Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (631)

Search Parameters:
Keywords = mobile application security

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
26 pages, 783 KiB  
Article
A PUF-Based Secure Authentication and Key Agreement Scheme for the Internet of Drones
by Jihye Choi, Seunghwan Son, Deokkyu Kwon and Youngho Park
Sensors 2025, 25(3), 982; https://doi.org/10.3390/s25030982 - 6 Feb 2025
Viewed by 225
Abstract
The Internet of Drones (IoD) is an emerging industry that offers convenient services for humans due to the high mobility and flexibility of drones. The IoD substantially enhances human life by enabling diverse drone applications across various domains. However, a malicious adversary can [...] Read more.
The Internet of Drones (IoD) is an emerging industry that offers convenient services for humans due to the high mobility and flexibility of drones. The IoD substantially enhances human life by enabling diverse drone applications across various domains. However, a malicious adversary can attempt security attacks because communication within an IoD environment is conducted through public channels and because drones are vulnerable to physical attacks. In 2023, Sharma et al. proposed a physical unclonable function (PUF)-based authentication and key agreement (AKA) scheme for the IoD. Regrettably, we discover that their scheme cannot prevent impersonation, stolen verifier, and ephemeral secret leakage (ESL) attacks. Moreover, Sharma et al.’s scheme cannot preserve user untraceability and anonymity. In this paper, we propose a secure and lightweight AKA scheme which addresses the shortcomings of Sharma et al.’s scheme. The proposed scheme has resistance against diverse security attacks, including physical capture attacks on drones, by leveraging a PUF. Furthermore, we utilize lightweight operations such as hash function and XOR operation to accommodate the computational constraints of drones. The security of the proposed scheme is rigorously verified, utilizing “Burrows–Abadi–Needham (BAN) logic”, “Real-or-Random (ROR) model”, “Automated Validation of Internet Security Protocols and Application (AVISPA)”, and informal analysis. Additionally, we compare the security properties, computational cost, communication cost, and energy consumption of the proposed scheme with other related works to evaluate performance. As a result, we determine that our scheme is efficient and well suited for the IoD. Full article
(This article belongs to the Special Issue Access Control in Internet of Things (IoT))
Show Figures

Figure 1

Figure 1
<p>System model for the IoD.</p>
Full article ">Figure 2
<p>Authentication and key agreement phase of Sharma et al.’s scheme.</p>
Full article ">Figure 3
<p>Drone registration of the proposed scheme.</p>
Full article ">Figure 4
<p>User registration of the proposed scheme.</p>
Full article ">Figure 5
<p>Authentication and key agreement phase of the proposed scheme.</p>
Full article ">Figure 6
<p>AVISPA simulation result under OFMC and CL-AtSe.</p>
Full article ">Figure 7
<p>Communication costs [<a href="#B15-sensors-25-00982" class="html-bibr">15</a>,<a href="#B16-sensors-25-00982" class="html-bibr">16</a>,<a href="#B17-sensors-25-00982" class="html-bibr">17</a>,<a href="#B18-sensors-25-00982" class="html-bibr">18</a>,<a href="#B19-sensors-25-00982" class="html-bibr">19</a>].</p>
Full article ">Figure 8
<p>Energy consumption [<a href="#B15-sensors-25-00982" class="html-bibr">15</a>,<a href="#B16-sensors-25-00982" class="html-bibr">16</a>,<a href="#B17-sensors-25-00982" class="html-bibr">17</a>,<a href="#B18-sensors-25-00982" class="html-bibr">18</a>,<a href="#B19-sensors-25-00982" class="html-bibr">19</a>].</p>
Full article ">
23 pages, 883 KiB  
Article
SAM-PAY: A Location-Based Authentication Method for Mobile Environments
by Diana Gratiela Berbecaru
Electronics 2025, 14(3), 621; https://doi.org/10.3390/electronics14030621 - 5 Feb 2025
Viewed by 323
Abstract
Wireless, satellite, and mobile networks are increasingly used in application scenarios to provide advanced services to mobile or nomadic devices. For example, to authenticate mobile users while obtaining access to remote services, a two-factor authentication mechanism is typically used, e.g., based on the [...] Read more.
Wireless, satellite, and mobile networks are increasingly used in application scenarios to provide advanced services to mobile or nomadic devices. For example, to authenticate mobile users while obtaining access to remote services, a two-factor authentication mechanism is typically used, e.g., based on the ownership of a personal mobile phone, device, or (smart)card and the knowledge of a (static) username and password. Nevertheless, two-factor authentication is considered roughly “adequate” for security problems encountered today on the Internet and even less for ubiquitous or mobile environments. To increase the authentication level, several authentication methods of different classes may be combined to achieve more reliable user identification. In particular, location technologies allow ubiquitous applications to better exploit the (physical) location information in the authentication process. Consequently, in security applications based on multiple authentication factors, an additional authentication factor could be the location information protected for integrity against undesired modification. We present the SAM-PAY authentication method, which combines different authentication factors to obtain a more reliable user identification. The mechanism is based on the use of a (location-aware) device, the location information certified by a trusted external party, such as a component or element in a telecom network, and the knowledge of data, like a static PIN and a dynamically generated one-time password. We also describe the design and implementation of a real case scenario exploiting our SAM-PAY method, namely the refueling service at a self-service gas station. The test-bed put in place for this service demonstrates the feasibility and effectiveness of the SAM-PAY method in open mobile environments. Full article
Show Figures

Figure 1

Figure 1
<p>Possible architecture in the case of a GSM network.</p>
Full article ">Figure 2
<p>Possible architecture in the case of professional communication networks (VHF, TETRA and DMR).</p>
Full article ">Figure 3
<p>Generation of LDEA-key, where (*) means multiplication.</p>
Full article ">Figure 4
<p>Modified LDEA geo-encryption algorithm used in the SAM-PAY authentication method.</p>
Full article ">Figure 5
<p>Architecture and workflow of the SAM-PAY-based refueling service at self-service gas stations.</p>
Full article ">Figure 6
<p>Test-bed for the self-service gas-station scenario exploiting the SAM-PAY authentication method.</p>
Full article ">
25 pages, 11115 KiB  
Article
Enhancing Banking Transaction Security with Fractal-Based Image Steganography Using Fibonacci Sequences and Discrete Wavelet Transform
by Alina Iuliana Tabirca, Catalin Dumitrescu and Valentin Radu
Fractal Fract. 2025, 9(2), 95; https://doi.org/10.3390/fractalfract9020095 - 2 Feb 2025
Viewed by 502
Abstract
The growing reliance on digital banking and financial transactions has brought significant security challenges, including data breaches and unauthorized access. This paper proposes a robust method for enhancing the security of banking and financial transactions. In this context, steganography—hiding information within digital media—is [...] Read more.
The growing reliance on digital banking and financial transactions has brought significant security challenges, including data breaches and unauthorized access. This paper proposes a robust method for enhancing the security of banking and financial transactions. In this context, steganography—hiding information within digital media—is valuable for improving data protection. This approach combines biometric authentication, using face and voice recognition, with image steganography to secure communication channels. A novel application of Fibonacci sequences is introduced within a direct-sequence spread-spectrum (DSSS) system for encryption, along with a discrete wavelet transform (DWT) for embedding data. The secret message, encrypted through Fibonacci sequences, is concealed within an image and tested for effectiveness using the Mean Square Error (MSE) and Peak Signal-to-Noise Ratio (PSNR). The experimental results demonstrate that the proposed method achieves a high PSNR, particularly for grayscale images, enhancing the robustness of security measures in mobile and online banking environments. Full article
Show Figures

