Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (102)

Search Parameters:
Keywords = Amazon Web Services

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
22 pages, 597 KB  
Article
Scaling Computer Vision: A Comparative Analysis of Cloud Infrastructures for AI-Based Image Processing and Classification Applications
by Haojie Zheng, Carlos Reaño, Alberto Castillo, Juan F. Ariño-Sales, Álvaro Igual and Carles Igual
Electronics 2026, 15(9), 1953; https://doi.org/10.3390/electronics15091953 - 5 May 2026
Viewed by 299
Abstract
Artificial intelligence-driven computer vision has undergone rapid expansion in recent years, largely propelled by progress in deep learning techniques and the availability of extensive annotated datasets. Nevertheless, the large-scale adoption of such systems remains challenging for many organizations due to financial constraints and [...] Read more.
Artificial intelligence-driven computer vision has undergone rapid expansion in recent years, largely propelled by progress in deep learning techniques and the availability of extensive annotated datasets. Nevertheless, the large-scale adoption of such systems remains challenging for many organizations due to financial constraints and technological complexity. In this context, cloud computing has become an appealing alternative, as it offers elastic, on-demand resources under a pay-as-you-go model. Despite these advantages, the use of cloud platforms also introduces specific challenges for computer vision applications. One of the key open issues concerns the assessment of whether it is better to use classical Infrastructure (IaaS) or Containers (CaaS) to build applications. In this paper, we evaluated and compared these two models by using a real-world use case: an AI-based image processing and classification application. The best-performing model achieved speed-ups of up to 2.12× and reduced resource consumption and costs by up to 22% compared with the other evaluated alternatives. Full article
Show Figures

Figure 1

18 pages, 920 KB  
Article
A Controlled Comparative Evaluation of Infrastructure as Code Tools: Deployment Performance and Maintainability Across Terraform, Pulumi, and AWS CloudFormation
by Damir Regvart, Ivan Vlahović and Mislav Balković
Appl. Sci. 2026, 16(6), 2971; https://doi.org/10.3390/app16062971 - 19 Mar 2026
Viewed by 1350
Abstract
Infrastructure as Code (IaC) underpins automated cloud provisioning in modern DevOps environments; however, controlled comparative evaluations of leading IaC tools under identical conditions remain limited. This study presents a controlled comparative evaluation of Terraform, Pulumi, and AWS CloudFormation within a standardized Amazon Web [...] Read more.
Infrastructure as Code (IaC) underpins automated cloud provisioning in modern DevOps environments; however, controlled comparative evaluations of leading IaC tools under identical conditions remain limited. This study presents a controlled comparative evaluation of Terraform, Pulumi, and AWS CloudFormation within a standardized Amazon Web Services environment. An identical multi-tier architecture was implemented using each tool, and repeated deployment cycles were conducted to observe differences in provisioning duration, removal time, structural maintainability, and operational characteristics. Descriptive statistical analysis across 30 controlled repetitions indicates that Terraform and Pulumi achieve comparable deployment performance, whereas CloudFormation requires more than twice the average provisioning time under the conditions evaluated. Removal durations were similar across tools but remained longest for CloudFormation. Structural analysis reveals trade-offs between declarative modular design, programmatic flexibility, and native cloud integration. The study provides a controlled, comparative framework to support evidence-based selection of IaC tools in production-oriented cloud environments. Full article
Show Figures

