in the sustainable Transportation 5.0 system reduces environmental impact while increasing passenger convenience and the overall efficiency and accessibility of the transport network, with greater improvements for developing nations. As the variety of transportation options, including electric vehicles, is successfully integrated, this evolution will eventually enable shared mobility, green infrastructure, and multimodal transit options. Full article
Show Figures

Figure 1

Figure 1
<p>Historical progression of transportation development.</p>
Full article ">Figure 2
<p>Co-citation network analysis.</p>
Full article ">Figure 3
<p>Core components of transportation 5.0 for system dynamics modeling.</p>
Full article ">Figure 4
<p>Possible impact of Transportation 5.0 in developing countries.</p>
Full article ">
Back to TopTop