[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,337)

Search Parameters:
Keywords = data sharing environment

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
21 pages, 2457 KiB  
Article
Blockchain-Assisted Verifiable and Multi-User Fuzzy Search Encryption Scheme
by Xixi Yan, Pengyu Cheng, Yongli Tang and Jing Zhang
Appl. Sci. 2024, 14(24), 11740; https://doi.org/10.3390/app142411740 - 16 Dec 2024
Viewed by 316
Abstract
Searchable encryption (SE) allows users to efficiently retrieve data from encrypted cloud data, but most of the existing SE solutions only support precise keyword search. Fuzzy searchable encryption agrees with practical situations well in the cloud environment, as search keywords that are misspelled [...] Read more.
Searchable encryption (SE) allows users to efficiently retrieve data from encrypted cloud data, but most of the existing SE solutions only support precise keyword search. Fuzzy searchable encryption agrees with practical situations well in the cloud environment, as search keywords that are misspelled to some extent can still generate search trapdoors that are as effective as correct keywords. In scenarios where multiple users can search for ciphertext, most fuzzy searchable encryption schemes ignore the security issues associated with malicious cloud services and are inflexible in multi-user scenarios. For example, in medical application scenarios where malicious cloud servers may exist, diverse types of files need to correspond to doctors in the corresponding departments, and there is a lack of fine-grained access control for sharing decryption keys for different types of files. In the application of medical cloud storage, malicious cloud servers may return incorrect ciphertext files. Since diverse types of files need to be guaranteed to be accessible by doctors in the corresponding departments, sharing decryption keys with the corresponding doctors for different types of files is an issue. To solve these problems, a verifiable fuzzy searchable encryption with blockchain-assisted multi-user scenarios is proposed. Locality-sensitive hashing and bloom filters are used to realize multi-keyword fuzzy search, and the bigram segmentation algorithm is optimized for keyword conversion to improve search accuracy. To realize fine-grained access control in multi-user scenarios, ciphertext-policy attribute-based encryption (CP-ABE) is used to distribute the shared keys. In response to the possibility of malicious servers tampering with or falsifying users’ search results, the scheme leverages the blockchain’s technical features of decentralization, non-tamperability, and traceability, and uses smart contracts as a trusted third party to carry out the search work, which not only prevents keyword-guessing attacks within the cloud server, but also solves the verification work of search results. The security analysis leads to the conclusion that the scheme is secure under the adaptively chosen-keyword attack. Full article
Show Figures

Figure 1

Figure 1
<p>p-stable element mapping.</p>
Full article ">Figure 2
<p>System model.</p>
Full article ">Figure 3
<p>LSH-Bloom Architectural Diagram.</p>
Full article ">Figure 4
<p>The index tree.</p>
Full article ">Figure 5
<p>(<b>a</b>) Index generation time. (<b>b</b>) The search matching time when search keyword number is 3. (<b>c</b>) The search matching time when the file number is 2000. (<b>d</b>) The fuzzy search accuracy. Zhong, H. et al (2020) refers to the scheme in ref. [<a href="#B15-applsci-14-11740" class="html-bibr">15</a>], Li, X. et al (2022) refers to the scheme in ref. [<a href="#B21-applsci-14-11740" class="html-bibr">21</a>], Li, J. et al (2022) refers to the scheme in ref. [<a href="#B28-applsci-14-11740" class="html-bibr">28</a>] and Fu, S. et al (2021) refers to the scheme in ref. [<a href="#B29-applsci-14-11740" class="html-bibr">29</a>].</p>
Full article ">
15 pages, 525 KiB  
Article
A Lightweight ECC-Based Authentication and Key Agreement Protocol for IoT with Dynamic Authentication Credentials
by Momo Li and Shunfang Hu
Sensors 2024, 24(24), 7967; https://doi.org/10.3390/s24247967 - 13 Dec 2024
Viewed by 393
Abstract
Due to the openness of communication channels and the sensitivity of the data being collected and transmitted, securing data access and communication in IoT systems requires robust ECC-based authentication and key agreement (AKA) protocols. However, designing an AKA protocol for IoT presents significant [...] Read more.
Due to the openness of communication channels and the sensitivity of the data being collected and transmitted, securing data access and communication in IoT systems requires robust ECC-based authentication and key agreement (AKA) protocols. However, designing an AKA protocol for IoT presents significant challenges, as most IoT sensors are deployed in resource-constrained, unattended environments with limited computational power, connectivity, and storage. To achieve anonymous authentication, existing solutions typically rely on shared temporary public keys to mask device IDs or validate sender certificates, which increases the computational overhead. Furthermore, these protocols often fail to address crucial security concerns, such as nonresistance to ephemeral secret leakage (ESL) attacks and a lack of perfect forward security. To mitigate the computational burden, we propose a dynamic authenticated credentials (DACs) synchronization framework for anonymous authentication. Then, we introduce an ECC-based AKA scheme that employs DACs in place of temporary public keys or sender credentials, enabling efficient and secure anonymous authentication. The security of the proposed protocol was rigorously verified under the Real-or-Oracle model and validated using ProVerif. Performance comparisons demonstrate that our scheme offered significant improvements in security, with an over 37% reduction in communication cost and computational overhead. Full article
(This article belongs to the Special Issue IoT-Enabled Smart Everything Cyber-Physical Systems)
Show Figures

