[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,639)

Search Parameters:
Keywords = smartphone device

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
30 pages, 3647 KiB  
Review
A Comprehensive Review of Smartphone and Other Device-Based Techniques for Road Surface Monitoring
by Saif Alqaydi, Waleed Zeiada, Ahmed El Wakil, Ali Juma Alnaqbi and Abdelhalim Azam
Eng 2024, 5(4), 3397-3426; https://doi.org/10.3390/eng5040177 (registering DOI) - 16 Dec 2024
Viewed by 96
Abstract
Deteriorating road infrastructure is a global concern, especially in low-income countries where financial and technological constraints hinder effective monitoring and maintenance. Traditional methods, like inertial profilers, are expensive and complex, making them unsuitable for large-scale use. This paper explores the integration of cost-effective, [...] Read more.
Deteriorating road infrastructure is a global concern, especially in low-income countries where financial and technological constraints hinder effective monitoring and maintenance. Traditional methods, like inertial profilers, are expensive and complex, making them unsuitable for large-scale use. This paper explores the integration of cost-effective, scalable smartphone technologies for road surface monitoring. Smartphone sensors, such as accelerometers and gyroscopes, combined with data preprocessing techniques like filtering and reorientation, improve the quality of collected data. Machine learning algorithms, particularly CNNs, are utilized to classify road anomalies, enhancing detection accuracy and system efficiency. The results demonstrate that smartphone-based systems, paired with advanced data processing and machine learning, significantly reduce the cost and complexity of traditional road surveys. Future work could focus on improving sensor calibration, data synchronization, and machine learning models to handle diverse real-world conditions. These advancements will increase the accuracy and scalability of smartphone-based monitoring systems, particularly for urban areas requiring real-time data for rapid maintenance. Full article
Show Figures

Figure 1

Figure 1
<p>Integration of Global Positioning System (GPS) with smartphone sensors [<a href="#B28-eng-05-00177" class="html-bibr">28</a>]. Reproduced with permission license number 589261145.</p>
Full article ">Figure 2
<p>Real-time road surface condition monitoring using smartphones [<a href="#B29-eng-05-00177" class="html-bibr">29</a>].</p>
Full article ">Figure 3
<p>Smartphone distress detection process for road surface [<a href="#B16-eng-05-00177" class="html-bibr">16</a>].</p>
Full article ">Figure 4
<p>Example of a high-pass filter applied to sensor [<a href="#B55-eng-05-00177" class="html-bibr">55</a>].</p>
Full article ">Figure 5
<p>Application of a Kalman filter to improve sensor data accuracy.</p>
Full article ">Figure 6
<p>Impact of vehicle speed on roughness measurement accuracy.</p>
Full article ">Figure 7
<p>Decision tree model for classifying road surface distress [<a href="#B90-eng-05-00177" class="html-bibr">90</a>].</p>
Full article ">Figure 8
<p>Crowdsourced data collection architecture for road surface monitoring [<a href="#B99-eng-05-00177" class="html-bibr">99</a>]. Reproduced with permission license number 5892630995208.</p>
Full article ">Figure 9
<p>Comparison of data aggregation strategies in crowdsourced road monitoring.</p>
Full article ">Figure 10
<p>Integration of IMUs and GPS for enhanced road surface monitoring.</p>
Full article ">Figure 11
<p>Machine learning model for road anomaly detection [<a href="#B112-eng-05-00177" class="html-bibr">112</a>].</p>
Full article ">
20 pages, 282 KiB  
Article
Technology and K-12 Environmental Education in Ontario, Canada: Teacher Perceptions and Recommendations
by Andrew A. Millward, Courtney Carrier, Nickesh Bhagat and Gregory T. O. LeBreton
Educ. Sci. 2024, 14(12), 1362; https://doi.org/10.3390/educsci14121362 - 12 Dec 2024
Viewed by 347
Abstract
This research explores the perspectives of kindergarten through to Grade 12 (K-12) teachers on incorporating information and communication technology (ICT) into the environmental education (EE) curriculum. In the context of the increasing influence of ICT in education, this study examines both the potential [...] Read more.
This research explores the perspectives of kindergarten through to Grade 12 (K-12) teachers on incorporating information and communication technology (ICT) into the environmental education (EE) curriculum. In the context of the increasing influence of ICT in education, this study examines both the potential enhancements ICT offers to EE and the challenges it poses. Using data from an online survey and an in-person focus group, the investigation addresses the capacity of ICT to promote environmental stewardship and personal growth, alongside concerns regarding technology’s potential to alienate students from nature and the divided opinions among educators regarding optimal technology use. Attention is given to systemic barriers that complicate EE integration and the variability of its implementation in Ontario, Canada, where EE is mandated across K-12 curricula. The findings illuminate educators’ concerns about digital dependencies among their students and the difficulty they face in striking a balance between the use of ICT and non-technical pedagogical approaches when engaging students in environmental lessons. Importantly, study participants identified limited contemporary and timely technological tools to support EE delivery that deemphasize using personal mobile devices (e.g., smartphones and tablets). In response, we recommend three forms of technology (and accompanying lesson ideas) that are affordable, easy to integrate into classrooms, and do not require off-site trips, thereby enhancing accessibility and equity. This study’s implications are aimed at educators, policymakers, and stakeholders seeking to enhance EE delivery within a technologically evolving educational framework and ensure the development of environmentally conscious students. Full article
(This article belongs to the Special Issue New Ways of Seeing Outdoor and Environmental Learning)
40 pages, 2489 KiB  
Article
Enhancing Smartphone Battery Life: A Deep Learning Model Based on User-Specific Application and Network Behavior
by Daniel Flores-Martin, Sergio Laso and Juan Luis Herrera
Electronics 2024, 13(24), 4897; https://doi.org/10.3390/electronics13244897 - 12 Dec 2024
Viewed by 326
Abstract
Smartphones have become a central element in modern society with their widespread adoption driven by technological advancements and their ability to facilitate everyday tasks. A critical feature influencing user satisfaction and smartphone adoption is battery life, as the intensive use of mobile devices [...] Read more.
Smartphones have become a central element in modern society with their widespread adoption driven by technological advancements and their ability to facilitate everyday tasks. A critical feature influencing user satisfaction and smartphone adoption is battery life, as the intensive use of mobile devices can significantly drain battery power. This paper addresses the challenge of predicting smartphone battery consumption using artificial intelligence techniques, specifically deep learning, to optimize energy efficiency. By collecting and analyzing data from mobile devices, such as application usage, screen time, network type, network usage, and battery temperature among others, we developed a predictive model tailored to user-specific behavior. This model identifies the key variables affecting battery consumption and provides personalized energy-saving strategies. Our approach offers a solution for improving battery performance, contributing to more efficient energy management in both hardware and networking terms while adapting to individual usage patterns. The results demonstrate that our approach can significantly predict the battery to anticipate power demands based on user-specific usage. While challenges remain, such as improving the generalizability of the model across different devices, this approach provides a scalable and adaptive method to improve the energy efficiency of smartphones, which will allow efficient management solutions to be suggested, contributing to better battery and network management to improve user experience and device longevity. Full article
(This article belongs to the Special Issue Ubiquitous Computing and Mobile Computing)
Show Figures