Figure 1

23 pages, 937 KB  
Systematic Review
Barriers to Accessing Cervical Cancer Screening and Treatment in the Amazon Region—A Systematic Review
by Marcia Helena Ribeiro de Oliveira, Sandra Lopes Aparício, José Antônio Cordero da Silva, Domingos Aires Leitão Neto, Sofia B. Nunes and Guilhermina Rêgo
J. Clin. Med. 2026, 15(3), 1206; https://doi.org/10.3390/jcm15031206 - 3 Feb 2026
Cited by 1 | Viewed by 982
Abstract
Background/Objectives: Unequal access to cervical cancer screening and treatment remains a significant contributor to preventable morbidity and mortality for women in the Amazon Basin, compounded by geographic, social and infrastructural barriers. Given the fragmented nature of the existing evidence, this systematic review [...] Read more.
Background/Objectives: Unequal access to cervical cancer screening and treatment remains a significant contributor to preventable morbidity and mortality for women in the Amazon Basin, compounded by geographic, social and infrastructural barriers. Given the fragmented nature of the existing evidence, this systematic review aims to synthesize available findings on barriers to cervical cancer screening and treatment for this region. The implications of these findings are examined to inform the development of actionable strategies to improve equity in prevention and care. Methods: This systematic review was conducted in accordance with PRISMA 2020. Searches were conducted on 7 November 2025, in PubMed/MEDLINE, Web of Science, and SciELO, utilizing combinations of MeSH terms, keywords, and free-text expressions. Studies were considered eligible if they addressed barriers to cervical cancer screening or treatment among women living in the Amazon Region. Two reviewers independently screened the studies and extracted the relevant data. The risk of bias was assessed using the JBI checklists, the Newcastle–Ottawa Scale, and the MMAT. A narrative synthesis summarized the results. Results: Of 57 studies identified, 11 were included. Organizational and health-system barriers were reported most frequently, including scheduling difficulties, long wait times, a shortage of professionals, and equipment unavailability. Socioeconomic barriers were most often related to younger age, low income, limited schooling, and care related expenses. Cultural factors were frequently linked to fear of the procedure and insufficient knowledge about cervical cancer. Geographic barriers included rural residence and travel difficulties. Conclusions: This systematic review indicates that disparities in cervical cancer screening in the Amazon region are primarily associated with organizational and health-system-related barriers, together with socioeconomic, cultural, and geographic factors. These findings highlight the need for equitable, multisectoral interventions to strengthen service organization, improve health literacy, and expand timely access to screening and treatment for underserved women. Full article
Show Figures

Figure 1

25 pages, 5781 KB  
Article
Optimization and Tradespace Analysis of a Classic Machine—A Street Clock Movement Study
by Pranav Manvi, Yifan Xu, David Moline, Cameron Turner and John Wagner
Machines 2026, 14(2), 136; https://doi.org/10.3390/machines14020136 - 24 Jan 2026
Viewed by 501
Abstract
Computer-based engineering design tools can quicken the cadence for machine design, which enables companies to compete better in the global marketplace. The application of nonlinear optimization and tradespace analysis methods allows the exploration of design variables within dynamic mechanisms. In this paper, the [...] Read more.
Computer-based engineering design tools can quicken the cadence for machine design, which enables companies to compete better in the global marketplace. The application of nonlinear optimization and tradespace analysis methods allows the exploration of design variables within dynamic mechanisms. In this paper, the design of a classical machine, the Seth Thomas pendulum street clock, which offered precision timekeeping and time display at the turn of the 20th century, will be investigated from a modern perspective. A mathematical model serves as the basis for the genetic algorithm optimization method to assess the system design in terms of accuracy, mass, quality factor, and bending stress. To validate the model, experimental data was collected on a 1906 Seth Thomas Model 04 movement. The engineering study findings indicate that the target accuracy, quality factor, and bending stress can be achieved with pendulum mass and gear thickness reductions of 1.4% and 50.3%, respectively. The tradespace exploration offers a visualization of the machine’s performance per design variable adjustments for greater insight into the original solution and subsequent recommended changes. Overall, this mechanical machine review enables an assessment of original design choices made over a century ago and provides an awareness of engineering’s progress during this period. Full article
(This article belongs to the Section Machine Design and Theory)
Show Figures