Figure 1

Figure 1
<p>The architecture for achieving the protection of banking transactions using steganography. Source: author’s contribution.</p>
Full article ">Figure 2
<p>Architecture of the proposed method. Source: author’s contribution.</p>
Full article ">Figure 3
<p>Lena, 512 by 512 pixels: (<b>a</b>) compressed at 0.34 bpp, PSNR = 32.39 dB; (<b>b</b>) processed by soft truncation of the wavelet coefficients with local threshold and correction value based on the contour map in translation-invariant method, PSNR = 53.00 dB. Source: author’s contribution.</p>
Full article ">Figure 4
<p>Application of Fibonacci sequence using LSB: (<b>a</b>) software implementation for the Fibonacci sequence generation code using LSB; (<b>b</b>) GUI results. Source: author’s contribution.</p>
Full article ">Figure 5
<p>Application of direct-sequence spread spectrum (DS) using Fibonacci sequence: (<b>a</b>) code generating; (<b>b</b>) GUI results. Source: author’s contribution.</p>
Full article ">Figure 6
<p>The software application for testing the proposed algorithm: (<b>a</b>) the implementation of lines of code; (<b>b</b>) the GUI interface with the obtained results. Source: author’s results.</p>
Full article ">Figure 7
<p>Lena’s image marked with <span class="html-italic">α</span> = 1.5 using the proposed method. Source: author’s results.</p>
Full article ">Figure 8
<p>Digital watermarking for different image quality: (<b>a</b>) Q = 20, (<b>b</b>) Q = 50, (<b>c</b>) Q = 75, and (<b>d</b>) Q = 85. Source: author’s results.</p>
Full article ">Figure 9
<p>Marked image for the presented method, with <span class="html-italic">α =</span> 1.5, level 0 (PSNR = 58 dB). Source: author’s results.</p>
Full article ">Figure 10
<p>Marked image for the presented method, with <span class="html-italic">α =</span> 1.5, level 1 (PSNR = 63 dB). Source: author’s results.</p>
Full article ">Figure 11
<p>Marked image for the presented method, with <span class="html-italic">α =</span> 1.5, level 0 (PSNR = 20 dB). Source: author’s results.</p>
Full article ">Figure 12
<p>Original Lena image, as well as images marked with (<b>left</b>) proposed method, α = 1.5, PSNR = 66.86 dB; and (<b>right</b>) old method, <span class="html-italic">α</span> = 0.2, PSNR = 36.39 dB. Source: author’s results.</p>
Full article ">Figure 13
<p>The result of digital watermarking with the proposed algorithm, with <span class="html-italic">α</span> = 0.05, PSNR = 66.60 dB. Source: author’s results.</p>
Full article ">Figure 14
<p>The result of digital watermarking with the proposed algorithm, with <span class="html-italic">α</span> = 1.05, PSNR = 67.21 dB. Source: author’s results.</p>
Full article ">Figure 15
<p>Visual encryption results: (<b>a</b>,<b>b</b>) input plaintext images and (<b>c</b>,<b>d</b>) corresponding ciphertext images. Source: author’s results.</p>
Full article ">Figure 16
<p>The result of the digital watermark with the proposed algorithm for the RGB image Lena.tiff. Source: author’s results.</p>
Full article ">Figure 17
<p>The results of the digital stegano image with the proposed algorithm for the SSIM analysis. (<b>a</b>) Cover image, (<b>b</b>) secret image, and (<b>c</b>) stegano image. Source: author’s results.</p>
Full article ">Figure 18
<p>The SSIM analysis for the stegano image: (<b>a</b>) affected by brightness (<b>b</b>) affected by contrast. Source: author’s results.</p>
Full article ">Figure 19
<p>Encrypt–decrypt diagram for the proposed solution. Source: author’s results.</p>
Full article ">Figure 20
<p>Realization of the transmission–reception application of WiFi 5 (IEEE 802.11 ac) communication. (<b>a</b>) Results of the application of a simulation of the transmission of a secret message on a WiFi 5 (IEEE 802.11 ac) communication system with a 64QAM modulation; (<b>b</b>) packeting transmit; and (<b>c</b>) packeting receiving. Source: author’s results.</p>
Full article ">
27 pages, 12866 KiB  
Article
Multimodal Augmented Reality System for Real-Time Roof Type Recognition and Visualization on Mobile Devices
by Bartosz Kubicki, Artur Janowski and Adam Inglot
Appl. Sci. 2025, 15(3), 1330; https://doi.org/10.3390/app15031330 - 27 Jan 2025
Viewed by 534
Abstract
The utilization of augmented reality (AR) is becoming increasingly prevalent in the integration of virtual reality (VR) elements into the tangible reality of the physical world. It facilitates a more straightforward comprehension of the interconnections, interdependencies, and spatial context of data. Furthermore, the [...] Read more.
The utilization of augmented reality (AR) is becoming increasingly prevalent in the integration of virtual reality (VR) elements into the tangible reality of the physical world. It facilitates a more straightforward comprehension of the interconnections, interdependencies, and spatial context of data. Furthermore, the presentation of analyses and the combination of spatial data with annotated data are facilitated. This is particularly evident in the context of mobile applications, where the combination of real-world and virtual imagery facilitates enhances visualization. This paper presents a proposal for the development of a multimodal system that is capable of identifying roof types in real time and visualizing them in AR on mobile devices. The current approach to roof identification is based on data made available by public administrations in an open-source format, including orthophotos and building contours. Existing computer processing technologies have been employed to generate objects representing the shapes of building masses, and in particular, the shape of roofs, in three-dimensional (3D) space. The system integrates real-time data obtained from multiple sources and is based on a mobile application that enables the precise positioning and detection of the recipient’s viewing direction (pose estimation) in real time. The data were integrated and processed in a Docker container system, which ensured the scalability and security of the solution. The multimodality of the system is designed to enhance the user’s perception of the space and facilitate a more nuanced interpretation of its intricacies. In its present iteration, the system facilitates the extraction and classification/generalization of two categories of roof types (gable and other) from aerial imagery through the utilization of deep learning methodologies. The outcomes achieved suggest considerable promise for the advancement and deployment of the system in domains pertaining to architecture, urban planning, and civil engineering. Full article
(This article belongs to the Special Issue Applications of Data Science and Artificial Intelligence)
Show Figures