Figure 1

Figure 1
<p>Android application flowchart. It describes the information flow of the data collection application from the time the user installs it until its data are generated and transferred to a server to generate his/her model.</p>
Full article ">Figure 2
<p>Correlation matrix example for OnePlus LE2123. It indicates how variables affect each other. It is useful to identify redundancies, select relevant features, and avoid multicollinearity problems in the models.</p>
Full article ">Figure 3
<p>Network traffic variables analysis and the correlation among them.</p>
Full article ">Figure 4
<p>DNN predictions for OnePlus_LE2113 considering the predictions and real values.</p>
Full article ">Figure 5
<p>LSTM predictions for OnePlus_LE2113 considering the predictions and real values.</p>
Full article ">Figure 6
<p>OnePlus_LE2113 results comparison. (<b>a</b>) DNN, LSTM, linear regression and decision tree data results. (<b>b</b>) DNN and LSTM loss for training and validation.</p>
Full article ">Figure 7
<p>DNN predictions for OnePlus_LE2123 considering the predictions and real values.</p>
Full article ">Figure 8
<p>LSTM predictions for OnePlus_LE2123 considering the predictions and real values.</p>
Full article ">Figure 9
<p>OnePlus_LE2123 results comparison.</p>
Full article ">Figure 10
<p>DNN predictions for Samsung_SM-A226B considering the predictions and real values.</p>
Full article ">Figure 11
<p>Samsung_SM-A226B results comparison.</p>
Full article ">Figure 12
<p>LSTM predictions for Samsung_SM-A226B considering the predictions and real values.</p>
Full article ">Figure 13
<p>DNN predictions for POCO_M2102J20SG considering the predictions and real values.</p>
Full article ">Figure 14
<p>LSTM predictions for POCO_M2102J20SG considering the predictions and real values.</p>
Full article ">Figure 15
<p>POCO_M2102J20SG results comparison.</p>
Full article ">Figure 16
<p>DNN predictions for Samsung_SM-G991B considering the predictions and real values.</p>
Full article ">Figure 17
<p>LSTM predictions for Samsung_SM-G991B considering the predictions and real values.</p>
Full article ">Figure 18
<p>Samsung_SM-G991B results comparison.</p>
Full article ">
34 pages, 10226 KiB  
Article
The Improved Network Intrusion Detection Techniques Using the Feature Engineering Approach with Boosting Classifiers
by Hari Mohan Rai, Joon Yoo and Saurabh Agarwal
Mathematics 2024, 12(24), 3909; https://doi.org/10.3390/math12243909 - 11 Dec 2024
Viewed by 393
Abstract
In the domain of cybersecurity, cyber threats targeting network devices are very crucial. Because of the exponential growth of wireless devices, such as smartphones and portable devices, cyber risks are becoming increasingly frequent and common with the emergence of new types of threats. [...] Read more.
In the domain of cybersecurity, cyber threats targeting network devices are very crucial. Because of the exponential growth of wireless devices, such as smartphones and portable devices, cyber risks are becoming increasingly frequent and common with the emergence of new types of threats. This makes the automatic and accurate detection of network-based intrusion very essential. In this work, we propose a network-based intrusion detection system utilizing the comprehensive feature engineering approach combined with boosting machine-learning (ML) models. A TCP/IP-based dataset with 25,192 data samples from different protocols has been utilized in our work. To improve the dataset, we used preprocessing methods such as label encoding, correlation analysis, custom label encoding, and iterative label encoding. To improve the model’s accuracy for prediction, we then used a unique feature engineering methodology that included novel feature scaling and random forest-based feature selection techniques. We used three conventional models (NB, LR, and SVC) and four boosting classifiers (CatBoostGBM, LightGBM, HistGradientBoosting, and XGBoost) for classification. The 10-fold cross-validation methods were employed to train each model. After an assessment using numerous metrics, the best-performing model emerged as XGBoost. With mean metric values of 99.54 ± 0.0007 for accuracy, 99.53 ± 0.0013 for precision, 99.54 ± 0.001 for recall, and an F1-score of 99.53 ± 0.0014, the XGBoost model produced the best performance overall. Additionally, we showed the ROC curve for evaluating the model, which demonstrated that all boosting classifiers obtained a perfect AUC value of one. Our suggested methodologies show effectiveness and accuracy in detecting network intrusions, setting the stage for the model to be used in real time. Our method provides a strong defensive measure against malicious intrusions into network infrastructures while cyber threats keep varying. Full article
Show Figures

Figure 1

Figure 1
<p>The schematic diagram of (<b>a</b>) signature-based NIDSs and (<b>b</b>) anomaly-based NIDSs.</p>
Full article ">Figure 2
<p>The schematic diagram of (<b>a</b>) Hybrid NIDSs and (<b>b</b>) AI-powered NIDSs.</p>
Full article ">Figure 3
<p>The block diagram of the proposed methodology utilized for the NIDS using the ML approach.</p>
Full article ">Figure 4
<p>Comparative distribution of dataset in (<b>a</b>) normal and anomaly classes and (<b>b</b>) protocol types.</p>
Full article ">Figure 5
<p>Distribution patterns of destination, host, and service count in the dataset.</p>
Full article ">Figure 6
<p>Visualization of feature importance in NIDSs using the proposed approach.</p>
Full article ">Figure 7
<p>Training performance using 10-fold cross-validation of the NB classifier.</p>
Full article ">Figure 8
<p>Training performance using 10-fold cross-validation of the LR classifier.</p>
Full article ">Figure 9
<p>Training performance using 10-fold cross-validation of the SVC classifier.</p>
Full article ">Figure 10
<p>Training performance with 10-fold cross-validation using CatBoost classifier.</p>
Full article ">Figure 11
<p>Training performance with 10-fold cross-validation using LightGBM classifier.</p>
Full article ">Figure 12
<p>Training performance with 10-fold cross-validation using HistGradientBoosting classifier.</p>
Full article ">Figure 13
<p>Training performance with 10-fold cross-validation using XGBoost classifier.</p>
Full article ">Figure 14
<p>Confusion matrix for testing results: (<b>a</b>) NB classifier and (<b>b</b>) LR classifier.</p>
Full article ">Figure 15
<p>Confusion matrix for testing results: (<b>a</b>) SVC classifier and (<b>b</b>) CatBoost classifier.</p>
Full article ">Figure 16
<p>Confusion matrix for testing results: (<b>a</b>) LightGBM classifier and (<b>b</b>) HistGradientBoosing classifier.</p>
Full article ">Figure 17
<p>Confusion matrix for testing results with XGBoost classifier.</p>
Full article ">Figure 18
<p>ROC-AUC curves comparing the performance of utilized models.</p>
Full article ">
23 pages, 2025 KiB  
Article
Assessing Locomotive Syndrome Through Instrumented Five-Time Sit-to-Stand Test and Machine Learning
by Iman Hosseini and Maryam Ghahramani
Sensors 2024, 24(23), 7727; https://doi.org/10.3390/s24237727 - 3 Dec 2024
Viewed by 380
Abstract
Locomotive syndrome (LS) refers to a condition where individuals face challenges in performing activities of daily living. Early detection of such deterioration is crucial to reduce the need for nursing care. The Geriatric Locomotive Function Scale (GLFS-25), a 25-question assessment, has been proposed [...] Read more.
Locomotive syndrome (LS) refers to a condition where individuals face challenges in performing activities of daily living. Early detection of such deterioration is crucial to reduce the need for nursing care. The Geriatric Locomotive Function Scale (GLFS-25), a 25-question assessment, has been proposed for categorizing individuals into different stages of LS. However, its subjectivity has prompted interest in technology-based quantitative assessments. In this study, we utilized machine learning and an instrumented five-time sit-to-stand test (FTSTS) to assess LS stages. Younger and older participants were recruited, with older individuals classified into LS stages 0–2 based on their GLFS-25 scores. Equipped with a single inertial measurement unit at the pelvis level, participants performed the FTSTS. Using acceleration data, 144 features were extracted, and seven distinct machine learning models were developed using the features. Remarkably, the multilayer perceptron (MLP) model demonstrated superior performance. Following data augmentation and principal component analysis (PCA), the MLP+PCA model achieved an accuracy of 0.9, a precision of 0.92, a recall of 0.9, and an F1 score of 0.91. This underscores the efficacy of the approach for LS assessment. This study lays the foundation for the future development of a remote LS assessment system using commonplace devices like smartphones. Full article
(This article belongs to the Special Issue Intelligent Sensors for Healthcare and Patient Monitoring)
Show Figures