Figure 1

Figure 1
<p>IoT network model.</p>
Full article ">Figure 2
<p>Authentication and key agreement.</p>
Full article ">
16 pages, 230 KiB  
Article
Exploring Autonomy in the AI Wilderness: Learner Challenges and Choices
by Antonie Alm
Educ. Sci. 2024, 14(12), 1369; https://doi.org/10.3390/educsci14121369 - 13 Dec 2024
Viewed by 399
Abstract
The emergence of Generative Artificial Intelligence (GenAI) raises critical questions about learner autonomy and agency. This exploratory case study examines how four university-level German language learners with diverse backgrounds developed autonomy in their learning process through engagement with AI tools. The study was [...] Read more.
The emergence of Generative Artificial Intelligence (GenAI) raises critical questions about learner autonomy and agency. This exploratory case study examines how four university-level German language learners with diverse backgrounds developed autonomy in their learning process through engagement with AI tools. The study was conducted in early 2023 when most learners were first discovering ChatGPT’s potential for language learning. Data were collected through reflective journals, digital portfolios, and interviews during a semester-long course that scaffolded self-directed learning with AI integration. The findings reveal emerging patterns of shared agency between learners and AI tools. Learners developed distinct strategies for AI integration based on their language learning backgrounds, with heritage speakers focusing on accuracy improvement while classroom learners emphasized communication practice. Cross-case analyses identified key dimensions of autonomy development: a critical evaluation of AI output, evolving learner–AI relationships, maintaining and developing a second language (L2) voice, and the strategic integration of AI tools while preserving learner agency. These patterns suggest that autonomy in AI-mediated environments manifests through learners’ capacity to engage productively with AI while maintaining critical awareness and personal agency in their learning process. Full article
16 pages, 610 KiB  
Article
Research on Small-Sample Credit Card Fraud Identification Based on Temporal Attention-Boundary-Enhanced Prototype Network
by Boyu Liu, Longrui Wu and Shengdong Mu
Mathematics 2024, 12(24), 3894; https://doi.org/10.3390/math12243894 - 10 Dec 2024
Viewed by 362
Abstract
The Nielsen Report points out that credit card fraud caused business losses of USD 28.65 billion globally in 2019, with the US accounting for more than one-third of the high share, and that insufficient identification of credit card fraud has brought about a [...] Read more.
The Nielsen Report points out that credit card fraud caused business losses of USD 28.65 billion globally in 2019, with the US accounting for more than one-third of the high share, and that insufficient identification of credit card fraud has brought about a serious loss of financial institutions’ ability to do business. In small sample data environments, traditional fraud detection methods based on prototype network models struggle with the loss of time-series features and the challenge of identifying the uncorrected sample distribution in the metric space. In this paper, we propose a credit card fraud detection method called the Time-Series Attention-Boundary-Enhanced Prototype Network (TABEP), which strengthens the temporal feature dependency between channels by incorporating a time-series attention module to achieve channel temporal fusion feature acquisition. Additionally, nearest-neighbor boundary loss is introduced after the computation of the prototype-like network model to adjust the overall distribution of features in the metric space and to clarify the representation boundaries of the prototype-like model. Experimental results show that the TABEP model achieves higher accuracy in credit card fraud detection compared to five existing baseline prototype network methods, better fits the overall data distribution, and significantly improves fraud detection performance. This study highlights the effectiveness of open innovation methods in addressing complex financial security problems, which is of great significance for promoting technological advancement in the field of credit card security. Full article
Show Figures

Figure 1

Figure 1
<p>Schematic diagram of the prototype network structure.</p>
Full article ">Figure 2
<p>The model after the introduction of the attention mechanism.</p>
Full article ">Figure 3
<p>Schematic diagram of timing attention structure.</p>
Full article ">Figure 4
<p>Schematic of loss of near neighbors.</p>
Full article ">Figure 5
<p>Overall framework of the TABEP model.</p>
Full article ">Figure 6
<p>F1-Scores of base learners and TABEP model on different datasets.</p>
Full article ">Figure 7
<p>Schematic representation of classification accuracy of different models.</p>
Full article ">
18 pages, 2790 KiB  
Review
Analysis of Energy System Transformations in the European Union
by Agata Jaroń and Anna Borucka
Energies 2024, 17(23), 6181; https://doi.org/10.3390/en17236181 - 7 Dec 2024
Viewed by 548
Abstract
Achieving climate neutrality has become an environmental goal for all European Union (EU) Member States. Thanks to numerous projects and subsidies, EU countries are able to achieve the goal of decarbonizing energy sources. The aim of the presented study is to assess the [...] Read more.
Achieving climate neutrality has become an environmental goal for all European Union (EU) Member States. Thanks to numerous projects and subsidies, EU countries are able to achieve the goal of decarbonizing energy sources. The aim of the presented study is to assess the validity of Member States’ actions to reduce CO2 emissions based on data provided by Eurostat. The presented study combines, using regression, data on financial outlays dictated by environmental protection, the share of renewable energy, and total CO2 emissions in individual Member States. This study has shown that, despite differences in the use of energy sources, Member States are able to achieve economic growth in symbiosis with the environment. Full article
(This article belongs to the Special Issue Policy and Economic Analysis of Energy Systems)
Show Figures

