Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (2,034)

Search Parameters:
Keywords = 5G security

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
29 pages, 1755 KiB  
Article
A Class of Perfectly Secret Autonomous Low-Bit-Rate Voice Communication Systems
by Jelica Radomirović, Milan Milosavljević, Sara Čubrilović, Zvezdana Kuzmanović, Miroslav Perić, Zoran Banjac and Dragana Perić
Symmetry 2025, 17(3), 365; https://doi.org/10.3390/sym17030365 (registering DOI) - 27 Feb 2025
Abstract
This paper presents an autonomous perfectly secure low-bit-rate voice communication system (APS-VCS) based on the mixed-excitation linear prediction voice coder (MELPe), Vernam cipher, and sequential key distillation (SKD) protocol by public discussion. An authenticated public channel can be selected in a wide range, [...] Read more.
This paper presents an autonomous perfectly secure low-bit-rate voice communication system (APS-VCS) based on the mixed-excitation linear prediction voice coder (MELPe), Vernam cipher, and sequential key distillation (SKD) protocol by public discussion. An authenticated public channel can be selected in a wide range, from internet connections to specially leased radio channels. We found the source of common randomness between the locally synthesized speech signal at the transmitter and the reconstructed speech signal at the receiver side. To avoid information leakage about open input speech, the SKD protocol is not executed on the actual transmitted speech signal but on artificially synthesized speech obtained by random selection of the linear spectral pairs (LSP) parameters of the speech production model. Experimental verification of the proposed system was performed on the Vlatacom Personal Crypto Platform for Voice encryption (vPCP-V). Empirical measurements show that with an adequate selection of system parameters for voice transmission of 1.2 kb/s, a secret key rate (KR) of up to 8.8 kb/s can be achieved, with a negligible leakage rate (LR) and bit error rate (BER) of order for various communications channels, including GSM 3G and GSM VoLTE networks. At the same time, by ensuring perfect secrecy within symmetric encryption systems, it further highlights the importance of the symmetry principle in the field of information-theoretic security. To our knowledge, this is the first autonomous, perfectly secret system for low-bit-rate voice communication that does not require explicit prior generation and distribution of secret keys. Full article
(This article belongs to the Special Issue Symmetry and Asymmetry in Cryptography, Second Edition)
25 pages, 4704 KiB  
Article
Participatory Land Planning, Community Land Trusts, and Managed Retreat: Transforming Informality and Building Resilience to Flood Risk in Puerto Rico’s Caño Martín Peña
by Ivis García and Leslie Martínez-Román
Land 2025, 14(3), 485; https://doi.org/10.3390/land14030485 - 26 Feb 2025
Viewed by 118
Abstract
El Caño Martín Peña (CMP), a cluster of eight historically informal neighborhoods in San Juan, Puerto Rico, faces long-standing challenges of inadequate infrastructure, persistent flooding, and displacement pressures. In response, the G8 collective—a coalition representing these communities—and the Martín Peña Canal Community Land [...] Read more.
El Caño Martín Peña (CMP), a cluster of eight historically informal neighborhoods in San Juan, Puerto Rico, faces long-standing challenges of inadequate infrastructure, persistent flooding, and displacement pressures. In response, the G8 collective—a coalition representing these communities—and the Martín Peña Canal Community Land Trust (CLT) establishment have developed a participatory planning model prioritizing resilience and housing security. This unique and exemplary model of a participatory planning case study, grounded in document analysis and participant observation, explores how the G8 and CLT have driven transformative improvements in CMP, addressing informality, mitigating flood risks, and preventing displacement. Findings highlight how community-driven governance fosters trust and enhances long-term sustainability, offering valuable insights for equitable urban development and spatial justice. Full article
(This article belongs to the Special Issue Participatory Land Planning: Theory, Methods, and Case Studies)
Show Figures

Figure 1

Figure 1
<p>Housing Units Cleared for Martín Peña Canal Dredging Project. A sign posted outside the acquired house informs residents that construction in this area is prohibited and indicates the planned future width of the channel. Authors’ source.</p>
Full article ">Figure 2
<p>Flowchart illustrating the structure of participatory planning for the Martín Peña Canal.</p>
Full article ">Figure 3
<p>Map showcasing San Juan, Puerto Rico, including the Martín Peña Channel and the eight surrounding communities. Source: Authors.</p>
Full article ">Figure 4
<p>Community Timeline. Source: Image created by authors using napkin ai.</p>
Full article ">Figure 5
<p>Transformation of the Martín Peña Canal: From Extensive Mangroves in 1936 to a Narrowed and Filled Canal in the 2000s. (<b>a</b>) A 1936 aerial photograph of the Martín Peña Canal reveals the extensive mangrove swamps about 250 feet wide that once bordered the waterway during that period.; (<b>b</b>) An aerial view of the Martín Peña Canal from the 2000s reveals that nearly all the mangrove swamps have been filled in, resulting in a significantly narrower canal; (<b>c</b>) Aerial view of the communities surrounding the Caño Martín Peña shows how close the community is to the main economic center; (<b>d</b>) Community leaders shown in a mural that reads, “And for the first time we, the residents, were the leaders of our future”. Source: Proyecto ENLACE.</p>
Full article ">Figure 5 Cont.
<p>Transformation of the Martín Peña Canal: From Extensive Mangroves in 1936 to a Narrowed and Filled Canal in the 2000s. (<b>a</b>) A 1936 aerial photograph of the Martín Peña Canal reveals the extensive mangrove swamps about 250 feet wide that once bordered the waterway during that period.; (<b>b</b>) An aerial view of the Martín Peña Canal from the 2000s reveals that nearly all the mangrove swamps have been filled in, resulting in a significantly narrower canal; (<b>c</b>) Aerial view of the communities surrounding the Caño Martín Peña shows how close the community is to the main economic center; (<b>d</b>) Community leaders shown in a mural that reads, “And for the first time we, the residents, were the leaders of our future”. Source: Proyecto ENLACE.</p>
Full article ">
11 pages, 1461 KiB  
Article
Influence of Posture and Sleep Duration on Heart Rate Variability in Older Subjects
by Emi Yuda and Yutaka Yoshida
Appl. Sci. 2025, 15(5), 2504; https://doi.org/10.3390/app15052504 - 26 Feb 2025
Viewed by 169
Abstract
Japan is facing challenges associated with its super-aging society, including increased social security burdens and a rise in the elderly workforce due to a declining younger labor force. Extending the healthy life expectancy is one countermeasure, necessitating lifestyle improvements such as frailty prevention [...] Read more.
Japan is facing challenges associated with its super-aging society, including increased social security burdens and a rise in the elderly workforce due to a declining younger labor force. Extending the healthy life expectancy is one countermeasure, necessitating lifestyle improvements such as frailty prevention and ensuring adequate sleep duration. This study investigated the relationship between heart rate variability (HRV) and sleep duration among older adults (aged ≥ 65) using electrocardiogram (ECG) and three-axis accelerometer data from the Allostatic State Mapping by the Ambulatory ECG Repository (ALLSTAR) database, recorded between January 2019 and March 2021. Inclusion criteria required a sinus rhythm and recording durations ≥80%. Continuous 24 h ECG and accelerometer data were analyzed for 55,154 participants (mean age 76 ± 6). The results consistently showed significant differences in HRV metrics, including MRRI, SDRR, ULF, LF, HF, and LF/HF, across sleep duration groups (G1–G4). Short-sleep groups (G4) exhibited decreased MRRI and SDRR and increased LF/HF, suggesting active lifestyles but reduced HRV. Conversely, long-sleep groups (G1) showed increased MRRI and reduced LF/HF but exhibited age-related declines in SDRR and ULF. These findings indicate that both insufficient and excessive sleep may contribute to HRV reduction in older adults. This study provides critical insights for improving elderly lifestyles through tailored interventions in exercise and sleep management. Full article
(This article belongs to the Special Issue Artificial Intelligence for Healthcare)
Show Figures