Figure 1

Figure 1
<p>Study area in Głusk Community, Lublin Poviat, Lubelskie Voivodeship, Poland (source: author’s own elaboration).</p>
Full article ">Figure 2
<p>Repository of certain roof type classes: axonometric view (<b>a</b>) and top view (<b>b</b>) with geometrical parameters involving examples from orthophoto (<b>c</b>) (source: author’s own elaboration).</p>
Full article ">Figure 3
<p>Scheme of assumptions for creating data for the learning set of YOLO (source: author’s own elaboration).</p>
Full article ">Figure 4
<p>Diagram with the percentage of the roof type class in each individual area (source: author’s own elaboration).</p>
Full article ">Figure 5
<p>Normal (Gaussian) distribution graph of the percentage of roof type classes. (source: author’s own elaboration).</p>
Full article ">Figure 6
<p>Statistics of training data from YOLO: (<b>a</b>) Centroid distribution of training objects. (<b>b</b>) Bounding box dimensions of training objects (source: author’s own elaboration).</p>
Full article ">Figure 7
<p>Training and validation loss and precision trends across 350 epochs. Early stopping at epoch 327 ensures optimal precision and prevents overfitting (source: author’s own elaboration).</p>
Full article ">Figure 8
<p>Examples of misclassification of roof types: (<b>a</b>) incorrect class, (<b>b</b>) roof is not located on the building, (<b>c</b>) incorrect object other than the roof, (<b>d</b>) unclassified (source: author’s own elaboration).</p>
Full article ">Figure 9
<p>Visualization of representative classes of building blocks: buildings with gable roofs (<b>a</b>) and others (<b>b</b>) (source: author’s own elaboration).</p>
Full article ">Figure 10
<p>Multimodal system component data flow architecture (source: author’s own elaboration).</p>
Full article ">Figure 11
<p>The options for presenting classes of building roof shapes in 2D and 3D (source: author’s own elaboration).</p>
Full article ">Figure A1
<p>Determining the optimal F1-score value for confidence threshold optimization, considering overfitting (source: author’s own elaboration).</p>
Full article ">
21 pages, 1368 KiB  
Article
Radar Signal Processing and Its Impact on Deep Learning-Driven Human Activity Recognition
by Fahad Ayaz, Basim Alhumaily, Sajjad Hussain, Muhammad Ali Imran, Kamran Arshad, Khaled Assaleh and Ahmed Zoha
Sensors 2025, 25(3), 724; https://doi.org/10.3390/s25030724 - 25 Jan 2025
Viewed by 572
Abstract
Human activity recognition (HAR) using radar technology is becoming increasingly valuable for applications in areas such as smart security systems, healthcare monitoring, and interactive computing. This study investigates the integration of convolutional neural networks (CNNs) with conventional radar signal processing methods to improve [...] Read more.
Human activity recognition (HAR) using radar technology is becoming increasingly valuable for applications in areas such as smart security systems, healthcare monitoring, and interactive computing. This study investigates the integration of convolutional neural networks (CNNs) with conventional radar signal processing methods to improve the accuracy and efficiency of HAR. Three distinct, two-dimensional radar processing techniques, specifically range-fast Fourier transform (FFT)-based time-range maps, time-Doppler-based short-time Fourier transform (STFT) maps, and smoothed pseudo-Wigner–Ville distribution (SPWVD) maps, are evaluated in combination with four state-of-the-art CNN architectures: VGG-16, VGG-19, ResNet-50, and MobileNetV2. This study positions radar-generated maps as a form of visual data, bridging radar signal processing and image representation domains while ensuring privacy in sensitive applications. In total, twelve CNN and preprocessing configurations are analyzed, focusing on the trade-offs between preprocessing complexity and recognition accuracy, all of which are essential for real-time applications. Among these results, MobileNetV2, combined with STFT preprocessing, showed an ideal balance, achieving high computational efficiency and an accuracy rate of 96.30%, with a spectrogram generation time of 220 ms and an inference time of 2.57 ms per sample. The comprehensive evaluation underscores the importance of interpretable visual features for resource-constrained environments, expanding the applicability of radar-based HAR systems to domains such as augmented reality, autonomous systems, and edge computing. Full article
(This article belongs to the Special Issue Non-Intrusive Sensors for Human Activity Detection and Recognition)
Show Figures

Figure 1

Figure 1
<p>Detailed flow diagram illustrating the structure of the paper sections and content.</p>
Full article ">Figure 2
<p>Radar-based HAR system depicting the workflow from data acquisition to radar maps’ generation, along with state-of-the-art neural networks.</p>
Full article ">Figure 3
<p>Two-dimensional images of six activities resulting from TR, STFT, and SPWVD techniques.</p>
Full article ">Figure 4
<p>Confusion matrices of best-performing pairs. (<b>a</b>) shows pair M1, (<b>b</b>) shows pair M7, and (<b>c</b>) shows pair M10.</p>
Full article ">Figure 5
<p>Generalization capability of the proposed HAR system.</p>
Full article ">Figure 6
<p>Performance and computational analysis comparison across radar domains as input to MobileNetV2.</p>
Full article ">
21 pages, 5691 KiB  
Article
Task Offloading Strategy for UAV-Assisted Mobile Edge Computing with Covert Transmission
by Zhijuan Hu, Dongsheng Zhou, Chao Shen, Tingting Wang and Liqiang Liu
Electronics 2025, 14(3), 446; https://doi.org/10.3390/electronics14030446 - 23 Jan 2025
Viewed by 457
Abstract
Task offloading strategies for unmanned aerial vehicle (UAV) -assisted mobile edge computing (MEC) systems have emerged as a promising solution for computationally intensive applications. However, the broadcast and open nature of radio transmissions makes such systems vulnerable to eavesdropping threats. Therefore, developing strategies [...] Read more.
Task offloading strategies for unmanned aerial vehicle (UAV) -assisted mobile edge computing (MEC) systems have emerged as a promising solution for computationally intensive applications. However, the broadcast and open nature of radio transmissions makes such systems vulnerable to eavesdropping threats. Therefore, developing strategies that can perform task offloading in a secure communication environment is critical for both ensuring the security and optimizing the performance of MEC systems. In this paper, we first design an architecture that utilizes covert communication techniques to guarantee that a UAV-assisted MEC system can securely offload highly confidential tasks from the relevant user equipment (UE) and calculations. Then, utilizing the Markov Decision Process (MDP) as a framework and incorporating the Prioritized Experience Replay (PER) mechanism into the Deep Deterministic Policy Gradient (DDPG) algorithm, a PER-DDPG algorithm is proposed, aiming to minimize the maximum processing delay of the system and the correct detection rate of the warden by jointly optimizing resource allocation, the movement of the UAV base station (UAV-BS), and the transmit power of the jammer. Simulation results demonstrate the convergence and effectiveness of the proposed approach. Compared to baseline algorithms such as Deep Q-Network (DQN) and DDPG, the PER-DDPG algorithm achieves significant performance improvements, with an average reward increase of over 16% compared to DDPG and over 53% compared to DQN. Furthermore, PER-DDPG exhibits the fastest convergence speed among the three algorithms, highlighting its efficiency in optimizing task offloading and communication security. Full article
(This article belongs to the Special Issue Research in Secure IoT-Edge-Cloud Computing Continuum)
Show Figures

Figure 1

Figure 1
<p>Unmanned aerial vehicle (UAV) -assisted mobile edge computing (MEC) scenario.</p>
Full article ">Figure 2
<p>Deep Deterministic Policy Gradient (DDPG) algorithm structure.</p>
Full article ">Figure 3
<p>Convergence performance with varying learning rates of the PER-DDPG algorithm.</p>
Full article ">Figure 4
<p>Convergence result using varying discount factors.</p>
Full article ">Figure 5
<p>Convergence performance with varying exploration parameters.</p>
Full article ">Figure 6
<p>Performance without PER mechanism or state normalization.</p>
Full article ">Figure 7
<p>Performance of various algorithms with task size of D = 100 Mb.</p>
Full article ">Figure 8
<p>Detection error rate of warden in different algorithms.</p>
Full article ">Figure 9
<p>Various indicators of three algorithms under different computing capabilities of UEs. (<b>a</b>) Convergence performance. (<b>b</b>) Offloading ratio. (<b>c</b>) Detection error rate of warden.</p>
Full article ">Figure 10
<p>Performance of various algorithms with different task size.</p>
Full article ">Figure 11
<p>Performance of various algorithms as number of UEs varies from 1 to 10.</p>
Full article ">
21 pages, 2616 KiB  
Review
Using Blockchain in the Registration and Authentication of a Carpooling Application: From Review to Proposal
by Lina Sofía Cardona Martínez, Cesar Andrés Sandoval Muñoz, Ricardo Salazar-Cabrera, Álvaro Pachón de la Cruz and Juan Manuel Madrid Molina
World Electr. Veh. J. 2025, 16(1), 49; https://doi.org/10.3390/wevj16010049 - 20 Jan 2025
Viewed by 526
Abstract
Today, transportation plays a crucial role in economic development and establishing strong social relationships. Primary mobility challenges in cities include high levels of traffic, accidents, and pollution. Improvements in road infrastructure, technological advancements at traffic light intersections, and the adoption of electric or [...] Read more.
Today, transportation plays a crucial role in economic development and establishing strong social relationships. Primary mobility challenges in cities include high levels of traffic, accidents, and pollution. Improvements in road infrastructure, technological advancements at traffic light intersections, and the adoption of electric or hybrid vehicles are insufficient to resolve these issues. Maximizing the use of public transit and shared transportation is essential for this purpose. Strategies aimed at reducing the number of private vehicles on city roads are beneficial in this regard. Ridesharing, particularly carpooling, is an effective strategy to achieve such a reduction in vehicle numbers. However, safety concerns related to carpooling tools present a significant barrier to the growth of this mode of transportation. The measures implemented in these tools often lack appropriate technology for the authentication process, which is crucial for enhancing safety for both passengers and drivers. This proposed research explores the benefits of improving the authentication processes for passengers and drivers within a shared transportation system to minimize information security risks. A thorough literature review was conducted on shared transportation, user registration, authentication processes within these systems, and technologies that could enhance security, such as blockchain. Subsequently, considering the identified criteria in the literature review, a proposal was developed for creating a registration and authentication module based on blockchain that could be applied across various systems. Finally, an analysis was conducted on how this module could be integrated into a carpooling application and the benefits it would provide regarding safety and increased user adoption. The findings from the review were organized and assessed to identify key aspects for improving user authentication in a system based on intelligent transportation systems (ITSs) and utilizing blockchain, recognized for its security and data integrity. The registration and authentication module developed in this work allows increased security, scalability, and user adoption for any type of application, e.g., carpooling. Full article
Show Figures

