[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (4,324)

Search Parameters:
Keywords = end-user

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
17 pages, 3441 KiB  
Article
A Trip Purpose Inference Method Considering the Origin and Destination of Shared Bicycles
by Haicheng Xiao, Xueyan Shen and Xiujian Yang
Appl. Sci. 2025, 15(1), 483; https://doi.org/10.3390/app15010483 - 6 Jan 2025
Abstract
This study advances the inference of travel purposes for dockless bike-sharing users by integrating dockless bike-sharing and point of interest (POI) data, thereby enhancing traditional models. The methodology involves cleansing dockless bike-sharing datasets, identifying destination areas via users’ walking radii from their start [...] Read more.
This study advances the inference of travel purposes for dockless bike-sharing users by integrating dockless bike-sharing and point of interest (POI) data, thereby enhancing traditional models. The methodology involves cleansing dockless bike-sharing datasets, identifying destination areas via users’ walking radii from their start and end points, and categorizing POI data to establish a correlation between trip purposes and POI types. The innovative GMOD model (gravity model considering origin and destination) is developed by modifying the basic gravity model parameters with the distribution of POI types and travel time. This refined approach significantly improves the accuracy of predicting travel purposes, surpassing standard gravity models. Particularly effective in identifying less frequent but critical purposes such as transfers, medical visits, and educational trips, the GMOD model demonstrates substantial improvements in these areas. The model’s efficacy in sample data tests highlights its potential as a valuable tool for urban transport analysis and in conducting comprehensive trip surveys. Full article
Show Figures

Figure 1

Figure 1
<p>Framework and workflow of the travel purpose inference method.</p>
Full article ">Figure 2
<p>Schematic diagram of the candidate POI list in the area.</p>
Full article ">Figure 3
<p>Research Area and Distribution of Shared Bicycles.</p>
Full article ">Figure 4
<p>Proportion of different cycling durations.</p>
Full article ">Figure 5
<p>Probabilistic statistical analysis of travel moment data.</p>
Full article ">Figure 6
<p>Statistical analysis of the probability of POI category data.</p>
Full article ">Figure 7
<p>Inferred results of the purpose of each type of travel activity for dockless bike-sharing users.</p>
Full article ">Figure 8
<p>Accuracy of inferring the purpose of each type of travel activity for dockless bike-sharing users.</p>
Full article ">
22 pages, 4901 KiB  
Article
Clustering Analysis for Active and Reactive Energy Consumption Data Based on AMI Measurements
by Oscar A. Bustos-Brinez and Javier Rosero Garcia
Energies 2025, 18(1), 221; https://doi.org/10.3390/en18010221 - 6 Jan 2025
Abstract
Electrical data analysis based on smart grids has become a fundamental tool used by electrical grid stakeholders to understand the energy consumption patterns of users, although many proposals in this area do not consider reactive energy as another source of useful information regarding [...] Read more.
Electrical data analysis based on smart grids has become a fundamental tool used by electrical grid stakeholders to understand the energy consumption patterns of users, although many proposals in this area do not consider reactive energy as another source of useful information regarding distribution costs and threats to the grid. In this regard, the analysis of reactive energy patterns can become an extremely useful addition to existing electrical data analysis frameworks. This work shows the application of a series of clustering techniques over measurements of both active and reactive energy consumption measured for end users from the Colombian electrical network, including an analysis of the efficiency of the network measured by calculating the ratio of active energy to total consumption (power factor) per user. This allows a detailed characterization of users to be compiled, based on the identification of different active and reactive energy consumption behaviors, which could help grid operators to improve overall grid management and to increase the efficiency of their reactive energy compensation strategies. Full article
(This article belongs to the Special Issue Computational Intelligence in Electrical Systems: 2nd Edition)
26 pages, 3308 KiB  
Article
Adaptive Cloud-Based Big Data Analytics Model for Sustainable Supply Chain Management
by Nenad Stefanovic, Milos Radenkovic, Zorica Bogdanovic, Jelena Plasic and Andrijana Gaborovic
Sustainability 2025, 17(1), 354; https://doi.org/10.3390/su17010354 - 6 Jan 2025
Viewed by 145
Abstract
Due to uncertain business climate, fierce competition, environmental challenges, regulatory requirements, and the need for responsible business operations, organizations are forced to implement sustainable supply chains. This necessitates the use of proper data analytics methods and tools to monitor economic, environmental, and social [...] Read more.
Due to uncertain business climate, fierce competition, environmental challenges, regulatory requirements, and the need for responsible business operations, organizations are forced to implement sustainable supply chains. This necessitates the use of proper data analytics methods and tools to monitor economic, environmental, and social performance, as well as to manage and optimize supply chain operations. This paper discusses issues, challenges, and the state of the art approaches in supply chain analytics and gives a systematic literature review of big data developments associated with supply chain management (SCM). Even though big data technologies promise many benefits and advantages, the prospective applications of big data technologies in sustainable SCM are still not achieved to a full extent. This necessitates work on several segments like research, the design of new models, architectures, services, and tools for big data analytics. The goal of the paper is to introduce a methodology covering the whole Business Intelligence (BI) lifecycle and a unified model for advanced supply chain big data analytics (BDA). The model is multi-layered, cloud-based, and adaptive in terms of specific big data scenarios. It comprises business process modeling, data ingestion, storage, processing, machine learning, and end-user intelligence and visualization. It enables the creation of next-generation BDA systems that improve supply chain performance and enable sustainable SCM. The proposed supply chain BDA methodology and the model have been successfully applied in practice for the purpose of supplier quality management. The solution based on the real-world dataset and the illustrative supply chain case are presented and discussed. The results demonstrate the effectiveness and applicability of the big data model for intelligent and insight-driven decision making and sustainable supply chain management. Full article
(This article belongs to the Special Issue Sustainable Enterprise Operation and Supply Chain Management)
Show Figures