Figure 1

Figure 1
<p>Overview of the study stages. This figure illustrates the comprehensive workflow for assessing locomotive syndrome (LS) using an instrumented five-time sit-to-stand (FTSTS) test and machine learning techniques in order to predict and identify the different stages of LS. The process begins with data acquisition, followed by data preprocessing steps, including zero-centering, filtering, and data augmentation. Sit–stand–sit (SSS) transition segmentation and postprocessing were then applied to the data. Feature extraction involved generating both time-domain and frequency-domain features, which were subsequently optimized and underwent dimensionality reduction. The data were then split into training and testing sets, then normalized before being input into the machine learning model. The model consists of an input layer, multiple hidden layers, and an output layer, which classifies the data into different stages of locomotive syndrome (LS-Stage 0, LS-Stage 1, LS-Stage 2).</p>
Full article ">Figure 2
<p>The acceleration of the pelvis in the ML, AP, and SI directions for a younger participant. The SiSt, StSi, and SSS transitions during the FTSTS test are shown.</p>
Full article ">Figure 3
<p>A line chart comparing the accuracy of eight different machine learning models on the original and augmented datasets. The augmentation significantly improves model performance, particularly for models like SVM, LR, and MLP.</p>
Full article ">Figure 4
<p>The top 40 most significant features ranked by their importance scores obtained through the SelectKBest feature selection method, reflecting the relevance of each feature to LS prediction.</p>
Full article ">Figure 5
<p>The confusion matrix showing the performance of the MLP+PCA model on the test dataset. The diagonal elements represent correct predictions, while off-diagonal elements indicate misclassifications of the model during the test phase.</p>
Full article ">
12 pages, 12255 KiB  
Article
A New Caffeine Detection Method Using a Highly Multiplexed Smartphone-Based Spectrometer
by Erhuan Zhuo, Huanxin Xia, Huan Hu and Yu Lin
Biosensors 2024, 14(12), 590; https://doi.org/10.3390/bios14120590 - 3 Dec 2024
Viewed by 677
Abstract
Smartphones equipped with highly integrated sensors are increasingly being recognized as powerful tools for rapid on-site testing. Here, we propose a low-cost, portable, and highly multiplexed smartphone-based spectrometer capable of collecting three types of spectra—transmission, reflection, and fluorescence—by simply replacing the optical fiber [...] Read more.
Smartphones equipped with highly integrated sensors are increasingly being recognized as powerful tools for rapid on-site testing. Here, we propose a low-cost, portable, and highly multiplexed smartphone-based spectrometer capable of collecting three types of spectra—transmission, reflection, and fluorescence—by simply replacing the optical fiber attached to the housing. Spectral analysis is performed directly on the smartphone using a custom-developed app. Furthermore, we introduce a high signal-to-noise ratio (SNR) caffeine detection scheme that leverages aspirin and salicylic acid as fluorescent probes, allowing for the rapid and straightforward detection of caffeine in various samples. The fluorescence quenching of the probes was found to be linearly related to the caffeine concentration (0–200 μM), and the recoveries of the commercially available caffeine-containing samples were in the range of 98.0333–105.6000%, with a limit of detection (LOD) of 2.58 μM. The reliability and stability of the on-site assay using the smartphone spectrometer were verified. More importantly, this spectrometer demonstrates great potential as a versatile device for use outside of laboratory settings by enabling different operating modes tailored to various scenarios. Full article
Show Figures

Figure 1

Figure 1
<p>Light path and fabrication of the smartphone-based spectrometer. (<b>a</b>) Light path and fabrication of the spectrometer. (<b>b</b>) Smartphone spectrometer physical picture.</p>
Full article ">Figure 2
<p>Spectrum RGB images processing. (<b>a</b>) RGB ROI (red boxes) and peak pixel position of 532 nm and 650 nm. Resolution = (650 − 532)/(1296 − 743) ≈ 0.21 nm/pixel. (<b>b</b>–<b>e</b>) Spot and contours of 532 nm RGB image before and after correcting.</p>
Full article ">Figure 3
<p>Validation of spectrometer using R6G. (<b>a</b>) Absorption spectrum of R6G. (<b>b</b>) Linear fit of OD value and concentration of R6G. (<b>c</b>) 650 nm reflective intensity of diluted milk. Milk content in diluted solution is 0, 20, 40, 60, 80, 100%.</p>
Full article ">Figure 4
<p>(<b>a</b>) Aspirin fluorescence excited by UV LED. (<b>b</b>) Aspirin fluorescence is quenched by caffeine.</p>
Full article ">Figure 5
<p>Effect of the presence or absence of inhibition of aspirin hydrolysis on its fluorescence. (<b>a</b>) Experiment design under group I, II, III. M1–M7 are the specific cases of measuring spectrum. (<b>b</b>,<b>c</b>) Fluorescence spectra after 12 h reaction with caffeine under inhibited and uninhibited conditions. (<b>d</b>–<b>h</b>) Fluorescence spectrum obtained by hydrolyzing 0, 3, 6, 9, 12 h aspirin with caffeine. (<b>i</b>,<b>j</b>) Linear fit results of quenching fluorescence and caffeine concentration in <a href="#biosensors-14-00590-f005" class="html-fig">Figure 5</a> M1 and M2. (<b>k</b>) Caffeine concentration in coffee diluted at different times. The red line is the result of fitting dilution factor and caffeine concentration.</p>
Full article ">Figure 6
<p>The effect of the degree of aspirin hydrolysis on the linear fitting results when aspirin hydrolysis is not inhibited. (<b>a</b>) Experiment design of the effect of aspirin hydrolysis time under under group I, II, III, IV. (<b>b</b>) Linear fit results of different aspirin hydrolysis times.</p>
Full article ">Figure 7
<p>The original caffeine content in five samples. Data for red and green flags are from <a href="#biosensors-14-00590-t001" class="html-table">Table 1</a>.</p>
Full article ">
25 pages, 2970 KiB  
Article
An Android-Based Internet of Medical Things Adaptive User Authentication and Authorization Model for the Elderly
by Prudence M. Mavhemwa, Marco Zennaro, Philibert Nsengiyumva and Frederic Nzanywayingoma
J. Cybersecur. Priv. 2024, 4(4), 993-1017; https://doi.org/10.3390/jcp4040046 - 2 Dec 2024
Viewed by 787
Abstract
Globally, 77% of the elderly aged 65 and above suffer from multiple chronic ailments, according to recent research. However, several barriers within the healthcare system in the developing world hinder the adoption of home-based patient management, hence the need for the IoMT, whose [...] Read more.
Globally, 77% of the elderly aged 65 and above suffer from multiple chronic ailments, according to recent research. However, several barriers within the healthcare system in the developing world hinder the adoption of home-based patient management, hence the need for the IoMT, whose application raises security concerns, particularly in authentication. Several authentication techniques have been proposed; however, they lack a balance of security and usability. This paper proposes a Naive Bayes based adaptive user authentication app that calculates the risk associated with a login attempt on an Android device for elderly users, using their health conditions, risk score, and available authenticators. This authentication technique guided by the MAPE-KHMT framework makes use of embedded smartphone sensors. Results indicate a 100% and 98.6% accuracy in usable-security metrics, while cross-validation and normalization results also support the accuracy, efficiency, effectiveness, and usability of our model with room for scaling it up without computational costs and generalizing it beyond SSA. The post-deployment evaluation also confirms that users found the app usable and secure. A few areas need further refinement to improve the accuracy, usability, security, and acceptance but the model shows potential to improve users’ compliance with IoMT security, thereby promoting the attainment of SDG3. Full article
Show Figures

