[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (292)

Search Parameters:
Keywords = pervasive computing

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
8 pages, 5114 KiB  
Article
Advancing Towards Higher Contrast, Energy-Efficient Screens with Advanced Anti-Glare Manufacturing Technology
by Danielle van der Heijden, Anna Casimiro, Jan Matthijs ter Meulen, Kahraman Keskinbora and Erhan Ercan
Nanomanufacturing 2024, 4(4), 241-248; https://doi.org/10.3390/nanomanufacturing4040016 (registering DOI) - 15 Dec 2024
Abstract
The pervasive use of screens, averaging nearly 7 h per day globally between mobile phones, computers, notebooks and TVs, has sparked a growing desire to minimize reflections from ambient lighting and enhance readability in harsh lighting conditions, without the need to increase screen [...] Read more.
The pervasive use of screens, averaging nearly 7 h per day globally between mobile phones, computers, notebooks and TVs, has sparked a growing desire to minimize reflections from ambient lighting and enhance readability in harsh lighting conditions, without the need to increase screen brightness. This demand highlights a significant need for advanced anti-glare (AG) technologies, to increase comfort and eventually reduce energy consumption of the devices. Currently used production technologies are limited in their texture designs, which can lead to suboptimal performance of the anti-glare texture. To overcome this design limitation and improve the performance of the anti-glare feature, this work reports a new, cost-effective, high-volume production method that enables much needed design freedom over a large area. This is achieved by combining mastering via large-area Laser Beam Lithography (LBL) and replication by Nanoimprint Lithography (NIL) processes. The environmental impact of the production method, such as regards material consumption, are considered, and the full cycle from design to final imprint is discussed. Full article
(This article belongs to the Special Issue Nanoimprinting and Sustainability)
Show Figures

Figure 1

Figure 1
<p>Schematic representation of specular reflection (<b>a</b>) and diffused reflection (<b>b</b>).</p>
Full article ">Figure 2
<p>To enable design freedom, this work combines mastering by LBL and replication via NIL.</p>
Full article ">Figure 3
<p>Schematic representation of Morphotonics R2P imprinting process.</p>
Full article ">Figure 4
<p>Final layout of the designed master mold, containing four different anti-glare textures.</p>
Full article ">Figure 5
<p>Example of results from optimization of the texture of design 4.</p>
Full article ">Figure 6
<p>Example of an imprint made on Morphotonics Portis NIL600 R2P equipment.</p>
Full article ">Figure 7
<p>Replication fidelity measurements of all four textures. In the comparison image: blue = master, yellow = imprint. Top to bottom: design 1, design 2, design 3 and design 4.</p>
Full article ">
18 pages, 4920 KiB  
Article
Dual-Attention Multiple Instance Learning Framework for Pathology Whole-Slide Image Classification
by Dehua Liu, Chengming Li, Xiping Hu and Bin Hu
Electronics 2024, 13(22), 4445; https://doi.org/10.3390/electronics13224445 - 13 Nov 2024
Viewed by 682
Abstract
Conventional methods for tumor diagnosis suffer from two inherent limitations: they are time-consuming and subjective. Computer-aided diagnosis (CAD) is an important approach for addressing these limitations. Pathology whole-slide images (WSIs) are high-resolution tissue images that have made significant contributions to cancer diagnosis and [...] Read more.
Conventional methods for tumor diagnosis suffer from two inherent limitations: they are time-consuming and subjective. Computer-aided diagnosis (CAD) is an important approach for addressing these limitations. Pathology whole-slide images (WSIs) are high-resolution tissue images that have made significant contributions to cancer diagnosis and prognosis assessment. Due to the complexity of WSIs and the availability of only slide-level labels, multiple instance learning (MIL) has become the primary framework for WSI classification. However, most MIL methods fail to capture the interdependence among image patches within a WSI, which is crucial for accurate classification prediction. Moreover, due to the weak supervision of slide-level labels, overfitting may occur during the training process. To address these issues, this paper proposes a dual-attention-based multiple instance learning framework (DAMIL). DAMIL leverages the spatial relationships and channel information between WSI patches for classification prediction, without detailed pixel-level tumor annotations. The output of the model preserves the semantic variations in the latent space, enhances semantic disturbance invariance, and provides reliable class identification for the final slide-level representation. We validate the effectiveness of DAMIL on the most commonly used public dataset, Camelyon16. The results demonstrate that DAMIL outperforms the state-of-the-art methods in terms of classification accuracy (ACC), area under the curve (AUC), and F1-Score. Our model also allows for the examination of its interpretability by visualizing the dual-attention weights. To the best of our knowledge, this is the first attempt to use a dual-attention mechanism, considering both spatial and channel information, for whole-slide image classification. Full article
Show Figures