Figure 1

Figure 1
<p>Methodology for big data analytics.</p>
Full article ">Figure 2
<p>Supply chain analytics lifecycle model.</p>
Full article ">Figure 3
<p>Supply chain big data solution architecture.</p>
Full article ">Figure 4
<p>Supplier quality analysis services cube.</p>
Full article ">Figure 5
<p>Supplier quality dashboard page.</p>
Full article ">Figure 6
<p>Supplier downtime analysis dashboard.</p>
Full article ">Figure 7
<p>Result of natural queries.</p>
Full article ">Figure 8
<p>Automatically generated machine learning insights.</p>
Full article ">
50 pages, 2370 KiB  
Systematic Review
Movement Disorders and Smart Wrist Devices: A Comprehensive Study
by Andrea Caroppo, Andrea Manni, Gabriele Rescio, Anna Maria Carluccio, Pietro Aleardo Siciliano and Alessandro Leone
Sensors 2025, 25(1), 266; https://doi.org/10.3390/s25010266 - 5 Jan 2025
Viewed by 523
Abstract
In the medical field, there are several very different movement disorders, such as tremors, Parkinson’s disease, or Huntington’s disease. A wide range of motor and non-motor symptoms characterizes them. It is evident that in the modern era, the use of smart wrist devices, [...] Read more.
In the medical field, there are several very different movement disorders, such as tremors, Parkinson’s disease, or Huntington’s disease. A wide range of motor and non-motor symptoms characterizes them. It is evident that in the modern era, the use of smart wrist devices, such as smartwatches, wristbands, and smart bracelets is spreading among all categories of people. This diffusion is justified by the limited costs, ease of use, and less invasiveness (and consequently greater acceptability) than other types of sensors used for health status monitoring. This systematic review aims to synthesize research studies using smart wrist devices for a specific class of movement disorders. Following PRISMA-S guidelines, 130 studies were selected and analyzed. For each selected study, information is provided relating to the smartwatch/wristband/bracelet model used (whether it is commercial or not), the number of end-users involved in the experimentation stage, and finally the characteristics of the benchmark dataset possibly used for testing. Moreover, some articles also reported the type of raw data extracted from the smart wrist device, the implemented designed algorithmic pipeline, and the data classification methodology. It turned out that most of the studies have been published in the last ten years, showing a growing interest in the scientific community. The selected articles mainly investigate the relationship between smart wrist devices and Parkinson’s disease. Epilepsy and seizure detection are also research topics of interest, while there are few papers analyzing gait disorders, Huntington’s Disease, ataxia, or Tourette Syndrome. However, the results of this review highlight the difficulties still present in the use of the smartwatch/wristband/bracelet for the identified categories of movement disorders, despite the advantages these technologies could bring in the dissemination of low-cost solutions usable directly within living environments and without the need for caregivers or medical personnel. Full article
(This article belongs to the Special Issue Intelligent Sensors and Signal Processing in Industry)
Show Figures

Figure 1

Figure 1
<p>Main functionalities (already or being integrated) for smart wrist devices in the market.</p>
Full article ">Figure 2
<p>Classification of movement disorders with an approximate indication of worldwide incidence.</p>
Full article ">Figure 3
<p>Flow diagram generated with PRISMA-S methodology, depicting the reviewers’ process of finding published data on the considered topic and how they decided whether to include it in the review.</p>
Full article ">Figure 4
<p>Distribution of the articles by year of publication.</p>
Full article ">Figure 5
<p>Distribution of the articles by movement disorder.</p>
Full article ">Figure 6
<p>Categorization of the articles related to PD movement disorder.</p>
Full article ">Figure 7
<p>Categorization of articles related to epilepsy or seizure detection, based on type of wrist device.</p>
Full article ">Figure 8
<p>Graphical representation of the distribution of articles with respect to classification methodologies.</p>
Full article ">
31 pages, 1632 KiB  
Review
Recent Advancements in Localization Technologies for Wireless Capsule Endoscopy: A Technical Review
by Muhammad A. Ali, Neil Tom, Fahad N. Alsunaydih and Mehmet R. Yuce
Sensors 2025, 25(1), 253; https://doi.org/10.3390/s25010253 - 4 Jan 2025
Viewed by 254
Abstract
Conventional endoscopy is limited in its ability to examine the small bowel and perform long-term monitoring due to the risk of infection and tissue perforation. Wireless Capsule Endoscopy (WCE) is a painless and non-invasive method of examining the body’s internal organs using a [...] Read more.
Conventional endoscopy is limited in its ability to examine the small bowel and perform long-term monitoring due to the risk of infection and tissue perforation. Wireless Capsule Endoscopy (WCE) is a painless and non-invasive method of examining the body’s internal organs using a small camera that is swallowed like a pill. The existing active locomotion technologies do not have a practical localization system to control the capsule’s movement within the body. A robust localization system is essential for safely guiding the WCE device through the complex gastrointestinal (GI) tract. Moreover, having access to the capsule’s trajectory data is highly desirable for drug delivery and surgery, as well as for creating accurate user profiles for diagnosis and future reference. Therefore, a robust, real-time, and practical localization system is imperative to advance the field of WCE and make it desirable for clinical trials. In this work, we have identified salient features of different localization techniques and categorized studies in comprehensive tables. This study is self-contained as it offers a comprehensive overview of emerging localization techniques based on magnetic field, radio frequency (RF), video, and hybrid methods. A summary at the end of each method is provided to point out the potential gaps and give directions for future research. The main point of this work is to present an in-depth review of the most recent localization techniques published in the past five years. This will assist researchers in comprehending current techniques and pinpointing potential areas for further investigation. This review can be a significant reference and guide for future research on WCE localization. Full article
(This article belongs to the Special Issue Feature Review Papers in Intelligent Sensors)
Show Figures