Figure 1

Figure 1
<p>Examples of factors used in MFA. Reproduced with permission from Hazratifard et al. [<a href="#B9-jcp-04-00046" class="html-bibr">9</a>].</p>
Full article ">Figure 2
<p>General Architecture.</p>
Full article ">Figure 3
<p>Login process until authorization.</p>
Full article ">Figure 4
<p>Signup and login screens.</p>
Full article ">Figure 5
<p>Overall confusion matrix and statistics.</p>
Full article ">Figure 6
<p>ROC curve for authentication and authorization.</p>
Full article ">Figure 7
<p>Confusion matrix and statistics for health impact on authentication.</p>
Full article ">Figure 8
<p>Confusion matrix and statistics for the train–test split and L1, L2 normalization.</p>
Full article ">Figure 9
<p>Confusion matrix and statistics for the cross-validation option.</p>
Full article ">Figure 10
<p>Distance analysis.</p>
Full article ">Figure 11
<p>Distance graph.</p>
Full article ">Figure 12
<p>Snippet of success ratio.</p>
Full article ">Figure 13
<p>App consideration of user medical conditions.</p>
Full article ">Figure 14
<p>Usability metrics.</p>
Full article ">Figure 15
<p>App recommendation to others.</p>
Full article ">
13 pages, 606 KiB  
Article
Acceptance, Needs, and Demands for Nutritional mHealth Support in Patients with Cardiovascular Disease
by Darya Mohajeri, Lisa Maria Jahre, Alexander Bäuerle, Theresa Schieffers, Daniel Messiha, Christos Rammos, Martin Teufel, Tienush Rassaf and Julia Lortz
Nutrients 2024, 16(23), 4155; https://doi.org/10.3390/nu16234155 - 30 Nov 2024
Viewed by 688
Abstract
Background: Cardiovascular diseases (CVDs) are the leading causes of death globally. Managing risk factors and preventing atherosclerosis and its progress, especially with lifestyle changes, are highly important. Smartphone-based mobile health (mHealth) strategies allow easily accessible assistance for healthy nutrition. This study aimed to [...] Read more.
Background: Cardiovascular diseases (CVDs) are the leading causes of death globally. Managing risk factors and preventing atherosclerosis and its progress, especially with lifestyle changes, are highly important. Smartphone-based mobile health (mHealth) strategies allow easily accessible assistance for healthy nutrition. This study aimed to assess the acceptance and outline the needs and demands for a nutritional mHealth tool by analyzing the desired characteristics. Methods: A cross-sectional study was conducted between August 2022 and September 2023 targeting 398 individuals with atherosclerosis. Acceptance, needs, and demands regarding mHealth, sociodemographic, medical, psychometric, and electronic health (eHealth) data were assessed. Multiple hierarchical regression analyses were conducted to determine the predictors of acceptance. Results: High acceptance for nutritional mHealth was reported by 88.4% (n = 274). Significant predictors of acceptance were age (β = −0.01, p = 0.002), diabetes (β = 0.20, p = 0.041), depressive symptoms (β = −0.02, p = 0.017), digital confidence (β = 0.17, p = 0.001), Internet anxiety (β = −0.18, p = 0.004), and the Unified Theory of Acceptance and Use of Technology (UTAUT) predictors effort expectancy (β = 0.23, p < 0.001) and social influence (β = 0.53, p < 0.001). Preferences included handheld devices, permanent use (86.5%), and weekly (44.5%) new content of 10 to 30 min (79%). Conclusions: These results summarize the patients’ preferences for individualized mHealth tools to ensure their effectiveness. Especially regarding the secondary prevention of CVDs, mHealth can be a helpful resource. The high acceptance rate and specific preferences outlined in this study form a strong basis for the development of mHealth tools with a focus on nutritional support in patients with CVDs. Full article
(This article belongs to the Special Issue New Advances in Dietary Assessment)
Show Figures

Figure 1

Figure 1
<p>Relevant and irrelevant content for nutritional mHealth support in patients with an atherosclerotic disease.</p>
Full article ">
23 pages, 1626 KiB  
Article
Effects of Distracted Pedestrian Behavior on Transportation Safety: Causes and Contributing Factors
by Birat Rijal and Nadir Yilmaz
Appl. Sci. 2024, 14(23), 11068; https://doi.org/10.3390/app142311068 - 28 Nov 2024
Viewed by 487
Abstract
Pedestrian distraction poses significant risks at signalized intersections, especially in populated urban areas. This study investigates the primary causes of pedestrian distraction to determine the contributing factors affecting crossing behavior. Data were collected from ten signalized intersections by conducting in-person interviews, performing real-time [...] Read more.
Pedestrian distraction poses significant risks at signalized intersections, especially in populated urban areas. This study investigates the primary causes of pedestrian distraction to determine the contributing factors affecting crossing behavior. Data were collected from ten signalized intersections by conducting in-person interviews, performing real-time observation, and reviewing video recordings. The study used binary logistic regression and Heuristic Bin analysis to examine different levels of distraction among pedestrians. Three major types of pedestrian distractions were identified: visual, auditory, and cognitive distractions. From the regression analysis, two models were developed to predict moderate and high levels of distraction based on factors such as age, intersection location, walking behavior, use of electronic devices, and awareness of traffic signals. The results indicated that smartphone usage and earphones were the predominant sources of distraction. Pedestrians walking in pairs demonstrated higher levels of distraction than those walking alone or in groups. Heuristic Bins analysis revealed that females were slightly more distracted than males while walking alone, in pairs, or in a group. Pedestrians also tended to be more distracted when they were walking in pairs than when walking alone or in groups. Full article
(This article belongs to the Section Transportation and Future Mobility)
Show Figures