Figure 1

Figure 1
<p>Overview of the proposed DAMIL. The WSI is first cropped into a number of patches and then feature extraction is performed with the pre-trained Resnet18. The generated feature vector matrix is passed sequentially through the encoder, channel attention module, spatial attention module, decoder, pooling layer, and fully connected layer to generate the finally prediction.</p>
Full article ">Figure 2
<p>Illustration of the difference between the attention-based conventional MIL model and the proposed dual-attention MIL model.</p>
Full article ">Figure 3
<p>Graphical representation of the transformation from a 2D feature map to a 1D feature map.</p>
Full article ">Figure 4
<p>Illustration of each attention submodule. As depicted in the diagram, (<b>a</b>) illustrates the channel attention module, while (<b>b</b>) illustrates the spatial attention module. Both attention modules utilize max-pooling and average pooling for their outputs. Channel attention compresses the dimension of instance quantity for pooling operations, while spatial attention compresses the channel dimension for pooling operations.</p>
Full article ">Figure 5
<p>Visualization of the clustering of package representations generated by the model using T-SNE. From left to right, the clustering results for ABMIL [<a href="#B29-electronics-13-04445" class="html-bibr">29</a>], DSMIL [<a href="#B18-electronics-13-04445" class="html-bibr">18</a>], and DAMIL.</p>
Full article ">Figure 6
<p>Interpretable heatmap of a WSI. The initial column displays pixel-level annotations of lymph node metastasis in a WSI, while the subsequent columns showcase the interpretable heatmaps corresponding to the red-boxed regions of the WSI acquired via ABMIL [<a href="#B29-electronics-13-04445" class="html-bibr">29</a>], DSMIL [<a href="#B18-electronics-13-04445" class="html-bibr">18</a>], and DAMIL, respectively.</p>
Full article ">
21 pages, 402 KiB  
Systematic Review
Enhancing IoT Security in Vehicles: A Comprehensive Review of AI-Driven Solutions for Cyber-Threat Detection
by Rafael Abreu, Emanuel Simão, Carlos Serôdio, Frederico Branco and António Valente
AI 2024, 5(4), 2279-2299; https://doi.org/10.3390/ai5040112 - 6 Nov 2024
Viewed by 2166
Abstract
Background: The Internet of Things (IoT) has improved many aspects that have impacted the industry and the people’s daily lives. To begin with, the IoT allows communication to be made across a wide range of devices, from household appliances to industrial machinery. This [...] Read more.
Background: The Internet of Things (IoT) has improved many aspects that have impacted the industry and the people’s daily lives. To begin with, the IoT allows communication to be made across a wide range of devices, from household appliances to industrial machinery. This connectivity allows for a better integration of the pervasive computing, making devices “smart” and capable of interacting with each other and with the corresponding users in a sublime way. However, the widespread adoption of IoT devices has introduced some security challenges, because these devices usually run in environments that have limited resources. As IoT technology becomes more integrated into critical infrastructure and daily life, the need for stronger security measures will increase. These devices are exposed to a variety of cyber-attacks. This literature review synthesizes the current research of artificial intelligence (AI) technologies to improve IoT security. This review addresses key research questions, including: (1) What are the primary challenges and threats that IoT devices face?; (2) How can AI be used to improve IoT security?; (3) What AI techniques are currently being used for this purpose?; and (4) How does applying AI to IoT security differ from traditional methods? Methods: We included a total of 33 peer-reviewed studies published between 2020 and 2024, specifically in journal and conference papers written in English. Studies irrelevant to the use of AI for IoT security, duplicate studies, and articles without full-text access were excluded. The literature search was conducted using scientific databases, including MDPI, ScienceDirect, IEEE Xplore, and SpringerLink. Results were synthesized through a narrative synthesis approach, with the help of the Parsifal tool to organize and visualize key themes and trends. Results: We focus on the use of machine learning, deep learning, and federated learning, which are used for anomaly detection to identify and mitigate the security threats inherent to these devices. AI-driven technologies offer promising solutions for attack detection and predictive analysis, reducing the need for human intervention more significantly. This review acknowledges limitations such as the rapidly evolving nature of IoT technologies, the early-stage development or proprietary nature of many AI techniques, the variable performance of AI models in real-world applications, and potential biases in the search and selection of articles. The risk of bias in this systematic review is moderate. While the study selection and data collection processes are robust, the reliance on narrative synthesis and the limited exploration of potential biases in the selection process introduce some risk. Transparency in funding and conflict of interest reporting reduces bias in those areas. Discussion: The effectiveness of these AI-based approaches can vary depending on the performance of the model and the computational efficiency. In this article, we provide a comprehensive overview of existing AI models applied to IoT security, including machine learning (ML), deep learning (DL), and hybrid approaches. We also examine their role in enhancing the detection accuracy. Despite all the advances, challenges still remain in terms of data privacy and the scalability of AI solutions in IoT security. Conclusion: This review provides a comprehensive overview of ML applications to enhance IoT security. We also discuss and outline future directions, emphasizing the need for collaboration between interested parties and ongoing innovation to address the evolving threat landscape in IoT security. Full article
Show Figures

Figure 1

Figure 1
<p>Bar chart of selected vs. accepted articles.</p>
Full article ">Figure 2
<p>PRISMA 2020 diagram.</p>
Full article ">
30 pages, 7823 KiB  
Article
Real-Time Evaluation of the Improved Eagle Strategy Model in the Internet of Things
by Venushini Rajendran and R Kanesaraj Ramasamy
Future Internet 2024, 16(11), 409; https://doi.org/10.3390/fi16110409 - 6 Nov 2024
Viewed by 1349
Abstract
With the rapid expansion of cloud computing and the pervasive growth of IoT across industries and educational sectors, the need for efficient remote data management and service orchestration has become paramount. Web services, facilitated by APIs, offer a modular approach to integrating and [...] Read more.
With the rapid expansion of cloud computing and the pervasive growth of IoT across industries and educational sectors, the need for efficient remote data management and service orchestration has become paramount. Web services, facilitated by APIs, offer a modular approach to integrating and streamlining complex business processes. However, real-time monitoring and optimal service selection within large-scale, cloud-based repositories remain significant challenges. This study introduces the novel Improved Eagle Strategy (IES) hybrid model, which uniquely integrates bio-inspired optimization with clustering techniques to drastically reduce computation time while ensuring highly accurate service selection tailored to specific user requirements. Through comprehensive NetLogo simulations, the IES model demonstrates superior efficiency in service selection compared to existing methodologies. Additionally, the IES model’s application through a web dashboard system highlights its capability to manage both functional and non-functional service attributes effectively. When deployed on real-time IoT devices, the IES model not only enhances computation speed but also ensures a more responsive and user-centric service environment. This research underscores the transformative potential of the IES model, marking a significant advancement in optimizing cloud computing processes, particularly within the IoT ecosystem. Full article
Show Figures