Figure 1

Figure 1
<p>Possible ways to reduce pollution on the roads.</p>
Full article ">Figure 2
<p>Improvement in the carpooling service using ICT.</p>
Full article ">Figure 3
<p>UML component diagram of registration and authentication model.</p>
Full article ">Figure 4
<p>Smart contract structure.</p>
Full article ">Figure 5
<p>Application architecture.</p>
Full article ">Figure 6
<p>User registration sequence diagram.</p>
Full article ">Figure 7
<p>User login sequence diagram.</p>
Full article ">
28 pages, 397 KiB  
Review
Exploring In-Network Computing with Information-Centric Networking: Review and Research Opportunities
by Marica Amadeo and Giuseppe Ruggeri
Future Internet 2025, 17(1), 42; https://doi.org/10.3390/fi17010042 - 18 Jan 2025
Viewed by 518
Abstract
The advent of 6G networks and beyond calls for innovative paradigms to address the stringent demands of emerging applications, such as extended reality and autonomous vehicles, as well as technological frameworks like digital twin networks. Traditional cloud computing and edge computing architectures fall [...] Read more.
The advent of 6G networks and beyond calls for innovative paradigms to address the stringent demands of emerging applications, such as extended reality and autonomous vehicles, as well as technological frameworks like digital twin networks. Traditional cloud computing and edge computing architectures fall short in providing their required flexibility, scalability, and ultra-low latency. Cloud computing centralizes resources in distant data centers, leading to high latency and increased network congestion, while edge computing, though closer to data sources, lacks the agility to dynamically adapt to fluctuating workloads, user mobility, and real-time requirements. In-network computing (INC) offers a transformative solution by integrating computational capabilities directly into the network fabric, enabling dynamic and distributed task execution. This paper explores INC through the lens of information-centric networking (ICN), a revolutionary communication paradigm implementing routing-by-name and in-network caching, and thus emerging as a natural enabler for INC. We review state-of-the-art advancements involving INC and ICN, addressing critical topics such as service naming, executor selection strategies, compute reuse, and security. Furthermore, we discuss key challenges and propose research directions for deploying INC via ICN, thereby outlining a cohesive roadmap for future investigation. Full article
(This article belongs to the Special Issue Featured Papers in the Section Internet of Things, 2nd Edition)
Show Figures

Figure 1

Figure 1
<p>Reference scenario.</p>
Full article ">Figure 2
<p>NDN node architecture.</p>
Full article ">
19 pages, 4225 KiB  
Article
Zero-Shot Traffic Identification with Attribute and Graph-Based Representations for Edge Computing
by Zikui Lu, Zixi Chang, Mingshu He and Luona Song
Sensors 2025, 25(2), 545; https://doi.org/10.3390/s25020545 - 18 Jan 2025
Viewed by 478
Abstract
With the proliferation of mobile terminals and the rapid growth of network applications, fine-grained traffic identification has become increasingly challenging. Methods based on machine learning and deep learning have achieved remarkable results, but they heavily rely on the distribution of training data, which [...] Read more.
With the proliferation of mobile terminals and the rapid growth of network applications, fine-grained traffic identification has become increasingly challenging. Methods based on machine learning and deep learning have achieved remarkable results, but they heavily rely on the distribution of training data, which makes them ineffective in handling unseen samples. In this paper, we propose AG-ZSL, a zero-shot learning framework based on traffic behavior and attribute representations for general encrypted traffic classification. AG-ZSL primarily learns two mapping functions: one that captures traffic behavior embeddings from burst-based traffic interaction graphs, and the other that learns attribute embeddings from traffic attribute descriptions. Then, the framework minimizes the distance between these embeddings within the shared feature space. The gradient rejection algorithm and K-Nearest Neighbors are introduced to implement a two-stage method for general traffic classification. Experimental results on IoT datasets demonstrate that AG-ZSL achieves exceptional performance in classifying both known and unknown traffic, highlighting its potential for enhancing secure and efficient traffic management at the network edge. Full article
(This article belongs to the Special Issue Communications and Networking Based on Artificial Intelligence)
Show Figures

Figure 1

Figure 1
<p>Traffic interaction graph based on burst.</p>
Full article ">Figure 2
<p>The training and testing objectives of AG-ZSL.</p>
Full article ">Figure 3
<p>AG-ZSL training phase.</p>
Full article ">Figure 4
<p>AG-ZSL inference phase.</p>
Full article ">Figure 5
<p>Data statistics: CDF of burst proportion, cv, and packet rate.</p>
Full article ">Figure 6
<p>Confusion matrix on <math display="inline"><semantics> <msub> <mi>D</mi> <mn>1</mn> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>D</mi> <mn>2</mn> </msub> </semantics></math>. (<b>a</b>) Confusion matrix of accuracy for AG-ZSL on <math display="inline"><semantics> <msub> <mi>D</mi> <mn>1</mn> </msub> </semantics></math>. (<b>b</b>) Confusion matrix of accuracy for TF on <math display="inline"><semantics> <msub> <mi>D</mi> <mn>1</mn> </msub> </semantics></math>. (<b>c</b>) Confusion matrix of accuracy for FS-Net on <math display="inline"><semantics> <msub> <mi>D</mi> <mn>1</mn> </msub> </semantics></math>. (<b>d</b>) Confusion matrix of accuracy for AG-ZSL on <math display="inline"><semantics> <msub> <mi>D</mi> <mn>2</mn> </msub> </semantics></math>. (<b>e</b>) Confusion matrix of accuracy for TF on <math display="inline"><semantics> <msub> <mi>D</mi> <mn>2</mn> </msub> </semantics></math>. (<b>f</b>) Confusion matrix of accuracy for FS-Net on <math display="inline"><semantics> <msub> <mi>D</mi> <mn>2</mn> </msub> </semantics></math>.</p>
Full article ">Figure 7
<p>Comparison of the results of different methods under various <math display="inline"><semantics> <mi>ξ</mi> </semantics></math>.</p>
Full article ">
24 pages, 529 KiB  
Article
Analysis and Evaluation of Intel Software Guard Extension-Based Trusted Execution Environment Usage in Edge Intelligence and Internet of Things Scenarios
by Zhiyuan Wang and Yuezhi Zhou
Future Internet 2025, 17(1), 32; https://doi.org/10.3390/fi17010032 - 13 Jan 2025
Viewed by 692
Abstract
With the extensive deployment and application of the Internet of Things (IoT), 5G and 6G technologies and edge intelligence, the volume of data generated by IoT and the number of intelligence applications derived from these data are rapidly growing. However, the absence of [...] Read more.
With the extensive deployment and application of the Internet of Things (IoT), 5G and 6G technologies and edge intelligence, the volume of data generated by IoT and the number of intelligence applications derived from these data are rapidly growing. However, the absence of effective mechanisms to safeguard the vast data generated by IoT, along with the security and privacy of edge intelligence applications, hinders their further development and adoption. In recent years, Trusted Execution Environment (TEE) has emerged as a promising technology for securing cloud data storage and cloud processing, demonstrating significant potential for ensuring data and application confidentiality in more scenarios. Nevertheless, applying TEE technology to enhance security in IoT and edge intelligence scenarios still presents several challenges. This paper investigates the technical challenges faced by current TEE solutions, such as performance overhead and I/O security issues, in the context of the resource constraints and data mobility that are inherent to IoT and edge intelligence applications. Using Intel Software Guard Extensions (SGX) technology as a case study, this paper validates these challenges through extensive experiments. The results provide critical assessments and analyses essential for advancing the development and usage of TEE in IoT and edge intelligence scenarios. Full article
(This article belongs to the Special Issue Edge Intelligence: Edge Computing for 5G and the Internet of Things)
Show Figures

