Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (914)

Search Parameters:
Keywords = Android

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
28 pages, 1509 KiB  
Article
A Precise and Scalable Indoor Positioning System Using Cross-Modal Knowledge Distillation
by Hamada Rizk, Ahmed Elmogy, Mohamed Rihan and Hirozumi Yamaguchi
Sensors 2024, 24(22), 7322; https://doi.org/10.3390/s24227322 (registering DOI) - 16 Nov 2024
Viewed by 220
Abstract
User location has emerged as a pivotal factor in human-centered environments, driving applications like tracking, navigation, healthcare, and emergency response that align with Sustainable Development Goals (SDGs). However, accurate indoor localization remains challenging due to the limitations of GPS in indoor settings, where [...] Read more.
User location has emerged as a pivotal factor in human-centered environments, driving applications like tracking, navigation, healthcare, and emergency response that align with Sustainable Development Goals (SDGs). However, accurate indoor localization remains challenging due to the limitations of GPS in indoor settings, where signal interference and reflections disrupt satellite connections. While Received Signal Strength Indicator (RSSI) methods are commonly employed, they are affected by environmental noise, multipath fading, and signal interference. Round-Trip Time (RTT)-based localization techniques provide a more resilient alternative but are not universally supported across access points due to infrastructure limitations. To address these challenges, we introduce DistilLoc: a cross-knowledge distillation framework that transfers knowledge from an RTT-based teacher model to an RSSI-based student model. By applying a teacher–student architecture, where the RTT model (teacher) trains the RSSI model (student), DistilLoc enhances RSSI-based localization with the accuracy and robustness of RTT without requiring RTT data during deployment. At the core of DistilLoc, the FNet architecture is employed for its computational efficiency and capacity to capture complex relationships among RSSI signals from multiple access points. This enables the student model to learn a robust mapping from RSSI measurements to precise location estimates, reducing computational demands while improving scalability. Evaluation in two cluttered indoor environments of varying sizes using Android devices and Google WiFi access points, DistilLoc achieved sub-meter localization accuracy, with median errors of 0.42 m and 0.32 m, respectively, demonstrating improvements of 267% over conventional RSSI methods and 496% over multilateration-based approaches. These results validate DistilLoc as a scalable, accurate solution for indoor localization, enabling intelligent, resource-efficient urban environments that contribute to SDG 9 (Industry, Innovation, and Infrastructure) and SDG 11 (Sustainable Cities and Communities). Full article
(This article belongs to the Section Navigation and Positioning)
Show Figures

Figure 1

Figure 1
<p>FTM protocol.</p>
Full article ">Figure 2
<p><span class="html-italic">DistilLoc</span> system architecture.</p>
Full article ">Figure 3
<p>The network structure of the F-Net student model.</p>
Full article ">Figure 4
<p>The Tokenization Process.</p>
Full article ">Figure 5
<p>The Lab testbed layout. Blue circles represent training points, while red circles indicate testing points.</p>
Full article ">Figure 6
<p>The Office testbed layout.</p>
Full article ">Figure 7
<p>Effect of temperature parameter on median localization error during the distillation process.</p>
Full article ">Figure 8
<p>Impact of reducing the density of RTT-capable APs on median localization error in the offline phase.</p>
Full article ">Figure 9
<p>Impact of reducing the density of RSSI-capable APs on median localization error in the online phase.</p>
Full article ">Figure 10
<p>Impact of increasing reference point spacing on median localization error.</p>
Full article ">Figure 11
<p>Performance of different modalities.</p>
Full article ">Figure 12
<p>Distillation type impact in the Office testbed.</p>
Full article ">Figure 13
<p>Comparison of CDFs of different systems in the office testbed.</p>
Full article ">Figure 14
<p>Comparison of CDFs of different systems in the Lab testbed.</p>
Full article ">Figure 15
<p>Comparison of run time of the different systems.</p>
Full article ">Figure 16
<p>Effect of varying the testing device on <span class="html-italic">DistilLoc</span> performance in the two testbeds.</p>
Full article ">
1 pages, 140 KiB  
Correction
Correction: Xu et al. Android Malware Detection Based on Behavioral-Level Features with Graph Convolutional Networks. Electronics 2023, 12, 4817
by Qingling Xu, Dawei Zhao, Shumian Yang, Lijuan Xu and Xin Li
Electronics 2024, 13(22), 4464; https://doi.org/10.3390/electronics13224464 - 14 Nov 2024
Viewed by 160
Abstract
The journal has corrected the article “Android Malware Detection Based on Behavioral-Level Features with Graph Convolutional Networks” [...] Full article
19 pages, 1077 KiB  
Article
Measuring the Effectiveness of the ‘Batch Operations’ Energy Design Pattern to Mitigate the Carbon Footprint of Communication Peripherals on Mobile Devices
by Roberto Vergallo, Alberto Cagnazzo, Emanuele Mele and Simone Casciaro
Sensors 2024, 24(22), 7246; https://doi.org/10.3390/s24227246 - 13 Nov 2024
Viewed by 427
Abstract
The Internet of Things (IoT) is set to play a significant role in the future development of smart cities, which are designed to be environmentally friendly. However, the proliferation of these devices, along with their frequent replacements and the energy required to power [...] Read more.
The Internet of Things (IoT) is set to play a significant role in the future development of smart cities, which are designed to be environmentally friendly. However, the proliferation of these devices, along with their frequent replacements and the energy required to power them, contributes to a significant environmental footprint. In this paper we provide scientific evidences on the advantages of using an energy design pattern named ‘Batch Operations’ (BO) to optimize energy consumption on mobile devices. Big ICT companies like Google already batch multiple API calls instead of putting the device into an active state many times. This is supposed to save tail energy consumption in communication peripherals. To confirm this, we set up an experiment where we compare energy consumption and carbon emission when BO is applied to two communication peripherals on Android mobile device: 4G and GPS. Results show that (1) BO can save up to 40% energy when sending HTTP requests, resulting in an equivalent reduction in CO2 emissions. (2) no advantages for the GPS interface. Full article
(This article belongs to the Special Issue Sensors and Livable Smart Cities)
Show Figures