Figure 1

Figure 1
<p>A model of transformation mechanisms occurring in the EU—combined theoretical model of the presented study.</p>
Full article ">Figure 2
<p>Box plot of investments [EUR million] for EU countries.</p>
Full article ">Figure 3
<p>Share of renewable energy sources (RES) [%] for EU countries.</p>
Full article ">Figure 4
<p>Box plot of emissions [million kg] in EU member states.</p>
Full article ">Figure 5
<p>Bar chart of investments (in EUR million) over the years for EU countries.</p>
Full article ">Figure 6
<p>Share of RES over the years [%] for EU countries.</p>
Full article ">Figure 7
<p>Bar chart of emissions [million kg] in EU Member States.</p>
Full article ">
24 pages, 6178 KiB  
Article
HoloGaussian Digital Twin: Reconstructing 3D Scenes with Gaussian Splatting for Tabletop Hologram Visualization of Real Environments
by Tam Le Phuc Do, Jinwon Choi, Viet Quoc Le, Philippe Gentet, Leehwan Hwang and Seunghyun Lee
Remote Sens. 2024, 16(23), 4591; https://doi.org/10.3390/rs16234591 - 6 Dec 2024
Viewed by 542
Abstract
Several studies have explored the use of hologram technology in architecture and urban design, demonstrating its feasibility. Holograms can represent 3D spatial data and offer an immersive experience, potentially replacing traditional methods such as physical 3D and offering a promising alternative to mixed-reality [...] Read more.
Several studies have explored the use of hologram technology in architecture and urban design, demonstrating its feasibility. Holograms can represent 3D spatial data and offer an immersive experience, potentially replacing traditional methods such as physical 3D and offering a promising alternative to mixed-reality display technologies. Holograms can visualize realistic scenes such as buildings, cityscapes, and landscapes using the novel view synthesis technique. This study examines the suitability of spatial data collected through the Gaussian splatting method for tabletop hologram visualization. Recent advancements in Gaussian splatting algorithms allow for real-time spatial data collection of a higher quality compared to photogrammetry and neural radiance fields. Both hologram visualization and Gaussian splatting share similarities in that they recreate 3D scenes without the need for mesh reconstruction. In this research, unmanned aerial vehicle-acquired primary image data were processed for 3D reconstruction using Gaussian splatting techniques and subsequently visualized through holographic displays. Two experimental environments were used, namely, a building and a university campus. As a result, 3D Gaussian data have proven to be an ideal spatial data source for hologram visualization, offering new possibilities for real-time motion holograms of real environments and digital twins. Full article
(This article belongs to the Special Issue Application of Photogrammetry and Remote Sensing in Urban Areas)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Common 3D reconstruction methods for real-world environments.</p>
Full article ">Figure 2
<p>Locations of experiment environments 1 and 2 on the university campus.</p>
Full article ">Figure 3
<p>Gaussian splatting practice interface displaying the dataset of the research experiment in point cloud. (<b>a</b>) Experiment environment 1. (<b>b</b>) Experiment environment 2.</p>
Full article ">Figure 4
<p>DJI Mini 4 Pro performing flight missions for data collection at the selected experiment environment. (<b>a</b>) Dji Mini Pro 4 under operation. (<b>b</b>) FOVs of the UAV and the coverage area.</p>
Full article ">Figure 5
<p>Circular paths for data collection in experiment environment 1. (<b>a</b>) Detailed circular flight paths of the UAV. (<b>b</b>) Calculated coverage area of the data collection based on different recording angles.</p>
Full article ">Figure 6
<p>Data collection for rectangular paths in experiment environment 2. (<b>a</b>) Detailed rectangular flight paths of the UAV, with calculated coverage areas based on different recording angles: (<b>b</b>) 60°, (<b>c</b>) 30°, and (<b>d</b>) 0°.</p>
Full article ">Figure 7
<p>Data collection crossover paths for experiment environment 2. (<b>a</b>) Detailed crossover flight paths of the UAV, with calculated coverage areas based on different recording crossover paths: (<b>b</b>) vertical path, (<b>c</b>) horizontal path, and (<b>d</b>) diagonal paths 1 and 2.</p>
Full article ">Figure 7 Cont.
<p>Data collection crossover paths for experiment environment 2. (<b>a</b>) Detailed crossover flight paths of the UAV, with calculated coverage areas based on different recording crossover paths: (<b>b</b>) vertical path, (<b>c</b>) horizontal path, and (<b>d</b>) diagonal paths 1 and 2.</p>
Full article ">Figure 8
<p>Operations with Unreal Engine when displaying data and performing novel view synthesis rendering for hologram printing. (<b>a</b>) PLY file opened in the Unreal Engine interface and (<b>b</b>) OBJ file opened in the Unreal Engine interface.</p>
Full article ">Figure 9
<p>Setup of the exhibited zero-degree tabletop hologram.</p>
Full article ">Figure 10
<p>Flow chart of the experiment conducted in this study. The method comprises four main phases, including data collection, data input scenarios, data processing, and tabletop hologram production.</p>
Full article ">Figure 11
<p>Representation of images extracted from the collected data in experiment environment 1.</p>
Full article ">Figure 12
<p>Representation of images extracted from the collected data in experiment environment 2.</p>
Full article ">Figure 13
<p>Comparison of 3D reconstruction quality between Gaussian splatting and photogrammetry in both experiment environments. (Note. Red zones are used to identify the significant difference of 3D reconstruction quality between the two methods).</p>
Full article ">Figure 14
<p>Three-dimensional reconstruction of data from six scenarios using Gaussian splatting and photogrammetry.</p>
Full article ">Figure 15
<p>Hologram visualization for (<b>a</b>) experiment environment 1 (<b>b</b>) and experiment environment 2.</p>
Full article ">Figure 16
<p>Workflow of the urban and architectural HoloGaussian digital twin.</p>
Full article ">
30 pages, 1330 KiB  
Review
Bridging Community Engagement and Technological Innovation for Creating Smart and Resilient Cities: A Systematic Literature Review
by Nuwani Kangana, Nayomi Kankanamge, Chathura De Silva, Ashantha Goonetilleke, Rifat Mahamood and Daneesha Ranasinghe
Smart Cities 2024, 7(6), 3823-3852; https://doi.org/10.3390/smartcities7060147 - 5 Dec 2024
Viewed by 1077
Abstract
Urbanization presents significant challenges to disaster management as cities grow and develop, hence increasing their vulnerability to disasters. Disaster resilience is crucial for protecting lives and infrastructure, ensuring economic stability, promoting equality and cohesion, and ensuring the long-term viability of metropolitan regions in [...] Read more.
Urbanization presents significant challenges to disaster management as cities grow and develop, hence increasing their vulnerability to disasters. Disaster resilience is crucial for protecting lives and infrastructure, ensuring economic stability, promoting equality and cohesion, and ensuring the long-term viability of metropolitan regions in these rapidly growing cities. This paper investigates contemporary approaches to creating smart and resilient urban environments through disaster management that emphasize community-based solutions in prioritizing advanced technologies. The key findings of the research include three factors to be accomplished in utilizing technology in community-based disaster management, trust in the crowd, digital divide, and cultural sensitivity. Moreover, the review highlights the significance of the use of smart technologies in improving urban resilience, including but not limited to real-time data-sharing platforms and ML algorithms. Furthermore, it emphasizes the challenges regarding reliability and accuracy in crowdsourced information, stressing the importance of user awareness. Full article
Show Figures