Figure 1

Figure 1
<p>Different SGX implementations. (<b>a</b>) SGX SDK-based. (<b>b</b>) LibOS-based.</p>
Full article ">Figure 2
<p>CPU-intensive workload.</p>
Full article ">Figure 3
<p>Sequential read/write performance. (<b>a</b>) Sequential read. (<b>b</b>) Sequential write.</p>
Full article ">Figure 4
<p>Random read/write performance. (<b>a</b>) Random read. (<b>b</b>) Random write.</p>
Full article ">Figure 5
<p>Impact of concurrency on throughput.</p>
Full article ">Figure 6
<p>Comparison on CPU usage.</p>
Full article ">Figure 7
<p>Impact of file size on latency.</p>
Full article ">Figure 8
<p>Process creation latency.</p>
Full article ">Figure 9
<p>Inter-process communication.</p>
Full article ">Figure 10
<p>Throughput versus latency of Memcached.</p>
Full article ">
31 pages, 4517 KiB  
Article
Resource Management and Secure Data Exchange for Mobile Sensors Using Ethereum Blockchain
by Burhan Ul Islam Khan, Khang Wen Goh, Abdul Raouf Khan, Megat F. Zuhairi and Mesith Chaimanee
Symmetry 2025, 17(1), 61; https://doi.org/10.3390/sym17010061 - 1 Jan 2025
Viewed by 912
Abstract
A typical Wireless Sensor Network (WSN) defines the usage of static sensors; however, the growing focus on smart cities has led to a rise in the adoption of mobile sensors to meet the varied demands of Internet of Things (IoT) applications. This results [...] Read more.
A typical Wireless Sensor Network (WSN) defines the usage of static sensors; however, the growing focus on smart cities has led to a rise in the adoption of mobile sensors to meet the varied demands of Internet of Things (IoT) applications. This results in significantly increasing dependencies towards secure storage and effective resource management. One way to address this issue is to harness the immutability property of the Ethereum blockchain. However, the existing challenges in IoT communication using blockchain are noted to eventually lead to symmetry issues in the network dynamics of Ethereum. The key issues related to this symmetry are scalability, resource disparities, and centralization risk, which offer sub-optimal opportunities for nodes to gain benefits, influence, or participate in the processes in the blockchain network. Therefore, this paper presents a novel blockchain-based computation model for optimizing resource utilization and offering secure data exchange during active communication among mobile sensors. An empirical method of trust computation was carried out to identify the degree of legitimacy of mobile sensor participation in the network. Finally, a novel cost model has been presented for cost estimation and to enhance the users’ quality of experience. With the aid of a simulation study, the benchmarked outcome of the study exhibited that the proposed scheme achieved a 40% reduced validation time, 28% reduced latency, 23% improved throughput, 38% minimized overhead, 27% reduced cost, and 38% reduced processing time, in contrast to the existing blockchain-based solutions reported in the literature. This outcome prominently exhibits fairer symmetry in the network dynamics of Ethereum presented in the proposed system. Full article
(This article belongs to the Special Issue Symmetry in Cyber Security and Privacy)
Show Figures

Figure 1

Figure 1
<p>Proposed conceptual model of securing communication in sensory applications.</p>
Full article ">Figure 2
<p>Communication system among the actors.</p>
Full article ">Figure 3
<p>Enrollment and validation of sensor.</p>
Full article ">Figure 3 Cont.
<p>Enrollment and validation of sensor.</p>
Full article ">Figure 4
<p>Flowchart of adopted validation.</p>
Full article ">Figure 5
<p>High-level diagram of the proposed framework.</p>
Full article ">Figure 6
<p>Comparative assessment of validation time [<a href="#B28-symmetry-17-00061" class="html-bibr">28</a>,<a href="#B29-symmetry-17-00061" class="html-bibr">29</a>,<a href="#B37-symmetry-17-00061" class="html-bibr">37</a>,<a href="#B38-symmetry-17-00061" class="html-bibr">38</a>,<a href="#B39-symmetry-17-00061" class="html-bibr">39</a>,<a href="#B43-symmetry-17-00061" class="html-bibr">43</a>,<a href="#B44-symmetry-17-00061" class="html-bibr">44</a>,<a href="#B45-symmetry-17-00061" class="html-bibr">45</a>,<a href="#B46-symmetry-17-00061" class="html-bibr">46</a>,<a href="#B47-symmetry-17-00061" class="html-bibr">47</a>,<a href="#B48-symmetry-17-00061" class="html-bibr">48</a>,<a href="#B49-symmetry-17-00061" class="html-bibr">49</a>].</p>
Full article ">Figure 7
<p>Comparative assessment of latency [<a href="#B28-symmetry-17-00061" class="html-bibr">28</a>,<a href="#B29-symmetry-17-00061" class="html-bibr">29</a>,<a href="#B37-symmetry-17-00061" class="html-bibr">37</a>,<a href="#B38-symmetry-17-00061" class="html-bibr">38</a>,<a href="#B39-symmetry-17-00061" class="html-bibr">39</a>,<a href="#B43-symmetry-17-00061" class="html-bibr">43</a>,<a href="#B44-symmetry-17-00061" class="html-bibr">44</a>,<a href="#B45-symmetry-17-00061" class="html-bibr">45</a>,<a href="#B46-symmetry-17-00061" class="html-bibr">46</a>,<a href="#B47-symmetry-17-00061" class="html-bibr">47</a>,<a href="#B48-symmetry-17-00061" class="html-bibr">48</a>,<a href="#B49-symmetry-17-00061" class="html-bibr">49</a>].</p>
Full article ">Figure 8
<p>Comparative assessment of throughput [<a href="#B28-symmetry-17-00061" class="html-bibr">28</a>,<a href="#B29-symmetry-17-00061" class="html-bibr">29</a>,<a href="#B37-symmetry-17-00061" class="html-bibr">37</a>,<a href="#B38-symmetry-17-00061" class="html-bibr">38</a>,<a href="#B39-symmetry-17-00061" class="html-bibr">39</a>,<a href="#B43-symmetry-17-00061" class="html-bibr">43</a>,<a href="#B44-symmetry-17-00061" class="html-bibr">44</a>,<a href="#B45-symmetry-17-00061" class="html-bibr">45</a>,<a href="#B46-symmetry-17-00061" class="html-bibr">46</a>,<a href="#B47-symmetry-17-00061" class="html-bibr">47</a>,<a href="#B48-symmetry-17-00061" class="html-bibr">48</a>,<a href="#B49-symmetry-17-00061" class="html-bibr">49</a>].</p>
Full article ">Figure 9
<p>Comparative assessment of overhead [<a href="#B28-symmetry-17-00061" class="html-bibr">28</a>,<a href="#B29-symmetry-17-00061" class="html-bibr">29</a>,<a href="#B37-symmetry-17-00061" class="html-bibr">37</a>,<a href="#B38-symmetry-17-00061" class="html-bibr">38</a>,<a href="#B39-symmetry-17-00061" class="html-bibr">39</a>,<a href="#B43-symmetry-17-00061" class="html-bibr">43</a>,<a href="#B44-symmetry-17-00061" class="html-bibr">44</a>,<a href="#B45-symmetry-17-00061" class="html-bibr">45</a>,<a href="#B46-symmetry-17-00061" class="html-bibr">46</a>,<a href="#B47-symmetry-17-00061" class="html-bibr">47</a>,<a href="#B48-symmetry-17-00061" class="html-bibr">48</a>,<a href="#B49-symmetry-17-00061" class="html-bibr">49</a>].</p>
Full article ">Figure 10
<p>Comparative assessment of cost [<a href="#B28-symmetry-17-00061" class="html-bibr">28</a>,<a href="#B29-symmetry-17-00061" class="html-bibr">29</a>,<a href="#B37-symmetry-17-00061" class="html-bibr">37</a>,<a href="#B38-symmetry-17-00061" class="html-bibr">38</a>,<a href="#B39-symmetry-17-00061" class="html-bibr">39</a>,<a href="#B43-symmetry-17-00061" class="html-bibr">43</a>,<a href="#B44-symmetry-17-00061" class="html-bibr">44</a>,<a href="#B45-symmetry-17-00061" class="html-bibr">45</a>,<a href="#B46-symmetry-17-00061" class="html-bibr">46</a>,<a href="#B47-symmetry-17-00061" class="html-bibr">47</a>,<a href="#B48-symmetry-17-00061" class="html-bibr">48</a>,<a href="#B49-symmetry-17-00061" class="html-bibr">49</a>].</p>
Full article ">Figure 11
<p>Comparative assessment of processing time [<a href="#B28-symmetry-17-00061" class="html-bibr">28</a>,<a href="#B29-symmetry-17-00061" class="html-bibr">29</a>,<a href="#B37-symmetry-17-00061" class="html-bibr">37</a>,<a href="#B38-symmetry-17-00061" class="html-bibr">38</a>,<a href="#B39-symmetry-17-00061" class="html-bibr">39</a>,<a href="#B43-symmetry-17-00061" class="html-bibr">43</a>,<a href="#B44-symmetry-17-00061" class="html-bibr">44</a>,<a href="#B45-symmetry-17-00061" class="html-bibr">45</a>,<a href="#B46-symmetry-17-00061" class="html-bibr">46</a>,<a href="#B47-symmetry-17-00061" class="html-bibr">47</a>,<a href="#B48-symmetry-17-00061" class="html-bibr">48</a>,<a href="#B49-symmetry-17-00061" class="html-bibr">49</a>].</p>
Full article ">
13 pages, 2554 KiB  
Article
Laser Desorption-Ion Mobility Spectrometry of Explosives for Forensic and Security Applications
by Giorgio Felizzato, Martin Sabo, Matej Petrìk and Francesco Saverio Romolo
Molecules 2025, 30(1), 138; https://doi.org/10.3390/molecules30010138 - 1 Jan 2025
Viewed by 609
Abstract
Background: The detection of explosives in crime scene investigations is critical for forensic science. This study explores the application of laser desorption (LD) ion mobility spectrometry (IMS) as a novel method for this purpose utilising a new IMS prototype developed by MaSaTECH. Methods: [...] Read more.
Background: The detection of explosives in crime scene investigations is critical for forensic science. This study explores the application of laser desorption (LD) ion mobility spectrometry (IMS) as a novel method for this purpose utilising a new IMS prototype developed by MaSaTECH. Methods: The LD sampling technique employs a laser diode module to vaporise explosive traces on surfaces, allowing immediate analysis by IMS without sample preparation. Chemometric approaches, including multivariate data analysis, were utilised for data processing and interpretation, including pre-processing of raw IMS plasmagrams and various pattern recognition techniques, such as linear discriminant analysis (LDA) and support vector machines (SVMs). Results: The IMS prototype was validated through experiments with pure explosives (TNT, RDX, PETN) and explosive products (SEMTEX 1A, C4) on different materials. The study found that the pre-processing method significantly impacts classification accuracy, with the PCA-LDA model demonstrating the best performance for real-world applications. Conclusions: The LD-IMS prototype, coupled with effective chemometric techniques, presents a promising methodology for the detection of explosives in forensic investigations, enhancing the reliability of field applications. Full article
(This article belongs to the Special Issue Analytical Chemistry in Forensic Science)
Show Figures