Figure 1

Figure 1
<p>Service-Oriented Computing Research Roadmap.</p>
Full article ">Figure 2
<p>Web Service SOA-based framework.</p>
Full article ">Figure 3
<p>The Skeleton of IoT Infrastructure.</p>
Full article ">Figure 4
<p>The overall progression of the IES.</p>
Full article ">Figure 5
<p>Clustering process of WS.</p>
Full article ">Figure 6
<p>Process of a service request by the user.</p>
Full article ">Figure 7
<p>Overall Architecture of Improved Eagle Strategy.</p>
Full article ">Figure 8
<p>Venn diagram illustrating the IES algorithm.</p>
Full article ">Figure 9
<p>Dynamic Web Service Composition Scenario with IES.</p>
Full article ">Figure 10
<p>Flowchart for substitution of service.</p>
Full article ">Figure 11
<p>Overall Architecture of Smart Toilet.</p>
Full article ">Figure 12
<p>Electrical diagram of Smart Toilet System.</p>
Full article ">Figure 13
<p>Illustration of the installation of IoT.</p>
Full article ">Figure 14
<p>Screenshot of mobile application.</p>
Full article ">Figure 15
<p>Screenshot of web dashboard.</p>
Full article ">Figure 16
<p>Phases of Testing and Validation.</p>
Full article ">Figure 17
<p>Graphical illustration for WOA service selection.</p>
Full article ">Figure 18
<p>Graphical illustration for ES service selection.</p>
Full article ">Figure 19
<p>Graphical illustration for IES service selection.</p>
Full article ">Figure 20
<p>Comparison of time taken to select the services.</p>
Full article ">Figure 21
<p>The activities are carried out to evaluate the correct service.</p>
Full article ">Figure 22
<p>Web-based system for IES.</p>
Full article ">Figure 23
<p>Flowchart of “send SMS” function.</p>
Full article ">Figure 24
<p>Perform searches for the send SMS keyboard.</p>
Full article ">Figure 25
<p>BPMN of Smart Toilet IoT System.</p>
Full article ">Figure 26
<p>BPEL of Smart Toilet IoT System.</p>
Full article ">
16 pages, 2729 KiB  
Article
Hybrid RFSVM: Hybridization of SVM and Random Forest Models for Detection of Fake News
by Deepali Goyal Dev and Vishal Bhatnagar
Algorithms 2024, 17(10), 459; https://doi.org/10.3390/a17100459 - 16 Oct 2024
Viewed by 773
Abstract
The creation and spreading of fake information can be carried out very easily through the internet community. This pervasive escalation of fake news and rumors has an extremely adverse effect on the nation and society. Detecting fake news on the social web is [...] Read more.
The creation and spreading of fake information can be carried out very easily through the internet community. This pervasive escalation of fake news and rumors has an extremely adverse effect on the nation and society. Detecting fake news on the social web is an emerging topic in research today. In this research, the authors review various characteristics of fake news and identify research gaps. In this research, the fake news dataset is modeled and tokenized by applying term frequency and inverse document frequency (TFIDF). Several machine-learning classification approaches are used to compute evaluation metrics. The authors proposed hybridizing SVMs and RF classification algorithms for improved accuracy, precision, recall, and F1-score. The authors also show the comparative analysis of different types of news categories using various machine-learning models and compare the performance of the hybrid RFSVM. Comparative studies of hybrid RFSVM with different algorithms such as Random Forest (RF), naïve Bayes (NB), SVMs, and XGBoost have shown better results of around 8% to 16% in terms of accuracy, precision, recall, and F1-score. Full article
(This article belongs to the Special Issue Algorithms in Data Classification (2nd Edition))
Show Figures

Figure 1

Figure 1
<p>Automatic fact-checking process.</p>
Full article ">Figure 2
<p>Research methodology.</p>
Full article ">Figure 3
<p>Proposed framework.</p>
Full article ">Figure 4
<p>Accuracy % of artificial intelligence algorithms.</p>
Full article ">Figure 5
<p>Precision % of artificial intelligence algorithms.</p>
Full article ">Figure 6
<p>Recall % of artificial intelligence algorithms.</p>
Full article ">Figure 7
<p>F1-score % of artificial intelligence algorithms.</p>
Full article ">Figure 8
<p>Comparison among evaluation parameters of different classifiers.</p>
Full article ">
26 pages, 3533 KiB  
Systematic Review
Energy-Efficient Industrial Internet of Things in Green 6G Networks
by Xavier Fernando and George Lăzăroiu
Appl. Sci. 2024, 14(18), 8558; https://doi.org/10.3390/app14188558 - 23 Sep 2024
Viewed by 2749
Abstract
The research problem of this systematic review was whether green 6G networks can integrate energy-efficient Industrial Internet of Things (IIoT) in terms of distributed artificial intelligence, green 6G pervasive edge computing communication networks and big-data-based intelligent decision algorithms. We show that sensor data [...] Read more.
The research problem of this systematic review was whether green 6G networks can integrate energy-efficient Industrial Internet of Things (IIoT) in terms of distributed artificial intelligence, green 6G pervasive edge computing communication networks and big-data-based intelligent decision algorithms. We show that sensor data fusion can be carried out in energy-efficient IoT smart industrial urban environments by cooperative perception and inference tasks. Our analyses debate on 6G wireless communication, vehicular IoT intelligent and autonomous networks, and energy-efficient algorithm and green computing technologies in smart industrial equipment and manufacturing environments. Mobile edge and cloud computing task processing capabilities of decentralized network control and power grid system monitoring were thereby analyzed. Our results and contributions clarify that sustainable energy efficiency and green power generation together with IoT decision support and smart environmental systems operate efficiently in distributed artificial intelligence 6G pervasive edge computing communication networks. PRISMA was used, and with its web-based Shiny app flow design, the search outcomes and screening procedures were integrated. A quantitative literature review was performed in July 2024 on original and review research published between 2019 and 2024. Study screening, evidence map visualization, and data extraction and reporting tools, machine learning classifiers, and reference management software were harnessed for qualitative and quantitative data, collection, management, and analysis in research synthesis. Dimensions and VOSviewer were deployed for data visualization and analysis. Full article
Show Figures

Figure 1

Figure 1
<p>PRISMA flow diagram describing the search results and screening (PRISMA checklist is available in <a href="#app1-applsci-14-08558" class="html-app">Supplementary Materials</a>).</p>
Full article ">Figure 2
<p>VOSviewer mapping of energy-efficient Industrial IoT in green 6G networks regarding co-authorship (see <a href="#applsci-14-08558-t004" class="html-table">Table 4</a> for VOSviewer clusters).</p>
Full article ">Figure 3
<p>VOSviewer mapping of energy-efficient Industrial IoT in green 6G networks regarding citation (see <a href="#applsci-14-08558-t005" class="html-table">Table 5</a> for VOSviewer clusters).</p>
Full article ">Figure 4
<p>VOSviewer mapping of energy-efficient Industrial IoT in green 6G networks regarding bibliographic coupling (see <a href="#applsci-14-08558-t006" class="html-table">Table 6</a> for VOSviewer clusters).</p>
Full article ">Figure 5
<p>VOSviewer mapping of energy-efficient Industrial Internet of Things in green 6G networks regarding co-citation (see <a href="#applsci-14-08558-t007" class="html-table">Table 7</a> for VOSviewer clusters).</p>
Full article ">
25 pages, 2396 KiB  
Article
Internet of Conscious Things: Ontology-Based Social Capabilities for Smart Objects
by Michele Ruta, Floriano Scioscia, Giuseppe Loseto, Agnese Pinto, Corrado Fasciano, Giovanna Capurso and Eugenio Di Sciascio
Future Internet 2024, 16(9), 327; https://doi.org/10.3390/fi16090327 - 8 Sep 2024
Viewed by 873
Abstract
Emerging distributed intelligence paradigms for the Internet of Things (IoT) call for flexible and dynamic reconfiguration of elementary services, resources and devices. In order to achieve such capability, this paper faces complex interoperability and autonomous decision problems by proposing a thorough framework based [...] Read more.
Emerging distributed intelligence paradigms for the Internet of Things (IoT) call for flexible and dynamic reconfiguration of elementary services, resources and devices. In order to achieve such capability, this paper faces complex interoperability and autonomous decision problems by proposing a thorough framework based on the integration of the Semantic Web of Things (SWoT) and Social Internet of Things (SIoT) paradigms. SWoT enables low-power knowledge representation and autonomous reasoning at the edge of the network through carefully optimized inference services and engines. This layer provides service/resource management and discovery primitives for a decentralized collaborative social protocol in the IoT, based on the Linked Data Notifications(LDN) over Linked Data Platform on Constrained Application Protocol (LDP-CoAP). The creation and evolution of friend and follower relationships between pairs of devices is regulated by means of novel dynamic models assessing trust as a usefulness reputation score. The close SWoT-SIoT integration overcomes the functional limitations of existing proposals, which focus on either social device or semantic resource management only. A smart mobility case study on Plug-in Electric Vehicles (PEVs) illustrates the benefits of the proposal in pervasive collaborative scenarios, while experiments show the computational sustainability of the dynamic relationship management approach. Full article
(This article belongs to the Special Issue Social Internet of Things (SIoT))
Show Figures