Figure 1

Figure 1
<p>The PRISMA flow diagram (adapted from [<a href="#B32-smartcities-07-00147" class="html-bibr">32</a>,<a href="#B133-smartcities-07-00147" class="html-bibr">133</a>]).</p>
Full article ">Figure 2
<p>Keyword analysis of 548 articles. Each color represents a cluster centered around a highly occurring keyword (displayed in larger text). The size of the text reflects the frequency of occurrence, with larger words appearing more frequently. Smaller words in the same color are linked to the central keyword, illustrating thematic relationships within the cluster.</p>
Full article ">Figure 3
<p>Temporal analysis of the keywords.</p>
Full article ">
13 pages, 952 KiB  
Article
An Educational RISC-V-Based 16-Bit Processor
by Jecel Mattos de Assumpção, Oswaldo Hideo Ando, Hugo Puertas de Araújo and Mario Gazziro
Chips 2024, 3(4), 395-407; https://doi.org/10.3390/chips3040020 - 30 Nov 2024
Viewed by 492
Abstract
This work introduces a novel custom-designed 16-bit RISC-V processor, intended for educational purposes and for use in low-resource equipment. The implementation, despite providing registers of 16 bits, is based on RV32E RISC-V ISA, but with some key differences like a reduced instruction set [...] Read more.
This work introduces a novel custom-designed 16-bit RISC-V processor, intended for educational purposes and for use in low-resource equipment. The implementation, despite providing registers of 16 bits, is based on RV32E RISC-V ISA, but with some key differences like a reduced instruction set that is optimized for embedded systems, the removal of floating-point instructions, reduced register count, and modified data types. These changes enable the processor to operate efficiently in resource-constrained environments while still maintaining assembly-level compatibility with the standard RISC-V architecture. The educational aspects of this project are also a key focus. By working on this project, students can gain hands-on experience with digital logic design, Verilog programming, and computer architecture. The project also includes tools and scripts to help students transform assembly code into binary format, making it easier for them to test and verify their designs. Additionally, the project’s open-source nature allows for collaboration and the sharing of knowledge among students and researchers worldwide. Full article
Show Figures

Figure 1

Figure 1
<p>Overview of the open-source HW/SW simulation and design tool flow of MicroRV32 [<a href="#B11-chips-03-00020" class="html-bibr">11</a>].</p>
Full article ">Figure 2
<p>Complete CPU system using <b>drv16</b> soft core processor. The blue lines are the data buses, with small blue symbols indicating inputs, small red symbols indicating outputs and the big blue symbols indicating bus intersections.</p>
Full article ">Figure 3
<p>Implementation of the <b>drv16</b> soft core processor.</p>
Full article ">Figure 4
<p>Comparison of LUTs usage between the <b>drv16</b> and its analog PicoRV32.</p>
Full article ">Figure 5
<p>ALU (Arithmetic Logic Unit).</p>
Full article ">Figure 6
<p>Register x0 handling.</p>
Full article ">Figure 7
<p>Control unit of <b>drv16</b> soft core processor.</p>
Full article ">Figure 8
<p>Execution PLA (Programmable Logic Array).</p>
Full article ">Figure 9
<p>Internal operations timing diagram of <b>drv16</b>.</p>
Full article ">Figure 10
<p>Terminal output in plain text.</p>
Full article ">Figure 11
<p>Mandelbrot-type fractal generated as text output using <b>drv16</b> emulation on <span class="html-italic">DIGITAL</span> tool and its overlay with the high resolution graphical model.</p>
Full article ">
19 pages, 1368 KiB  
Article
Determinants of Dockless Bicycle-Sharing Adoption and Usage Intensity for Commuting and Errands: Evidence from Disadvantaged Neighborhoods
by Hongyu Wang, Yu Dong and Liang Ma
Land 2024, 13(12), 2055; https://doi.org/10.3390/land13122055 - 30 Nov 2024
Viewed by 548
Abstract
The emergence of dockless bicycle sharing has transformed urban transportation, particularly in China, by offering a flexible and accessible travel option. However, understanding the factors driving its adoption and usage in disadvantaged neighborhoods is crucial, as these areas often face unique mobility challenges. [...] Read more.
The emergence of dockless bicycle sharing has transformed urban transportation, particularly in China, by offering a flexible and accessible travel option. However, understanding the factors driving its adoption and usage in disadvantaged neighborhoods is crucial, as these areas often face unique mobility challenges. This study explores these determinants, providing a more comprehensive analysis than prior research by focusing specifically on disadvantaged communities. Using survey data from four such neighborhoods in Xi’an, China, we apply Structural Equation Modeling to investigate the factors influencing individuals’ decisions to adopt and intensively use dockless bicycle sharing for commuting and errands. The results reveal key determinants, including psychological factors, demographic characteristics, and spatial and social contexts, and their interaction mechanisms. Attitudes are found to have a substantial impact on bicycle-sharing behavior for both commuting and errands, while social norms and perceived behavioral control (PBC) mainly influence usage for errands. Interestingly, PBC affects adoption but not usage frequency. The findings also highlight that proximity to schools, subways, and neighborhood aesthetics positively correlate with bicycle-sharing adoption for errands, whereas bicycling infrastructure significantly influences usage intensity. However, none of the neighborhood environment factors were found to significantly affect adoption for commuting purposes. These insights are especially valuable for developing targeted strategies to promote bicycle sharing as a sustainable transportation solution in disadvantaged neighborhoods, where improved access can significantly enhance mobility and quality of life. Full article
Show Figures