Figure 1

Figure 1
<p>How smartphone apps contribute to <math display="inline"><semantics> <mrow> <mi>C</mi> <msub> <mi>O</mi> <mn>2</mn> </msub> </mrow> </semantics></math> emissions through energy consumption.</p>
Full article ">Figure 2
<p>Tail Consumption graphical model.</p>
Full article ">Figure 3
<p>The research methodology adopted in this paper.</p>
Full article ">Figure 4
<p>System logical architectures.</p>
Full article ">Figure 5
<p>Physical architecture of the package.</p>
Full article ">Figure 6
<p>Physical architecture of test.</p>
Full article ">Figure 7
<p>HTTP with Batch. Start Time: Monday 3 April 22:59:26, End Time: Tuesday 4 April 00:01:03, Total Consumption: 392.856065 J. HTTP without Batch. Start Time: Tuesday 4 April 13:01:24, End Time: Tuesday 4 April 14:01:57, Total Consumption: 643.59043 J.</p>
Full article ">Figure 8
<p>GPS with Batch. Start Time: Tuesday 4 April 21:10:57, End Time: Tuesday 4 April 22:09:32, Total Consumption: 2357.88609 J. GPS without Batch. Start Time: Friday 7 April 16:07:33, End Time: Friday 7 April 17:02:17, Total Consumption: 2266.757144 J.</p>
Full article ">Figure 9
<p>Distribution of data for HTTP with batch on the left and without batch on the right.</p>
Full article ">Figure 10
<p>Distribution of data for GPS with batch on the left and without batch on the right.</p>
Full article ">
30 pages, 1096 KiB  
Article
A Secure Approach Out-of-Band for e-Bank with Visual Two-Factor Authorization Protocol
by Laerte Peotta de Melo, Dino Macedo Amaral, Robson de Oliveira Albuquerque, Rafael Timóteo de Sousa Júnior, Ana Lucila Sandoval Orozco and Luis Javier García Villalba
Cryptography 2024, 8(4), 51; https://doi.org/10.3390/cryptography8040051 - 11 Nov 2024
Viewed by 553
Abstract
The article presents an innovative approach for secure authentication in internet banking transactions, utilizing an Out-of-Band visual two-factor authorization protocol. With the increasing rise of cyber attacks and fraud, new security models are needed that ensure the integrity, authenticity, and confidentiality of financial [...] Read more.
The article presents an innovative approach for secure authentication in internet banking transactions, utilizing an Out-of-Band visual two-factor authorization protocol. With the increasing rise of cyber attacks and fraud, new security models are needed that ensure the integrity, authenticity, and confidentiality of financial transactions. The identified gap lies in the inability of traditional authentication methods, such as TANs and tokens, to provide security in untrusted terminals. The proposed solution is the Dynamic Authorization Protocol (DAP), which uses mobile devices to validate transactions through visual codes, such as QR codes. Each transaction is assigned a unique associated code, and the challenge must be responded to within 120 s. The customer initiates the transaction on a computer and independently validates it on their mobile device using an out-of-band channel to prevent attacks such as phishing and man-in-the-middle. The methodology involves implementing a prototype in Java ME for Android devices and a Java application server, creating a practical, low-computational-cost system, accessible for use across different operating systems and devices. The protocol was tested in real-world scenarios, focusing on ensuring transaction integrity and authenticity. The results show a successful implementation at Banco do Brasil, with 3.6 million active users, demonstrating the efficiency of the model over 12 years of use without significant vulnerabilities. The DAP protocol provides a robust and effective solution for securing banking transactions and can be extended to other authentication environments, such as payment terminals and point of sale devices. Full article
Show Figures

Figure 1

Figure 1
<p>Key Change.</p>
Full article ">Figure 2
<p>Authentication Messages.</p>
Full article ">Figure 3
<p>Generation of seeds Master Key.</p>
Full article ">Figure 4
<p>Key Exchange—<math display="inline"><semantics> <msub> <mi>k</mi> <mn>1</mn> </msub> </semantics></math>.</p>
Full article ">Figure 5
<p>Key Exchange—<math display="inline"><semantics> <msub> <mi>k</mi> <mn>2</mn> </msub> </semantics></math>.</p>
Full article ">Figure 6
<p>Asymmetric cryptographic keys Model.</p>
Full article ">Figure 7
<p>Transaction authorization flow.</p>
Full article ">Figure 8
<p>Challenge response displayed on the untrusted computer.</p>
Full article ">Figure 9
<p>Cellphone transaction check.</p>
Full article ">Figure 10
<p>Cellphone authorization code view.</p>
Full article ">Figure 11
<p>Diagram Personification of Customer Attack.</p>
Full article ">Figure 12
<p>Diagram Control Device Attack.</p>
Full article ">Figure 13
<p>Number of Users.</p>
Full article ">
15 pages, 985 KiB  
Article
Factors Influencing Adoption of the PlantVillage Nuru Application for Cassava Mosaic Disease Diagnosis Among Farmers in Benin
by Dèwanou Kant David Ahoya, Eveline Marie Fulbert Windinmi Sawadogo-Compaore, Jacob Afouda Yabi, Martine Zandjanakou-Tachin, Jerome Anani Houngue, Serge Sètondji Houedjissin, Justin Simon Pita and Corneille Ahanhanzo
Agriculture 2024, 14(11), 2001; https://doi.org/10.3390/agriculture14112001 - 7 Nov 2024
Viewed by 387
Abstract
Cassava production in Africa is constrained by number of biotic factors, including cassava mosaic disease (CMD). In response to this challenge, the PlantVillage Nuru application, which employs artificial intelligence for CMD diagnosis, provides farmers with the ability to independently detect the disease. This [...] Read more.
Cassava production in Africa is constrained by number of biotic factors, including cassava mosaic disease (CMD). In response to this challenge, the PlantVillage Nuru application, which employs artificial intelligence for CMD diagnosis, provides farmers with the ability to independently detect the disease. This study examines the factors influencing the adoption of the innovative Nuru application by farmers in Benin. Data were randomly collected from 305 farmers in three Agricultural Development Poles (PDAs 5, 6 and 7). A binary logit model was used to analyze the determinants of adoption. The results show that, despite the potential of the Nuru application, the adoption rate remained relatively low at 14.1%. The key drivers of adoption were found to be participation in CMD training, disease knowledge, ownership of an Android smartphone, education level and practice of crop association. These findings emphasize the necessity of intensifying farmers’ training and raising awareness about CMD. Effective strategies to reach and train a significant number of farmers are crucial. Enhancing Nuru adoption can lead to more effective CMD management and improved cassava production, which will have a positive impact on food security in Africa and strengthen the resilience of farming communities against biotic challenges. Full article
(This article belongs to the Section Agricultural Economics, Policies and Rural Management)
Show Figures