Figure 1

Figure 1
<p>An RF and video-based hybrid localization technique. (<b>a</b>) A WCE device passing through a GI tract surrounded by an array of sensors. (<b>b</b>) Fusion of different measurement modules. (<b>c</b>) Position estimation.</p>
Full article ">Figure 2
<p>Review methodology.</p>
Full article ">Figure 3
<p>An overview of different techniques used for WCE localization.</p>
Full article ">Figure 4
<p>System overview of a magnetic field-based localization technique with active coils [<a href="#B36-sensors-25-00253" class="html-bibr">36</a>].</p>
Full article ">Figure 5
<p>System overview of a wearable capsule endoscope electromagnetic localization system [<a href="#B61-sensors-25-00253" class="html-bibr">61</a>].</p>
Full article ">Figure 6
<p>Overview of an RF and video-based hybrid localization technique [<a href="#B85-sensors-25-00253" class="html-bibr">85</a>].</p>
Full article ">
17 pages, 1299 KiB  
Article
Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT
by Kisung Park, Myeonghyun Kim and Youngho Park
Sensors 2025, 25(1), 237; https://doi.org/10.3390/s25010237 - 3 Jan 2025
Viewed by 264
Abstract
The proliferation of the Internet of Things (IoT) has worsened the challenge of maintaining data and user privacy. IoT end devices, often deployed in unsupervised environments and connected to open networks, are susceptible to physical tampering and various other security attacks. Thus, robust, [...] Read more.
The proliferation of the Internet of Things (IoT) has worsened the challenge of maintaining data and user privacy. IoT end devices, often deployed in unsupervised environments and connected to open networks, are susceptible to physical tampering and various other security attacks. Thus, robust, efficient authentication and key agreement (AKA) protocols are essential to protect data privacy during exchanges between end devices and servers. The previous work in “Provably Secure ECC-Based Anonymous Authentication and Key Agreement for IoT” proposed a novel AKA scheme for secure IoT environments. They claimed their protocol offers comprehensive security features, guarding against numerous potential flaws while achieving session key security. However, this paper demonstrates through logical and mathematical analyses that the previous work is vulnerable to various attacks. We conducted a security analysis using the extended Canetti and Krawczyk (eCK) model, which is widely employed in security evaluations. This model considers scenarios where an attacker has complete control over the network, including the ability to intercept, modify, and delete messages, while also accounting for the potential exposure of ephemeral private keys. Furthermore, we show that their scheme fails to meet critical security requirements and relies on flawed security assumptions. We prove our findings using the automated validation of internet security protocols and applications, a widely recognized formal verification tool. To strengthen attack resilience, we propose several recommendations for the advancement of more robust and efficient AKA protocols specifically designed for IoT environments. Full article
Show Figures

Figure 1

Figure 1
<p>End device impersonation attack in the previous scheme.</p>
Full article ">Figure 2
<p>AVISPA simulation procedure.</p>
Full article ">Figure 3
<p>HLPSL description: TA’s role.</p>
Full article ">Figure 4
<p>HLPSL description: SP’s role.</p>
Full article ">Figure 5
<p>HLPSL description: end device’s role.</p>
Full article ">Figure 6
<p>HLPSL description: session and environment.</p>
Full article ">Figure A1
<p>Simulation results. (<b>a</b>) Result: CL-AtSe. (<b>b</b>) Result: OFMC.</p>
Full article ">Figure A2 Cont.
<p>Simulation results. (<b>a</b>) Result: CL-AtSe. (<b>b</b>) Result: OFMC.</p>
Full article ">
43 pages, 10533 KiB  
Article
Footprints of the Future: Cleaner and Faster Transportation with Shared E-Scooter Operational Models
by Ömer Kaya
ISPRS Int. J. Geo-Inf. 2025, 14(1), 16; https://doi.org/10.3390/ijgi14010016 - 2 Jan 2025
Viewed by 303
Abstract
In recent years, shared e-scooters have become increasingly popular as a mode of transportation in urban areas. Shared e-scooters have emerged as a convenient and sustainable transportation option in urban areas, providing users with a flexible and efficient way to travel short distances [...] Read more.
In recent years, shared e-scooters have become increasingly popular as a mode of transportation in urban areas. Shared e-scooters have emerged as a convenient and sustainable transportation option in urban areas, providing users with a flexible and efficient way to travel short distances within a city. Many service providers and local municipalities are interested in implementing shared e-scooter operational models. However, determining which operating model to prefer and what the service areas will be is a significant problem. We aimed to solve the implementation of three different operational models, the site selection problem of station locations, and service areas for Erzurum, the metropolitan city in this study. As shared e-scooter is quite a new transportation mode; information collected to assess the operational models’ sustainability performance may be indeterminate and vague. In this study, the Geographic Information System (GIS)-based hybrid multi-criteria decision-making (MCDM) method is proposed for the solution of implementation, site selection, and service areas problems of three different shared e-scooter operational models. To this end, a four-step scientific and strategic solution approach is developed: (i) the identification and detailed explanation of 5 main and 24 sub-criteria, (ii) the weighting of criteria through the Analytical Hierarchical Process (AHP), Multi-Influencing Factor (MIF), and Best–Worst Method (BWM) in order to increase the sensitivity and robustness of the study, (iii) obtaining a suitability map for the solution of implementation, site selection, and service areas problems of operational models, and (iv) assigning shared e-scooter stations and analyzing their performance levels with COmplex PRoportional ASsessment (COPRAS). The results show that, in Erzurum, the central three districts are the most suitable for service areas. The paper’s solution methodology can help service providers and policymakers invest in sustainable shared e-scooter operational models, even in situations of high uncertainty. Full article
(This article belongs to the Topic Spatial Decision Support Systems for Urban Sustainability)
Show Figures