Figure 1

Figure 1
<p>Example of applying the supine position detection algorithm. From top to bottom, the RR interval, (light blue) the x, y, and z axes of acceleration (red, yellow, and green), and body position (red for standing, yellow for sitting, blue for lying down, and light blue for lying on side) are shown. The horizontal axis of the graph shows time, and the data is from 10:00 in the morning until 10:00 the following morning.</p>
Full article ">Figure 2
<p>Estimation of nighttime sleep duration and grouping.</p>
Full article ">Figure 3
<p>HRV indicators for each group: (<b>a</b>–<b>c</b>) indicate the HRV indexes for 2019, 2020, and 2021, respectively. The symbols in the figure are as follows, * <span class="html-italic">p</span> &lt; 0.05, ** <span class="html-italic">p</span> &lt; 0.01 vs. G1, † <span class="html-italic">p</span> &lt; 0.05, †† <span class="html-italic">p</span> &lt; 0.01 vs. G2, # <span class="html-italic">p</span> &lt; 0.05, ## <span class="html-italic">p</span> &lt; 0.01 vs. G3.</p>
Full article ">Figure 3 Cont.
<p>HRV indicators for each group: (<b>a</b>–<b>c</b>) indicate the HRV indexes for 2019, 2020, and 2021, respectively. The symbols in the figure are as follows, * <span class="html-italic">p</span> &lt; 0.05, ** <span class="html-italic">p</span> &lt; 0.01 vs. G1, † <span class="html-italic">p</span> &lt; 0.05, †† <span class="html-italic">p</span> &lt; 0.01 vs. G2, # <span class="html-italic">p</span> &lt; 0.05, ## <span class="html-italic">p</span> &lt; 0.01 vs. G3.</p>
Full article ">
57 pages, 21926 KiB  
Article
The Role of Artificial Intelligence in Developing the Tall Buildings of Tomorrow
by Samaa Emad, Mohsen Aboulnaga, Ayman Wanas and Ahmed Abouaiana
Buildings 2025, 15(5), 749; https://doi.org/10.3390/buildings15050749 - 25 Feb 2025
Viewed by 176
Abstract
The application of artificial intelligence (AI) in tall buildings’ development provides transformative opportunities for facing population growth pressures and sustainability challenges in cities. This study presents a comprehensive review of both the current literature and the theoretical framework of AI and its role [...] Read more.
The application of artificial intelligence (AI) in tall buildings’ development provides transformative opportunities for facing population growth pressures and sustainability challenges in cities. This study presents a comprehensive review of both the current literature and the theoretical framework of AI and its role in construction, specifically analyzing the convergence of AI and skyscraper development. The research methodology combines scholarly sources, AI image generation techniques, an analytical approach, and a comparative analysis of traditional versus AI-enhanced approaches. This study identifies key domains where AI significantly impacts skyscraper evolution, including design optimization, energy management, construction processes, and operational efficiencies. It highlights short-term benefits like enhanced architectural design through rapid generative design iterations and material optimization, alongside long-term implications involving adaptive building technologies and sustainability enhancements. Additionally, it addresses the advantages and challenges of adopting AI in architecture, considering various factors (e.g., sustainability, security, and occupant well-being), as well as the impact of different climates on AI in architecture and construction. It also explores transformative applications across diverse skyscraper functions and how AI can bridge different cultures and technologies. The findings reveal AI’s substantial potential in TBs’ design and management, (i.e., structural optimization, energy saving, safety protocols, and operational efficiency) by leveraging innovative technologies such as machine learning, computer vision, and predictive modeling. In conclusion, AI’s dual role as both a revolutionary tool that enhances traditional architectural methods and a catalyst for new design paradigms prioritizing sustainability and resilience has been reflected. Ultimately, this research underscores the importance of balancing AI innovation with established architectural principles to foster a favorable urban future that embraces both technological advancement and foundational design values. This study serves as a base for future research in the AI field. Full article
(This article belongs to the Section Building Materials, and Repair & Renovation)
Show Figures