Figure 1

Figure 1
<p>Semantic Web of Things architecture for SIoT.</p>
Full article ">Figure 2
<p>Social IoT framework and interaction model.</p>
Full article ">Figure 3
<p>Reference ontology-based data modeling.</p>
Full article ">Figure 4
<p>Distributed service/resource discovery.</p>
Full article ">Figure 5
<p>Sample network with loosely connected nodes.</p>
Full article ">Figure 6
<p>Social smart mobility scenario.</p>
Full article ">Figure 7
<p>Electric taxi profile semantic description.</p>
Full article ">Figure 8
<p>Semantic annotations of taxi request and friends’ services.</p>
Full article ">Figure 9
<p>Semantic description of selected service.</p>
Full article ">Figure 10
<p>Test results for small-size networks. Legend denotes values of parameters for each configuration (&lt;generation algorithm&gt;_&lt;number of nodes&gt;_&lt;request rate&gt;).</p>
Full article ">Figure 11
<p>Test results for medium-size networks. Legend denotes values of parameters for each configuration (&lt;generation algorithm&gt;_&lt;number of nodes&gt;_&lt;request rate&gt;).</p>
Full article ">Figure 12
<p>Test results for large-size networks. Legend denotes values of parameters for each configuration (&lt;generation algorithm&gt;_&lt;number of nodes&gt;_&lt;request rate&gt;).</p>
Full article ">Figure 13
<p>Comparison of dynamic (this paper) vs. static [<a href="#B9-futureinternet-16-00327" class="html-bibr">9</a>] relationship management.</p>
Full article ">
19 pages, 18788 KiB  
Article
Integrating Cost-Effective Measurements and CFD Modeling for Accurate Air Quality Assessment
by Giannis Ioannidis, Paul Tremper, Chaofan Li, Till Riedel, Nikolaos Rapkos, Christos Boikos and Leonidas Ntziachristos
Atmosphere 2024, 15(9), 1056; https://doi.org/10.3390/atmos15091056 - 1 Sep 2024
Viewed by 934
Abstract
Assessing air quality in urban areas is vital for protecting public health, and low-cost sensor networks help quantify the population’s exposure to harmful pollutants effectively. This paper introduces an innovative method to calibrate air-quality sensor networks by combining CFD modeling with dependable AQ [...] Read more.
Assessing air quality in urban areas is vital for protecting public health, and low-cost sensor networks help quantify the population’s exposure to harmful pollutants effectively. This paper introduces an innovative method to calibrate air-quality sensor networks by combining CFD modeling with dependable AQ measurements. The developed CFD model is used to simulate traffic-related PM10 dispersion in a 1.6 × 2 km2 urban area. Hourly simulations are conducted, and the resulting concentrations are cross-validated against high-quality measurements. By offering detailed 3D information at a micro-scale, the CFD model enables the creation of concentration maps at sensor locations. Through regression analysis, relationships between low-cost sensor (LCS) readings and modeled outcomes are established and used for network calibration. The study demonstrates the methodology’s capability to provide aid to low-cost devices during a representative 24 h period. The precision of a CFD model can also guide optimal sensor placement based on prevailing meteorological and emission scenarios and refine existing networks for more accurate urban air quality representation. The usage of cost-effective air quality networks, high-quality monitoring stations, and high-resolution air quality modeling combines the strengths of both top-down and bottom-up approaches for air quality assessment. Therefore, the work demonstrated plays a significant role in providing reliable pollutant monitoring and supporting the assessment of environmental policies, aiming to address health issues related to urban air pollution. Full article
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Wider area of interest (<b>a</b>). Test case area containing smartAQnet sensors and official AQ stations (<b>b</b>). OpenStreetMap (OSM) representation of the city (<b>c</b>) and clean geometry of the urban area used for CFD modeling (<b>d</b>).</p>
Full article ">Figure 2
<p>Computational domain developed according to common practices (<b>a</b>). Focus on computational mesh developed on the buildings, ground, and emission sources (<b>b</b>).</p>
Full article ">Figure 3
<p>Methodology followed to enhance smartAQnet PM measurements and to create more reliable PM concentration datasets.</p>
Full article ">Figure 4
<p>Rose graph indicating wind direction and wind speed of September (<b>ai</b>) and for the day selected for simulations (<b>aii</b>) in Augsburg. Traffic originating PM<sub>10</sub> emissions from all traffic sources included in the model (<b>b</b>). Demonstration of measured PM<sub>10</sub> concentrations observed by reference monitoring stations between 9 and 15 of September (<b>c</b>).</p>
Full article ">Figure 5
<p>Karlstrasse (KS) and Köningsplatz (KP) areas (<b>a</b>,<b>c</b>). Air quality stations depicted by the red dot. CFD pollutant concentration for KS and KP at the height of the sensors (<b>b</b>,<b>d</b>) and extraction points for AQS comparison depicted by the black dot.</p>
Full article ">Figure 6
<p>Comparison between measured wind speeds and modeled ones (<b>a</b>) and regression analysis between modeled WS and meteorological station’s (<b>b</b>).</p>
Full article ">Figure 7
<p>Comparison between modeled concentrations and official measurements for Karlstraße (KS) (<b>a</b>) and Königsplatz (KP) (<b>c</b>). Regression analysis between model and measurement for KS (<b>b</b>) and KP (<b>d</b>).</p>
Full article ">Figure 8
<p>Modeled concentrations vs. smartAQnet indications. Hour-to-hour comparison (<b>a</b>–<b>c</b>) and regression analysis with linear fitting to produce calibration equations (<b>d</b>–<b>f</b>).</p>
Full article ">Figure 9
<p>SmartAQnet PM<sub>10</sub> concentrations, modeled PM<sub>10</sub> values, and calibrated PM<sub>10</sub> dataset for RS (<b>a</b>), RT (<b>b</b>), and CN (<b>c</b>), respectively, and indications of high-cost measurements from KS and KP during the examined 24 h period.</p>
Full article ">
26 pages, 5241 KiB  
Article
Automated Identification of Cylindrical Cells for Enhanced State of Health Assessment in Lithium-Ion Battery Reuse
by Alejandro H. de la Iglesia, Fernando Lobato Alejano, Daniel H. de la Iglesia, Carlos Chinchilla Corbacho and Alfonso J. López Rivero
Batteries 2024, 10(9), 299; https://doi.org/10.3390/batteries10090299 - 24 Aug 2024
Viewed by 1195
Abstract
Lithium-ion batteries are pervasive in contemporary life, providing power for a vast array of devices, including smartphones and electric vehicles. With the projected sale of millions of electric vehicles globally by 2022 and over a million electric vehicles in Europe alone in the [...] Read more.
Lithium-ion batteries are pervasive in contemporary life, providing power for a vast array of devices, including smartphones and electric vehicles. With the projected sale of millions of electric vehicles globally by 2022 and over a million electric vehicles in Europe alone in the first quarter of 2023, the necessity of securing a sustainable supply of lithium-ion batteries has reached a critical point. As the demand for electric vehicles and renewable energy storage (ESS) systems increases, so too does the necessity to address the shortage of lithium batteries and implement effective recycling and recovery practices. A considerable number of electric vehicle batteries will reach the end of their useful life in the near future, resulting in a significant increase in the number of used batteries. It is of paramount importance to accurately identify the manufacturer and model of cylindrical batteries to ascertain their State of Health (SoH) and guarantee their efficient reuse. This study focuses on the automation of the identification of cylindrical cells through optical character recognition (OCR) and the analysis of the external color of the cell and the anode morphology based on computer vision techniques. This is a novel work in the current limited literature, which aims to bridge the gap between industrialized lithium-ion cell recovery processes and an automated SoH calculation. Accurate battery identification optimizes battery reuse, reduces manufacturing costs and mitigates environmental impact. The results of the work are promising, achieving 90% accuracy in the identification of 18,650 cylindrical cells. Full article
Show Figures