Figure 1

Figure 1
<p>The flowchart of the study.</p>
Full article ">Figure 2
<p>Study area.</p>
Full article ">Figure 3
<p>Web of Science-data-based density visualization.</p>
Full article ">Figure 4
<p>Shared e-scooter operating model factor relationships.</p>
Full article ">Figure 5
<p>Average weights of evaluation criteria.</p>
Full article ">Figure 6
<p>Normalization maps of Transportation main criterion.</p>
Full article ">Figure 7
<p>Normalization maps of Education/Health main criterion.</p>
Full article ">Figure 8
<p>Normalization maps of Finance main criterion.</p>
Full article ">Figure 9
<p>Normalization maps of Social/Geographic main criterion.</p>
Full article ">Figure 10
<p>Normalization maps of Energy/Environment main criterion.</p>
Full article ">Figure 11
<p>Suitability map for shared e-scooter operational models/raster calculator analysis.</p>
Full article ">Figure 12
<p>Suitability map for shared e-scooter operational models/weighted overlay analysis.</p>
Full article ">Figure 13
<p>Service area of the free-floating operational model.</p>
Full article ">Figure 14
<p>Station-based operational model and assigned stations.</p>
Full article ">Figure 15
<p>Hybrid operational model and service areas.</p>
Full article ">Figure 16
<p>The clustering of top and bottom 50 potential station locations.</p>
Full article ">Figure 17
<p>Sensitivity analysis.</p>
Full article ">
19 pages, 1101 KiB  
Article
The Role of Trust and Perceived Social Justice in the Waste Recycling Practices of Households in Latvia
by Linda Veliverronena and Agnese Davidsone
Sustainability 2025, 17(1), 219; https://doi.org/10.3390/su17010219 - 31 Dec 2024
Viewed by 453
Abstract
In households, waste growth has become a critical global issue. This study aims to extend our understanding of promoting pro-environmental behavior by exploring the role of trust and perceived justice in households’ waste recycling practices. Trust and social justice are context-sensitive; studying them [...] Read more.
In households, waste growth has become a critical global issue. This study aims to extend our understanding of promoting pro-environmental behavior by exploring the role of trust and perceived justice in households’ waste recycling practices. Trust and social justice are context-sensitive; studying them in different contexts provides new knowledge on motivating recycling motivation. The research is based on semi-structured interviews (n = 40) on household recycling practices in Latvia. Research results demonstrate that a lack of institutional trust and perceived social injustice concerning household waste recycling practices appear in several contexts: trust in an individual’s capacity to recycle, trust in their peers’ capacity to recycle, trust in the efficiency of the recycling system, trust in the capacity of the waste management company to recycle, trust in waste management policy, and trust in information on recycling. Lack of trust in waste management is linked to perceived social injustice as waste management policy is criticized for not being accessible and putting too much responsibility on households, and this can serve as a critical barrier to household recycling. This study reveals which elements of the waste management system are related to a higher risk of social injustice and lack of trust in the perspective of households, thus signaling where changes in the system or providing end-users more information are needed to make the waste-sorting process more efficient. The findings of the study indicated a few directions for further improvements in the waste management system: ensuring the financial availability of recycling services, reassessment of the responsibilities of the stakeholders, and working toward raising awareness of the recycling and waste management system. Full article
(This article belongs to the Section Waste and Recycling)
Show Figures