Figure 1

Figure 1
<p>The IMS MaSaTECH prototype without the protective case (<b>on the left</b>) and the LD-IMS prototype in the protective case (<b>on the right</b>).</p>
Full article ">Figure 2
<p>Molecular structures of (<b>a</b>) TNT, (<b>b</b>) PETN, (<b>c</b>) RDX, (<b>d</b>) 2,6 DNT, (<b>e</b>) 2,4 DNT, and (<b>f</b>) 3,4 DNT.</p>
Full article ">Figure 3
<p>IMS plasmagram obtained by analysing RDX, PETN, 2,6-DNT, and 2,4-DNT.</p>
Full article ">Figure 4
<p>Chemometrics workflow for the IMS data.</p>
Full article ">Figure 5
<p>Score plot coloured by class using the autoscaling pre-processed plasmagrams.</p>
Full article ">Figure 6
<p>Score plot of grouped classes, coloured by class, using the autoscaling pre-processed plasmagrams.</p>
Full article ">Figure 7
<p>D plot coloured by class for the PCA-LDA.</p>
Full article ">Figure 8
<p>D plot of grouped classes, coloured by grouped class, for the PCA-LDA.</p>
Full article ">
19 pages, 10948 KiB  
Article
Detecting Plant Diseases Using Machine Learning Models
by Nazar Kohut, Oleh Basystiuk, Nataliya Shakhovska and Nataliia Melnykova
Sustainability 2025, 17(1), 132; https://doi.org/10.3390/su17010132 - 27 Dec 2024
Viewed by 843
Abstract
Sustainable agriculture is pivotal to global food security and economic stability, with plant disease detection being a key challenge to ensuring healthy crop production. The early and accurate identification of plant diseases can significantly enhance agricultural practices, minimize crop losses, and reduce the [...] Read more.
Sustainable agriculture is pivotal to global food security and economic stability, with plant disease detection being a key challenge to ensuring healthy crop production. The early and accurate identification of plant diseases can significantly enhance agricultural practices, minimize crop losses, and reduce the environmental impacts. This paper presents an innovative approach to sustainable development by leveraging machine learning models to detect plant diseases, focusing on tomato crops—a vital and globally significant agricultural product. Advanced object detection models including YOLOv8 (minor and nano variants), Roboflow 3.0 (Fast), EfficientDetV2 (with EfficientNetB0 backbone), and Faster R-CNN (with ResNet50 backbone) were evaluated for their precision, efficiency, and suitability for mobile and field applications. YOLOv8 nano emerged as the optimal choice, offering a mean average precision (MAP) of 98.6% with minimal computational requirements, facilitating its integration into mobile applications for real-time support to farmers. This research underscores the potential of machine learning in advancing sustainable agriculture and highlights future opportunities to integrate these models with drone technology, Internet of Things (IoT)-based irrigation, and disease management systems. Expanding datasets and exploring alternative models could enhance this technology’s efficacy and adaptability to diverse agricultural contexts. Full article
Show Figures