Figure 1

Figure 1
<p>Map showing the study area.</p>
Full article ">
17 pages, 6590 KiB  
Article
A Comparison of Using Cuffed and Uncuffed Face Masks for Providing Manual Bag Ventilation in Elderly Patients with Obesity
by Paweł Ratajczyk, Krzysztof Wasiak, Przemysław Kluj and Tomasz Gaszyński
Healthcare 2024, 12(22), 2214; https://doi.org/10.3390/healthcare12222214 - 6 Nov 2024
Viewed by 386
Abstract
Background: With the improvement of healthcare, the number of elderly individuals, including those with obesity, is increasing. The accumulation of various ventilation problems associated with the use of face masks in both these patient groups can pose a challenge even for an experienced [...] Read more.
Background: With the improvement of healthcare, the number of elderly individuals, including those with obesity, is increasing. The accumulation of various ventilation problems associated with the use of face masks in both these patient groups can pose a challenge even for an experienced anesthesiologist. The main aim of this study was to evaluate the ventilation of elderly patients with obesity using face masks, uncuffed or cuffed, and compare it with values obtained among patients with obesity who are not elderly. The secondary aim of the study was to demonstrate which of the two masks tested is better for elderly patients with android and gynoid obesity. Methods: This study was conducted at University Clinical Hospital No. 1 in Lodz among 108 patients with obesity, 50 elderly and 58 non-elderly. Patients’ BMIs ranged from 35.0 to 59.0. For the study, the uncuffed Intersurgical Eco Mask II and cuffed Ambu Ultra Seal face masks were used. Expiratory tidal volume and leakage obtained during the use of both types of masks were examined. The obtained data were analyzed using the Kolmogorov–Smirnov test and supplemented with Wilcoxon test values. Results: In elderly patients with obesity, especially those with gynoid obesity, the use of the Intersurgical Eco Mask II is associated with better ventilation parameters than the Ambu Ultra Seal mask. Only in the case of elderly patients with android obesity did the use of the Ambu Ultra Seal mask yield similar results to the Intersurgical Eco Mask II. Conclusions: Uncuffed face masks provide better ventilation parameters during manual bag ventilation in elderly patients with obesity. Full article
(This article belongs to the Section Critical Care)
Show Figures

Figure 1

Figure 1
<p>Flow chart of the present study.</p>
Full article ">Figure 2
<p>Expiratory volume chart obtained during ventilation of elderly patients with obesity with Eco Mask II and Ultra Seal Mask.</p>
Full article ">Figure 3
<p>Leakage values chart obtained during ventilation of patients with Eco Mask II and Ultra Seal Mask.</p>
Full article ">Figure 4
<p>Graph showing values of expiratory volume and leakage obtained during ventilation of non-elderly patients with obesity using Eco Mask II and Ultra Seal Mask.</p>
Full article ">Figure 5
<p>Graph showing leakage values during ventilation of non-elderly patients with obesity using Eco Mask II and Ultra Seal Mask.</p>
Full article ">Figure 6
<p>Chart of tidal volume during ventilation of elderly patients with gynoid obesity using Eco Mask II and Ultra Seal Mask.</p>
Full article ">Figure 7
<p>Chart of leakage values during ventilation of elderly patients with gynoid obesity using Eco Mask II and Ultra Seal Mask.</p>
Full article ">Figure 8
<p>Expiratory volume chart during ventilation of non-elderly patients with gynoid obesity using Eco Mask II and Ultra Seal Mask.</p>
Full article ">Figure 9
<p>Leakage values chart during ventilation of non-elderly patients with gynoid obesity using Eco Mask II and Ultra Seal Mask.</p>
Full article ">Figure 10
<p>Expiratory volume graph during ventilation of elderly patients with android obesity using Eco Mask II and Ultra Seal Mask.</p>
Full article ">Figure 11
<p>Leakage values graph during ventilation of elderly patients with android obesity using Eco Mask II and Ultra Seal Mask.</p>
Full article ">Figure 12
<p>Expiratory volume chart during ventilation of non-elderly patients with android obesity using Eco Mask II and Ultra Seal Mask.</p>
Full article ">Figure 13
<p>Leakage value chart during ventilation of non-elderly patients with android obesity using Eco Mask II and Ultra Seal Mask.</p>
Full article ">
24 pages, 7060 KiB  
Article
Digital Twin Used in Real-Time Monitoring of Operations Performed on CNC Technological Equipment
by Dinu Daraba, Florina Pop and Catalin Daraba
Appl. Sci. 2024, 14(22), 10088; https://doi.org/10.3390/app142210088 - 5 Nov 2024
Viewed by 1088
Abstract
This article presents the development and implementation of a real-time monitoring solution designed for CNC machines, specifically applied to 150 industrial printing machines, leveraging Digital Twin (DT) technology. The system integrates an SQL database with Android and .NET interfaces, ensuring seamless data synchronization [...] Read more.
This article presents the development and implementation of a real-time monitoring solution designed for CNC machines, specifically applied to 150 industrial printing machines, leveraging Digital Twin (DT) technology. The system integrates an SQL database with Android and .NET interfaces, ensuring seamless data synchronization across all machines and optimizing production processes. The real-time monitoring enables immediate reflection of operational changes, enhancing predictive maintenance and reducing machine downtime. A notable feature of the system is its 1 s average data synchronization rate per machine, managing 150 resources distributed over a 10,000 mp area. This fast synchronization improves workflow coordination, reducing production time by approximately 10%, and minimizing operator delays caused by material issues, machine malfunctions, or product defects. The integration of advanced analytics further supports real-time decision-making, predictive maintenance, and performance optimization, aligning the solution with the objectives of Industry 4.0 and Industry 5.0 initiatives. This version reflects the specific results of the research, including the 1 s synchronization rate, the 10% reduction in production time, and the scalability of the system for 150 resources. Full article
Show Figures