Figure 1

Figure 1
<p>Articles related to AI and ML in the built environment by year and publisher (source: developed by authors based on [<a href="#B5-buildings-15-00749" class="html-bibr">5</a>]). (<b>a</b>) Mapping articles connected to AI and ML by year, (<b>b</b>) Articles associated with AI and ML by publisher.</p>
Full article ">Figure 2
<p>The adopted methodology shows the strategy and two main approaches, theoretical and analytical, leading to a comparative review and comparative analysis of utilizing AI in line with skyscraper design (source: developed by authors).</p>
Full article ">Figure 3
<p>Development of skyscrapers’ height through the years (image source: developed by authors based on [<a href="#B21-buildings-15-00749" class="html-bibr">21</a>]).</p>
Full article ">Figure 4
<p>Pros and cons of skyscrapers, developed by authors (Image’s credit and source: Donaldytong, <a href="https://en.wikipedia.org/wiki/Burj_Khalifa#/media/File:Burj_Khalifa.jpg" target="_blank">https://en.wikipedia.org/wiki/Burj_Khalifa#/media/File:Burj_Khalifa.jpg</a> (accessed on 26 December 2024)).</p>
Full article ">Figure 5
<p>A brief history of AI evolution through the years (image source: developed by authors after Hello Future, 2022, [<a href="#B31-buildings-15-00749" class="html-bibr">31</a>]; (Image’s credit and source: M. Weik. <a href="https://commons.wikimedia.org/wiki/File:ENIAC-changing_a_tube_(cropped).jpg" target="_blank">https://commons.wikimedia.org/wiki/File:ENIAC-changing_a_tube_(cropped).jpg</a> (accessed on 16 February 2025)). (Image’s credit and source: Elliott &amp; Fry. <a href="https://en.wikipedia.org/wiki/Alan_Turing#/media/File:Alan_Turing_(1951).jpg" target="_blank">https://en.wikipedia.org/wiki/Alan_Turing#/media/File:Alan_Turing_(1951).jpg</a> (accessed on 16 February 2025)). Image’s credit and source: Osamu Iwasaki. <a href="https://en.wikipedia.org/wiki/Micromouse#/media/File:Micromouse_maze.jpg" target="_blank">https://en.wikipedia.org/wiki/Micromouse#/media/File:Micromouse_maze.jpg</a> (accessed on 16 February 2025)). (Image’s credit and source: Dartmouth College. <a href="https://en.wikipedia.org/wiki/Seal_of_Dartmouth_College#/media/File:Seal_of_Dartmouth_College.png" target="_blank">https://en.wikipedia.org/wiki/Seal_of_Dartmouth_College#/media/File:Seal_of_Dartmouth_College.png</a> (accessed on 16 February 2025)). (Image’s credit and source: null0. <a href="https://en.wikipedia.org/wiki/John_McCarthy_(computer_scientist)#/media/File:John_McCarthy_Stanford.jpg" target="_blank">https://en.wikipedia.org/wiki/John_McCarthy_(computer_scientist)#/media/File:John_McCarthy_Stanford.jpg</a> (accessed on 16 February 2025)). (Image’s credit and source: MrunaltPatel. <a href="https://commons.wikimedia.org/wiki/File:Simons_3_stages_in_Decision_Making.gif" target="_blank">https://commons.wikimedia.org/wiki/File:Simons_3_stages_in_Decision_Making.gif</a> (accessed on 16 February 2025)). (Image’s credit and source: Unknown author. <a href="https://en.wikipedia.org/wiki/ELIZA#/media/File:ELIZA_conversation.png" target="_blank">https://en.wikipedia.org/wiki/ELIZA#/media/File:ELIZA_conversation.png</a> (accessed on 16 February 2025)). (Image’s credit and source: NIAID. <a href="https://en.wikipedia.org/wiki/File:E._coli_Bacteria_(7316101966).jpg" target="_blank">https://en.wikipedia.org/wiki/File:E._coli_Bacteria_(7316101966).jpg</a> (accessed on 16 February 2025)). (Image’s credit and source: James the photographer. <a href="https://en.wikipedia.org/wiki/Deep_Blue_%28chess_computer%29#/media/File:Deep_Blue.jpg" target="_blank">https://en.wikipedia.org/wiki/Deep_Blue_%28chess_computer%29#/media/File:Deep_Blue.jpg</a> (accessed on 16 February 2025)). (Image’s credit and source: <a href="https://en.wikipedia.org/wiki/Deep_Blue_%28chess_computer%29#/media/File:Deep_Blue.jpg" target="_blank">https://en.wikipedia.org/wiki/Deep_Blue_%28chess_computer%29#/media/File:Deep_Blue.jpg</a> (accessed on 16 February 2025)). (Image’s credit and source: Clockready. <a href="https://en.wikipedia.org/wiki/IBM_Watson#/media/File:IBM_Watson.PNG" target="_blank">https://en.wikipedia.org/wiki/IBM_Watson#/media/File:IBM_Watson.PNG</a> (accessed on 16 February 2025)). (Image’s credit and source: <a href="http://www.freepik.com/free-vector/illustration-robot_2606096.htm#fromView=keyword&amp;page=1&amp;position=2&amp;uuid=1fe57a5f-8ed5-4f45-973e-ee6aeea3f46a&amp;query=Chatbots+Icon" target="_blank">www.freepik.com/free-vector/illustration-robot_2606096.htm#fromView=keyword&amp;page=1&amp;position=2&amp;uuid=1fe57a5f-8ed5-4f45-973e-ee6aeea3f46a&amp;query=Chatbots+Icon</a> (accessed on 16 February 2025)). (Image’s credit and source: <a href="https://www.freepik.com/free-vector/circle-with-triangles-background_723422.htm#fromView=search&amp;page=1&amp;position=2&amp;uuid=5df70b94-ca1e-4979-8aa7-2239dc59ac8c&amp;query=Capsule+neural+network" target="_blank">https://www.freepik.com/free-vector/circle-with-triangles-background_723422.htm#fromView=search&amp;page=1&amp;position=2&amp;uuid=5df70b94-ca1e-4979-8aa7-2239dc59ac8c&amp;query=Capsule+neural+network</a> (accessed on 16 February 2025)).</p>
Full article ">Figure 6
<p>Types of AI based on capabilities, functionality, and domain of AI (image source: developed by authors based on [<a href="#B30-buildings-15-00749" class="html-bibr">30</a>]).</p>
Full article ">Figure 7
<p>AI applications in abstracting forms, biomimicry, and enhancing architectural sketches (images’ source: developed by authors). (<b>a</b>) Abstract form and pattern inspired by nature, (<b>b</b>,<b>c</b>) AI and biomimetic architecture, (<b>d</b>) AI in enhancing sketches.</p>
Full article ">Figure 8
<p>AI’s role in generating alternatives for tower designs, showing the capabilities of AI tools and technologies in generating several alternatives (images’ source: Noori and Yashoaa, 2023 [<a href="#B39-buildings-15-00749" class="html-bibr">39</a>]). (<b>a</b>) Different forms of towers generated by Dynamo script; these scripts lead to having multiple tower proposals; the form that highlighted with a blue frame is the conceptual mass that will ultimately be selected for the following AI augmentation phase [<a href="#B39-buildings-15-00749" class="html-bibr">39</a>]. (<b>b</b>) (<b>Left</b>) Dynamo or Revit geometry to Promeai to generate high-quality renderings. (<b>Middle</b> and <b>Right</b>) Alternative towers [<a href="#B44-buildings-15-00749" class="html-bibr">44</a>]. (<b>c</b>) An additional illustration of using multiple merged reference images to improve Dynamo models with AI.</p>
Full article ">Figure 8 Cont.
<p>AI’s role in generating alternatives for tower designs, showing the capabilities of AI tools and technologies in generating several alternatives (images’ source: Noori and Yashoaa, 2023 [<a href="#B39-buildings-15-00749" class="html-bibr">39</a>]). (<b>a</b>) Different forms of towers generated by Dynamo script; these scripts lead to having multiple tower proposals; the form that highlighted with a blue frame is the conceptual mass that will ultimately be selected for the following AI augmentation phase [<a href="#B39-buildings-15-00749" class="html-bibr">39</a>]. (<b>b</b>) (<b>Left</b>) Dynamo or Revit geometry to Promeai to generate high-quality renderings. (<b>Middle</b> and <b>Right</b>) Alternative towers [<a href="#B44-buildings-15-00749" class="html-bibr">44</a>]. (<b>c</b>) An additional illustration of using multiple merged reference images to improve Dynamo models with AI.</p>
Full article ">Figure 9
<p>Examples of AI technology being implemented across different areas of the construction industry, highlighting innovative applications (e.g., predictive analytics for project management, automated design generation, robotics in construction processes, and smart building systems). (source: developed by authors based on [<a href="#B29-buildings-15-00749" class="html-bibr">29</a>]).</p>
Full article ">Figure 10
<p>AI x Future Cities conceptual design based on Manas Bahateia’s ideas to depict AI tools’ capabilities in imagining ideas (images’ source: developed by authors). (<b>a</b>) Skyscrapers envisioned as biophilic towers for air purification; (<b>b</b>) a flowing, utopian metropolis with structures that serve as green areas, (<b>c</b>) other alternatives and imaginings of the same project.</p>
Full article ">Figure 11
<p>Skyscrapers with smart and green architectural elements (e.g., photovoltaic panels, smart glazing, green features, and sun-shading systems generated by AI (images’ source: developed by authors). (<b>a</b>,<b>b</b>) Two alternatives of tall building design with green elements act as a biophilic design and mimic the behavior of trees and greenery. (<b>c</b>–<b>e</b>) Tall building design output after giving a prompt that includes specific glazing, renewable energy elements, and solar photovoltaic panels.</p>
Full article ">Figure 12
<p>This re-imagination of the Burj Khalifa with some environmentally friendly and sustainable elements was conducted using the AI image generator tool Haiper (images’ source: developed by the authors). (<b>a</b>) Utilization of AI tool in re-imagining the Burj Khalifa with renewable energy (RE). (<b>b</b>) Another angle of the building with green walls. (<b>c</b>) AI-created ant’s view of the Burj Khalifa with renewable energy, specific types of glazing, and green walls.</p>
Full article ">Figure 13
<p>Proposed futuristic skyscrapers that are taller than the Burj Khalifa: (<b>a</b>) Image’s credit and source: Gensler, <a href="https://en.wikipedia.org/wiki/File:Suzhou_Zhongnan_Center.jpg" target="_blank">https://en.wikipedia.org/wiki/File:Suzhou_Zhongnan_Center.jpg</a> (accessed on 26 December 2024), (<b>b</b>) Image’s credit and source: Ammar shaker, <a href="https://commons.wikimedia.org/wiki/File:Jeddah_Tower_Building_Progress_as_of_13-Jul-2016_002.jpg" target="_blank">https://commons.wikimedia.org/wiki/File:Jeddah_Tower_Building_Progress_as_of_13-Jul-2016_002.jpg</a> (accessed on 26 December 2024), (<b>c</b>,<b>d</b>) Thetowerinfo [<a href="#B71-buildings-15-00749" class="html-bibr">71</a>]). (<b>a</b>) Proposed Suzhou Zhongnan Center, (<b>b</b>) Jeddah Tower under construction, (<b>c</b>) Creek Tower, (<b>d</b>) Creek Tower height relative to Burj Kalifa and Jeddah Tower.</p>
Full article ">Figure 14
<p>Domains influencing the future of skyscraper design that play a crucial role in shaping the future of skyscrapers. These encompass multiple factors (source: developed by authors based on [<a href="#B73-buildings-15-00749" class="html-bibr">73</a>]).</p>
Full article ">Figure 15
<p>Multiple critical challenges as buildings age (source: developed by authors after [<a href="#B77-buildings-15-00749" class="html-bibr">77</a>]).</p>
Full article ">Figure 16
<p>Essential components for digital twin creation of the building (image credit and source: Developed by authors).</p>
Full article ">
14 pages, 5332 KiB  
Article
Sustainable Marginal Water Resource Management: A Case Study of Brackish Water Irrigation on the Southern Coast of Laizhou Bay
by Wenquan Liu, Fang Lu and Weitao Han
Sustainability 2025, 17(5), 1956; https://doi.org/10.3390/su17051956 - 25 Feb 2025
Viewed by 142
Abstract
The secure and effective use of marginal water resources, such as brackish water, plays a crucial role in ensuring food security and promoting the sustainable development of agricultural land. This paper conducted indoor soil column experiments to simulate the infiltration of brackish water [...] Read more.
The secure and effective use of marginal water resources, such as brackish water, plays a crucial role in ensuring food security and promoting the sustainable development of agricultural land. This paper conducted indoor soil column experiments to simulate the infiltration of brackish water (0, 1, 3, and 5 g L−1) in order to study the effects of infiltration on the movement of soil water and salt, aiming to address the critical challenge of utilizing marginal water resources in coastal saline-alkali areas. The result showed that, as salt content increases, the movement speed of the moisture front and soil infiltration rate gradually decrease over the same period of time. The moisture front progress and infiltration volume showed a positive correlation. The moisture content of the soil profile gradually decreased, within the soil depth range of 0–40 cm, except for the 5 g L−1 saline water infiltration, and the Cl content increased, while the other treatments showed a trend of first decreasing and then increasing. The higher salt content at the same depth, the higher the Na+ and Cl contents. Under different irrigation water volume conditions, the soil profile conductivity shows a trend of first decreasing and then increasing. The research findings advance fundamental understanding of salinity-driven soil hydrological processes, offering theoretical support for the sustainable utilization of brackish water, balancing agricultural water demand and soil health in coastal areas. Full article
Show Figures