Figure 1

Figure 1
<p>Micro-level factors related to household recycling behavior adapted from Macklin et al. [<a href="#B4-sustainability-17-00219" class="html-bibr">4</a>]. The symbol * refers to context specific factors in <a href="#sustainability-17-00219-f001" class="html-fig">Figure 1</a> identified in this particular study and these do not appear in the framework by Macklin et al.</p>
Full article ">Figure 2
<p>Meso-level factors related to household recycling behavior adapted from Macklin et al. [<a href="#B4-sustainability-17-00219" class="html-bibr">4</a>]. The symbol * refers to context specific factors in <a href="#sustainability-17-00219-f002" class="html-fig">Figure 2</a> identified in this particular study and these do not appear in the framework by Macklin et al.</p>
Full article ">Figure 3
<p>Macro-level factors related to household recycling behavior adapted from Macklin et al. [<a href="#B4-sustainability-17-00219" class="html-bibr">4</a>]. The symbol * refers to context specific factors in <a href="#sustainability-17-00219-f003" class="html-fig">Figure 3</a> identified in this particular study and these do not appear in the framework by Macklin et al.</p>
Full article ">
10 pages, 2390 KiB  
Article
Investigation on the Compressibility Factor of Hydrogen-Doped Natural Gas Using GERG-2008 Equation of State
by Ji-Chao Li, Yong Fan, Dan Pang, Tong Wu, Ying Zhang and Ke Zhou
Energies 2025, 18(1), 53; https://doi.org/10.3390/en18010053 - 27 Dec 2024
Viewed by 289
Abstract
The primary methods for hydrogen transportation include gaseous storage and transport, liquid hydrogen storage, and transport via organic liquid carriers. Among these, pipeline transportation offers the lowest cost and the greatest potential for large-scale, long-distance transport. Although the construction and operation costs of [...] Read more.
The primary methods for hydrogen transportation include gaseous storage and transport, liquid hydrogen storage, and transport via organic liquid carriers. Among these, pipeline transportation offers the lowest cost and the greatest potential for large-scale, long-distance transport. Although the construction and operation costs of dedicated hydrogen pipelines are relatively high, blending hydrogen into existing natural gas networks presents a viable alternative. This approach allows hydrogen to be transported to the end-users, where it can be either separated for use or directly combusted, thereby reducing hydrogen transport costs. This study, based on the GERG-2008 equation of state, conducts experimental tests on the compressibility factor of hydrogen-doped natural gas mixtures across a temperature range of −10 °C to 110 °C and a pressure range of 2 to 12 MPa, with hydrogen blending ratios of 5%, 10%, 20%, 30%, and 40%. The results indicate that the hydrogen blending ratio, temperature, and pressure significantly affect the compressibility factor, particularly under low-temperature and high-pressure conditions, where an increase in the hydrogen blending ratio leads to a notable rise in the compressibility factor. These findings have substantial implications for the practical design of hydrogen-enriched natural gas pipelines, as changes in the compressibility factor directly impact pipeline operational parameters, compressor characteristics, and other system performance aspects. Specifically, the introduction of hydrogen alters the compressibility factor of the transported medium, thereby affecting the pipeline’s flowability and compressibility, which are crucial for optimizing and applying the performance of hydrogen-enriched natural gas in transportation channels. The research outcomes provide valuable insights for understanding combustion reactions, adjusting pipeline operational parameters, and compressor performance characteristics, facilitating more precise decision-making in the design and operation of hydrogen-enriched natural gas pipelines. Full article
Show Figures

Figure 1

Figure 1
<p>Compressibility factor of Case 1.</p>
Full article ">Figure 2
<p>Compressibility factor of Case 2.</p>
Full article ">Figure 3
<p>Compressibility factor of Case 3.</p>
Full article ">Figure 4
<p>Compressibility factor of Case 4.</p>
Full article ">Figure 5
<p>Compressibility factor of Case 5.</p>
Full article ">
17 pages, 511 KiB  
Article
Enhancing Security in International Data Spaces: A STRIDE Framework Approach
by Nikola Gavric, Andrii Shalaginov, Aliaksei Andrushevich, Andreas Rumsch and Andrew Paice
Technologies 2025, 13(1), 8; https://doi.org/10.3390/technologies13010008 - 26 Dec 2024
Viewed by 502
Abstract
The proliferation of Internet of Things (IoT) devices and big data has catalyzed the emergence of data markets. Regulatory and technological frameworks such as International Data Spaces (IDS) have been developed to facilitate secure data exchange while integrating security and data sovereignty aspects [...] Read more.
The proliferation of Internet of Things (IoT) devices and big data has catalyzed the emergence of data markets. Regulatory and technological frameworks such as International Data Spaces (IDS) have been developed to facilitate secure data exchange while integrating security and data sovereignty aspects required by laws and regulations, such as the GDPR and NIS2. Recently, novel attack vectors have taken a toll on many enterprises, causing significant damage despite the deployed security mechanisms. Hence, it is reasonable to assume that the IDS may be just as susceptible. In this paper, we conduct a STRIDE threat analysis on IDS to assess its susceptibility to traditional and emerging cybersecurity threats. Specifically, we evaluate novel threats such as Man-in-the-Middle (MitM) attacks, compromised end-user devices, SIM swapping, and potential backdoors in commonly used open-source software. Our analysis identifies multiple vulnerabilities, particularly at the trust boundary (TB) between users and the IDS system. These include the traditionally troublesome Denial of Service (DoS) attacks, key management weaknesses, and the mentioned novel threats. We discuss the hacking techniques, tools, and associated risks to the IDS framework, followed by targeted mitigation strategies and recommendations. This paper provides a framework for performing a STRIDE-based threat analysis of the IDS. Using the proposed methodology, we identified the most potent threats and suggested solutions, thus contributing to the development of a safer and more resilient data space architecture. Full article
(This article belongs to the Section Information and Communication Technologies)
Show Figures