Figure 1

Figure 1
<p>The projected evolution of Digital Twin globally (2024–2030).</p>
Full article ">Figure 2
<p>Expected Digital Twin market (2023–2028).</p>
Full article ">Figure 3
<p>Digital Twin architecture [<a href="#B34-applsci-14-10088" class="html-bibr">34</a>].</p>
Full article ">Figure 4
<p>Maturity levels of Digital Twin technology [<a href="#B36-applsci-14-10088" class="html-bibr">36</a>].</p>
Full article ">Figure 5
<p>Processes, flows, and artifacts for use in smart manufacturing [<a href="#B37-applsci-14-10088" class="html-bibr">37</a>].</p>
Full article ">Figure 6
<p>SignalR architecture for current research.</p>
Full article ">Figure 7
<p>Dapper ORM architecture.</p>
Full article ">Figure 8
<p>Solution of proposed architecture.</p>
Full article ">Figure 9
<p>Database architecture.</p>
Full article ">Figure 10
<p>Windows client architecture [<a href="#B42-applsci-14-10088" class="html-bibr">42</a>].</p>
Full article ">Figure 11
<p>Block diagram for creating connection to Real-Time Server Events.</p>
Full article ">Figure 12
<p>Block diagram for creating the event of Monitoring Live Map Refresh.</p>
Full article ">Figure 13
<p>Block diagram for definition of Production Monitoring Model and User Model.</p>
Full article ">Figure 14
<p>Block diagram for decryption of the password.</p>
Full article ">Figure 15
<p>Block diagram for processing orders information retrieving.</p>
Full article ">Figure 16
<p>Pseudocode for global file.</p>
Full article ">Figure 17
<p>Pseudocode for operator information flow model.</p>
Full article ">Figure 18
<p>Block diagram for retrieving the data required by the operator.</p>
Full article ">Figure 19
<p>Three-dimensional models of a resource group of CNC’s equipment.</p>
Full article ">Figure 20
<p>Windows module for monitoring the production process.</p>
Full article ">Figure 21
<p>Android module for monitoring operator activities on CNC equipment.</p>
Full article ">Figure 22
<p>Number of actions performed by resources.</p>
Full article ">Figure 23
<p>Number of resources connected to the Notification Hub.</p>
Full article ">Figure 24
<p>Average of synchronized data.</p>
Full article ">Figure 25
<p>Average production time in previous week compared with actual research week.</p>
Full article ">Figure 26
<p>Comparison with other similar solutions.</p>
Full article ">
43 pages, 6561 KiB  
Review
Exploring Perspectives of Blockchain Technology and Traditional Centralized Technology in Organ Donation Management: A Comprehensive Review
by Geet Bawa, Harmeet Singh, Sita Rani, Aman Kataria and Hong Min
Information 2024, 15(11), 703; https://doi.org/10.3390/info15110703 - 4 Nov 2024
Viewed by 550
Abstract
Background/Objectives: The healthcare sector is rapidly growing, aiming to promote health, provide treatment, and enhance well-being. This paper focuses on the organ donation and transplantation system, a vital aspect of healthcare. It offers a comprehensive review of challenges in global organ donation [...] Read more.
Background/Objectives: The healthcare sector is rapidly growing, aiming to promote health, provide treatment, and enhance well-being. This paper focuses on the organ donation and transplantation system, a vital aspect of healthcare. It offers a comprehensive review of challenges in global organ donation and transplantation, highlighting issues of fairness and transparency, and compares centralized architecture-based models and blockchain-based decentralized models. Methods: This work reviews 370 publications from 2016 to 2023 on organ donation management systems. Out of these, 85 publications met the inclusion criteria, including 67 journal articles, 2 doctoral theses, and 16 conference papers. About 50.6% of these publications focus on global challenges in the system. Additionally, 12.9% of the publications examine centralized architecture-based models, and 36.5% of the publications explore blockchain-based decentralized models. Results: Concerns about organ trafficking, illicit trade, system distrust, and unethical allocation are highlighted, with a lack of transparency as the primary catalyst in organ donation and transplantation. It has been observed that centralized architecture-based models use technologies such as Python, Java, SQL, and Android Technology but face data storage issues. In contrast, blockchain-based decentralized models, mainly using Ethereum and a subset on Hyperledger Fabric, benefit from decentralized data storage, ensure transparency, and address these concerns efficiently. Conclusions: It has been observed that blockchain technology-based models are the better option for organ donation management systems. Further, suggestions for future directions for researchers in the field of organ donation management systems have been presented. Full article
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Organ donation and transplantation process flowchart.</p>
Full article ">Figure 2
<p>Publication search results in the initial search phase. (<b>a</b>) Journal and Conference Publications; (<b>b</b>) Post-Doctorate Dissertations.</p>
Full article ">Figure 3
<p>Types of publications explored in the initial search phase.</p>
Full article ">Figure 4
<p>Publication search results after the application of exclusion and inclusion criteria. (<b>a</b>) Journal Publications and Conference Publications; (<b>b</b>) Post-Doctorate Dissertations.</p>
Full article ">Figure 5
<p>Types of publications explored after the application of exclusion and inclusion criteria.</p>
Full article ">Figure 6
<p>Year-wise publications selected.</p>
Full article ">Figure 7
<p>Year-wise publications selected to address RQ1, RQ2, and RQ3.</p>
Full article ">Figure 8
<p>The Review Process Phase.</p>
Full article ">Figure 9
<p>Distribution of publications on organ donation issues by year.</p>
Full article ">Figure 10
<p>A chronological display of countries investigated to analyze issues in their organ donation systems.</p>
Full article ">Figure 11