Figure 1

Figure 1
<p>Geographic location of soil sample collection.</p>
Full article ">Figure 2
<p>Schematic diagram of brackish water irrigation experiment.</p>
Full article ">Figure 3
<p>(<b>a</b>) Relationship between wetting front and time under different salinity; (<b>b</b>) relationship between wetting front and water infiltration under different salinity; (<b>c</b>) relationship between infiltration rate and time under different salinity.</p>
Full article ">Figure 4
<p>Changes of soil moisture content at different soil depths under different salinity.</p>
Full article ">Figure 5
<p>(<b>a</b>) Contents of Cl<sup>−</sup> in different soil depths under different salinity; (<b>b</b>) contents of Na<sup>+</sup> in different soil depths under different salinity.</p>
Full article ">Figure 6
<p>(<b>a</b>) Electrical conductivity of soil at different depths under different irrigation volumes; (<b>b</b>) moisture content of soil at different depths under different irrigation volumes.</p>
Full article ">
7 pages, 1353 KiB  
Data Descriptor
Spatial Dataset of Climate Robust and High-Yield Agricultural Areas in Brandenburg: Results of a Classification Framework Using Bio-Economic Climate Simulations
by Hannah Jona von Czettritz, Sandra Uthes, Johannes Schuler, Kurt-Christian Kersebaum and Peter Zander
Data 2025, 10(3), 32; https://doi.org/10.3390/data10030032 - 25 Feb 2025
Viewed by 132
Abstract
Coherent spatial data are crucial for informed land use and regional planning decisions, particularly in the context of securing a crisis-proof food supply and adapting to climate change. This dataset provides spatial information on climate-robust and high-yield agricultural arable land in Brandenburg, Germany, [...] Read more.
Coherent spatial data are crucial for informed land use and regional planning decisions, particularly in the context of securing a crisis-proof food supply and adapting to climate change. This dataset provides spatial information on climate-robust and high-yield agricultural arable land in Brandenburg, Germany, based on the results of a classification using bio-economic climate simulations. The dataset is intended to support regional planning and policy makers in zoning decisions (e.g., photovoltaic power plants) by identifying climate-robust arable land with high current and stable future production potential that should be reserved for agricultural use. The classification method used to generate the dataset includes a wide range of indicators, including established approaches, such as a soil quality index, drought, water, and wind erosion risk, as well as a dynamic approach, using bio-economic simulations, which determine the production potential under future climate scenarios. The dataset is a valuable resource for spatial planning and climate change adaptation, contributing to long-term food security especially in dry areas such as the state of Brandenburg facing increased production risk under future climatic conditions, thereby serving globally as an example for land use planning challenges related to climate change. Full article
(This article belongs to the Section Spatial Data Science and Digital Earth)
Show Figures

Figure 1

Figure 1
<p>Visualization of the application of the dataset, as presented in Czettritz et al. [<a href="#B6-data-10-00032" class="html-bibr">6</a>].</p>
Full article ">Figure 2
<p>Graphical representation of the criteria for determining climate-robust arable land.</p>
Full article ">Figure 3
<p>Graphical representation of the criteria for determining arable land with high current and future yield potential.</p>
Full article ">
16 pages, 5129 KiB  
Article
Farmers’ Typologies for the Construction of a Technological and Socioeconomic Baseline of Industrial Cassava Organizations to Guide Research, Production, and Policy Design in Colombian Caribbean Region
by Antonio María Martínez-Reina, Hernando Araujo, Sol Mara Regino, Amaury Espitia, Lilibet Tordecilla, Liliana Grandett, Shirley Pérez, Remberto Martínez and Amparo Rosero
Agriculture 2025, 15(5), 488; https://doi.org/10.3390/agriculture15050488 - 25 Feb 2025
Viewed by 224
Abstract
The cassava production system in Colombia is relevant for food security and agro-industrial development, especially in the Caribbean region. To optimize this system, it is necessary to understand the technical and socioeconomic particularities of the crop, which facilitates cost improvements and increased yields. [...] Read more.
The cassava production system in Colombia is relevant for food security and agro-industrial development, especially in the Caribbean region. To optimize this system, it is necessary to understand the technical and socioeconomic particularities of the crop, which facilitates cost improvements and increased yields. Two main market segments are recognized in this country, cassava for human consumption and for industrial purposes (starch and animal feed). There is still no comprehensive study on the characterization of industrial cassava production systems; therefore, this work aims to identify typologies of farmers according to their technological and socioeconomic characteristics, to contribute to research and production planning. The information related to sociodemographic and technological conditions was collected through a structured survey applied to 53 organizations selected by random sampling that compiles consensual information of 1470 producers. The data were analyzed with descriptive statistics and a multivariate analysis of variables, such as cultivated area, yield, and proximity to markets, using the Gower method. The results indicated that in the Caribbean industrial cassava production, the average age of farmers is 47 years, with mostly men (72%), and a predominant educational level of secondary school (35%). Two groups of farmers were identified from multivariate analysis, from which group 2 (G2) represented four producer organizations (119 producers) and showed the highest yields and a larger cultivated area, suggesting that a larger scale of production is associated with better yields, which is associated with major access to technological tools and possibly technical knowledge. However, the most cassava producers (49 producer organizations and 1361 producers) had a lower cultivated area and yield, confirming that the technological level and management optimization is related to competitiveness and profitability. Full article
Show Figures