Figure 1

Figure 1
<p>Data Collection Locations.</p>
Full article ">Figure 2
<p>Surveyor observational data.</p>
Full article ">Figure 3
<p>Pedestrian distraction categories by gender.</p>
Full article ">Figure 4
<p>Pedestrian distraction categories by time of day.</p>
Full article ">
28 pages, 2967 KiB  
Review
Advanced Wearable Devices for Monitoring Sweat Biochemical Markers in Athletic Performance: A Comprehensive Review
by Graziana Assalve, Paola Lunetti, Alessandra Di Cagno, Ernesto William De Luca, Stefano Aldegheri, Vincenzo Zara and Alessandra Ferramosca
Biosensors 2024, 14(12), 574; https://doi.org/10.3390/bios14120574 - 26 Nov 2024
Viewed by 1045
Abstract
Wearable technology has advanced significantly, offering real-time monitoring of athletes’ physiological parameters and optimizing training and recovery strategies. Recent developments focus on biosensor devices capable of monitoring biochemical parameters in addition to physiological ones. These devices employ noninvasive methods such as sweat analysis, [...] Read more.
Wearable technology has advanced significantly, offering real-time monitoring of athletes’ physiological parameters and optimizing training and recovery strategies. Recent developments focus on biosensor devices capable of monitoring biochemical parameters in addition to physiological ones. These devices employ noninvasive methods such as sweat analysis, which reveals critical biomarkers like glucose, lactate, electrolytes, pH, and cortisol. These biomarkers provide valuable insights into an athlete’s energy use, hydration status, muscle function, and stress levels. Current technologies utilize both electrochemical and colorimetric methods for sweat analysis, with electrochemical methods providing higher precision despite potential signal interference. Wearable devices such as epidermal patches, temporary tattoos, and fabric-based sensors are preferred for their flexibility and unobtrusive nature compared to more rigid conventional wearables. Such devices leverage advanced materials and transmit real-time data to computers, tablets, or smartphones. These data would aid coaches and sports medical personnel in monitoring athletes’ health, optimizing diets, and developing training plans to enhance performance and reduce injuries. Full article
(This article belongs to the Section Wearable Biosensors)
Show Figures

Figure 1

Figure 1
<p>Literature search methods. Flowchart of the selection (in green) and exclusion criteria (in red) for literature review.</p>
Full article ">Figure 2
<p>Structural anatomy of the most representative glucose biosensors. Schematic illustration of (<b>a</b>) a hybridized nanoporous carbon-reinforced 3D graphene-based epidermal patch [<a href="#B37-biosensors-14-00574" class="html-bibr">37</a>], (<b>b</b>) the HIS paper [<a href="#B43-biosensors-14-00574" class="html-bibr">43</a>], (<b>c</b>) the composition of the PEN membrane [<a href="#B45-biosensors-14-00574" class="html-bibr">45</a>], (<b>d</b>) an epidermal microfluidic biosensor integrated with flexible electronics [<a href="#B24-biosensors-14-00574" class="html-bibr">24</a>], and (<b>e</b>) a photograph showing a real application of a device made of paper strips [<a href="#B48-biosensors-14-00574" class="html-bibr">48</a>].</p>
Full article ">Figure 3
<p>Structural anatomy of the most representative lactate biosensors. Diagram of (<b>a</b>) a patch-type sensor with microfluidics [<a href="#B73-biosensors-14-00574" class="html-bibr">73</a>]; (<b>b</b>) a device consisting of an osmotic hydrogel, a paper microfluidic channel, a functionalized lactate sensor, and a flexible sheet with screen-printed electrodes [<a href="#B79-biosensors-14-00574" class="html-bibr">79</a>]; (<b>c</b>) the working electrode coated by chitosan in a tattoo biosensor [<a href="#B80-biosensors-14-00574" class="html-bibr">80</a>]; (<b>d</b>) a smart textile biosensor with embroidered electrodes on a hydrophobic fabric and three metal press buttons connected by wires to the electrochemical device [<a href="#B81-biosensors-14-00574" class="html-bibr">81</a>]; (<b>e</b>) a smart wireless ear-worn device connected to an external battery and encapsulated in PDMS to protect the electronics [<a href="#B83-biosensors-14-00574" class="html-bibr">83</a>]; (<b>f</b>) the layer makeup of the biofuel cell-based patch-type colorimetric sensor [<a href="#B47-biosensors-14-00574" class="html-bibr">47</a>]; (<b>g</b>) a textile-based colorimetric sensor [<a href="#B89-biosensors-14-00574" class="html-bibr">89</a>]. BSA, bovine serum albumin. PVC, polyvinyl chloride. PtB, platinum black. TTF, tetrathiafulvalene. CNT, carbon nanotube.</p>
Full article ">Figure 4
<p>Structural anatomy of the most representative electrolytes and pH biosensors. Schematic illustration of (<b>a</b>) the different layers of a microfluidic epidermal patch [<a href="#B76-biosensors-14-00574" class="html-bibr">76</a>], (<b>b</b>) a paper microfluidic chip [<a href="#B78-biosensors-14-00574" class="html-bibr">78</a>], (<b>c</b>) a potentiometric ion sensor embedded into a flexible leather substrate [<a href="#B115-biosensors-14-00574" class="html-bibr">115</a>], (<b>d</b>) the different layers of a potentiometric tattoo sensor [<a href="#B91-biosensors-14-00574" class="html-bibr">91</a>], (<b>e</b>) the individual components of the PEDOT ion-selective electrode [<a href="#B117-biosensors-14-00574" class="html-bibr">117</a>], (<b>f</b>) a colorimetric epidermal microfluidic device [<a href="#B121-biosensors-14-00574" class="html-bibr">121</a>], (<b>g</b>) a colorimetric paper-based microfluidic chip [<a href="#B30-biosensors-14-00574" class="html-bibr">30</a>], (<b>h</b>) a textile-based colorimetric sensor [<a href="#B89-biosensors-14-00574" class="html-bibr">89</a>], (<b>i</b>) a skin-interfaced fluorometric microfluidic device [<a href="#B111-biosensors-14-00574" class="html-bibr">111</a>], (<b>j</b>) a pH sensor with an optical detection system [<a href="#B123-biosensors-14-00574" class="html-bibr">123</a>]. PMMA, Poly (methyl methacrylate). PSA, pressure-sensitive adhesive. SAB, surface-activated bonding. SAP, superabsorbent polymer.</p>
Full article ">Figure 5
<p>Structural anatomy of the most representative cortisol biosensors. Schematic illustrations of (<b>a</b>) a patch-type cortisol sensor composed of multiple layers [<a href="#B138-biosensors-14-00574" class="html-bibr">138</a>] and (<b>b</b>) a flexible electrochemical patch with cortisol antibodies immobilized on its surface [<a href="#B139-biosensors-14-00574" class="html-bibr">139</a>]. AuNPs, Au nanoparticles. BSA, bovine serum albumin. HOOC-PEG-SH, thiol-polyethylene glycol-carboxyl.</p>
Full article ">Figure 6
<p>Overview of the main types of wearable devices for monitoring biochemical markers. The most representative devices are the electrochemical ones (<b>a</b>–<b>f</b>). (<b>a</b>) Photograph of an epidermal patch worn on a subject’s chest [<a href="#B37-biosensors-14-00574" class="html-bibr">37</a>]. (<b>b</b>) Optical image of a HIS paper-based Ti<sub>3</sub>C<sub>2</sub>T<sub>x</sub>/MB electrode under original state [<a href="#B43-biosensors-14-00574" class="html-bibr">43</a>]. (<b>c</b>) Photograph of a smart band [<a href="#B117-biosensors-14-00574" class="html-bibr">117</a>]. (<b>d</b>) Image of an epidermal ISE tattoo applied to cubital fossa [<a href="#B92-biosensors-14-00574" class="html-bibr">92</a>]. (<b>e</b>) Illustration of embroidered textile electrodes integrated into a belt [<a href="#B81-biosensors-14-00574" class="html-bibr">81</a>]. (<b>f</b>) Photograph of a wireless, battery-free, flexible patch for in situ cortisol detection [<a href="#B139-biosensors-14-00574" class="html-bibr">139</a>]. Less diffused are the colorimetric devices (<b>g</b>–<b>i</b>). (<b>g</b>) Photograph of an epidermal microfluidic biosensor integrated with flexible electronics mounted on the forearm [<a href="#B24-biosensors-14-00574" class="html-bibr">24</a>]. (<b>h</b>) Photograph of a device made of paper strips mounted on the forehead [<a href="#B48-biosensors-14-00574" class="html-bibr">48</a>]. (<b>i</b>) Optical image of a cotton textile-based colorimetric sensor directly patched on the abdomen of volunteers [<a href="#B89-biosensors-14-00574" class="html-bibr">89</a>].</p>
Full article ">
40 pages, 9583 KiB  
Article
Development of Advanced Positioning Techniques of UWB/Wi-Fi RTT Ranging for Personal Mobility Applications
by Harris Perakis, Vassilis Gikas and Günther Retscher
Sensors 2024, 24(23), 7520; https://doi.org/10.3390/s24237520 - 25 Nov 2024
Viewed by 402
Abstract
“Smart” devices, such as contemporary smartphones and PDAs (Personal Digital Assistance), play a significant role in our daily live, be it for navigation or location-based services (LBSs). In this paper, the use of Ultra-Wide Band (UWB) and Wireless Fidelity (Wi-Fi) based on RTT [...] Read more.
“Smart” devices, such as contemporary smartphones and PDAs (Personal Digital Assistance), play a significant role in our daily live, be it for navigation or location-based services (LBSs). In this paper, the use of Ultra-Wide Band (UWB) and Wireless Fidelity (Wi-Fi) based on RTT (Round-Trip Time) measurements is investigated for pedestrian user localization. For this purpose, several scenarios are designed either using real observation or simulated data. In addition, the localization of user groups within a neighborhood based on collaborative navigation (CP) is investigated and analyzed. An analysis of the performance of these techniques for ranging the positioning estimation using different fusion algorithms is assessed. The methodology applied for CP leverages the hybrid nature of the range measurements obtained by UWB and Wi-Fi RTT systems. The proposed approach stands out due to its originality in two main aspects: (1) it focuses on developing and evaluating suitable models for correcting range errors in RF-based TWR (Two-Way Ranging) technologies, and (2) it emphasizes the development of a robust CP engine for groups of pedestrians. The results obtained demonstrate that a performance improvement with respect to position trueness for UWB and Wi-Fi RTT cases of the order of 74% and 54%, respectively, is achieved due to the integration of these techniques. The proposed localization algorithm based on a P2I/P2P (Peer-to-Infrastructure/Peer-to-Peer) configuration provides a potential improvement in position trueness up to 10% for continuous anchor availability, i.e., UWB known nodes or Wi-Fi access points (APs). Its full potential is evident for short-duration events of complete anchor loss (P2P-only), where an improvement of up to 53% in position trueness is achieved. Overall, the performance metrics estimated based on the extensive evaluation campaigns demonstrate the effectiveness of the proposed methodologies. Full article
(This article belongs to the Special Issue Feature Papers in Physical Sensors 2024)
Show Figures