Figure 1

22 pages, 840 KB  
Article
A Comparative Evaluation of Snort and Suricata for Detecting Data Exfiltration Tunnels in Cloud Environments
by Mahmoud H. Qutqut, Ali Ahmed, Mustafa K. Taqi, Jordan Abimanyu, Erika Thea Ajes and Fatima Alhaj
J. Cybersecur. Priv. 2026, 6(1), 17; https://doi.org/10.3390/jcp6010017 - 8 Jan 2026
Cited by 2 | Viewed by 3341
Abstract
Data exfiltration poses a major cybersecurity challenge because it involves the unauthorized transfer of sensitive information. Intrusion Detection Systems (IDSs) are vital security controls in identifying such attacks; however, their effectiveness in cloud computing environments remains limited, particularly against covert channels such as [...] Read more.
Data exfiltration poses a major cybersecurity challenge because it involves the unauthorized transfer of sensitive information. Intrusion Detection Systems (IDSs) are vital security controls in identifying such attacks; however, their effectiveness in cloud computing environments remains limited, particularly against covert channels such as Internet Control Message Protocol (ICMP) and Domain Name System (DNS) tunneling. This study compares two widely used IDSs, Snort and Suricata, in a controlled cloud computing environment. The assessment focuses on their ability to detect data exfiltration techniques implemented via ICMP and DNS tunneling, using DNSCat2 and Iodine. We evaluate detection performance using standard classification metrics, including Recall, Precision, Accuracy, and F1-Score. Our experiments were conducted on Amazon Web Services (AWS) Elastic Compute Cloud (EC2) instances, where IDS instances monitored simulated exfiltration traffic generated by DNSCat2, Iodine, and Metasploit. Network traffic was mirrored via AWS Virtual Private Cloud (VPC) Traffic Mirroring, with the ELK Stack integrated for centralized logging and visual analysis. The findings indicate that Suricata outperformed Snort in detecting DNS-based exfiltration, underscoring the advantages of multi-threaded architectures for managing high-volume cloud traffic. For DNS tunneling, Suricata achieved 100% detection (recall) for both DNSCat2 and Iodine, whereas Snort achieved 85.7% and 66.7%, respectively. Neither IDS detected ICMP tunneling using Metasploit, with both recording 0% recall. It is worth noting that both IDSs failed to detect ICMP tunneling under default configurations, highlighting the limitations of signature-based detection in isolation. These results emphasize the need to combine signature-based and behavior-based analytics, supported by centralized logging frameworks, to strengthen cloud-based intrusion detection and enhance forensic visibility. Full article
(This article belongs to the Special Issue Cloud Security and Privacy)
Show Figures

Figure 1

24 pages, 4230 KB  
Article
Cloud-Based sEMG Segmentation for Muscle Fatigue Monitoring: A Wavelet–Quantile Approach with Computational Cost Assessment
by Aura Polo, Mario Callejas Cabarcas, Lácides Antonio Ripoll Solano, Carlos Robles-Algarín and Omar Rodríguez-Álvarez
Technologies 2026, 14(1), 16; https://doi.org/10.3390/technologies14010016 - 25 Dec 2025
Viewed by 1321
Abstract
This paper presents the development and cloud deployment of a system for the segmentation of electromyographic (EMG) signals oriented toward muscle fatigue monitoring in the biceps and triceps. A dataset of 30 subjects was used, resulting in 120 EMG and gyroscope files containing [...] Read more.
This paper presents the development and cloud deployment of a system for the segmentation of electromyographic (EMG) signals oriented toward muscle fatigue monitoring in the biceps and triceps. A dataset of 30 subjects was used, resulting in 120 EMG and gyroscope files containing between four and six strength exercise series each. After a quality assessment, approximately 80% of the signals (95 files) were classified as level 1 or 2 and considered suitable for segmentation and subsequent analysis. A near real-time segmentation algorithm was designed based on signal envelopes, sliding windows, and quantile thresholds, complemented with discrete wavelet transform (DWT) filtering. Using EMG alone, segmentation accuracy reached 83% for biceps and 54% for triceps; after incorporating DWT preprocessing, accuracy increased to 87.5% and 71%, respectively. By exploiting the gyroscope’s X-axis signal as a low-noise reference, the optimal configuration achieved an overall accuracy of 80%, with 83.3% for biceps and 76.2% for triceps. The prototype was deployed on Amazon Web Services (AWS) using EC2 instances and SQS queues, and its computational cost was evaluated across four server types. On a t2.micro instance, the maximum memory usage was approximately 219 MB with a dedicated CPU and a maximum processing time of 0.98 s per signal, demonstrating the feasibility of near real-time operation under conditions with limited resources. Full article
Show Figures