Figure 1

Figure 1
<p>The IDS context diagram.</p>
Full article ">Figure 2
<p>Attack tree for spoofing at TB 2.</p>
Full article ">
26 pages, 2216 KiB  
Article
QCA: Quantum Computational Approach for Internet of Things with 5G Connectivity
by Shitharth Selvarajan, Hariprasath Manoharan, Adil O. Khadidos and Alaa O. Khadidos
Information 2025, 16(1), 5; https://doi.org/10.3390/info16010005 - 25 Dec 2024
Viewed by 325
Abstract
In this paper, the need for a quantum computing approach is analyzed for IoT applications using the 5G resource spectrum. Most of the IoT devices are connected for data transmission to end users with remote monitoring units, but there are no sufficient data [...] Read more.
In this paper, the need for a quantum computing approach is analyzed for IoT applications using the 5G resource spectrum. Most of the IoT devices are connected for data transmission to end users with remote monitoring units, but there are no sufficient data storage units, and more data cannot be processed at minimized time periods. Hence, in the proposed method, quantum information processing protocols and quantum algorithms are integrated where data transmissions are maximized. Further, the system model is designed in such a way for checking the external influence factors that prevent the IoT device from transmitting data to end users. Therefore, with corresponding signal and noise power, it is essential to process the transmissions, thereby increasing data proportions at end connectivity. Once quantum computations are performed, then it is crucial to normalize IoT data units, thus establishing control over entire connected nodes that create a gateway for achieving maximum throughput. The combined system model is tested under four cases where the comparative outcomes prove that with reduced queue reductions of 12%, it is possible to achieve a maximum throughput of 99%. Full article
(This article belongs to the Special Issue Internet of Things and Cloud-Fog-Edge Computing)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Block diagram of quantum computations for IoT and 5G network connectivity.</p>
Full article ">Figure 2
<p>Flow chart for minimization objectives with data bit generation patterns.</p>
Full article ">Figure 3
<p>Flow chart for maximization objectives with data bit generation patterns.</p>
Full article ">Figure 4
<p>Signal power source for quantum resource blocks with data rate maximization.</p>
Full article ">Figure 5
<p>Total service time periods for discovering influence factors.</p>
Full article ">Figure 6
<p>Grid distance representations for normalized data values.</p>
Full article ">Figure 7
<p>Queue reductions for collided packets in quantum blocks.</p>
Full article ">Figure 8
<p>Total storage complexities for allocated resources.</p>
Full article ">Figure 9
<p>Time complexities with a reduction in propagation delays.</p>
Full article ">
17 pages, 1092 KiB  
Article
Achieving On-Site Trustworthy AI Implementation in the Construction Industry: A Framework Across the AI Lifecycle
by Lichao Yang, Gavin Allen, Zichao Zhang and Yifan Zhao
Buildings 2025, 15(1), 21; https://doi.org/10.3390/buildings15010021 - 25 Dec 2024
Viewed by 407
Abstract
In recent years, the application of artificial intelligence (AI) technology in the construction industry has rapidly emerged, particularly in areas such as site monitoring and project management. This technology has demonstrated its great potential in enhancing safety and productivity in construction. However, concerns [...] Read more.
In recent years, the application of artificial intelligence (AI) technology in the construction industry has rapidly emerged, particularly in areas such as site monitoring and project management. This technology has demonstrated its great potential in enhancing safety and productivity in construction. However, concerns regarding the technical maturity and reliability, safety, and privacy implications have led to a lack of trust in AI among stakeholders and end users in the construction industry, which slows the intelligent transformation of the industry, particularly for on-site AI implementation. This paper reviews frameworks for AI system design across various sectors and government regulations and requirements for achieving trustworthy and responsible AI. The principles for the AI system design are then determined. Furthermore, a lifecycle design framework specifically tailored for AI systems deployed in the construction industry is proposed. This framework addresses six key phases, including planning, data collection, algorithm development, deployment, maintenance, and archiving, and clarifies the design principles and development priorities needed for each phase to enhance AI system trustworthiness and acceptance. This framework provides design guidance for the implementation of AI in the construction industry, particularly for on-site applications, aiming to facilitate the intelligent transformation of the construction industry. Full article
(This article belongs to the Special Issue Big Data and Machine/Deep Learning in Construction)
Show Figures

Figure 1

Figure 1
<p>Principles to design trustworthy and responsible AI.</p>
Full article ">Figure 2
<p>Operation framework for the entire AI lifecycle.</p>
Full article ">
16 pages, 3478 KiB  
Article
Residential Load Forecasting Based on Long Short-Term Memory, Considering Temporal Local Attention
by Wenzhi Cao, Houdun Liu, Xiangzhi Zhang and Yangyan Zeng
Sustainability 2024, 16(24), 11252; https://doi.org/10.3390/su162411252 - 22 Dec 2024
Viewed by 443
Abstract
Accurate residential load forecasting is crucial for the stable operation of the energy internet, which plays a significant role in advancing sustainable development. As the construction of the energy internet progresses, the proportion of residential electricity consumption in end-use energy consumption is increasing, [...] Read more.
Accurate residential load forecasting is crucial for the stable operation of the energy internet, which plays a significant role in advancing sustainable development. As the construction of the energy internet progresses, the proportion of residential electricity consumption in end-use energy consumption is increasing, the peak load on the grid is growing year on year, and seasonal and regional peak power supply tensions, mainly for household electricity consumption, grow into common problems across countries. Residential load forecasting can assist utility companies in determining effective electricity pricing structures and demand response operations, thereby improving renewable energy utilization efficiency and reducing the share of thermal power generation. However, due to the randomness and uncertainty of user load data, forecasting residential load remains challenging. According to prior research, the accuracy of residential load forecasting using machine learning and deep learning methods still has room for improvement. This paper proposes an improved load-forecasting model based on a time-localized attention (TLA) mechanism integrated with LSTM, named TLA-LSTM. The model is composed of a full-text regression network, a date-attention network, and a time-point attention network. The full-text regression network consists of a traditional LSTM, while the date-attention and time-point attention networks are based on a local attention model constructed with CNN and LSTM. Experimental results on real-world datasets show that compared to standard LSTM models, the proposed method improves R2 by 14.2%, reduces MSE by 15.2%, and decreases RMSE by 8.5%. These enhancements demonstrate the robustness and efficiency of the TLA-LSTM model in load forecasting tasks, effectively addressing the limitations of traditional LSTM models in focusing on specific dates and time-points in user load data. Full article
(This article belongs to the Special Issue Sustainable Renewable Energy: Smart Grid and Electric Power System)
Show Figures