Figure 1

Figure 1
<p>Empirical (spatial) error correction models: 1D model (<b>left</b>), 2D model (<b>right</b>).</p>
Full article ">Figure 2
<p>Distinction between centralized CP architecture (<b>left</b>) and distributed CP architecture (<b>right</b>).</p>
Full article ">Figure 3
<p>TWR range correction methodology steps.</p>
Full article ">Figure 4
<p>UWB P410 ranges histograms and representative statistical values.</p>
Full article ">Figure 5
<p>Wi-Fi RTT WILD ranges histograms and representative statistical values.</p>
Full article ">Figure 6
<p>Example radial (1D) range correction models for UWB (P410 Time Domain<sup>©</sup>) data.</p>
Full article ">Figure 7
<p>Empirical 1D range correction models estimation.</p>
Full article ">Figure 8
<p>Empirical 2D range correction models estimation.</p>
Full article ">Figure 9
<p>Proposed RSS-based orientation selection approaches. Radial-based selection (<b>left</b>) and bi-dimensional-based selection (<b>right</b>).</p>
Full article ">Figure 10
<p>TWR ranging setup for a single rover EKF-based localization.</p>
Full article ">Figure 11
<p>LED (Leading−Edge Detection) flags with corresponding range deviations along with the standard deviation values for all UWB pairs.</p>
Full article ">Figure 12
<p>Empirical RSS versus trueness diagrams for Wi-Fi RTT observables.</p>
Full article ">Figure 13
<p>Examples of empirical trueness SD versus RSS values for Wi-Fi RTT observables.</p>
Full article ">Figure 14
<p>TWR ranging and communication setup for two rovers’ SCIF-based localization.</p>
Full article ">Figure 15
<p>DCP (distributed collaborative positioning) algorithm implementation diagram, illustrating the respective data flows, error correction implementation, and adaptive filtering steps, as well as standalone or collaborative positioning.</p>
Full article ">Figure 16
<p>Range histograms for all UWB node pairs at point C1 for campaign 1.</p>
Full article ">Figure 17
<p>Bi-dimensional interpolated range error Voronoi surfaces for the different UWB pairs for campaign 1.</p>
Full article ">Figure 18
<p>UWB ranges histograms along with calibrated “EPDFmax” values for the different correction methods at point V1 for campaign 1.</p>
Full article ">Figure 19
<p>UWB ranging mean trueness with standard deviation values per correction method using all validation points for campaign 1.</p>
Full article ">Figure 20
<p>Range histograms for all Wi-Fi RTT APs at point C1_south for campaign 2.</p>
Full article ">Figure 21
<p>Correction models for south and north orientation–linear correction (OLC) estimated for the 901-301 Wi-Fi RTT pair of campaign 2.</p>
Full article ">Figure 22
<p>Bi-dimensional interpolated south and north orientation–Voronoi correction (OVC) range error Voronoi surfaces for the 901-301 Wi-Fi RTT pair for campaign 2.</p>
Full article ">Figure 23
<p>Wi-Fi RTT range histograms along with calibrated “EPDFmax” values for the different correction methods at point V2 for campaign 2.</p>
Full article ">Figure 24
<p>Wi-Fi RTT ranging mean trueness with standard deviation values per correction method using all validation points for campaign 2.</p>
Full article ">Figure 25
<p>Kinematic trajectories generated using UWB ranging and the alternative correction methods in campaign 1.</p>
Full article ">Figure 26
<p>Kinematic trajectories obtained using Wi-Fi RTT ranging for the different correction methods for scenario in campaign 2. With green "*" are denoted the WiFi RTT APs, whereas the dashed line shows the experiment area perimeter.</p>
Full article ">Figure 27
<p>ECDF graph of position trueness using Wi-Fi RTT ranging for the different correction models for Scenario 1 in campaign 2.</p>
Full article ">Figure 28
<p>Rover trajectories for a four-rover setup applying P2I WiFi-RTT, P2P UWB ranges, and the azimuth of campaign 3 with no anchor loss, utilizing simulated data.</p>
Full article ">Figure 29
<p>Performance quality metrics graphic summary for the generated trajectories of campaign 3 with no anchor loss, utilizing simulated data.</p>
Full article ">Figure 30
<p>Rover trajectories obtained for a four-rover setup applying P2I WiFi-RTT and P2P UWB ranges, and the azimuth of campaign 3 with complete anchor loss. Varying anchors are highlighted with a red circle.</p>
Full article ">Figure 31
<p>Performance quality metrics graphic summary for the generated trajectories of campaign 3 with complete anchor loss, utilizing simulated data.</p>
Full article ">Figure 32
<p>Statistical summary of positioning algorithms performance obtained for the simulation-based campaigns’ scenarios.</p>
Full article ">
12 pages, 564 KiB  
Review
Clinical Applications, Legal Considerations and Implementation Challenges of Smartphone-Based Thermography: A Scoping Review
by Alessandra Putrino, Michele Cassetta, Mario Raso, Federica Altieri, Davide Brilli, Martina Mezio, Francesco Circosta, Simona Zaami and Enrico Marinelli
J. Clin. Med. 2024, 13(23), 7117; https://doi.org/10.3390/jcm13237117 - 25 Nov 2024
Viewed by 446
Abstract
Medical thermography is a non-invasive technique that allows the measurement of the temperature of the human body surface, exploiting the heat emitted by the body through the skin in the form of infrared electromagnetic radiation. Recently, smartphone-based thermography (ST) has drawn considerable attention. [...] Read more.
Medical thermography is a non-invasive technique that allows the measurement of the temperature of the human body surface, exploiting the heat emitted by the body through the skin in the form of infrared electromagnetic radiation. Recently, smartphone-based thermography (ST) has drawn considerable attention. This scoping review (SR) aims to describe its current applications and reliability based on currently available research findings, also taking into account the medico-legal implications linked to its use. A search of the sources was conducted on multiple databases (PubMed, Scopus, Cochrane, Lilacs, Google Scholar). Based on a set of eligibility criteria, all articles deemed useful were included in the SR. Collected data, processed with descriptive statistics, are then discussed. From the initial 241 results, after duplicate removal and full-text reading based on inclusion/exclusion criteria, 20 articles were classified according to the main characteristics and indications and outcomes are highlighted based on clinical evidence. The most frequently documented fields of ST are wound care management and vascular surgery. Other disciplines are less explored (dentistry, ophthalmology, otorhinolaryngology, orthopedics, etc.). Practicality, operational simplicity and affordability of mobile thermographic devices are the chief strengths of this technology. Comparative studies with traditional thermal imaging methods are poor in terms of the number of patients analyzed but this technology showed high sensitivity and accuracy in the large number of patients enrolled in observational studies, encouraging the development of further operational protocols in all medical specialties. Gaining a deeper understanding of such techniques will also help settle the medico-legal issues which may arise from the clinical implementation of ST, thus appraising its reliability and safety from that perspective as well. Full article
Show Figures