Figure 1

Figure 1
<p>Examples of tomato fruit abnormalities.</p>
Full article ">Figure 2
<p>Examples of unusual object detection labels in the Tomato-Village dataset.</p>
Full article ">Figure 3
<p>Examples of images gathered in the laboratory and natural environment.</p>
Full article ">Figure 4
<p>Class distribution.</p>
Full article ">Figure 5
<p>Dataset visualization: (<b>a</b>) Histogram of object count; (<b>b</b>) Annotation heatmap.</p>
Full article ">Figure 6
<p>Examples of images from fields but with artificially created backgrounds.</p>
Full article ">Figure 7
<p>Examples of images that came from books and websites.</p>
Full article ">Figure 8
<p>Feature pyramid network architecture.</p>
Full article ">Figure 9
<p>Illustration of the framework. (<b>a</b>) FPN backbone, (<b>b</b>) bottom-up path augmentation, (<b>c</b>) adaptive feature pooling, (<b>d</b>) box branch, and (<b>e</b>) fully-connected fusion.</p>
Full article ">Figure 10
<p>The general flow of predicting tomato diseases is shown in the photo on the mobile.</p>
Full article ">Figure 11
<p>Detailed application process flow.</p>
Full article ">Figure 12
<p>Sample of learning curves for YOLOv8 nano trained throughout 80 epochs.</p>
Full article ">Figure 13
<p>Learning curves for YOLOv8 small trained throughout 80 epochs.</p>
Full article ">Figure 14
<p>Detailed application process flow.</p>
Full article ">Figure 15
<p>Detailed application pipeline.</p>
Full article ">Figure 16
<p>Simplified YOLOv8 training pipeline.</p>
Full article ">Figure 17
<p>Model performance regarding MAP50 and inference time on the Tesla T4 GPU.</p>
Full article ">Figure 18
<p>Confusion matrices were calculated for the YOLOv8 nano model as: (<b>a</b>) YOLOv8 nano model on the train dataset; (<b>b</b>) YOLOv8 nano model on the test dataset.</p>
Full article ">Figure 19
<p>Confusion matrices were calculated for the YOLOv8 nano model on the validation dataset.</p>
Full article ">Figure 20
<p>Results of disease detection using the trained YOLOv8 nano model: (<b>a</b>) leaf photographs in field conditions and (<b>b</b>) labeled image from the created dataset.</p>
Full article ">Figure 21
<p>Results of disease detection using the trained YOLOv8 nano model: (<b>a</b>) leaf photographs in field conditions and (<b>b</b>) labeled image from the created dataset.</p>
Full article ">Figure 22
<p>Results of disease detection using the trained YOLOv8 nano model: (<b>a</b>) leaf photographs in laboratory conditions and (<b>b</b>) labeled image from the created dataset.</p>
Full article ">
25 pages, 5211 KiB  
Article
A Novel Grammar-Based Approach for Patients’ Symptom and Disease Diagnosis Information Dissemination to Maintain Confidentiality and Information Integrity
by Sanjay Nag, Nabanita Basu, Payal Bose and Samir Kumar Bandyopadhyay
Bioengineering 2024, 11(12), 1265; https://doi.org/10.3390/bioengineering11121265 - 13 Dec 2024
Viewed by 798
Abstract
Disease prediction using computer-based methods is now an established area of research. The importance of technological intervention is necessary for the better management of disease, as well as to optimize use of limited resources. Various AI-based methods for disease prediction have been documented [...] Read more.
Disease prediction using computer-based methods is now an established area of research. The importance of technological intervention is necessary for the better management of disease, as well as to optimize use of limited resources. Various AI-based methods for disease prediction have been documented in the literature. Validated AI-based systems support diagnoses and decision making by doctors/medical practitioners. The resource-efficient dissemination of the symptoms identified and the diagnoses undertaken is the requirement of the present-day scenario to support paperless, yet seamless, information sharing. The representation of symptoms using grammar provides a novel way for the resource-efficient encoding of disease diagnoses. Initially, symptoms are represented as strings, and, in terms of grammar, this is called a sentence. Moreover, the conversion of the generated string containing the symptoms and the diagnostic outcome to a QR code post encryption makes it portable. The code can be stored in a mobile application, in a secure manner, and can be scanned wherever required, universally. The patient can carry the medical condition and the diagnosis in the form of the QR code for medical consultations. This research work presents a case study based on two diseases, influenza and coronavirus, to highlight the proposed methodology. Both diseases have some common and overlapping symptoms. The proposed system can be implemented for any kind of disease detection, including clinical and diagnostic imaging. Full article
(This article belongs to the Section Biosignal Processing)
Show Figures