Figure 1

Figure 1
<p>Conceptual framework.</p>
Full article ">Figure 2
<p>Different bicycle-sharing usage behaviors of the same respondents. Notes: True = bicycle sharing is the primary mode; False = bicycle sharing is not the primary mode; Always = “more than twice a week”; Usually = “once a week”; Often = “about once every two weeks”; Sometimes = “once or twice a month”; Rarely = “less than once a month”.</p>
Full article ">Figure 3
<p>Summary of model results.</p>
Full article ">
26 pages, 6589 KiB  
Article
Integration of BIM and GIS for the Digitization of the Built Environment
by Giuseppe Piras, Francesco Muzi and Claudia Zylka
Appl. Sci. 2024, 14(23), 11171; https://doi.org/10.3390/app142311171 - 29 Nov 2024
Viewed by 604
Abstract
The integration of Building Information Modelling (BIM) and Geographic Information Systems (GIS) is a growing reality in the building production sector. Through this integration, it is possible to improve the efficiency of management, maintenance, use and planning of conservation operations, providing an integrated [...] Read more.
The integration of Building Information Modelling (BIM) and Geographic Information Systems (GIS) is a growing reality in the building production sector. Through this integration, it is possible to improve the efficiency of management, maintenance, use and planning of conservation operations, providing an integrated and dynamic vision of the built environment. Simultaneous exchange of BIM-GIS elements in a shared environment facilitates information access and optimizes processes like requalification, activity planning, safety and sustainable urban design. Two alternative strategies are proposed for the multidisciplinary approach, using advanced technologies to acquire, process and manage detailed and georeferenced data. The first one is an open-source environment to guarantee flexibility, customization and accessibility. The second option, in a closed-source environment, provides advanced functionalities and dedicated support. Both require careful planning, detailed analysis and collaboration between the disciplines of architecture, engineering and geoinformatics. The study transcends theoretical analysis by exploring practical implications for real-world systems integration, examining their advantages, limitations and potential synergies in terms of flexibility, security and sustainability. This will enable a more efficient and comprehensive management of the architectural heritage and the built environment, contributing to its preservation and enhancement in the context of the digital transition in a future perspective of smart cities. Full article
(This article belongs to the Section Civil Engineering)
Show Figures

Figure 1

Figure 1
<p>OS methodology chart.</p>
Full article ">Figure 2
<p>QGIS interface, layer and geospatial map.</p>
Full article ">Figure 3
<p>Creation of polygon process in QGIS.</p>
Full article ">Figure 4
<p>Database DBMS property visualization in QGIS.</p>
Full article ">Figure 5
<p>Interactive view, property of building element in OS viewer.</p>
Full article ">Figure 6
<p>Interactive view, 3D measurement in OS viewer.</p>
Full article ">Figure 7
<p>Closed-source methodology chart.</p>
Full article ">Figure 8
<p>Application of the WGS84 coordinate system in ArcGIS Pro.</p>
Full article ">Figure 9
<p>Application of the coordinate system in the Revit (BIM) environment.</p>
Full article ">Figure 10
<p>Visualization interface of BIM-GIS integration into the CS, 3D BIM model in a GIS environment.</p>
Full article ">
30 pages, 6408 KiB  
Article
Construction of a Deep Learning Model for Unmanned Aerial Vehicle-Assisted Safe Lightweight Industrial Quality Inspection in Complex Environments
by Zhongyuan Jing and Ruyan Wang
Drones 2024, 8(12), 707; https://doi.org/10.3390/drones8120707 - 27 Nov 2024
Viewed by 500
Abstract
With the development of mobile communication technology and the proliferation of the number of Internet of Things (IoT) terminal devices, a large amount of data and intelligent applications are emerging at the edge of the Internet, giving rise to the demand for edge [...] Read more.
With the development of mobile communication technology and the proliferation of the number of Internet of Things (IoT) terminal devices, a large amount of data and intelligent applications are emerging at the edge of the Internet, giving rise to the demand for edge intelligence. In this context, federated learning, as a new distributed machine learning method, becomes one of the key technologies to realize edge intelligence. Traditional edge intelligence networks usually rely on terrestrial communication base stations as parameter servers to manage communication and computation tasks among devices. However, this fixed infrastructure is difficult to adapt to the complex and ever-changing heterogeneous network environment. With its high degree of flexibility and mobility, the introduction of unmanned aerial vehicles (UAVs) into the federated learning framework can provide enhanced communication, computation, and caching services in edge intelligence networks, but the limited communication bandwidth and unreliable communication environment increase system uncertainty and may lead to a decrease in overall energy efficiency. To address the above problems, this paper designs a UAV-assisted federated learning with a privacy-preserving and efficient data sharing method, Communication-efficient and Privacy-protection for FL (CP-FL). A network-sparsifying pruning training method based on a channel importance mechanism is proposed to transform the pruning training process into a constrained optimization problem. A quantization-aware training method is proposed to automate the learning of quantization bitwidths to improve the adaptability between features and data representation accuracy. In addition, differential privacy is applied to the uplink data on this basis to further protect data privacy. After the model parameters are aggregated on the pilot UAV, the model is subjected to knowledge distillation to reduce the amount of downlink data without affecting the utility. Experiments on real-world datasets validate the effectiveness of the scheme. The experimental results show that compared with other federated learning frameworks, the CP-FL approach can effectively mitigate the communication overhead, as well as the computation overhead, and has the same outstanding advantage in terms of the balance between privacy and usability in differential privacy preservation. Full article
(This article belongs to the Special Issue Mobile Fog and Edge Computing in Drone Swarms)
Show Figures