Figure 1

Figure 1
<p>Geographical framework of the study area for technical-economic analysis of the cassava production system for the producing regions of the Caribbean of Colombia. (<b>a</b>) Departments of the Caribbean region of Colombia covered by the study, (<b>b</b>) locations of surveys applied in municipalities of the department of Bolívar, (<b>c</b>) locations of surveys applied in municipalities of the department of Córdoba, and (<b>d</b>) locations of surveys applied in municipalities of the department of Sucre.</p>
Full article ">Figure 1 Cont.
<p>Geographical framework of the study area for technical-economic analysis of the cassava production system for the producing regions of the Caribbean of Colombia. (<b>a</b>) Departments of the Caribbean region of Colombia covered by the study, (<b>b</b>) locations of surveys applied in municipalities of the department of Bolívar, (<b>c</b>) locations of surveys applied in municipalities of the department of Córdoba, and (<b>d</b>) locations of surveys applied in municipalities of the department of Sucre.</p>
Full article ">Figure 2
<p>Number of active members of characterized organizations with a vocation for industrial cassava for the Caribbean region.</p>
Full article ">Figure 3
<p>Sum of the area dedicated to cassava cultivation by groups of producers affiliated with the sampled organizations, by department.</p>
Full article ">
17 pages, 25856 KiB  
Article
An Independent UAV-Based Mobile Base Station
by Sung-Chan Choi and Sung-Yeon Kim
Sensors 2025, 25(5), 1349; https://doi.org/10.3390/s25051349 - 22 Feb 2025
Viewed by 185
Abstract
In disaster scenarios, e.g., earthquakes, tsunamis, and wildfires, communication infrastructure often becomes severely damaged. To rapidly restore damaged communication systems, we propose a UAV-based mobile base station equipped with Public Safety LTE (PS-LTE) technology to provide standalone communication capabilities. The proposed system includes [...] Read more.
In disaster scenarios, e.g., earthquakes, tsunamis, and wildfires, communication infrastructure often becomes severely damaged. To rapidly restore damaged communication systems, we propose a UAV-based mobile base station equipped with Public Safety LTE (PS-LTE) technology to provide standalone communication capabilities. The proposed system includes PS-LTE functionalities, mission-critical push-to-talk, proximity-based services, and isolated E-UTRAN operation to ensure the reliable and secure communication for emergency services. We provide a simulation result to achieve the radio coverage of mobile base station. By using this radio coverage, we find an appropriate location of the end device for performing the outdoor experiments. We develop a prototype of a proposed mobile base station and test its operation in an outdoor environment. The experimental results provide a sufficient data rate to make an independent mobile base station to restore communication infrastructure in areas that experienced environmental disasters. This prototype and experimental results offer a significant step forward in creating agile and efficient communication solutions for emergency scenarios. Full article
Show Figures

Figure 1

Figure 1
<p>An example of UAV to restore the communication infrastructure in disaster areas.</p>
Full article ">Figure 2
<p>The overall hardware structure of the mobile base station.</p>
Full article ">Figure 3
<p>LTE eNB module hardware design.</p>
Full article ">Figure 4
<p>LTE EPC module hardware design.</p>
Full article ">Figure 5
<p>Software module of the mobile base station.</p>
Full article ">Figure 6
<p>The received signal strength when the altitude of the mobile base station is 100 m.</p>
Full article ">Figure 7
<p>The received signal strength when the altitude of mobile base station is 300 m.</p>
Full article ">Figure 8
<p>The received signal strength when the altitude of the mobile base station is 500 m.</p>
Full article ">Figure 9
<p>Prototype of eNB module.</p>
Full article ">Figure 10
<p>Prototype of EPC module.</p>
Full article ">Figure 11
<p>Prototype of DC/DC module.</p>
Full article ">Figure 12
<p>Prototype of power amplifier module.</p>
Full article ">Figure 13
<p>Prototype of mobile base station.</p>
Full article ">Figure 14
<p>UAV mounted at mobile base station.</p>
Full article ">Figure 15
<p>The location of mobile base station.</p>
Full article ">Figure 16
<p>Average RSRP at a distance from the mobile base station.</p>
Full article ">Figure 17
<p>Average data rate at a distance from the mobile base station.</p>
Full article ">
21 pages, 6918 KiB  
Article
Sustainable and Traditional Irrigation and Fertigation Practices for Potato and Zucchini in Dry Mediterranean Regions
by Talal Darwish, Amin Shaban, Ghaleb Faour, Ihab Jomaa, Peter Moubarak and Roula Khadra
Sustainability 2025, 17(5), 1860; https://doi.org/10.3390/su17051860 - 21 Feb 2025
Viewed by 442
Abstract
Transforming irrigation practices is essential to address aquifer depletion and food security in Mediterranean regions facing climate change and water scarcity. Developing local and national resilience to climate change requires capacity building to boost soil health and adaptation to drought. Recent attempts undertaken [...] Read more.
Transforming irrigation practices is essential to address aquifer depletion and food security in Mediterranean regions facing climate change and water scarcity. Developing local and national resilience to climate change requires capacity building to boost soil health and adaptation to drought. Recent attempts undertaken by the SEALACOM Project reduced irrigation rates in protected agriculture. The purpose of this work is to enhance traditional farmer’s practices and promote the potential of advanced fertigation of field crops (i.e., potato and zucchini) cultivated under two different pedo-climatic conditions to improve water and nutrient use efficiency. Results showed the yield of zucchini and potato on SEALACOM plots with continuous fertigation was 22% and 17.8%, respectively, which was higher than the yield with traditional irrigation and fertilization practices. Elite potato tuber size was 40% higher in SEALACOM plots (p < 0.05). The farmer applied 359 L of water to produce 1 kg of fresh zucchini compared to 225 L by the SEALACOM Project, indicating a significant, 60% water saving in the SEALACOM practice. Compared to farmer’s practices of potato production, the SEALACOM Project achieved more than 50% higher water productivity. In zucchini production, farmers applied 19.5% more nitrogen and 19.6% more phosphorus fertilizers. Compared to 58 kg of N applied by the farmers, the SEALACOM Project applied 38 kg of N to produce 1 ton of Zucchini, showing a 34% saving in major nutrient application. To cultivate 1 kg of fresh potato tubers, SEALACOM utilized 4.06 g of nitrogen and 1.34 g of phosphorus, compared to the traditional practice, which required 13.2 g of nitrogen and 2.25 g of phosphorus. Water and nutrient saving and higher productivity and commerciality of the final product have a high positive impact on the farmer’s income and positive attitude towards the adoption of modern, sustainable practices. Full article
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Topographic map of the SEALACOM Project Demo Sites showing the elevation range derived from DEM.</p>
Full article ">Figure 2
<p>Average precipitation map of the SEALACOM Demo Sites showing the 100-precipitation interval.</p>
Full article ">Figure 3
<p>Soil map of the SEALACOM Project area of study [<a href="#B27-sustainability-17-01860" class="html-bibr">27</a>].</p>
Full article ">Figure 4
<p>(<b>a</b>). Fertigation of field crops using differential and proportional injectors. (<b>b</b>). Closed tanks (local production) are used by local farmers to mix, solubilize, and apply fertilizers with irrigation.</p>
Full article ">Figure 5
<p>Water-meter used to control water application both at the farmer’s plot and project plot.</p>
Full article ">Figure 6
<p>Comparison of cumulative yield of harvested commercial Zucchini (kg ha<sup>−1</sup>) by continuous fertigation (SEALACOM) against traditional (Farmer) practices.</p>
Full article ">Figure 7
<p>Comparative monitoring of crop canopy using NDVI data from Sentinel-2 during vegetation and production cycles demonstrates that continuous nutrient feeding enhances canopy tolerance to cold temperatures, while intermittent nutrient application induces stress in plants.</p>
Full article ">Figure 8
<p>Amounts of macronutrient application (g) to produce 1 kg of fresh zucchini product in the West Bekaa demo site.</p>
Full article ">Figure 9
<p>Amounts of macronutrients applied to produce 1 kg fresh potato tubers in traditional and advanced practices.</p>
Full article ">
17 pages, 1186 KiB  
Article
Sensing-Assisted Secure Communications over Correlated Rayleigh Fading Channels
by Martin Mittelbach, Rafael F. Schaefer, Matthieu Bloch, Aylin Yener and Onur Günlü
Entropy 2025, 27(3), 225; https://doi.org/10.3390/e27030225 - 21 Feb 2025
Viewed by 244
Abstract
We consider a secure integrated sensing and communication (ISAC) scenario, where a signal is transmitted through a state-dependent wiretap channel with one legitimate receiver with which the transmitter communicates and one honest-but-curious target that the transmitter wants to sense. The secure ISAC channel [...] Read more.
We consider a secure integrated sensing and communication (ISAC) scenario, where a signal is transmitted through a state-dependent wiretap channel with one legitimate receiver with which the transmitter communicates and one honest-but-curious target that the transmitter wants to sense. The secure ISAC channel is modeled as two state-dependent fast-fading channels with correlated Rayleigh fading coefficients and independent additive Gaussian noise components. Delayed channel outputs are fed back to the transmitter to improve the communication performance and to estimate the channel state sequence. We establish and illustrate an achievable secrecy-distortion region for degraded secure ISAC channels under correlated Rayleigh fading, for which we show that the signal-to-interference-plus-noise is not a sufficient statistic. We also evaluate the inner bound for a large set of parameters to derive practical design insights. The presented results include parameter ranges for which the secrecy capacity of a classical wiretap channel setup is surpassed and for which the channel capacity is approached. Thus, we illustrate for correlated Rayleigh fading cases that our secure ISAC methods can (i) eliminate the need for the legitimate receiver to have a statistical advantage over the eavesdropper and (ii) provide communication security with minimal rate penalty. Full article
(This article belongs to the Special Issue Integrated Sensing and Communications)
Show Figures