<p>A timeline of the publications that have been reviewed to address RQ1 [<a href="#B50-information-15-00703" class="html-bibr">50</a>,<a href="#B51-information-15-00703" class="html-bibr">51</a>,<a href="#B52-information-15-00703" class="html-bibr">52</a>,<a href="#B53-information-15-00703" class="html-bibr">53</a>,<a href="#B54-information-15-00703" class="html-bibr">54</a>,<a href="#B55-information-15-00703" class="html-bibr">55</a>,<a href="#B56-information-15-00703" class="html-bibr">56</a>,<a href="#B57-information-15-00703" class="html-bibr">57</a>,<a href="#B58-information-15-00703" class="html-bibr">58</a>,<a href="#B59-information-15-00703" class="html-bibr">59</a>,<a href="#B60-information-15-00703" class="html-bibr">60</a>,<a href="#B61-information-15-00703" class="html-bibr">61</a>,<a href="#B62-information-15-00703" class="html-bibr">62</a>,<a href="#B63-information-15-00703" class="html-bibr">63</a>,<a href="#B64-information-15-00703" class="html-bibr">64</a>,<a href="#B65-information-15-00703" class="html-bibr">65</a>,<a href="#B66-information-15-00703" class="html-bibr">66</a>,<a href="#B67-information-15-00703" class="html-bibr">67</a>,<a href="#B68-information-15-00703" class="html-bibr">68</a>,<a href="#B69-information-15-00703" class="html-bibr">69</a>,<a href="#B70-information-15-00703" class="html-bibr">70</a>,<a href="#B71-information-15-00703" class="html-bibr">71</a>,<a href="#B72-information-15-00703" class="html-bibr">72</a>,<a href="#B73-information-15-00703" class="html-bibr">73</a>,<a href="#B74-information-15-00703" class="html-bibr">74</a>,<a href="#B75-information-15-00703" class="html-bibr">75</a>,<a href="#B76-information-15-00703" class="html-bibr">76</a>,<a href="#B77-information-15-00703" class="html-bibr">77</a>,<a href="#B78-information-15-00703" class="html-bibr">78</a>,<a href="#B79-information-15-00703" class="html-bibr">79</a>,<a href="#B80-information-15-00703" class="html-bibr">80</a>,<a href="#B81-information-15-00703" class="html-bibr">81</a>,<a href="#B82-information-15-00703" class="html-bibr">82</a>,<a href="#B83-information-15-00703" class="html-bibr">83</a>,<a href="#B84-information-15-00703" class="html-bibr">84</a>,<a href="#B85-information-15-00703" class="html-bibr">85</a>,<a href="#B86-information-15-00703" class="html-bibr">86</a>,<a href="#B87-information-15-00703" class="html-bibr">87</a>,<a href="#B88-information-15-00703" class="html-bibr">88</a>,<a href="#B89-information-15-00703" class="html-bibr">89</a>,<a href="#B90-information-15-00703" class="html-bibr">90</a>,<a href="#B91-information-15-00703" class="html-bibr">91</a>,<a href="#B92-information-15-00703" class="html-bibr">92</a>].</p>
Full article ">Figure 12
<p>Studies reviewed by publication year addressing RQ2.</p>
Full article ">Figure 13
<p>Studies reviewed by publication year addressing RQ3.</p>
Full article ">Figure 14
<p>A year-wise exploration of global organ donation management system challenges.</p>
Full article ">Figure 15
<p>Blockchain usage: Ethereum (ETH) vs. Hyperledger Fabric (HLF) vs. InterPlanetary File System (IPFS) vs. Polygon (PLYGN) vs. Not Mentioned (NM).</p>
Full article ">Figure 16
<p>Blockchain type: Private Blockchain (PR_B) vs. Public Blockchain (PB_B) vs. Not Mentioned (NM).</p>
Full article ">Figure 17
<p>Smart contracts coded vs. not coded.</p>
Full article ">Figure 18
<p>Decentralized application (DApp) designed vs. not designed.</p>
Full article ">Figure 19
<p>An annual examination of studies in two categories.</p>
Full article ">Figure 20
<p>A comparative assessment of the issue assessing capabilities of both solutions.</p>
Full article ">Figure 21
<p>IoT sensors embedded inside an organ container.</p>
Full article ">
19 pages, 5545 KiB  
Article
Edge Computing for AI-Based Brain MRI Applications: A Critical Evaluation of Real-Time Classification and Segmentation
by Khuhed Memon, Norashikin Yahya, Mohd Zuki Yusoff, Rabani Remli, Aida-Widure Mustapha Mohd Mustapha, Hilwati Hashim, Syed Saad Azhar Ali and Shahabuddin Siddiqui
Sensors 2024, 24(21), 7091; https://doi.org/10.3390/s24217091 - 4 Nov 2024
Viewed by 660
Abstract
Medical imaging plays a pivotal role in diagnostic medicine with technologies like Magnetic Resonance Imagining (MRI), Computed Tomography (CT), Positron Emission Tomography (PET), and ultrasound scans being widely used to assist radiologists and medical experts in reaching concrete diagnosis. Given the recent massive [...] Read more.
Medical imaging plays a pivotal role in diagnostic medicine with technologies like Magnetic Resonance Imagining (MRI), Computed Tomography (CT), Positron Emission Tomography (PET), and ultrasound scans being widely used to assist radiologists and medical experts in reaching concrete diagnosis. Given the recent massive uplift in the storage and processing capabilities of computers, and the publicly available big data, Artificial Intelligence (AI) has also started contributing to improving diagnostic radiology. Edge computing devices and handheld gadgets can serve as useful tools to process medical data in remote areas with limited network and computational resources. In this research, the capabilities of multiple platforms are evaluated for the real-time deployment of diagnostic tools. MRI classification and segmentation applications developed in previous studies are used for testing the performance using different hardware and software configurations. Cost–benefit analysis is carried out using a workstation with a NVIDIA Graphics Processing Unit (GPU), Jetson Xavier NX, Raspberry Pi 4B, and Android phone, using MATLAB, Python, and Android Studio. The mean computational times for the classification app on the PC, Jetson Xavier NX, and Raspberry Pi are 1.2074, 3.7627, and 3.4747 s, respectively. On the low-cost Android phone, this time is observed to be 0.1068 s using the Dynamic Range Quantized TFLite version of the baseline model, with slight degradation in accuracy. For the segmentation app, the times are 1.8241, 5.2641, 6.2162, and 3.2023 s, respectively, when using JPEG inputs. The Jetson Xavier NX and Android phone stand out as the best platforms due to their compact size, fast inference times, and affordability. Full article
(This article belongs to the Section Biomedical Sensors)
Show Figures

