Emerging Trends in Intelligent Connectivity and Digital Transformation

A special issue of Computers (ISSN 2073-431X). This special issue belongs to the section "Internet of Things (IoT) and Industrial IoT".

Deadline for manuscript submissions: 28 February 2026 | Viewed by 5740

Special Issue Editor

Special Issue Information

Dear Colleagues,

The digital landscape is rapidly evolving due to innovations in the Internet of Things (IoT), artificial intelligence (AI), advanced networking, and next-generation applications. These developments are reshaping industries, user experiences, and technological ecosystems. This Special Issue seeks to provide a platform for researchers and practitioners to present original contributions, reviews, and case studies on the cutting-edge technologies that are driving intelligent connectivity, automation, and digital transformation.

We welcome submissions from a wide range of disciplines, including computer science, engineering, data science, and human-centered technologies. Topics may address theoretical foundations, applied research, cross-domain integration, simulations, and real-world deployments.

Key areas of interest include, but are not limited to, the following:

  • Internet of Things (IoT) and Industrial IoT (IIoT);
  • AI and machine learning for intelligent networks;
  • Edge, fog, and cloud computing;
  • 5G/6G connectivity and advanced communication protocols;
  • Blockchain and distributed systems in connected environments;
  • Gamification and human-centered computing in networked applications;
  • Cybersecurity, privacy, and trust in digital ecosystems;
  • Emerging technologies in business management;
  • Interoperability, scalability, and energy-efficient architectures;
  • Digital transformation and AI-driven innovation across industries.

Dr. Hamed Taherdoost
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 250 words) can be sent to the Editorial Office for assessment.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Computers is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • intelligent connectivity
  • Internet of Things (IoT)
  • wireless communication (5G/6G)
  • digital transformation
  • Artificial Intelligence (AI)

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

30 pages, 2206 KB  
Article
Digital Tech Integration in Industrial Engineer Training via Affordable Academic Tools
by Lidia M. Belmonte, Eva Segura, José L. Gómez-Sirvent, Francisco López de la Rosa, Javier de las Morenas, Antonio Fernández-Caballero and Rafael Morales
Computers 2025, 14(12), 547; https://doi.org/10.3390/computers14120547 - 11 Dec 2025
Abstract
The rapid advancement of Industry 4.0 and digital transformation is significantly impacting various sectors. Enabling digital technologies, such as big data, machine learning, and the Internet of Things, is becoming increasingly prevalent in industry. However, engineering curricula often fail to keep pace with [...] Read more.
The rapid advancement of Industry 4.0 and digital transformation is significantly impacting various sectors. Enabling digital technologies, such as big data, machine learning, and the Internet of Things, is becoming increasingly prevalent in industry. However, engineering curricula often fail to keep pace with these swift changes. This study, grounded in Kolb’s experiential learning theory, investigates the integration of enabling digital technologies into final academic projects for industrial engineering students to enhance their competencies through practical experience with affordable technologies. It presents a case study on the design of access control systems using Android, NFC, and Arduino. To demonstrate the potential of this approach, two projects are highlighted: one implementing an integrated parking access control system with NFC payment, and the other focusing on appointment management for access to services. A total of 50 industrial engineering students evaluated both projects, showing a high level of interest and a desire for similar future implementations. The findings indicate that integrating Industry 4.0 technologies into final academic projects effectively bridges the gap between industry requirements and engineering education, enhancing students’ technical skills through experiential learning. Full article
Show Figures

Figure 1

39 pages, 6955 KB  
Article
Architecture for Managing Autonomous Virtual Organizations in the Industry 4.0 Context
by Cindy Pamela López, Marco Santórum and Jose Aguilar
Computers 2025, 14(12), 519; https://doi.org/10.3390/computers14120519 - 28 Nov 2025
Viewed by 271
Abstract
A Virtual Organization (VO) unites companies or independent individuals to achieve a shared, short-term objective by leveraging information technologies for communication and coordination in personalized product creation. Despite extensive research, existing VO management architectures lack alignment with Industry 4.0 standards, do not incorporate [...] Read more.
A Virtual Organization (VO) unites companies or independent individuals to achieve a shared, short-term objective by leveraging information technologies for communication and coordination in personalized product creation. Despite extensive research, existing VO management architectures lack alignment with Industry 4.0 standards, do not incorporate intelligent requirement-gathering mechanisms, and are not based on the RAMI 4.0 framework. These limitations hinder support for Autonomous Virtual Organizations (AVOs) in evaluation, risk management, and continuity, often excluding small and medium-sized enterprises (SMEs) during the partner selection process. This study proposes a comprehensive architecture for AVO management, grounded in ACODAT (Autonomous Cycle of Data Analysis Tasks) and RAMI 4.0 principles. The methodology includes a literature review, an architectural design, and a detailed specification of the ACODAT for the digital supply chain design. A prototype was developed and applied in a case study involving a virtual organization within an editorial consortium. Evaluation addressed core service performance, scalability of the batch selection algorithm, resource-use efficiency, and accessibility/SEO compliance. Benchmarking demonstrated that the prototype met or exceeded thresholds for scalability, efficiency, and accessibility, with minor performance deviations attributed to the testing environment. The results highlight significant time savings and improved automation in requirement identification, partner selection, and supply chain configuration, underscoring the architecture’s effectiveness and inclusivity. Full article
Show Figures

Figure 1

Review

Jump to: Research

76 pages, 904 KB  
Review
Theoretical Bases of Methods of Counteraction to Modern Forms of Information Warfare
by Akhat Bakirov and Ibragim Suleimenov
Computers 2025, 14(10), 410; https://doi.org/10.3390/computers14100410 - 26 Sep 2025
Viewed by 5192
Abstract
This review is devoted to a comprehensive analysis of modern forms of information warfare in the context of digitalization and global interconnectedness. The work considers fundamental theoretical foundations—cognitive distortions, mass communication models, network theories and concepts of cultural code. The key tools of [...] Read more.
This review is devoted to a comprehensive analysis of modern forms of information warfare in the context of digitalization and global interconnectedness. The work considers fundamental theoretical foundations—cognitive distortions, mass communication models, network theories and concepts of cultural code. The key tools of information influence are described in detail, including disinformation, the use of botnets, deepfakes, memetic strategies and manipulations in the media space. Particular attention is paid to methods of identifying and neutralizing information threats using artificial intelligence and digital signal processing, including partial digital convolutions, Fourier–Galois transforms, residue number systems and calculations in finite algebraic structures. The ethical and legal aspects of countering information attacks are analyzed, and geopolitical examples are given, demonstrating the peculiarities of applying various strategies. The review is based on a systematic analysis of 592 publications selected from the international databases Scopus, Web of Science and Google Scholar, covering research from fundamental works to modern publications of recent years (2015–2025). It is also based on regulatory legal acts, which ensures a high degree of relevance and representativeness. The results of the review can be used in the development of technologies for monitoring, detecting and filtering information attacks, as well as in the formation of national cybersecurity strategies. Full article
Show Figures

Figure 1

Back to TopTop