Figure 1

Figure 1
<p>Secure ISAC model for <math display="inline"><semantics> <mrow> <mi>i</mi> <mspace width="3.33333pt"/> <mo>=</mo> <mspace width="3.33333pt"/> <mo>[</mo> <mn>1</mn> <mo>:</mo> <mi>n</mi> <mo>]</mo> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>j</mi> <mo>=</mo> <mn>1</mn> <mo>,</mo> <mn>2</mn> </mrow> </semantics></math>, for which the message <span class="html-italic">M</span> should be kept secret from the eavesdropper. We impose an average transmit power constraint on the channel input symbols <math display="inline"><semantics> <msub> <mi>X</mi> <mi>i</mi> </msub> </semantics></math> and assume independent AGN components <math display="inline"><semantics> <msub> <mi>N</mi> <mrow> <mn>1</mn> <mo>,</mo> <mi>i</mi> </mrow> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>N</mi> <mrow> <mn>2</mn> <mo>,</mo> <mi>i</mi> </mrow> </msub> </semantics></math>. We principally consider perfect channel output feedback with unit symbol time delay, i.e., <math display="inline"><semantics> <mrow> <msub> <mi>Z</mi> <mrow> <mi>i</mi> <mo>−</mo> <mn>1</mn> </mrow> </msub> <mo>=</mo> <mrow> <mo>(</mo> <msub> <mi>Y</mi> <mrow> <mn>1</mn> <mo>,</mo> <mi>i</mi> <mo>−</mo> <mn>1</mn> </mrow> </msub> <mo>,</mo> <msub> <mi>Y</mi> <mrow> <mn>2</mn> <mo>,</mo> <mi>i</mi> <mo>−</mo> <mn>1</mn> </mrow> </msub> <mo>)</mo> </mrow> </mrow> </semantics></math> such that the function <math display="inline"><semantics> <mrow> <mi>f</mi> <mo>(</mo> <mo>·</mo> <mo>,</mo> <mo>·</mo> <mo>)</mo> </mrow> </semantics></math> is the identity function.</p>
Full article ">Figure 2
<p><math display="inline"><semantics> <mrow> <msub> <mi>R</mi> <mi>α</mi> </msub> <mo>,</mo> <mo> </mo> <msub> <mi>R</mi> <mrow> <mi>α</mi> <mo>,</mo> <mi>ub</mi> </mrow> </msub> <mo>,</mo> <mspace width="4.pt"/> <mi>and</mi> <mspace width="4.pt"/> <msub> <mi>R</mi> <mi>β</mi> </msub> </mrow> </semantics></math> for power correlation coefficient <math display="inline"><semantics> <mrow> <msup> <mi>ρ</mi> <mn>2</mn> </msup> <mo>=</mo> <mn>0.01</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 3
<p><math display="inline"><semantics> <mrow> <msub> <mi>R</mi> <mi>α</mi> </msub> <mo>,</mo> <mo> </mo> <msub> <mi>R</mi> <mrow> <mi>α</mi> <mo>,</mo> <mi>ub</mi> </mrow> </msub> <mo>,</mo> <mspace width="4.pt"/> <mi>and</mi> <mspace width="4.pt"/> <msub> <mi>R</mi> <mi>β</mi> </msub> </mrow> </semantics></math> for power correlation coefficient <math display="inline"><semantics> <mrow> <msup> <mi>ρ</mi> <mn>2</mn> </msup> <mo>=</mo> <mn>0.50</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p><math display="inline"><semantics> <mrow> <msub> <mi>R</mi> <mi>α</mi> </msub> <mo>,</mo> <mo> </mo> <msub> <mi>R</mi> <mrow> <mi>α</mi> <mo>,</mo> <mi>ub</mi> </mrow> </msub> <mo>,</mo> <mspace width="4.pt"/> <mi>and</mi> <mspace width="4.pt"/> <msub> <mi>R</mi> <mi>β</mi> </msub> </mrow> </semantics></math> for power correlation coefficient <math display="inline"><semantics> <mrow> <msup> <mi>ρ</mi> <mn>2</mn> </msup> <mo>=</mo> <mn>0.81</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p><math display="inline"><semantics> <mrow> <msub> <mi>R</mi> <mi>α</mi> </msub> <mo>,</mo> <mo> </mo> <msub> <mi>R</mi> <mrow> <mi>α</mi> <mo>,</mo> <mi>ub</mi> </mrow> </msub> <mo>,</mo> <mspace width="4.pt"/> <mi>and</mi> <mspace width="4.pt"/> <msub> <mi>R</mi> <mi>β</mi> </msub> </mrow> </semantics></math> for power correlation coefficient <math display="inline"><semantics> <mrow> <msup> <mi>ρ</mi> <mn>2</mn> </msup> <mo>=</mo> <mn>0.90</mn> </mrow> </semantics></math>.</p>
Full article ">
20 pages, 4547 KiB  
Article
Conceptual Advancements in Infrastructure Maintenance and Management Using Smart Contracts: Reducing Costs and Improving Resilience
by Valentina Villa, Luca Gioberti, Marco Domaneschi and Necati Catbas
Buildings 2025, 15(5), 680; https://doi.org/10.3390/buildings15050680 - 21 Feb 2025
Viewed by 194
Abstract
The civil engineering sector operates within a complex ecosystem of stakeholders, requiring efficient management and maintenance of structural and infrastructural assets. In this context, there is an increasing need for robust tools to track critical events (e.g., alerts, unusual behaviors) and support decision-making [...] Read more.
The civil engineering sector operates within a complex ecosystem of stakeholders, requiring efficient management and maintenance of structural and infrastructural assets. In this context, there is an increasing need for robust tools to track critical events (e.g., alerts, unusual behaviors) and support decision-making processes related to maintenance and interventions. At the same time, ensuring secure and prompt payments is essential for timely and effective responses. This paper investigated the potential of smart contracts, integrated with blockchain technology, to automate and optimize asset management and maintenance processes. The proposed framework examines how these technologies can enhance operational efficiency, security, and event traceability, providing a structured approach for both routine operations and emergency interventions. Although smart contracts have been widely applied in the construction phase of infrastructure projects, their use in long-term asset management remains largely unexplored. As a conceptual study, this work does not present a quantitative analysis but instead lays the groundwork for future research and real-world applications of blockchain-based smart contracts in infrastructure management and safety procedures. Full article
Show Figures