Figure 1

Figure 1
<p>Interface of the NeuroImaging Sequence Examiner (NISE) app (<b>left</b>), which displays the sequence, orientation, and relative position of the input brain MRI, alongside the corresponding inference time. The NeuroImaging Volumetric Extractor (NIVE) app (<b>right</b>) showcases the input MRI (<b>top</b>), the generated brain mask (middle), and the skull-stripped output (<b>bottom</b>). The NIVE app also includes a slider for navigating through individual brain slices and an option to save the skull-stripped MRI images.</p>
Full article ">Figure 2
<p>A general comparison between post-training quantization (PTQ) and quantization-aware training (QAT) schemes. The QAT is not employed in this work.</p>
Full article ">Figure 3
<p>System block diagram outlining the research flow for optimal platform selection in real-time deployment of medical imaging-based CAD tools. The process is divided into four phases: (1) identification and selection of classification and segmentation tasks, (2) selection and training of deep learning architectures (Full Integer Quantization is not used in this research due to the sensitive nature of medical diagnosis applications), (3) integration and deployment of trained DL models onto selected hardware and software platforms after conversion to compatible formats, and (4) evaluation of performance based on established parameters.</p>
Full article ">Figure 4
<p>NISE model inference (classification) times using multiple platforms (MATLAB and Python on Lenovo Legion, Python on Raspberry Pi 4B, Python on Xavier NX with and without GPU, and Android) for (<b>a</b>) Jpeg and (<b>b</b>) Dicom 3-channel MRI inputs with 224 × 224 resolution. The top and bottom of each box represent the upper and lower quartiles, respectively. The red line within the box represents the median value, and the red ‘+’ symbols represent the outliers, resulting from the first execution of the app, which is relatively slower as compared to the subsequent executions.</p>
Full article ">Figure 5
<p>NIVE model segmentation times using multiple platforms (MATLAB and Python on Lenovo Legion, Python on Raspberry Pi 4B, Python on Xavier NX with and without GPU, and Android) for (<b>a</b>) Jpeg, (<b>b</b>) Dicom and (<b>c</b>) NIfTI single channel MRI inputs with 256 × 256 resolution. The top and bottom of each box represent the upper and lower quartiles, respectively. The whiskers extending from the box indicate variability outside the upper and lower quartiles. The red line within the box represents the median value, and the red ‘+’ symbols represent the outliers, resulting from the first execution of the app, which is relatively slower as compared to the subsequent executions.</p>
Full article ">Figure 6
<p>Confusion matrix for NISE baseline classification model on 1276 images. Exactly the same confusion matrix is also seen for the float16 TFLite variant. Notably, only two T1 sagittal MRIs were misclassified as FLAIR sagittal.</p>
Full article ">Figure 7
<p>Confusion matrix for NISE DRQ-int8-TFLite classification model on 1276 images. Notably, only three T1 sagittal MRIs were misclassified as FLAIR sagittal.</p>
Full article ">Figure 8
<p>Visualization of segmented brain with its corresponding Dice score of selected slices from 3 subjects of AIH dataset. Comparison of NIVE Dice scores for baseline (<b>left</b>), float16 TFLite (<b>middle</b>) and DRQ-int8-TFLite (<b>right</b>) models. First row contains coronal scans, second row contains sagittal scans, whereas the third row shows axial scans. Green represents the brain region in GT also detected by the model, blue represents the brain in GT not detected by the model, and red represents the brain detected by the model not present in the GT mask.</p>
Full article ">
11 pages, 963 KiB  
Article
An Objective Assessment of Neuromotor Control Using a Smartphone App After Repeated Subconcussive Blast Exposure
by Charlend K. Howard, Masahiro Yamada, Marcia Dovel, Rie Leverett, Alexander Hill, Kenneth A. Manlapaz, David O. Keyser, Rene S. Hernandez, Sheilah S. Rowe, Walter S. Carr, Michael J. Roy and Christopher K. Rhea
Sensors 2024, 24(21), 7064; https://doi.org/10.3390/s24217064 - 2 Nov 2024
Viewed by 616
Abstract
Subconcussive blast exposure has been shown to alter neurological functioning. However, the extent to which neurological dysfunction persists after blast exposure is unknown. This longitudinal study examined the potential short- and long-term effects of repeated subconcussive blast exposure on neuromotor performance from heavy [...] Read more.
Subconcussive blast exposure has been shown to alter neurological functioning. However, the extent to which neurological dysfunction persists after blast exposure is unknown. This longitudinal study examined the potential short- and long-term effects of repeated subconcussive blast exposure on neuromotor performance from heavy weapons training in military personnel. A total of 214 participants were assessed; 137 were exposed to repeated subconcussive blasts and 77 were not exposed to blasts (controls). Participants completed a short stepping-in-place task while an Android smartphone app placed on their thigh recorded movement kinematics. We showed acute suppression of neuromotor variability 6 h after subconcussive blast exposure, followed by a rebound to levels not different from baseline at the 72 h, 2-week, and 3-month post-tests. It is postulated that this suppression of neuromotor variability results from a reduction in the functional degrees of freedom from the subconcussive neurological insult. It is important to note that this change in behavior is short-lived, with a return to pre-blast exposure movement kinematics within 72 h. Full article
Show Figures