Figure 1

Figure 1
<p>Symptoms of coronavirus infection and influenza for mild to critical cases of the diseases.</p>
Full article ">Figure 2
<p>Overlay visualization map of the literature reviewed, showing the association of keywords used and the timeline of the reviewed works.</p>
Full article ">Figure 3
<p>Overlay visualization map of the literature reviewed, showing the authors and the citations of the reviewed works [<a href="#B17-bioengineering-11-01265" class="html-bibr">17</a>,<a href="#B18-bioengineering-11-01265" class="html-bibr">18</a>,<a href="#B19-bioengineering-11-01265" class="html-bibr">19</a>,<a href="#B20-bioengineering-11-01265" class="html-bibr">20</a>,<a href="#B21-bioengineering-11-01265" class="html-bibr">21</a>,<a href="#B22-bioengineering-11-01265" class="html-bibr">22</a>,<a href="#B23-bioengineering-11-01265" class="html-bibr">23</a>,<a href="#B24-bioengineering-11-01265" class="html-bibr">24</a>,<a href="#B25-bioengineering-11-01265" class="html-bibr">25</a>,<a href="#B26-bioengineering-11-01265" class="html-bibr">26</a>,<a href="#B27-bioengineering-11-01265" class="html-bibr">27</a>,<a href="#B28-bioengineering-11-01265" class="html-bibr">28</a>,<a href="#B29-bioengineering-11-01265" class="html-bibr">29</a>,<a href="#B30-bioengineering-11-01265" class="html-bibr">30</a>,<a href="#B31-bioengineering-11-01265" class="html-bibr">31</a>,<a href="#B32-bioengineering-11-01265" class="html-bibr">32</a>,<a href="#B33-bioengineering-11-01265" class="html-bibr">33</a>,<a href="#B34-bioengineering-11-01265" class="html-bibr">34</a>,<a href="#B35-bioengineering-11-01265" class="html-bibr">35</a>,<a href="#B36-bioengineering-11-01265" class="html-bibr">36</a>,<a href="#B37-bioengineering-11-01265" class="html-bibr">37</a>,<a href="#B38-bioengineering-11-01265" class="html-bibr">38</a>,<a href="#B39-bioengineering-11-01265" class="html-bibr">39</a>,<a href="#B40-bioengineering-11-01265" class="html-bibr">40</a>,<a href="#B41-bioengineering-11-01265" class="html-bibr">41</a>,<a href="#B42-bioengineering-11-01265" class="html-bibr">42</a>,<a href="#B43-bioengineering-11-01265" class="html-bibr">43</a>,<a href="#B44-bioengineering-11-01265" class="html-bibr">44</a>,<a href="#B45-bioengineering-11-01265" class="html-bibr">45</a>,<a href="#B46-bioengineering-11-01265" class="html-bibr">46</a>,<a href="#B47-bioengineering-11-01265" class="html-bibr">47</a>,<a href="#B48-bioengineering-11-01265" class="html-bibr">48</a>,<a href="#B49-bioengineering-11-01265" class="html-bibr">49</a>,<a href="#B50-bioengineering-11-01265" class="html-bibr">50</a>,<a href="#B51-bioengineering-11-01265" class="html-bibr">51</a>,<a href="#B52-bioengineering-11-01265" class="html-bibr">52</a>,<a href="#B53-bioengineering-11-01265" class="html-bibr">53</a>,<a href="#B54-bioengineering-11-01265" class="html-bibr">54</a>,<a href="#B55-bioengineering-11-01265" class="html-bibr">55</a>,<a href="#B56-bioengineering-11-01265" class="html-bibr">56</a>,<a href="#B57-bioengineering-11-01265" class="html-bibr">57</a>,<a href="#B58-bioengineering-11-01265" class="html-bibr">58</a>,<a href="#B59-bioengineering-11-01265" class="html-bibr">59</a>,<a href="#B60-bioengineering-11-01265" class="html-bibr">60</a>,<a href="#B61-bioengineering-11-01265" class="html-bibr">61</a>,<a href="#B62-bioengineering-11-01265" class="html-bibr">62</a>,<a href="#B63-bioengineering-11-01265" class="html-bibr">63</a>].</p>
Full article ">Figure 4
<p>The overlay diagram, showing the authors and the association map of the authors [<a href="#B17-bioengineering-11-01265" class="html-bibr">17</a>,<a href="#B18-bioengineering-11-01265" class="html-bibr">18</a>,<a href="#B19-bioengineering-11-01265" class="html-bibr">19</a>,<a href="#B20-bioengineering-11-01265" class="html-bibr">20</a>,<a href="#B21-bioengineering-11-01265" class="html-bibr">21</a>,<a href="#B22-bioengineering-11-01265" class="html-bibr">22</a>,<a href="#B23-bioengineering-11-01265" class="html-bibr">23</a>,<a href="#B24-bioengineering-11-01265" class="html-bibr">24</a>,<a href="#B25-bioengineering-11-01265" class="html-bibr">25</a>,<a href="#B26-bioengineering-11-01265" class="html-bibr">26</a>,<a href="#B27-bioengineering-11-01265" class="html-bibr">27</a>,<a href="#B28-bioengineering-11-01265" class="html-bibr">28</a>,<a href="#B29-bioengineering-11-01265" class="html-bibr">29</a>,<a href="#B30-bioengineering-11-01265" class="html-bibr">30</a>,<a href="#B31-bioengineering-11-01265" class="html-bibr">31</a>,<a href="#B32-bioengineering-11-01265" class="html-bibr">32</a>,<a href="#B33-bioengineering-11-01265" class="html-bibr">33</a>,<a href="#B34-bioengineering-11-01265" class="html-bibr">34</a>,<a href="#B35-bioengineering-11-01265" class="html-bibr">35</a>,<a href="#B36-bioengineering-11-01265" class="html-bibr">36</a>,<a href="#B37-bioengineering-11-01265" class="html-bibr">37</a>,<a href="#B38-bioengineering-11-01265" class="html-bibr">38</a>,<a href="#B39-bioengineering-11-01265" class="html-bibr">39</a>,<a href="#B40-bioengineering-11-01265" class="html-bibr">40</a>,<a href="#B41-bioengineering-11-01265" class="html-bibr">41</a>,<a href="#B42-bioengineering-11-01265" class="html-bibr">42</a>,<a href="#B43-bioengineering-11-01265" class="html-bibr">43</a>,<a href="#B44-bioengineering-11-01265" class="html-bibr">44</a>,<a href="#B45-bioengineering-11-01265" class="html-bibr">45</a>,<a href="#B46-bioengineering-11-01265" class="html-bibr">46</a>,<a href="#B47-bioengineering-11-01265" class="html-bibr">47</a>,<a href="#B48-bioengineering-11-01265" class="html-bibr">48</a>,<a href="#B49-bioengineering-11-01265" class="html-bibr">49</a>,<a href="#B50-bioengineering-11-01265" class="html-bibr">50</a>,<a href="#B51-bioengineering-11-01265" class="html-bibr">51</a>,<a href="#B52-bioengineering-11-01265" class="html-bibr">52</a>,<a href="#B53-bioengineering-11-01265" class="html-bibr">53</a>,<a href="#B54-bioengineering-11-01265" class="html-bibr">54</a>,<a href="#B55-bioengineering-11-01265" class="html-bibr">55</a>,<a href="#B56-bioengineering-11-01265" class="html-bibr">56</a>,<a href="#B57-bioengineering-11-01265" class="html-bibr">57</a>,<a href="#B58-bioengineering-11-01265" class="html-bibr">58</a>,<a href="#B59-bioengineering-11-01265" class="html-bibr">59</a>,<a href="#B60-bioengineering-11-01265" class="html-bibr">60</a>,<a href="#B61-bioengineering-11-01265" class="html-bibr">61</a>,<a href="#B62-bioengineering-11-01265" class="html-bibr">62</a>,<a href="#B63-bioengineering-11-01265" class="html-bibr">63</a>].</p>
Full article ">Figure 5
<p>Proposed system of medical infrastructure that involves disease prediction using encoded grammar rules and QR codes for transmission.</p>
Full article ">Figure 6
<p>Example of QR code representation for influenza and COVID-19 variations: (<b>A</b>) critical COVID-19 (string—fchbtrdmlv); (<b>B</b>) critical influenza (string—fchbtr); (<b>C</b>) moderate COVID-19 (string—fchtdlv); (<b>D</b>) moderate influenza (string—fchbt); (<b>E</b>) Severe COVID-19 (string—fchbtdlmv); (<b>F</b>) severe influenza (fchtr).</p>
Full article ">Figure 7
<p>Activity diagram of the proposed grammar. The letters (a, b, c, d, etc.) provided as link labels are unrelated to the terminals of the grammar proposed and have been used to facilitate the attribute-based representation of this activity diagram.</p>
Full article ">Figure 8
<p>Activity diagram representing the extension of the proposed grammar for different diseases, incorporating the relevant test results, AI support, and patient’s medical history. The nosological rule that doctors have for using all the relevant information for diagnoses can be encoded as grammar and shared seamlessly among authorized personnel.</p>
Full article ">
46 pages, 4241 KiB  
Review
Artificial Intelligence-Enabled Metaverse for Sustainable Smart Cities: Technologies, Applications, Challenges, and Future Directions
by Zita Lifelo, Jianguo Ding, Huansheng Ning, Qurat-Ul-Ain and Sahraoui Dhelim
Electronics 2024, 13(24), 4874; https://doi.org/10.3390/electronics13244874 - 10 Dec 2024
Cited by 3 | Viewed by 2187
Abstract
Rapid urbanisation has intensified the need for sustainable solutions to address challenges in urban infrastructure, climate change, and resource constraints. This study reveals that Artificial Intelligence (AI)-enabled metaverse offers transformative potential for developing sustainable smart cities. AI techniques, such as machine learning, deep [...] Read more.
Rapid urbanisation has intensified the need for sustainable solutions to address challenges in urban infrastructure, climate change, and resource constraints. This study reveals that Artificial Intelligence (AI)-enabled metaverse offers transformative potential for developing sustainable smart cities. AI techniques, such as machine learning, deep learning, generative AI (GAI), and large language models (LLMs), enhance the metaverse’s capabilities in data analysis, urban decision making, and personalised user experiences. The study further examines how these advanced AI models facilitate key metaverse technologies such as big data analytics, natural language processing (NLP), computer vision, digital twins, Internet of Things (IoT), Edge AI, and 5G/6G networks. Applications across various smart city domains—environment, mobility, energy, health, governance, and economy, and real-world use cases of virtual cities like Singapore, Seoul, and Lisbon are presented, demonstrating AI’s effectiveness in the metaverse for smart cities. However, AI-enabled metaverse in smart cities presents challenges related to data acquisition and management, privacy, security, interoperability, scalability, and ethical considerations. These challenges’ societal and technological implications are discussed, highlighting the need for robust data governance frameworks and AI ethics guidelines. Future directions emphasise advancing AI model architectures and algorithms, enhancing privacy and security measures, promoting ethical AI practices, addressing performance measures, and fostering stakeholder collaboration. By addressing these challenges, the full potential of AI-enabled metaverse can be harnessed to enhance sustainability, adaptability, and livability in smart cities. Full article
Show Figures

Figure 1

Figure 1
<p>The methodology flowchart following the PRISMA guidelines.</p>
Full article ">Figure 2
<p>Generic metaverse architecture for a smart city showing the digital, human, and physical infrastructure and the integration of the generic smart city architecture indicated in red bold square brackets.</p>
Full article ">Figure 3
<p>Role of AI, ML, and DL techniques in the metaverse and smart city applications.</p>
Full article ">Figure 4
<p>Unimodal and multimodal GAI models for information creation in the metaverse [<a href="#B72-electronics-13-04874" class="html-bibr">72</a>].</p>
Full article ">Figure 5
<p>AI-enabled technologies in a smart city metaverse environment.</p>
Full article ">Figure 6
<p>Generated image of a futuristic smart city using DALL-E 2.</p>
Full article ">Figure 7
<p>A blockchain-empowered spatial crowdsourcing service in the metaverse while preserving user location privacy [<a href="#B185-electronics-13-04874" class="html-bibr">185</a>].</p>
Full article ">Figure 8
<p>Real-time virtual/physical synchronisation between the intelligent edge network and the metaverse [<a href="#B37-electronics-13-04874" class="html-bibr">37</a>].</p>
Full article ">Figure 9
<p>Summarisation of applications for sustainable smart city in the metaverse.</p>
Full article ">Figure 10
<p>Generic diagram of a distributed AI system for various application areas of a smart city.</p>
Full article ">
Back to TopTop