Figure 1

Figure 1
<p>The four main steps in the second-life recovery process of lithium-ion cells are as follows: (1) Acquisition—collecting used cells from various sources; (2) Identification—determining the manufacturer and model to obtain technical specifications; (3) Testing—evaluating the cells’ State of Health and performance; and (4) Classification—sorting cells based on their suitability for reuse in second-life applications.</p>
Full article ">Figure 2
<p>Flow chart for the identification of cells in the system. If text is detected on the image of the cell, the cell is identified by means of the text; if no text is detected, the process of identification by color and anode begins.</p>
Full article ">Figure 3
<p>Image acquisition device for recovered cells consisting of a conveyor belt, a cell turning system and a system of two cameras, and a fixed point of light to record the outside of the cell.</p>
Full article ">Figure 4
<p>Example of the image generated by the image acquisition device for an 18,650 cell. The printed code, which identifies the model and manufacturer of the cell, is shown in blue. A piece of adhesive, attached to the surface, is shown in red. (<b>a</b>) Full image of the outside of the cell. (<b>b</b>) Top image of the anode of the cell. (<b>c</b>) Image of the analyzed 18,650 cell.</p>
Full article ">Figure 5
<p>Example of 18,650 cells with inconsistencies in their printed code. (<b>a</b>) The printed code is rotated between cells in the same batch. (<b>b</b>) The code in some cells is partially erased or with a minor amount of ink.</p>
Full article ">Figure 6
<p>18,650 cells with adhesive particles on the printed code on the outside of the cell making it difficult to identify.</p>
Full article ">Figure 7
<p>Architecture of text detection model based on Differentiable Binarization.</p>
Full article ">Figure 8
<p>Pseudocode based on the Levenshtein distance that allows us to calculate this distance between two strings, str1 and str2.</p>
Full article ">Figure 9
<p>Example of dot matrix approximation of the printed characters for an 18,650 cell. (<b>a</b>) Input image obtained from the capture system. (<b>b</b>) First approximation of the algorithm with some errors. (<b>c</b>) Correct identification of the individual characters.</p>
Full article ">Figure 10
<p>The 39 dot matrix characters trained to be recognized across the network.</p>
Full article ">Figure 11
<p>LeNet-5 architecture implemented for printed character recognition with dot matrix technique.</p>
Full article ">Figure 12
<p>Example output of the distance calculation algorithm for an ICR18650-22F cell.</p>
Full article ">Figure 13
<p>Pseudocode of the function for calculating distance between RGB colors.</p>
Full article ">Figure 14
<p>Generated test results to validate the calculation of distance between colors.</p>
Full article ">Figure 15
<p>Image of a Sanyo NCR18650BL cell without codes printed on the surface.</p>
Full article ">Figure 16
<p>Color data sheet for Sanyo NCR18650BL stored in the database.</p>
Full article ">Figure 17
<p>Result of comparison of the cell shown in <a href="#batteries-10-00299-f014" class="html-fig">Figure 14</a> and the data stored in the database.</p>
Full article ">Figure 18
<p>18,650 lithium cylindrical cell anode elements: (1) gasket seal: (2) external heat-shrinkable cover; (3) positive terminal or anode; (4) safety vent valve.</p>
Full article ">Figure 19
<p>Different morphologies and colors of 4-cell anodes from different manufacturers and models.</p>
Full article ">Figure 20
<p>Segmentation of the elements present in an 18,650 lithium cell anode using SAM architecture. (<b>a</b>) Image of the anode. (<b>b</b>) Segmentation carried out with SAM. (<b>c</b>) Mask corresponding to the outer heat-shrinkable coating of the cell. (<b>d</b>) Mask corresponding to the gasket seal ring. (<b>e</b>) Detail of the segmentation of the positive terminal where the holes for the safety ventilation are located. (<b>f</b>) Count of the different safety holes located. (<b>g</b>) Mask corresponding to other smaller elements detected in the anode such as the welding points of the cell.</p>
Full article ">Figure 21
<p>Counterfeit 18,650 Samsung SDI cell.</p>
Full article ">Figure 22
<p>Example of obtaining the dominant colors in RGB of the image of an 18,650 cell using different calculation methods.</p>
Full article ">
13 pages, 4401 KiB  
Article
Characterization of Nile Red-Stained Microplastics through Fluorescence Spectroscopy
by Suparnamaaya Prasad, Andrew Bennett and Michael Triantafyllou
J. Mar. Sci. Eng. 2024, 12(8), 1403; https://doi.org/10.3390/jmse12081403 - 15 Aug 2024
Cited by 1 | Viewed by 2073
Abstract
Microplastics (MPs), typically defined as plastic fragments smaller than 5 mm, are pervasive in terrestrial and marine ecosystems. There is a need for rapid, portable, low-cost detection systems to assess health and environmental risks. Fluorescent tagging with Nile Red (NR) has emerged as [...] Read more.
Microplastics (MPs), typically defined as plastic fragments smaller than 5 mm, are pervasive in terrestrial and marine ecosystems. There is a need for rapid, portable, low-cost detection systems to assess health and environmental risks. Fluorescent tagging with Nile Red (NR) has emerged as a popular detection method, but variations in fluorescent emissions based on NR solvent, plastic polymer, excitation wavelength, and additives complicate standardization. In this study, seven plastic samples stained with acetone-based NR were analyzed using a fluorescent spectrometer to identify optimal emission peaks across UV-Vis excitation wavelengths. These findings aid in selecting appropriate excitation wavelengths and optical filters for future detection systems. Additionally, a straightforward polymer identification scheme was validated against field-collected plastic samples, whose material composition was confirmed via Fourier Transform Infrared Spectroscopy. This work contributes towards developing accessible microplastic detection technologies by characterizing the fluorescent properties of NR-stained plastics and enhancing the capability for effective environmental monitoring. Future research will expand the dataset to include diverse plastics with varying additives and weathering, and incorporate computer-vision tools for automated data processing and polymer identification. Full article
Show Figures