Figure 1

Figure 1
<p>Example time series of thigh-angle data collected from one participant with the AccWalker app.</p>
Full article ">Figure 2
<p>Histogram of the number of participants who completed assessments at 2, 3, 4, or 5 time points.</p>
Full article ">Figure 3
<p>Estimated marginal mean and standard error (SE) bars of CV (%) of peak thigh flexion across time for the exposed and control groups. Asterisks indicate a value different from baseline (base).</p>
Full article ">
26 pages, 555 KiB  
Article
Cracking the Core: Hardware Vulnerabilities in Android Devices Unveiled
by Antonio Muñoz
Electronics 2024, 13(21), 4269; https://doi.org/10.3390/electronics13214269 - 31 Oct 2024
Viewed by 521
Abstract
As Android devices become more prevalent, their security risks extend beyond software vulnerabilities to include critical hardware weaknesses. This paper provides a comprehensive and systematic review of hardware-related vulnerabilities in Android systems, which can bypass even the most sophisticated software defenses. We compile [...] Read more.
As Android devices become more prevalent, their security risks extend beyond software vulnerabilities to include critical hardware weaknesses. This paper provides a comprehensive and systematic review of hardware-related vulnerabilities in Android systems, which can bypass even the most sophisticated software defenses. We compile and analyze an extensive range of reported vulnerabilities, introducing a novel categorization framework to facilitate a deeper understanding of these risks, classified by affected hardware components, vulnerability type, and the potential impact on system security. The paper addresses key areas such as memory management flaws, side-channel attacks, insecure system-on-chip (SoC) resource allocation, and cryptographic vulnerabilities. In addition, it examines feasible countermeasures, including hardware-backed encryption, secure boot mechanisms, and trusted execution environments (TEEs), to mitigate the risks posed by these hardware threats. By contextualizing hardware vulnerabilities within the broader security architecture of Android devices, this review emphasizes the importance of hardware security in ensuring system integrity and resilience. The findings serve as a valuable resource for both researchers and security professionals, offering insights into the development of more robust defenses against the emerging hardware-based threats faced by Android devices. Full article
(This article belongs to the Special Issue Artificial Intelligence Empowered Internet of Things)
Show Figures

Figure 1

Figure 1
<p>Monthly distribution of operating systems.</p>
Full article ">Figure 2
<p>Flowchart of the vulnerability identification process, including the number of reports at each stage and the filtering for critical CWEs.</p>
Full article ">Figure 3
<p>Survey results: perception of critical hardware vulnerabilities.</p>
Full article ">
12 pages, 217 KiB  
Essay
The Architecture of Immortality Through Neuroengineering
by Dany Moussa and Hind Moussa
Philosophies 2024, 9(6), 163; https://doi.org/10.3390/philosophies9060163 - 25 Oct 2024
Viewed by 658
Abstract
From mobile health and wearables to implantable medical devices and neuroprosthetics, the integration of machines into human biology and cognition is expanding. This paper explores the technological advancements that are pushing the human–machine boundaries further, raising profound questions about identity and existence in [...] Read more.
From mobile health and wearables to implantable medical devices and neuroprosthetics, the integration of machines into human biology and cognition is expanding. This paper explores the technological advancements that are pushing the human–machine boundaries further, raising profound questions about identity and existence in digital realms. The development of robots, androids, and AI–human hybrids promises to augment human capabilities beyond current limits. However, alongside these advancements, significant limitations arise: biological, technical, ethical, and legal. This paper further discusses the existential implications of these technological strides. It addresses the philosophical dimensions of mortality, forgiveness, and the significance of death in a world where technological immortality may be within reach. By addressing these questions, the paper seeks to provide a comprehensive analysis of the potential for these advancements to reshape our understanding of existence and the quest for immortality. Full article
23 pages, 3496 KiB  
Article
Android Malware Detection Using Support Vector Regression for Dynamic Feature Analysis
by Nahier Aldhafferi
Information 2024, 15(10), 658; https://doi.org/10.3390/info15100658 - 19 Oct 2024
Viewed by 922
Abstract
Mobile devices face significant security challenges due to the increasing proliferation of Android malware. This study introduces an innovative approach to Android malware detection, combining Support Vector Regression (SVR) and dynamic feature analysis to address escalating mobile security challenges. Our research aimed to [...] Read more.
Mobile devices face significant security challenges due to the increasing proliferation of Android malware. This study introduces an innovative approach to Android malware detection, combining Support Vector Regression (SVR) and dynamic feature analysis to address escalating mobile security challenges. Our research aimed to develop a more accurate and reliable malware detection system capable of identifying both known and novel malware variants. We implemented a comprehensive methodology encompassing dynamic feature extraction from Android applications, feature preprocessing and normalization, and the application of SVR with a Radial Basis Function (RBF) kernel for malware classification. Our results demonstrate the SVR-based model’s superior performance, achieving 95.74% accuracy, 94.76% precision, 98.06% recall, and a 96.38% F1-score, outperforming benchmark algorithms including SVM, Random Forest, and CNN. The model exhibited excellent discriminative ability with an Area Under the Curve (AUC) of 0.98 in ROC analysis. The proposed model’s capacity to capture complex, non-linear relationships in the feature space significantly enhanced its effectiveness in distinguishing between benign and malicious applications. This research provides a robust foundation for advancing Android malware detection systems, offering valuable insights for researchers and security practitioners in addressing evolving malware challenges. Full article
(This article belongs to the Special Issue Online Registration and Anomaly Detection of Cyber Security Events)
Show Figures