Figure 1

Figure 1
<p>Current practice vs. proposed improvements.</p>
Full article ">Figure 2
<p>Flow diagram of the smart contracts’ application from the real word to the digital data processing.</p>
Full article ">Figure 3
<p>Blockchain functioning.</p>
Full article ">Figure 4
<p>Smart contract interactions.</p>
Full article ">Figure 5
<p>Smart contract flowchart.</p>
Full article ">Figure 6
<p>Pseudo Code, in Solidity, confirmRisk function.</p>
Full article ">Figure 7
<p>Pseudo Code, in Solidity, resolveEmergency function.</p>
Full article ">Figure 8
<p>Pseudo Code, in Solidity makePayment function.</p>
Full article ">Figure 9
<p>Code score.</p>
Full article ">Figure 10
<p>Key performance indicators.</p>
Full article ">Figure 11
<p>Diagram representing budget increase requests.</p>
Full article ">Figure 12
<p>Resilience function.</p>
Full article ">Figure 13
<p>CPM costs and optimal project duration.</p>
Full article ">
19 pages, 1061 KiB  
Article
Decentralized Trace-Resistant Self-Sovereign Service Provisioning for Next-Generation Federated Wireless Networks
by Efat Fathalla and Mohamed Azab
Information 2025, 16(3), 159; https://doi.org/10.3390/info16030159 - 20 Feb 2025
Viewed by 139
Abstract
With the advent of NextG wireless networks, the reliance on centralized identity and service management systems poses significant challenges, including limited interoperability, increased privacy vulnerabilities, and the risk of unauthorized tracking or monitoring of user activity. To address these issues, there is a [...] Read more.
With the advent of NextG wireless networks, the reliance on centralized identity and service management systems poses significant challenges, including limited interoperability, increased privacy vulnerabilities, and the risk of unauthorized tracking or monitoring of user activity. To address these issues, there is a critical need for a decentralized framework that empowers users with self-sovereignty over their subscription information while maintaining trust and privacy among network entities. This article presents a novel framework to enable Self-Sovereign Federated NextG (SSFXG) wireless communication networks. The SSFXG framework separates identity management from the service management layer typically controlled by network operators to foster interoperability functionalities with enhanced privacy and trace-resistant assurances in the NextG landscape. The proposed model relies on blockchain technology as an infrastructure to enable single-authority-free service provisioning and boost mutual trust among federated network components. Further, the SSFXG framework facilitates subscribers’ self-sovereignty over their subscription information while ensuring anonymity and enhanced privacy preservation, avoiding unnecessary network activity monitoring or tracking. Preliminary evaluations demonstrated the effectiveness and efficiency of the proposed framework, making it a promising solution for advancing secure and interoperable NextG wireless networks. Full article
(This article belongs to the Special Issue Cybersecurity, Cybercrimes, and Smart Emerging Technologies)
Show Figures

Figure 1

Figure 1
<p>Proposed federated NextG NWs: High-level architecture and system components.</p>
Full article ">Figure 2
<p>Subscribers’ identity issuance and credentials storage and management stages.</p>
Full article ">Figure 3
<p>Subscription identity verification stage.</p>
Full article ">Figure 4
<p>NW service provisioning bidding scenario.</p>
Full article ">Figure 5
<p>Voice call requesting service.</p>
Full article ">Figure 6
<p>System scalability analysis.</p>
Full article ">Figure 7
<p>Operational cost analysis.</p>
Full article ">
27 pages, 48439 KiB  
Article
Optimization of 3D Extrusion Printing Parameters for Raw and Extruded Dehulled Andean Fava Bean Flours Using Response Surface Methodology (RSM)
by Grimaldo Wilfredo Quispe Santivañez, Henry Juan Javier Ninahuaman, Joselin Paucarchuco Soto, Maria Teresa Pedrosa Silva Clerici and Rebeca Salvador-Reyes
Foods 2025, 14(5), 715; https://doi.org/10.3390/foods14050715 - 20 Feb 2025
Viewed by 184
Abstract
This study optimizes the 3D extrusion printing parameters—water-to-flour ratio (X1), temperature (X2), and printing speed (X3)—for raw (RFB) and extruded (EFB) dehulled Andean fava bean flours to maximize print quality and minimize structural defects. A 23 [...] Read more.
This study optimizes the 3D extrusion printing parameters—water-to-flour ratio (X1), temperature (X2), and printing speed (X3)—for raw (RFB) and extruded (EFB) dehulled Andean fava bean flours to maximize print quality and minimize structural defects. A 23 central composite design combined with response surface methodology (RSM) was used to identify the optimal conditions for achieving geometric precision, surface homogeneity, and textural stability. Physicochemical analyses showed that extrusion cooking substantially modified the composition and rheology of the flour. Compared with RFB, EFB exhibited lower protein and fiber contents, a higher proportion of digestible carbohydrates, and reduced rheological parameters (τ0, K, G′, G″), which facilitated printing. The evaluation of different parameter combinations revealed notable differences between the two flours, with X1 and X2 exerting the greatest influence on print quality. For RFB, the highest desirability (0.853) was achieved at X1 = 0.806, X2 = 23.18 °C, and X3 = 2470.5 mm/min, yielding more uniform and firmer printed structures. In contrast, EFB reached a desirability of 0.844 at X1 = 1.66 °C, X2 = 56.82 °C, and X3 = 1505.43 mm/min, indicating its outstanding geometric accuracy and robustness. In conclusion, raw flour requires higher hydration and lower temperatures to prevent excessive viscosity. In contrast, extruded flour benefits from low water and high temperatures to achieve stable structures and firm textures. These findings demonstrate the feasibility of using Andean fava bean flour in 3D food printing to create nutrient-dense, functional foods with improved printability. This work offers practical applications for developing personalized foods—such as customized meals for individuals with specific dietary requirements—while contributing to sustainable and secure food production. Future research should address long-term storage, post-printing drying methods, and scaling production. Full article
(This article belongs to the Section Food Engineering and Technology)
Show Figures