Figure 1

Figure 1
<p>Example of a workplace for UAV-assisted industrial quality inspection.</p>
Full article ">Figure 2
<p>The architecture of CP-FL.</p>
Full article ">Figure 3
<p>Algorithm flow diagram.</p>
Full article ">Figure 4
<p>Schematic of knowledge distillation and federal learning processes. The teacher model generates soft labels for training the student model. Local updates are performed on the client, and the updated parameters are aggregated globally by the server.</p>
Full article ">Figure 5
<p>Diagram of the ConvNeXt network model (using depth-separable convolution to decouple the fusion of spatial information and the fusion of channel information, expanding the overall width of the model).</p>
Full article ">Figure 6
<p>Impact of different schemes on the performance of ResNet on MNIST.</p>
Full article ">Figure 7
<p>Impact of different schemes on the performance of ResNet on CIFAR-10.</p>
Full article ">Figure 8
<p>Performance test of model with different pruning rate based on MNIST dataset.</p>
Full article ">Figure 9
<p>Performance test of models with different pruning rates based on CIFAR-10 dataset.</p>
Full article ">Figure 10
<p>Layer-wise quantization bit statistics for VGG16.</p>
Full article ">Figure 11
<p>Layer-wise compression ratio statistics for VGG16.</p>
Full article ">Figure 12
<p>Classification accuracy of the CP-FL framework for participant models on the MNIST dataset.</p>
Full article ">Figure 13
<p>Classification accuracy of the CP-FL framework for participant models on the DTB70 dataset.</p>
Full article ">Figure 14
<p>Variation in accuracy on the CIFAR-10 dataset.</p>
Full article ">Figure 15
<p>Variation in the loss function on the CIFAR-10 dataset.</p>
Full article ">Figure 16
<p>Loss function vs. rounds for compression methods on MNIST.</p>
Full article ">Figure 17
<p>Loss function vs. rounds for compression method on CIFAR-10.</p>
Full article ">
32 pages, 7229 KiB  
Article
Resilience as a Concept for Convergence Across Health, Systems, and Well-Being: An AI-Augmented Mapping of 50 Years of Resilience Research
by Elizabeth Ekren, Maria E. Tomasso and Melinda M. Villagran
Sustainability 2024, 16(23), 10333; https://doi.org/10.3390/su162310333 - 26 Nov 2024
Viewed by 642
Abstract
Resilience has become a focal point of academic research investigating the impact of adverse disruption to the well-being of people, systems, the built environment, ecosystems, and climate. However, the proliferation of this work has not been accompanied by increasing clarity about the core [...] Read more.
Resilience has become a focal point of academic research investigating the impact of adverse disruption to the well-being of people, systems, the built environment, ecosystems, and climate. However, the proliferation of this work has not been accompanied by increasing clarity about the core meaning of resilience as a singular construct, threatening its relevance and complicating its use in practice. To improve the application of resilience in cross-disciplinary and convergence approaches to sustainability and well-being research, this work synthesized resilience conceptualizations across disciplines with novel artificial intelligence (AI)-augmented approaches. Using open-source applications for text mining and machine-learning-based natural language processing algorithms for the examination of text-as-data, this work mapped the content of 50 years of academic resilience work (24,732 abstracts). Presented as thematic and statistical textual associations in a series of network maps and tables, the findings highlight how specific measurements, components, and terminologies of resilience relate to one another within and across disciplines, emphasizing what concepts can be used to bridge disciplinary boundaries. From this, a converged conceptualization is derived to answer theoretical questions about the nature of resilience and define it as a dynamic process of control through the stages of disruption and progression to an improved state thereafter. This conceptualization supports a cross-disciplinary meaning of resilience that can enhance its shared understanding among a variety of stakeholders, and ultimately, the rigor and uniformity of its application in addressing sustainability and well-being challenges across multiple domains. Full article
Show Figures