Figure 1

Figure 1
<p>Review process in compliance with PRISMA-ScR guidelines.</p>
Full article ">
21 pages, 803 KiB  
Article
One-Dimensional Deep Residual Network with Aggregated Transformations for Internet of Things (IoT)-Enabled Human Activity Recognition in an Uncontrolled Environment
by Sakorn Mekruksavanich and Anuchit Jitpattanakul
Technologies 2024, 12(12), 242; https://doi.org/10.3390/technologies12120242 - 24 Nov 2024
Viewed by 912
Abstract
Human activity recognition (HAR) in real-world settings has gained significance due to the growth of Internet of Things (IoT) devices such as smartphones and smartwatches. Nonetheless, limitations such as fluctuating environmental conditions and intricate behavioral patterns have impacted the accuracy of the current [...] Read more.
Human activity recognition (HAR) in real-world settings has gained significance due to the growth of Internet of Things (IoT) devices such as smartphones and smartwatches. Nonetheless, limitations such as fluctuating environmental conditions and intricate behavioral patterns have impacted the accuracy of the current procedures. This research introduces an innovative methodology employing a modified deep residual network, called 1D-ResNeXt, for IoT-enabled HAR in uncontrolled environments. We developed a comprehensive network that utilizes feature fusion and a multi-kernel block approach. The residual connections and the split–transform–merge technique mitigate the accuracy degradation and reduce the parameter number. We assessed our suggested model on three available datasets, mHealth, MotionSense, and Wild-SHARD, utilizing accuracy metrics, cross-entropy loss, and F1 score. The findings indicated substantial enhancements in proficiency in recognition, attaining 99.97% on mHealth, 98.77% on MotionSense, and 97.59% on Wild-SHARD, surpassing contemporary methodologies. Significantly, our model attained these outcomes with considerably fewer parameters (24,130–26,118) than other models, several of which exceeded 700,000 parameters. The 1D-ResNeXt model demonstrated outstanding effectiveness under various ambient circumstances, tackling a significant obstacle in practical HAR applications. The findings indicate that our modified deep residual network presents a viable approach for improving the dependability and usability of IoT-based HAR systems in dynamic, uncontrolled situations while preserving the computational effectiveness essential for IoT devices. The results significantly impact multiple sectors, including healthcare surveillance, intelligent residences, and customized assistive devices. Full article
(This article belongs to the Special Issue IoT-Enabling Technologies and Applications)
Show Figures

Figure 1

Figure 1
<p>HAR framework for IoT-enable HAR in uncontrolled environments.</p>
Full article ">Figure 2
<p>The architecture of the 1D-ResNeXt model.</p>
Full article ">Figure 3
<p>Details of the multi-kernel module.</p>
Full article ">Figure 4
<p>Confusion matrix for a multi-class classification problem.</p>
Full article ">Figure 5
<p>Comparison of model parameters across different deep learning architectures for the mHEALTH, MotionSense, and Wild-SHARD datasets.</p>
Full article ">Figure 6
<p>Mean prediction time in milliseconds of deep learning models used in this work.</p>
Full article ">
25 pages, 1580 KiB  
Review
Near-Field Communication (NFC) Cyber Threats and Mitigation Solutions in Payment Transactions: A Review
by Princewill Onumadu and Hossein Abroshan
Sensors 2024, 24(23), 7423; https://doi.org/10.3390/s24237423 - 21 Nov 2024
Viewed by 1087
Abstract
Today, many businesses use near-field communications (NFC) payment solutions, which allow them to receive payments from customers quickly and smoothly. However, this technology comes with cyber security risks which must be analyzed and mitigated. This study explores the cyber risks associated with NFC [...] Read more.
Today, many businesses use near-field communications (NFC) payment solutions, which allow them to receive payments from customers quickly and smoothly. However, this technology comes with cyber security risks which must be analyzed and mitigated. This study explores the cyber risks associated with NFC transactions and examines strategies for mitigating these risks, focusing on payment devices. This paper provides an overview of NFC technology, related security vulnerabilities, privacy concerns, and fraudulent activities. It then investigates payment devices such as smartphones, contactless cards, and wearables, highlighting their features and vulnerabilities. The study also examines encryption, authentication, tokenization, biometric authentication, and fraud detection methods as risk mitigation strategies. The paper synthesizes theoretical frameworks to provide insights into NFC transaction security and offers stakeholder recommendations. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