Figure 1

Figure 1
<p>The proposed flowchart for the SVR model.</p>
Full article ">Figure 2
<p>The SVR model’s performance—distribution of actual vs. predicted.</p>
Full article ">Figure 3
<p>The SVR model’s performance—precision-recall curve.</p>
Full article ">Figure 4
<p>The SVR model’s performance—confusion matrix.</p>
Full article ">Figure 5
<p>The SVR model’s performance—receiver operating characteristic.</p>
Full article ">Figure 6
<p>Precision-recall and ROC curves demonstrating robustness to overfitting for the SVR model.</p>
Full article ">Figure 7
<p>Comparison of performance metrics across different malware detection models.</p>
Full article ">Figure 8
<p>Decision boundary of SVR with RBF kernel.</p>
Full article ">Figure 9
<p>The confusion matrix visualization.</p>
Full article ">Figure 10
<p>Comparative analysis of machine learning models for Android malware detection.</p>
Full article ">
17 pages, 4352 KiB  
Article
Dynamical Embedding of Single-Channel Electroencephalogram for Artifact Subspace Reconstruction
by Doli Hazarika, K. N. Vishnu, Ramdas Ransing and Cota Navin Gupta
Sensors 2024, 24(20), 6734; https://doi.org/10.3390/s24206734 - 19 Oct 2024
Viewed by 849
Abstract
This study introduces a novel framework to apply the artifact subspace reconstruction (ASR) algorithm on single-channel electroencephalogram (EEG) data. ASR is known for its ability to remove artifacts like eye-blinks and movement but traditionally relies on multiple channels. Embedded ASR (E-ASR) addresses this [...] Read more.
This study introduces a novel framework to apply the artifact subspace reconstruction (ASR) algorithm on single-channel electroencephalogram (EEG) data. ASR is known for its ability to remove artifacts like eye-blinks and movement but traditionally relies on multiple channels. Embedded ASR (E-ASR) addresses this by incorporating a dynamical embedding approach. In this method, an embedded matrix is created from single-channel EEG data using delay vectors, followed by ASR application and reconstruction of the cleaned signal. Data from four subjects with eyes open were collected using Fp1 and Fp2 electrodes via the CameraEEG android app. The E-ASR algorithm was evaluated using metrics like relative root mean square error (RRMSE), correlation coefficient (CC), and average power ratio. The number of eye-blinks with and without the E-ASR approach was also estimated. E-ASR achieved an RRMSE of 43.87% and had a CC of 0.91 on semi-simulated data and effectively reduced artifacts in real EEG data, with eye-blink counts validated against ground truth video data. This framework shows potential for smartphone-based EEG applications in natural environments with minimal electrodes. Full article
(This article belongs to the Special Issue EEG Signal Processing Techniques and Applications—2nd Edition)
Show Figures

Figure 1

Figure 1
<p>Graphical abstract for the proposed E-ASR framework on a single electroencephalogram channel. Each color represents a single time point.</p>
Full article ">Figure 2
<p>(<b>a</b>) The data recording setup for the resting-state eyes-open task, featuring (<b>i</b>) a OnePlus Nord CE 2 Lite 5G smartphone placed on a tripod in front of the subject, (<b>ii</b>) an EasyCap 24-channel EEG cap, and (<b>iii</b>) an mBrainTrain Smarting device mounted on the EEG cap. (<b>b</b>) The CameraEEG Android app running on the smartphone, recording synchronized EEG and video data.</p>
Full article ">Figure 3
<p>Framework for creating semi-simulated signal: (<b>a</b>) 10 s clean EEG segment from subject 4, (<b>b</b>) eye-blink, and (<b>c</b>) superposition of both clean EEG and eye-blink to create semi-simulated signal.</p>
Full article ">Figure 4
<p>The superposition plots of semi-simulated contaminated EEG, E-ASR-cleaned, and ground truth signal using the proposed algorithm: (<b>a</b>) plot for 1 min time duration signal; (<b>b</b>) zoomed version of (<b>a</b>) showing one eye-blink.</p>
Full article ">Figure 5
<p>Comparison of average power ratio between the artifact-free signal and its E-ASR-cleaned version for all subjects. The E-ASR algorithm successfully restored the power distribution across the EEG spectrum for each subject (<b>a</b>–<b>d</b>).</p>
Full article ">Figure 6
<p>Time-domain comparison of original (blue), ASR-cleaned (green), and E-ASR-cleaned (red) on Fp1 and Fp2 channels across all subjects.</p>
Full article ">Figure 7
<p>Spatial distribution of source activities at an eye-blink time point for (<b>A</b>) no E-ASR, (<b>B</b>) E-ASR only applied on Fp1, and (<b>C</b>) E-ASR applied on Fp1 and Fp2 channels of subject 1. Red indicates the presence of an eye-blink artifact whereas blue indicates the absence. The green circle indicates the location of Fp1 electrode and pink indicates the location of Fp2 electrode.</p>
Full article ">
37 pages, 1049 KiB  
Article
An Intelligent Approach to Automated Operating Systems Log Analysis for Enhanced Security
by Obinna Johnphill, Ali Safaa Sadiq, Omprakash Kaiwartya and Mohammad Aljaidi
Information 2024, 15(10), 657; https://doi.org/10.3390/info15100657 - 19 Oct 2024
Viewed by 512
Abstract
Self-healing systems have become essential in modern computing for ensuring continuous and secure operations while minimising downtime and maintenance costs. These systems autonomously detect, diagnose, and correct anomalies, with effective self-healing relying on accurate interpretation of system logs generated by operating systems (OSs). [...] Read more.
Self-healing systems have become essential in modern computing for ensuring continuous and secure operations while minimising downtime and maintenance costs. These systems autonomously detect, diagnose, and correct anomalies, with effective self-healing relying on accurate interpretation of system logs generated by operating systems (OSs). Manual analysis of these logs in complex environments is often cumbersome, time-consuming, and error-prone, highlighting the need for automated, reliable log analysis methods. Our research introduces an intelligent methodology for creating self-healing systems for multiple OSs, focusing on log classification using CountVectorizer and the Multinomial Naive Bayes algorithm. This approach involves preprocessing OS logs to ensure quality, converting them into a numerical format with CountVectorizer, and then classifying them using the Naive Bayes algorithm. The system classifies multiple OS logs into distinct categories, identifying errors and warnings. We tested our model on logs from four major OSs; Mac, Android, Linux, and Windows; sourced from Zenodo to simulate real-world scenarios. The model’s accuracy, precision, and reliability were evaluated, demonstrating its potential for deployment in practical self-healing systems. Full article
(This article belongs to the Special Issue Artificial Intelligence on the Edge)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Overview of the proposed system: Log Intelligence and Self-Healing System (LISH).</p>
Full article ">Figure 2
<p>Flow diagram for log extraction, preprocessing, feature extraction, model classification, and self-healing monitoring.</p>
Full article ">Figure 3
<p>Extracted data counts: error count (<b>left</b>) and warning count (<b>right</b>).</p>
Full article ">Figure 4
<p>Preprocessed data counts: error count (<b>left</b>) and warning count (<b>right</b>).</p>
Full article ">Figure 5
<p>Performance metrics for the best four models in the Android dataset.</p>
Full article ">Figure 6
<p>Performance metrics for the best four models in the Linux dataset.</p>
Full article ">Figure 7
<p>Performance metrics for the best four models in the Mac dataset.</p>
Full article ">Figure 8
<p>Performance metrics for the best four models in the Windows dataset.</p>
Full article ">
Back to TopTop