Figure 1

Figure 1
<p>Fluorescence spectroscopy experimental setup.</p>
Full article ">Figure 2
<p>Fluorescent emission spectra of Nile Red-stained lab plastics for different excitation wavelengths. Column (<b>left</b>) displays the spectra of plastics excited by 405 nm, plotted in blue on the left. Column (<b>middle</b>) displays the spectra of plastics excited by 465 nm, plotted in orange in the middle. Column (<b>right</b>) displays the spectra of plastics excited by 525 nm, plotted in yellow on the right [<a href="#B26-jmse-12-01403" class="html-bibr">26</a>].</p>
Full article ">Figure 3
<p>Polymer identification scheme [<a href="#B26-jmse-12-01403" class="html-bibr">26</a>].</p>
Full article ">Figure 4
<p>Fluorescent emission spectra of Nile Red-stained field plastics for different excitation wavelengths. Column on the left displays the spectra of PP plastics and column on the right displays the spectra of PE plastics [<a href="#B26-jmse-12-01403" class="html-bibr">26</a>].</p>
Full article ">Figure 5
<p>Low-cost microplastic imaging setup [<a href="#B26-jmse-12-01403" class="html-bibr">26</a>].</p>
Full article ">Figure 6
<p>Images of Nile Red-stained lab plastics for different excitation wavelengths [<a href="#B26-jmse-12-01403" class="html-bibr">26</a>]. Due to Nile Red’s solvatochromatic properties, the emission wavelength changes based on polarity of polymer surface.</p>
Full article ">Figure 7
<p>Images of Nile Red-stained lab plastics paired with raw fluorescent emission data for different excitation wavelengths [<a href="#B26-jmse-12-01403" class="html-bibr">26</a>].</p>
Full article ">
27 pages, 2719 KiB  
Article
Comparison of KF-Based Vehicle Sideslip Estimation Logics with Increasing Complexity for a Passenger Car
by Lorenzo Ponticelli, Mario Barbaro, Geraldino Mandragora, Gianluca Pagano and Gonçalo Sousa Torres
Sensors 2024, 24(15), 4846; https://doi.org/10.3390/s24154846 - 25 Jul 2024
Viewed by 904
Abstract
Nowadays, control is pervasive in vehicles, and a full and accurate knowledge of vehicle states is crucial to guarantee safety levels and support the development of Advanced Driver-Assistance Systems (ADASs). In this scenario, real-time monitoring of the vehicle sideslip angle becomes fundamental, and [...] Read more.
Nowadays, control is pervasive in vehicles, and a full and accurate knowledge of vehicle states is crucial to guarantee safety levels and support the development of Advanced Driver-Assistance Systems (ADASs). In this scenario, real-time monitoring of the vehicle sideslip angle becomes fundamental, and various virtual sensing techniques based on both vehicle dynamics models and data-driven methods are widely presented in the literature. Given the need for on-board embedded device solutions in autonomous vehicles, it is mandatory to find the correct balance between estimation accuracy and the computational burden required. This work mainly presents different physical KF-based methodologies and proposes both mathematical and graphical analysis to explore the effectiveness of these solutions, all employing equal tire and vehicle simplified models. For this purpose, results are compared with accurate sensor acquisition provided by the on-track campaign on passenger vehicles; moreover, to truthfully represent the possibility of using such virtual sensing techniques in real-world scenarios, the vehicle is also equipped with low-end sensors that provide information to all the employed observers. Full article
(This article belongs to the Special Issue Sensors and Sensor Fusion in Autonomous Vehicles)
Show Figures