Figure 1

Figure 1
<p>(<b>a</b>) Samples of RFB and EFB; (<b>b</b>) SEM images showing the morphology and particle size at 500× magnification.</p>
Full article ">Figure 2
<p>Two-dimensional contour plots of regression models for quality parameters of 3DFP samples with raw fava bean flour (RFB).</p>
Full article ">Figure 3
<p>Two-dimensional contour plots of regression models for quality parameters of 3DFP samples with extruded fava bean flour (EFB).</p>
Full article ">Figure 4
<p>Two-dimensional contour plots of desirability parameter optimization for (<b>a</b>) RFB and (<b>b</b>) EFB.</p>
Full article ">
32 pages, 498 KiB  
Review
A Survey on the Applications of Cloud Computing in the Industrial Internet of Things
by Elias Dritsas and Maria Trigka
Big Data Cogn. Comput. 2025, 9(2), 44; https://doi.org/10.3390/bdcc9020044 - 17 Feb 2025
Viewed by 312
Abstract
The convergence of cloud computing and the Industrial Internet of Things (IIoT) has significantly transformed industrial operations, enabling intelligent, scalable, and efficient systems. This survey provides a comprehensive analysis of the role cloud computing plays in IIoT ecosystems, focusing on its architectural frameworks, [...] Read more.
The convergence of cloud computing and the Industrial Internet of Things (IIoT) has significantly transformed industrial operations, enabling intelligent, scalable, and efficient systems. This survey provides a comprehensive analysis of the role cloud computing plays in IIoT ecosystems, focusing on its architectural frameworks, service models, and application domains. By leveraging centralized, edge, and hybrid cloud architectures, IIoT systems achieve enhanced real-time processing capabilities, streamlined data management, and optimized resource allocation. Moreover, this study delves into integrating artificial intelligence (AI) and machine learning (ML) in cloud platforms to facilitate predictive analytics, anomaly detection, and operational intelligence in IIoT environments. Security challenges, including secure device-to-cloud communication and privacy concerns, are addressed with innovative solutions like blockchain and AI-powered intrusion detection systems. Future trends, such as adopting 5G, serverless computing, and AI-driven adaptive services, are also discussed, offering a forward-looking perspective on this rapidly evolving domain. Finally, this survey contributes to a well-rounded understanding of cloud computing’s multifaceted aspects and highlights its pivotal role in driving the next generation of industrial innovation and operational excellence. Full article
(This article belongs to the Special Issue Application of Cloud Computing in Industrial Internet of Things)
Show Figures

Figure 1

Figure 1
<p>An overview of the key discussed topics for applying cloud computing in IIoT.</p>
Full article ">
19 pages, 8765 KiB  
Article
Spatial Multiplexing Holography for Multi-User Visible Light Communication
by Chaoxu Chen, Yuan Wei, Haoyu Zhang, Ziyi Zhuang, Ziwei Li, Chao Shen, Junwen Zhang, Haiwen Cai, Nan Chi and Jianyang Shi
Photonics 2025, 12(2), 160; https://doi.org/10.3390/photonics12020160 - 17 Feb 2025
Viewed by 194
Abstract
Given the burgeoning necessity for high-speed, efficient, and secure wireless communication in 6G, visible light communication (VLC) has emerged as a fervent subject of discourse within academic and industrial circles alike. Among these considerations, it is imperative to construct scalable multi-user VLC systems, [...] Read more.
Given the burgeoning necessity for high-speed, efficient, and secure wireless communication in 6G, visible light communication (VLC) has emerged as a fervent subject of discourse within academic and industrial circles alike. Among these considerations, it is imperative to construct scalable multi-user VLC systems, meticulously addressing pivotal issues such as power dissipation, alignment errors, and the safeguarding of user privacy. However, traditional methods like multiplexing holography (MPH) and multiple focal (MF) phase plates have shown limitations in meeting these diverse requirements. Here, we propose a novel spatial multiplexing holography (SMH) theory, a comprehensive solution that overcomes existing hurdles by enabling precise power allocation, self-designed power coverage, and secure communication through orbital angular momentum (OAM). The transformative potential of SMH is demonstrated through simulations and experimental studies, showcasing its effectiveness in power distribution within systems of VR glasses users, computer users, and smartphone users; enhancing power coverage with an 11.6 dB improvement at coverage edges; and securing data transmission, evidenced by error-free 1080P video playback under correct OAM keys. Our findings illustrate the superior performance of SMH in facilitating seamless multi-user communication, thereby establishing a new benchmark for future VLC systems in the 6G landscape. Full article
Show Figures

Figure 1

Figure 1
<p>(<b>a</b>) Scenario of multi-user system in VLC; (<b>b</b>) Sketch of power allocation; (<b>c</b>) Sketch of power coverage; (<b>d</b>) Sketch of OAM secure communication.</p>
Full article ">Figure 2
<p>Application of power allocation holography in projection.</p>
Full article ">Figure 3
<p>(<b>a</b>) Process of generating SMH for power allocation; (<b>b</b>) Process of generating SMH for power coverage; (<b>c</b>) Process of generating SMH for OAM secure communication.</p>
Full article ">Figure 4
<p>Schematic diagram of precise transmission space sampling. (<b>a</b>) Transmission process without pre-control; (<b>b</b>) Transmission process with pre-control.</p>
Full article ">Figure 5
<p>(<b>a</b>) Simulation results for power allocation; (<b>b</b>) Convergence line of GA; (<b>c</b>) Simulation results for power coverage under MF method; (<b>d</b>) Simulation results for power coverage under SMH.</p>
Full article ">Figure 6
<p>(<b>a</b>) Simulation of optical field at receiver plane under SMH and conventional method; (<b>b</b>) Power trend of user encoded with OAM modes <span class="html-italic">l</span> = 20 under different OAM keys; (<b>c</b>) Simulation results for OAM secret communication.</p>
Full article ">Figure 7
<p>Experimental setup. (<b>a</b>) Experiment platform; (<b>b</b>) Signal processing.</p>
Full article ">Figure 8
<p>Experimental results for power allocation. (<b>a</b>) Data rate curve with ROP; (<b>b</b>) One frame of 4K video received under MPH and SMH; (<b>c</b>) BER of each row in the first frame; (<b>d</b>) Mean BER of each second of the video; (<b>e</b>) Working point test for User 1; (<b>f</b>) Working point test for User 2; (<b>g</b>) Working point test for User 3.</p>
Full article ">Figure 9
<p>Experimental results for power coverage. (<b>a</b>) User 1’s ROP trend with XoY offset; (<b>b</b>) User 2’s ROP trend with XoY offset; (<b>c</b>) User 3’s ROP trend with XoY offset; (<b>d</b>) Coverage area diameter of 3 users under MF and SMH; (<b>e</b>) Data rate trend with XoY offset of three users; (<b>f</b>) CCD recording at User 1’s plate under different methods; (<b>g</b>) CCD recording at User 2’s plate under different methods; (<b>h</b>) CCD recording at User 3’s plate under different methods; (<b>i</b>) MSE and SSIM of recordings under different methods.</p>
Full article ">Figure 10
<p>Experimental results for OAM secure communication. (<b>a</b>) ROP of three users with different OAM keys; (<b>b</b>) Data rate of three users with different OAM keys; (<b>c</b>) CCD recording of three users; (<b>d</b>) One frame of a 1080P video received by User 3 under different OAM keys.</p>
Full article ">
Back to TopTop