Figure 1

Figure 1
<p>Load feature reconstruction.</p>
Full article ">Figure 2
<p>LSTM neuron structure.</p>
Full article ">Figure 3
<p>LSTM learns time series vectors.</p>
Full article ">Figure 4
<p>Convolutional network.</p>
Full article ">Figure 5
<p>Temporal Local Attention LSTM structure.</p>
Full article ">Figure 6
<p>Prediction results comparison.</p>
Full article ">Figure 7
<p>Box plot of <span class="html-italic">MAPE</span> error.</p>
Full article ">Figure 8
<p>Box plot of <span class="html-italic">MAE</span> error.</p>
Full article ">Figure 9
<p>Prediction results of window size experiment.</p>
Full article ">
22 pages, 893 KiB  
Article
Joint Design of Transmitter Precoding and Optical Intelligent Reflecting Surface Configuration for Photon-Counting MIMO Systems Under Poisson Shot Noise
by Jian Wang, Xiaolin Zhou, Fanghua Li, Yongkang Chen, Chaoyi Cai and Haoze Xu
Appl. Sci. 2024, 14(24), 11994; https://doi.org/10.3390/app142411994 - 21 Dec 2024
Viewed by 499
Abstract
Intelligent reflecting surfaces (IRSs) have emerged as a promising technology to enhance link reliability in a cost-effective manner, especially for line-of-sight (LOS) link blocking caused by obstacles. In this paper, we investigate an IRS-assisted single-cell photon-counting communication system in the presence of building [...] Read more.
Intelligent reflecting surfaces (IRSs) have emerged as a promising technology to enhance link reliability in a cost-effective manner, especially for line-of-sight (LOS) link blocking caused by obstacles. In this paper, we investigate an IRS-assisted single-cell photon-counting communication system in the presence of building shadows, where one IRS is deployed to assist the communication between a multi-antenna base station (BS) and multiple single-antenna users. Photon counting has been widely adopted in sixth-generation (6G) optical communications due to its exceptional detection capability for low-power optical signals. However, the correlation between signal and noise complicates analyses. To this end, we first derive the channel gain of the IRS-assisted MIMO system, followed by the derivation of the mean square error (MSE) of the system using probabilistic methods. Given the constraints of the transmit power and IRS configuration, we propose an optimization problem aimed at minimizing the MSE of the system. Next, we present an alternating optimization (AO) algorithm that transforms the original problem into two convex subproblems and analyze its convergence and complexity. Finally, numerical results demonstrate that the IRS-assisted scheme significantly reduces the MSE and bit error rate (BER) of the system, outperforming other baseline schemes. Full article
Show Figures