Figure 1

Figure 1
<p>Text retrieval, cleaning, and analysis process.</p>
Full article ">Figure 2
<p>VOS Viewer network map with article title keyword co-occurrences. Title field pulled with binary counting, minimum occurrences of 10 (1150 total); top 60% (690) most relevant kept.</p>
Full article ">Figure 3
<p>Leximancer semantic map of resilience research abstracts. Themes shown at 25%. Concepts shown at 0%. Concept dot size reflects extent to which concept co-occurs with others.</p>
Full article ">Figure 4
<p>Leximancer semantic map of resilience research abstracts. Themes shown at 25%. Concepts shown at 100%. Concept dot size reflects extent to which concept co-occurs with others.</p>
Full article ">Figure 5
<p>VOS Viewer network map of abstracts with journal title key word co-occurrences. Journal title field pulled with 632 keywords with 280 manually selected for field indication.</p>
Full article ">Figure 6
<p>VOS Viewer network map of abstracts published prior to 2000 with title keyword co-occurrences. Title field pulled with binary counting, minimum occurrences of 3 (25 total); all relevant kept.</p>
Full article ">Figure 7
<p>VOS Viewer network map of abstracts published between 2000 and 2009 with title keyword co-occurrences. Title field pulled with binary counting, minimum occurrences of 5 (64 total); all relevant kept.</p>
Full article ">Figure 8
<p>VOS Viewer network map of abstracts published between 2010 and 2019 with title keyword co-occurrences. Title field pulled with binary counting, minimum occurrences of 10 (287 total); top 60% (172) most relevant kept.</p>
Full article ">Figure 9
<p>VOS Viewer network map of abstracts published 2020 and later with title keyword co-occurrences. Title field pulled with binary counting, minimum occurrences of 10 (847 total); top 60% (508) most relevant kept.</p>
Full article ">
13 pages, 253 KiB  
Article
Exploring the Feasibility and Acceptability of a Brief Online Dialogic Book-Sharing Training for Teaching Support Staff
by Judy Hutchings, Rebecca Lothian, Anwen Jones and Margiad E. Williams
Children 2024, 11(12), 1423; https://doi.org/10.3390/children11121423 - 26 Nov 2024
Viewed by 368
Abstract
Background/Objectives: In the UK, significant and rising numbers of children arrive in schools with marked deficits in key skills such as oral language. This rise has been further negatively impacted by the COVID-19 pandemic. Given this, the foundation phase of primary school education [...] Read more.
Background/Objectives: In the UK, significant and rising numbers of children arrive in schools with marked deficits in key skills such as oral language. This rise has been further negatively impacted by the COVID-19 pandemic. Given this, the foundation phase of primary school education is a necessary environment for targeting language deficits. There is evidence to suggest that teaching assistant (TA)-led interventions can be effective when adequate training and support are provided. This study explored the feasibility of providing a brief, online dialogic book-sharing training to TAs, and whether this training would be effective in upskilling TAs and enable them to improve the language outcomes of children aged 3–7 years in a school context. Methods: North Wales primary schools were invited to nominate TAs for the two half-day training sessions. Five schools responded, and eleven TA–child dyads participated. Data were collected on recruitment, training acceptability and baseline, and post-training measures from TAs and children (2–3 weeks after the final training session) and 4–6 weeks after the first follow-up. Measures of TA competence and behavior were collected, along with measures of child language and behavior. Results: Schools and TAs were recruited; TAs reported positively to the training, and the results showed small to large effect size benefits on all TA skills and child expressive language with significant positive post-training effects on TAs’ use of reflections and child language abilities. However, these effects were somewhat reduced at follow-up. Conclusions: Overall, the results of this feasibility study provide positive evidence for this training as an accessible way for schools to strengthen their prevention infrastructures by professionalizing a growing, but relatively untrained, group within the school workforce. Full article
(This article belongs to the Section Pediatric Neurology & Neurodevelopmental Disorders)
26 pages, 2100 KiB  
Article
Energy–Economy–Carbon Emissions: Impacts of Energy Infrastructure Investments in Pakistan Under the China–Pakistan Economic Corridor
by Xiue Li, Zhirao Liu and Tariq Ali
Sustainability 2024, 16(23), 10191; https://doi.org/10.3390/su162310191 - 21 Nov 2024
Viewed by 694
Abstract
Energy–economy–environment sustainability is critical in shaping energy policies, especially in developing countries facing energy shortages. Investment in energy infrastructure, such as under the China–Pakistan Economic Corridor (CPEC), provides an opportunity to explore how such investments impact economic growth, environmental quality, and energy security. [...] Read more.
Energy–economy–environment sustainability is critical in shaping energy policies, especially in developing countries facing energy shortages. Investment in energy infrastructure, such as under the China–Pakistan Economic Corridor (CPEC), provides an opportunity to explore how such investments impact economic growth, environmental quality, and energy security. This study examines the energy, economic, and environmental effects of CPEC’s energy investments in Pakistan, covering a range of power sources, including coal, hydro, solar, wind, and nuclear energy. Utilizing data from 31 CPEC energy projects and employing the GTAP-E-Power model, this research assesses these impacts through seven scenarios, comprehensively analyzing the heterogeneity of different power sources. Our findings reveal that while all types of CPEC energy infrastructure investments contribute to increasing the share of zero-emissions electricity to 49.1% and reducing CO2 emissions by 18.61 million tons, the economic impacts vary significantly by energy source. The study suggests that it is crucial to prioritize renewable energy investments while addressing immediate power shortages to balance economic growth with environmental sustainability. Policymakers should also consider the potential inter-sectoral substitution effects when applying significant shocks to specific sectors. This analysis informs future energy investment decisions under CPEC and offers insights for other Belt and Road Initiative (BRI) countries aiming to optimize their energy strategies for sustainable development. Full article
Show Figures