Figure 1

Figure 1
<p>The Kalman filter cycle.</p>
Full article ">Figure 2
<p>Single-track vehicle model basic scheme.</p>
Full article ">Figure 3
<p>Tire model calibration results.</p>
Full article ">Figure 4
<p>Speed and steering input signals: (<b>a</b>) run 1, (<b>b</b>) run 2, (<b>c</b>) run 3, (<b>d</b>) run 4, (<b>e</b>) run 5, (<b>f</b>) run 6.</p>
Full article ">Figure 4 Cont.
<p>Speed and steering input signals: (<b>a</b>) run 1, (<b>b</b>) run 2, (<b>c</b>) run 3, (<b>d</b>) run 4, (<b>e</b>) run 5, (<b>f</b>) run 6.</p>
Full article ">Figure 4 Cont.
<p>Speed and steering input signals: (<b>a</b>) run 1, (<b>b</b>) run 2, (<b>c</b>) run 3, (<b>d</b>) run 4, (<b>e</b>) run 5, (<b>f</b>) run 6.</p>
Full article ">Figure 5
<p>Comparison of all the observers, run 1.</p>
Full article ">Figure 6
<p>Comparison of all the observers, run 2.</p>
Full article ">Figure 7
<p>Comparison of all the observers, run 3.</p>
Full article ">Figure 8
<p>Comparison of EKFs, run 1.</p>
Full article ">Figure 9
<p>Comparison of UKFs, run 1.</p>
Full article ">Figure 10
<p>Comparison of all the observers, run 4.</p>
Full article ">Figure 11
<p>Comparison of all the observers, run 5.</p>
Full article ">Figure 12
<p>Comparison of EKFs, run 6.</p>
Full article ">Figure 13
<p>Comparison of S-UKF vs. G-UKF, run 6.</p>
Full article ">Figure 14
<p>Comparison of SIMP-UKF vs. SPHE-UKF, run 6.</p>
Full article ">Figure 15
<p>Comparison of EKF vs. SIMP-UKF, run 6.</p>
Full article ">Figure 16
<p>Comparison of all the observers, run 6.</p>
Full article ">Figure 17
<p>Visual representation of RMSE comparison between all the observers on each run.</p>
Full article ">
26 pages, 2846 KiB  
Article
Tiny Machine Learning Battery State-of-Charge Estimation Hardware Accelerated
by Danilo Pietro Pau and Alberto Aniballi
Appl. Sci. 2024, 14(14), 6240; https://doi.org/10.3390/app14146240 - 18 Jul 2024
Viewed by 1613
Abstract
Electric mobility is pervasive and strongly affects everyone in everyday life. Motorbikes, bikes, cars, humanoid robots, etc., feature specific battery architectures composed of several lithium nickel oxide cells. Some of them are connected in series and others in parallel within custom architectures. They [...] Read more.
Electric mobility is pervasive and strongly affects everyone in everyday life. Motorbikes, bikes, cars, humanoid robots, etc., feature specific battery architectures composed of several lithium nickel oxide cells. Some of them are connected in series and others in parallel within custom architectures. They need to be controlled against over current, temperature, inner pressure and voltage, and their charge/discharge needs to be continuously monitored and balanced among the cells. Such a battery management system exhibits embarrassingly parallel computing, as hundreds of cells offer the opportunity for scalable and decentralized monitoring and control. In recent years, tiny machine learning has emerged as a data-driven black-box approach to address application problems at the edge by using very limited energy, computational and storage resources to achieve under mW power consumption. Examples of tiny devices at the edge include microcontrollers capable of 10–100 s MHz with 100 s KiB to few MB embedded memory. This study addressed battery management systems with a particular focus on state-of-charge prediction. Several machine learning workloads were studied by using IEEE open-source datasets to profile their accuracy. Moreover, their deployability on a range of microcontrollers was studied, and their memory footprints were reported in a very detailed manner. Finally, computational requirements were proposed with respect to the parallel nature of the battery system architecture, suggesting a per cell and per module tiny, decentralized artificial intelligence system architecture. Full article
Show Figures

Figure 1

Figure 1
<p>SoC variations over the time.</p>
Full article ">Figure 2
<p>Dataset features: correlation matrix. Numbers between parenthesis () are negative.</p>
Full article ">Figure 3
<p>10 Features selected from the dataset: correlation matrix. Numbers between parenthesis () are negative.</p>
Full article ">Figure 4
<p>FFN architecture.</p>
Full article ">Figure 5
<p>Stateless LSTM-based architecture.</p>
Full article ">Figure 6
<p>Stateful LSTM-based architecture.</p>
Full article ">Figure 7
<p>Stateless GRU-based architecture.</p>
Full article ">Figure 8
<p>Stateful GRU-based architecture.</p>
Full article ">Figure 9
<p>TCN Residual Block structure.</p>
Full article ">Figure 10
<p>TCN first branch topology.</p>
Full article ">Figure 11
<p>TCN second branch topology.</p>
Full article ">Figure 12
<p>TCN third branch topology.</p>
Full article ">Figure 13
<p>TCN complete topology with all the branches connected together.</p>
Full article ">Figure 14
<p>LMU-based architecture.</p>
Full article ">Figure 15
<p>Simplified features acquisition and computing architecture. (1) is the path to store the input features into embedded memory M, (2) is the path to read the feature batch from the memory M to feed the inference run on the CPU.</p>
Full article ">
15 pages, 286 KiB  
Article
Intelligent Agents at School—Child–Robot Interactions as an Educational Path
by Margherita Di Stasio and Beatrice Miotti
Educ. Sci. 2024, 14(7), 774; https://doi.org/10.3390/educsci14070774 - 16 Jul 2024
Viewed by 1039
Abstract
The pervasiveness of technologies leads us to talk about a code society. From an educational point of view, coding, computational thinking, and educational robotics are an open possibility. Nevertheless, new elements such as artificial intelligence are rapidly changing educational technology perspectives. In this [...] Read more.
The pervasiveness of technologies leads us to talk about a code society. From an educational point of view, coding, computational thinking, and educational robotics are an open possibility. Nevertheless, new elements such as artificial intelligence are rapidly changing educational technology perspectives. In this work, we will analyze school policies and theoretical bases in order to understand if, and under what kind of, condition coding, computational thinking, and educational robotics still represent the qualifying elements of a framework for digital literacy and digital citizenship. Full article
(This article belongs to the Special Issue The "Gentle Push" of Technologies to Change the School)
Show Figures