Figure 1
<p>Number of selected studies by year.</p>
Full article ">Figure 2
<p>Schematic diagram PRISMA Literature Review.</p>
Full article ">Figure 3
<p>High-resolution block diagram of key NFC security technologies.</p>
Full article ">
27 pages, 443456 KiB  
Article
ImageOP: The Image Dataset with Religious Buildings in the World Heritage Town of Ouro Preto for Deep Learning Classification
by André Luiz Carvalho Ottoni and Lara Toledo Cordeiro Ottoni
Heritage 2024, 7(11), 6499-6525; https://doi.org/10.3390/heritage7110302 - 20 Nov 2024
Viewed by 617
Abstract
Artificial intelligence has significant applications in computer vision studies for cultural heritage. In this research field, visual inspection of historical buildings and the digitization of heritage using machine learning models stand out. However, the literature still lacks datasets for the classification and identification [...] Read more.
Artificial intelligence has significant applications in computer vision studies for cultural heritage. In this research field, visual inspection of historical buildings and the digitization of heritage using machine learning models stand out. However, the literature still lacks datasets for the classification and identification of Brazilian religious buildings using deep learning, particularly with images from the historic town of Ouro Preto. It is noteworthy that Ouro Preto was the first Brazilian World Heritage Site recognized by UNESCO in 1980. In this context, this paper aims to address this gap by proposing a new image dataset, termed ImageOP: The Image Dataset with Religious Buildings in the World Heritage Town of Ouro Preto for Deep Learning Classification. This new dataset comprises 1613 images of facades from 32 religious monuments in the historic town of Ouro Preto, categorized into five classes: fronton (pediment), door, window, tower, and church. The experiments to validate the ImageOP dataset were conducted in two stages: simulations and computer vision using smartphones. Furthermore, two deep learning structures (MobileNet V2 and EfficientNet B0) were evaluated using Edge Impulse software. MobileNet V2 and EfficientNet B0 are architectures of convolutional neural networks designed for computer vision applications aiming at low computational cost, real-time classification on mobile devices. The results indicated that the models utilizing EfficientNet achieved the best outcomes in the simulations, with accuracy = 94.5%, precision = 96.0%, recall = 96.0%, and F-score = 96.0%. Additionally, superior accuracy values were obtained in detecting the five classes: fronton (96.4%), church (97.1%), window (89.2%), door (94.7%), and tower (95.4%). The results from the experiments with computer vision and smartphones reinforced the effectiveness of the proposed dataset, showing an average accuracy of 88.0% in detecting building elements across nine religious monuments tested for real-time mobile device application. The dataset is available in the Mendeley Data repository. Full article
Show Figures

Figure 1

Figure 1
<p>Methodology for the development of the ImageOP dataset.</p>
Full article ">Figure 2
<p>Historic Town of Ouro Preto. (<b>a</b>) Chapel of the Governors Palace and Museum of Inconfidence. (<b>b</b>) Church of Saint Francis of Assisi and Pico do Itacolomi. (<b>c</b>) Church of Saint Efigenia and historic houses. (<b>d</b>) Mountains and historic buildings.</p>
Full article ">Figure 3
<p>Regions of the historic town of Ouro Preto visited for the development of the ImageOP dataset. Source: modified from Google Maps.</p>
Full article ">Figure 4
<p>Religious monuments of Ouro Preto (Part I): (<b>a</b>) Chapel of Lord of Bonfim; (<b>b</b>) Chapel of the Dry Bridge Pass; (<b>c</b>) Chapel of the Governors Palace; (<b>d</b>) Chapel of Saint Anthony; (<b>e</b>) Chapel of the Saint Kings; (<b>f</b>) Chapel of Saint Joseph; (<b>g</b>) Chapel of Our Lady of Piety; (<b>h</b>) Chapel of Our Lady of Conception; (<b>i</b>) Church of Our Lady of Mercy; (<b>j</b>) Chapel of Our Lady of Good Dispatch; (<b>k</b>) Chapel of Saint Luzia; (<b>l</b>) Church of Our Lady of Piety.</p>
Full article ">Figure 5
<p>Religious monuments of Ouro Preto (Part II): (<b>a</b>) Church of Our Lady of Nazareth; (<b>b</b>) Church of Our Lady of Sorrows; (<b>c</b>) Basilica of Our Lady of Pilar; (<b>d</b>) Church of Saint Francis of Assisi; (<b>e</b>) Church of Our Lady of Mercy and Pardons; (<b>f</b>) Church of Saint Francis of Paula; (<b>g</b>) Church of Our Lady of Mount Carmel; (<b>h</b>) Sanctuary of Our Lady of Conception; (<b>i</b>) Church of Saint Anthony of Leite; (<b>j</b>) Church of Saint Anthony of Casa Branca; (<b>k</b>) Church of Good Jesus of Matosinhos and Saint Michael and Souls; (<b>l</b>) Church of Saint Efigenia; (<b>m</b>) Church of Our Lady of Mercy and Compassion; (<b>n</b>) Church of Saint Gonçalo; (<b>o</b>) Church of Our Lady of the Rosary; (<b>p</b>) Church of Saint Bartholomew; (<b>q</b>) Church of Our Lady of Mercy (Cachoeira do Campo); (<b>r</b>) Church of Our Lady of Sorrows of Mount Calvary; (<b>s</b>) Church of Saint Joseph; (<b>t</b>) Church of Our Lady of Mercy (São Bartolomeu).</p>
Full article ">Figure 6
<p>Image collection process in the historic town of Ouro Preto. (<b>a</b>) Data collection of small church. (<b>b</b>) Data collection of church.</p>
Full article ">Figure 7
<p>Kodak<sup>®</sup> PIXPRO AZ255 digital camera. (<b>a</b>) Front view of the camera. (<b>b</b>) Camera display.</p>
Full article ">Figure 8
<p>(<b>a</b>) Building components in a church: (1) fronton; (2) door; (3) window; (4) tower. (<b>b</b>) Building components in a small church (chapel): (1) fronton; (2) door.</p>
Full article ">Figure 9
<p>Examples of images from the fronton class. (<b>a</b>–<b>l</b>) Photographs of church pediments in the Historic Town of Ouro Preto.</p>
Full article ">Figure 10
<p>Examples of images from the church class. (<b>a</b>–<b>l</b>) Photographs of churches in the Historic Town of Ouro Preto.</p>
Full article ">Figure 11
<p>Examples of images from the window class. (<b>a</b>–<b>l</b>) Photographs of church windows in the Historic Town of Ouro Preto.</p>
Full article ">Figure 12
<p>Examples of images from the door class. (<b>a</b>–<b>l</b>) Photographs of church doors in the Historic Town of Ouro Preto.</p>
Full article ">Figure 13
<p>Examples of images from the tower class. (<b>a</b>–<b>l</b>) Photographs of church towers in the Historic Town of Ouro Preto.</p>
Full article ">Figure 14
<p>Method of dataset benchmarking for deep learning classification.</p>
Full article ">Figure 15
<p>Graph of the train and validation history for the MobileNet architecture: (<b>a</b>) accuracy; (<b>b</b>) loss.</p>
Full article ">Figure 16
<p>Confusion matrix for the MobileNet architecture.</p>
Full article ">Figure 17
<p>Graph of the train and validation history for the EfficientNet architecture: (<b>a</b>) accuracy; (<b>b</b>) loss.</p>
Full article ">Figure 17 Cont.
<p>Graph of the train and validation history for the EfficientNet architecture: (<b>a</b>) accuracy; (<b>b</b>) loss.</p>
Full article ">Figure 18
<p>Confusion matrix for the EfficientNet architecture.</p>
Full article ">Figure 19
<p>Proposed procedure for applying computer vision using smartphones to recognize elements of religious buildings.</p>
Full article ">Figure 20
<p>Process of computer vision using mobile device in the historic town of São João del-Rei. (<b>a</b>) Church door detection. (<b>b</b>) Church Detection.</p>
Full article ">Figure 21
<p>Example of deep learning classification using computer vision with a mobile device and Edge Impulse software. Detected class: window (<span class="html-italic">janela</span> in Portuguese).</p>
Full article ">Figure 22
<p>Examples of real-time classification from screenshots of the Edge Impulse graphical interface accessed on the mobile device.</p>
Full article ">
Back to TopTop