Figure 1

Figure 1
<p>The framework of the methodology, database, and procedure. The database is aggregated using GTAPagg2, while updates and simulations are performed using GEMPACK. Please refer to [<a href="#B28-sustainability-16-10191" class="html-bibr">28</a>] for the GTAP-E-Power Model.</p>
Full article ">Figure 2
<p>Nested electric power substitution in the GTAP-E-Power model and CO<sub>2</sub> releasing energy commodities. The sub-sectors of electricity are detailed in <a href="#app1-sustainability-16-10191" class="html-app">Appendix A</a> <a href="#sustainability-16-10191-t0A7" class="html-table">Table A7</a>. Source: Adapted from the GTAP-E-Model [<a href="#B28-sustainability-16-10191" class="html-bibr">28</a>].</p>
Full article ">Figure 3
<p>Overview of CPEC energy infrastructure investment. (<b>a</b>) Installed capacity (MW) added to different electricity generation sources. (<b>b</b>) Share of installed capacity (%) added to each province of Pakistan. (<b>c</b>) Estimated cost (USD million) for different electricity generation sources. (<b>d</b>) Share of estimated cost (%) for each province of Pakistan. Source: Calculated based on the project-level information in <a href="#app1-sustainability-16-10191" class="html-app">Appendix A</a> <a href="#sustainability-16-10191-t0A4" class="html-table">Table A4</a>, <a href="#sustainability-16-10191-t0A5" class="html-table">Table A5</a> and <a href="#sustainability-16-10191-t0A6" class="html-table">Table A6</a>.</p>
Full article ">Figure 4
<p>Change in energy output and price. (<b>a</b>) Percentage change in the output of electricity sub-sectors and non-electricity sectors (%). (<b>b</b>) Value change in the output of electricity sub-sectors and non-electricity sectors (USD million). (<b>c</b>) Percentage change in the price of electricity sub-sectors and non-electricity sectors (%). All changes are relative to the situation in the base year. Since HydroP and GasP in Pakistan are zero, there are no results for them. Source: Calculated based on simulation results from the GTAP-E-Power model.</p>
Full article ">Figure 5
<p>Change in energy structure. (<b>a</b>) Output value share of electricity generated from zero-emissions power sources (NuclearBL, HydroBL, WindBL, and SolarP) and fuel-fired power sources (CoalBL, GasBL, OilBL, other BL, and OilP). (<b>b</b>) Output value share of electricity generated from each power source. “Pre” refers to the situation before shocks in the base year. Source: Calculated based on simulation results from the GTAP-E-Power model.</p>
Full article ">Figure 6
<p>Change in CO<sub>2</sub> emissions from fuel energy commodities. (<b>a</b>) Percentage change in CO<sub>2</sub> emissions (%) from coal, oil, gas, p_c, and gas supply in Pakistan. (<b>b</b>) Absolute change in CO<sub>2</sub> emissions (Mts) from coal, oil, gas, p_c, and gas supply in Pakistan. The last two rows refer to the total absolute change in CO<sub>2</sub> emissions in Pakistan and the world, respectively. All changes are relative to the situation in the base year. Source: Calculated based on simulation results from the GTAP-E-Power model.</p>
Full article ">Figure 7
<p>Change in CO<sub>2</sub> emissions from production across different sectors. (<b>a</b>) CO<sub>2</sub> emissions in the base year before shocks (Mts). (<b>b</b>) CO<sub>2</sub> emissions in scenario S7 (Mts). This figure represents CO<sub>2</sub> emissions from firm activities, covering 80% of Pakistan’s total emissions. The remaining 20% comes from consumption. Coal, oil, gas, p_c, and gas supply are the five fuel energy commodities that release CO<sub>2</sub>. Here, the nodes on the left represent different sectors (the sources) that use these energy commodities and thus emit CO<sub>2</sub>, while the nodes on the right correspond to the specific energy commodities (the target). The production of these energy commodities also emits (embodied) CO<sub>2</sub>, but the emissions are relatively very small. Source: Calculated based on simulation results from the GTAP-E-Power model.</p>
Full article ">Figure 8
<p>Change in non-energy sectors. (<b>a</b>) Percentage change in the output of non-energy sectors (%). (<b>b</b>) Percentage change in the price of non-energy sectors (%). All changes are relative to the situation in the base year. Source: Calculated based on simulation results from the GTAP-E-Power model.</p>
Full article ">
22 pages, 10759 KiB  
Article
Design of a Cyber-Physical System-of-Systems Architecture for Elderly Care at Home
by José Galeas, Alberto Tudela, Óscar Pons, Juan Pedro Bandera and Antonio Bandera
Electronics 2024, 13(23), 4583; https://doi.org/10.3390/electronics13234583 - 21 Nov 2024
Viewed by 517
Abstract
The idea of introducing a robot into an Ambient Assisted Living (AAL) environment to provide additional services beyond those provided by the environment itself has been explored in numerous projects. Moreover, new opportunities can arise from this symbiosis, which usually requires both systems [...] Read more.
The idea of introducing a robot into an Ambient Assisted Living (AAL) environment to provide additional services beyond those provided by the environment itself has been explored in numerous projects. Moreover, new opportunities can arise from this symbiosis, which usually requires both systems to share the knowledge (and not just the data) they capture from the context. Thus, by using knowledge extracted from the raw data captured by the sensors deployed in the environment, the robot can know where the person is and whether he/she should perform some physical exercise, as well as whether he/she should move a chair away to allow the robot to successfully complete a task. This paper describes the design of an Ambient Assisted Living system where an IoT scheme and robot coexist as independent but connected elements, forming a cyber-physical system-of-systems architecture. The IoT environment includes cameras to monitor the person’s activity and physical position (lying down, sitting…), as well as non-invasive sensors to monitor the person’s heart or breathing rate while lying in bed or sitting in the living room. Although this manuscript focuses on how both systems handle and share the knowledge they possess about the context, a couple of example use cases are included. In the first case, the environment provides the robot with information about the positions of objects in the environment, which allows the robot to augment the metric map it uses to navigate, detecting situations that prevent it from moving to a target. If there is a person nearby, the robot will approach them to ask them to move a chair or open a door. In the second case, even more use is made of the robot’s ability to interact with the person. When the IoT system detects that the person has fallen to the ground, it passes this information to the robot so that it can go to the person, talk to them, and ask for external help if necessary. Full article
(This article belongs to the Special Issue Emerging Artificial Intelligence Technologies and Applications)
Show Figures

Figure 1

Figure 1
<p>The five-layered CPS architecture of the robot proposed by Lin et al. [<a href="#B16-electronics-13-04583" class="html-bibr">16</a>].</p>
Full article ">Figure 2
<p>A snapshot of the DSR. In this example, the robot is included within the IoT ecosystem.</p>
Full article ">Figure 3
<p>The CORTEX instantiation in the CPS-AAL proposal [<a href="#B3-electronics-13-04583" class="html-bibr">3</a>]: the IoT system and robot share a common DSR.</p>
Full article ">Figure 4
<p>The IoT system and the robot share a state representation but maintain their own working memories.</p>
Full article ">Figure 5
<p>The layout of the small apartment and the distribution of sensors.</p>
Full article ">Figure 6
<p>The Morphia robot navigating in the small apartment.</p>
Full article ">Figure 7
<p>A schematic view of the two CORTEX architectures.</p>
Full article ">Figure 8
<p>The device designed for mounting the FMCW 60GHz sensor (MR60BHA1) from Seeed Studio and the ESP32C3 microcontroller: (<b>Left</b>) The top layer showing the ESP32C3 (Espressif Systems, Shanghai, China) and (<b>Right</b>) the bottom layer showing the MR60BHA1 sensor.</p>
Full article ">Figure 9
<p>(<b>Left</b>) A rectified image showing a person interacting with the robot in the bedroom and (<b>right</b>) the associated depth image.</p>
Full article ">Figure 10
<p>Resulting metrics from yolov10 model training.</p>
Full article ">Figure 11
<p>ROS 2 perception pipeline.</p>
Full article ">Figure 12
<p>The detection of a person lying on the floor and objects (chairs and a bed) in the bedroom.</p>
Full article ">Figure 13
<p>(<b>Top</b>) The robot plans a path towards the bedroom. There is no problem navigating this route. (<b>Bottom</b>) When the robot is moving, the main door is closed. This event is immediately detected by the AAL system and communicated to the robot. The robot must ask the person in the home to open this door.</p>
Full article ">Figure 14
<p>The behaviour tree encoding attention to a fall alarm.</p>
Full article ">Figure 15
<p>A person correctly detected as having fallen on the ground (see text).</p>
Full article ">
Back to TopTop