Figure 1

Figure 1
<p>IRS-assisted MU downlink MISO photon-counting communication system.</p>
Full article ">Figure 2
<p>Two-dimensional topological model of optical path based on IRS.</p>
Full article ">Figure 3
<p>Convergence performance comparison of the proposed AO algorithm and the scheme that only optimizes the precoding matrix.</p>
Full article ">Figure 4
<p>Comparison of normalized MSE of different schemes, where <math display="inline"><semantics> <mrow> <mi>M</mi> <mo>=</mo> <mn>16</mn> <mo>,</mo> <mi>K</mi> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>64</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p>Comparison of normalized MSE of different schemes under different numbers of IRS units, where <math display="inline"><semantics> <mrow> <mi>M</mi> <mo>=</mo> <mn>16</mn> <mo>,</mo> <mi>K</mi> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mi>E</mi> <mi>b</mi> </msub> <mo>=</mo> <mo>−</mo> <mn>170</mn> <mspace width="4pt"/> <mi>dBJ</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 6
<p>Average BER performance of AO algorithm under different transmitting LEDs, where <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>36</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 7
<p>Average BER performance of AO algorithm with different numbers of IRS units, where <math display="inline"><semantics> <mrow> <mi>M</mi> <mo>=</mo> <mn>12</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 8
<p>Average BER performance of AO algorithm under different turbulence channels, where <math display="inline"><semantics> <mrow> <mi>M</mi> <mo>=</mo> <mn>12</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>36</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 9
<p>Average BER performance of AO algorithm under different background radiations, where <math display="inline"><semantics> <mrow> <mi>M</mi> <mo>=</mo> <mn>16</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>40</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 10
<p>Average BER performance of AO algorithm under imperfect CSI, where <math display="inline"><semantics> <mrow> <mi>M</mi> <mo>=</mo> <mn>16</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>40</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>4</mn> </mrow> </semantics></math>.</p>
Full article ">
11 pages, 3069 KiB  
Article
Photoluminescence Properties of X-Ray Generated Divalent Sm in Mechanochemically Prepared Nanocrystalline CaF₂:Sm3+
by Z. Siti Rozaila, Nicolas Riesen and Hans Riesen
Inorganics 2024, 12(12), 332; https://doi.org/10.3390/inorganics12120332 - 20 Dec 2024
Viewed by 358
Abstract
In this study, the mechanochemical preparation of nanocrystalline CaF2:Sm3+ by ball milling calcium acetate hydrate, samarium (III) acetate hydrate, and ammonium fluoride is reported. The photoluminescence of the as-prepared CaF2:Sm3+ shows predominantly Sm3+ 4G5/2 [...] Read more.
In this study, the mechanochemical preparation of nanocrystalline CaF2:Sm3+ by ball milling calcium acetate hydrate, samarium (III) acetate hydrate, and ammonium fluoride is reported. The photoluminescence of the as-prepared CaF2:Sm3+ shows predominantly Sm3+ 4G5/26HJ(J = 5/2, 7/2, 9/2, and 11/2) f-f luminescence, but intense electric dipole allowed 4f55d (T1u) → 4f6 7F1 (T1g) luminescence by Sm2+ was generated upon X-irradiation. In comparison with the co-precipitated CaF2:Sm3+, the conversion of Sm3+ Sm2+ in the ball-milled sample upon X-irradiation is significantly lower. Importantly, the present results indicate that the crystallite size and X-ray storage phosphor properties of the lanthanide-doped nanocrystalline CaF2 can be modified by adjusting the ball milling time, dopant concentration and post-annealing treatment, yielding crystallite sizes as low as 6 nm under specific experimental conditions. Full article
(This article belongs to the Special Issue Synthesis and Application of Luminescent Materials, 2nd Edition)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>XRD patterns (semi-logarithmic plot) of (<b>a</b>) nanocrystalline CaF<sub>2</sub>:0.1% Sm<sup>3+</sup> prepared by ball milling for 1, 3, 5 and 8 h, (<b>b</b>) nanocrystalline CaF<sub>2</sub>:<span class="html-italic">y</span>Sm<sup>3+</sup> with different concentrations of Sm<sup>3+</sup> (0 ≤ <span class="html-italic">y</span> ≤ 5%) ball milled for 8 h, and (<b>c</b>) nanocrystalline CaF<sub>2</sub>:0.1%Sm<sup>3+</sup> as prepared by ball milling for 8 h and subsequently annealed at 200, 300, and 400 °C. Experimental data and Rietveld refinements are shown as black and red lines, respectively. The standard data of cubic CaF<sub>2</sub> (PDF-1000043) is shown in blue. The green asterisks indicate impurity phases.</p>
Full article ">Figure 2
<p>TEM micrographs of nanocrystalline CaF<sub>2</sub>:0.1%Sm<sup>3+</sup>, ball milled for (<b>a</b>) 3 h and (<b>b</b>) 8 h, annealed at (<b>c</b>) 200 °C, (<b>d</b>) 400 °C, and (<b>e</b>) nanocrystalline CaF<sub>2</sub>:0.5%Sm<sup>3+</sup> prepared by co-precipitation.</p>
Full article ">Figure 3
<p>Photoluminescence spectra of nanocrystalline CaF<sub>2</sub>:0.1% Sm<sup>3+</sup> prepared by ball milling for 8 h, before and after 360 Gy X-irradiation. (<b>a</b>) Region of Sm<sup>3+</sup> luminescence at 293 K and (<b>b</b>) region of the Sm<sup>2+</sup> 4f<sup>5</sup>5d (T<sub>1u</sub>) → 4f<sup>6 7</sup>F<sub>1</sub> (T<sub>1g</sub>) emission at 27 K.</p>
Full article ">Figure 4
<p>Photoluminescence spectra of nanocrystalline CaF<sub>2</sub>:0.1% Sm<sup>3+</sup> prepared by ball milling for 1, 3, 5, and 8 h (red, black, green and blue traces, respectively). (<b>a</b>) Sm<sup>3+</sup> region at 293 K of the as-prepared sample and (<b>b</b>) Sm<sup>2+</sup> 4f<sup>5</sup>5d (T<sub>1u</sub>) → 4f<sup>6 7</sup>F<sub>1</sub> (T<sub>1g</sub>) region at 27 K after 135 Gy X-irradiation. The insets show corresponding integrated intensities (red circles are data points; the blue dotted line is a guide to the eye) as a function of ball milling time.</p>
Full article ">Figure 5
<p>Photoluminescence spectra of CaF<sub>2</sub>:<span class="html-italic">y</span>Sm<sup>3+</sup> with 0.05% ≤ <span class="html-italic">y</span> ≤ 5% in the region of (<b>a</b>) Sm<sup>3+</sup> at 293 K of the as-prepared sample and (<b>b</b>) Sm<sup>2+</sup> 4f<sup>5</sup>5d (T<sub>1u</sub>) → 4f<sup>6 7</sup>F<sub>1</sub> (T<sub>1g</sub>) at 27 K upon 135 Gy X-irradiation. Integrated intensities of (<b>a</b>) Sm<sup>3+ 4</sup>G<sub>5/2</sub> → <sup>6</sup>H<sub>5/2</sub> and (<b>b</b>) the Sm<sup>2+</sup> emission band as a function of Sm concentration are shown in the insets.</p>
Full article ">Figure 6
<p>Photoluminescence spectra of CaF<sub>2</sub>:0.1%Sm<sup>3+</sup> annealed at 200, 300, and 400 °C for 1 h in air. (<b>a</b>) Sm<sup>3+</sup> region of the as-prepared sample at 293 K, (<b>b</b>) Sm<sup>2+</sup> region of the 135 Gy X-irradiated sample at 27 K. The insets of (<b>a</b>,<b>b</b>) show normalized intensities of Sm<sup>3+</sup> and Sm<sup>2+</sup> luminescence, respectively (red circles are data points; the blue dotted lines are exponential fits).</p>
Full article ">Figure 7
<p>Comparison of photoluminescence spectra of nanocrystalline CaF<sub>2</sub>:0.5%Sm<sup>3+</sup> prepared by co-precipitation (CPT) and as-prepared (as well as annealed at 400 °C) CaF<sub>2</sub>:0.5%Sm<sup>3+</sup> prepared by 8 h of ball milling (BM). The inset shows a 3x magnification of BM CaF<sub>2</sub>:0.5%Sm<sup>3+</sup>.</p>
Full article ">
Back to TopTop