Figure 1

Figure 1
<p>SWOT analysis.</p>
Full article ">
21 pages, 2768 KiB  
Article
System Design for Sensing in Manufacturing to Apply AI through Hierarchical Abstraction Levels
by Georgios Sopidis, Michael Haslgrübler, Behrooz Azadi, Ouijdane Guiza, Martin Schobesberger, Bernhard Anzengruber-Tanase and Alois Ferscha
Sensors 2024, 24(14), 4508; https://doi.org/10.3390/s24144508 - 12 Jul 2024
Viewed by 937
Abstract
Activity recognition combined with artificial intelligence is a vital area of research, ranging across diverse domains, from sports and healthcare to smart homes. In the industrial domain, and the manual assembly lines, the emphasis shifts to human–machine interaction and thus to human activity [...] Read more.
Activity recognition combined with artificial intelligence is a vital area of research, ranging across diverse domains, from sports and healthcare to smart homes. In the industrial domain, and the manual assembly lines, the emphasis shifts to human–machine interaction and thus to human activity recognition (HAR) within complex operational environments. Developing models and methods that can reliably and efficiently identify human activities, traditionally just categorized as either simple or complex activities, remains a key challenge in the field. Limitations of the existing methods and approaches include their inability to consider the contextual complexities associated with the performed activities. Our approach to address this challenge is to create different levels of activity abstractions, which allow for a more nuanced comprehension of activities and define their underlying patterns. Specifically, we propose a new hierarchical taxonomy for human activity abstraction levels based on the context of the performed activities that can be used in HAR. The proposed hierarchy consists of five levels, namely atomic, micro, meso, macro, and mega. We compare this taxonomy with other approaches that divide activities into simple and complex categories as well as other similar classification schemes and provide real-world examples in different applications to demonstrate its efficacy. Regarding advanced technologies like artificial intelligence, our study aims to guide and optimize industrial assembly procedures, particularly in uncontrolled non-laboratory environments, by shaping workflows to enable structured data analysis and highlighting correlations across various levels throughout the assembly progression. In addition, it establishes effective communication and shared understanding between researchers and industry professionals while also providing them with the essential resources to facilitate the development of systems, sensors, and algorithms for custom industrial use cases that adapt to the level of abstraction. Full article
(This article belongs to the Special Issue Human-Centred Smart Manufacturing - Industry 5.0)
Show Figures

Figure 1

Figure 1
<p>This figure presents a hierarchy of an exemplary assembly process: components, units, modules, products, and post-assembly. Additionally, it demonstrates how these stages are interconnected and how activities and tasks flow inside a real assembly scenario from components to the final product. Each stage builds upon the previous one, with components being assembled into units, units into modules, modules into the final product, and finally, the product being integrated into the production line.</p>
Full article ">Figure 2
<p>The figure presents a visualization for the proposed taxonomy. At the atomic level, individual assembly activities are considered as singular tasks involving basic operations or manipulations on discrete components or tools. The micro-level aggregates multiple atomic operations into coherent sequences, representing actions within the assembly process. Larger assembly tasks are formed at the meso-level by combining multiple micro-level activities, often involving the assembly of sub-components or partial assemblies. The macro-level encompasses entire assembly processes, including stages such as the assembly of major components or modules. Finally, the mega-level represents the overall assembly process, incorporating post-assembly activities such as quality control checks, packaging, or final inspection.</p>
Full article ">Figure 3
<p>The table illustrates a simplified ATM assembly process, derived from a real industrial use case [<a href="#B76-sensors-24-04508" class="html-bibr">76</a>], showcasing activities across different assembly levels: atomic, micro, meso, macro, and mega. It serves as a comparative analysis with existing approaches for activity categorization, highlighting how each level contributes to the overall process. Specific activities are provided for clarity, offering insights into the hierarchical organization of assembly tasks. The color coding highlights differences in categorization when distinguishing tasks across levels.</p>
Full article ">Figure 4
<p>The table illustrates welding processes in car assembly, presenting the hierarchical framework of tasks, and showcasing activities across different assembly levels: atomic, micro, meso, macro, and mega. It serves as a comparative analysis with existing approaches for activity categorization, highlighting how each level contributes to the overall process and showing how individual actions aggregate into more complex tasks across the assembly line. Specific activities are provided for clarity, offering insights into the hierarchical organization of assembly tasks. The color coding highlights differences in categorization when distinguishing tasks across levels.</p>
Full article ">Figure 5
<p>This figure illustrates key characteristics across atomic, micro, meso, macro, and mega-levels of assembly activity recognition systems. Each group of related elements is color-coded, and each line represents a different category, ensuring distinctions between aspects. The figure highlights variations that are important in the overall design of an AI system, such as sensor placement, types of sensors used, system mobility, sampling rate, duration of experiments, frequency of actions, preprocessing techniques, models employed for activity recognition, window size for data processing, and feedback mechanisms. Associated recommendations are provided for each category and level to serve as a starting point for the development of AI models under the “Models to Use” category, which is related to industrial assembly.</p>
Full article ">
19 pages, 2015 KiB  
Article
Artificial Intelligence in Journalism: A Ten-Year Retrospective of Scientific Articles (2014–2023)
by Fabia Ioscote, Adriana Gonçalves and Claudia Quadros
Journal. Media 2024, 5(3), 873-891; https://doi.org/10.3390/journalmedia5030056 - 29 Jun 2024
Cited by 4 | Viewed by 15276
Abstract
Academic interest in AI in journalism has been growing since 2018. Through a systematic review of the literature from 2014 to 2023, this study discusses the evolution of research in the field and how AI has changed journalism. The aim is to understand [...] Read more.
Academic interest in AI in journalism has been growing since 2018. Through a systematic review of the literature from 2014 to 2023, this study discusses the evolution of research in the field and how AI has changed journalism. The aim is to understand the impact of AI on journalism, based on a review of academic papers and a qualitative analysis of the most cited articles. This study combines: a systematic review of scientific articles extracted from Web of Science and Scopus (n = 699) and a qualitative approach with categorical content analysis of those with more than 50 citations (n = 59). The results (n = 699) highlight the prominence of authors from the Universities of Amsterdam and Santiago de Compostela. The United States has the largest number of authorships: 261 distributed across 99 institutions. The categorical content analysis (n = 59) shows a focus on issues like the work of the journalist, because AI is replacing journalists with repetitive and monotonous tasks, raising several questions about the role of the journalist. The findings show the rise of computational methods, highlighting the pervasiveness of AI in research, which has not been explored in previous work. Ethics, regulation, and journalism education remain under-discussed in research. Full article
Show Figures

Figure 1

Figure 1
<p>Annual growth in articles.</p>
Full article ">Figure 2
<p>Annual growth of articles in the five journals with the highest number of publications.</p>
Full article ">Figure 3
<p>Top 50 keywords (n = 699).</p>
Full article ">
Back to TopTop