Figure 1

15 pages, 2861 KB  
Article
Sustainable Real-Time NLP with Serverless Parallel Processing on AWS
by Chaitanya Kumar Mankala and Ricardo J. Silva
Information 2025, 16(10), 903; https://doi.org/10.3390/info16100903 - 15 Oct 2025
Cited by 1 | Viewed by 2232
Abstract
This paper proposes a scalable serverless architecture for real-time natural language processing (NLP) on large datasets using Amazon Web Services (AWS). The framework integrates AWS Lambda, Step Functions, and S3 to enable fully parallel sentiment analysis with Transformer-based models such as DistilBERT, RoBERTa, [...] Read more.
This paper proposes a scalable serverless architecture for real-time natural language processing (NLP) on large datasets using Amazon Web Services (AWS). The framework integrates AWS Lambda, Step Functions, and S3 to enable fully parallel sentiment analysis with Transformer-based models such as DistilBERT, RoBERTa, and ClinicalBERT. By containerizing inference workloads and orchestrating parallel execution, the system eliminates the need for dedicated servers while dynamically scaling to workload demand. Experimental evaluation on the IMDb Reviews dataset demonstrates substantial efficiency gains: parallel execution achieved a 6.07× reduction in wall-clock duration, an 81.2% reduction in total computing time and energy consumption, and a 79.1% reduction in variable costs compared to sequential processing. These improvements directly translate into a smaller carbon footprint, highlighting the sustainability benefits of serverless architectures for AI workloads. The findings show that the proposed framework is model-independent and provides consistent advantages across diverse Transformer variants. This work illustrates how cloud-native, event-driven infrastructures can democratize access to large-scale NLP by reducing cost, processing time, and environmental impact while offering a reproducible pathway for real-world research and industrial applications. Full article
(This article belongs to the Special Issue Generative AI Transformations in Industrial and Societal Applications)
Show Figures

Graphical abstract

18 pages, 3408 KB  
Article
Enhancing Traditional Reactive Digital Forensics to a Proactive Digital Forensics Standard Operating Procedure (P-DEFSOP): A Case Study of DEFSOP and ISO 27035
by Hung-Cheng Yang, I-Long Lin and Yung-Hung Chao
Appl. Sci. 2025, 15(18), 9922; https://doi.org/10.3390/app15189922 - 10 Sep 2025
Cited by 3 | Viewed by 4239
Abstract
With the growing intensity of global cybersecurity threats and the rapid advancement of attack techniques, strengthening enterprise information and communication technology (ICT) infrastructures and enhancing digital forensics have become critical imperatives. Cloud environments, in particular, present substantial challenges due to the limited availability [...] Read more.
With the growing intensity of global cybersecurity threats and the rapid advancement of attack techniques, strengthening enterprise information and communication technology (ICT) infrastructures and enhancing digital forensics have become critical imperatives. Cloud environments, in particular, present substantial challenges due to the limited availability of effective forensic tools and the pressing demand for impartial and legally admissible digital evidence. To address these challenges, we propose a proactive digital forensics mechanism (P-DFM) designed for emergency incident management in enterprise settings. This mechanism integrates a range of forensic tools to identify and preserve critical digital evidence. It also incorporates the MITRE ATT&CK framework with Security Information and Event Management (SIEM) and Managed Detection and Response (MDR) systems to enable comprehensive and timely threat detection and analysis. The principal contribution of this study is the formulation of a novel Proactive Digital Evidence Forensics Standard Operating Procedure (P-DEFSOP), which enhances the accuracy and efficiency of security threat detection and forensic analysis while ensuring that digital evidence remains legally admissible. This advancement significantly reinforces the cybersecurity posture of enterprise networks. Our approach is systematically grounded in the Digital Evidence Forensics Standard Operating Procedure (DEFSOP) framework and complies with internationally recognized digital forensic standards, including ISO/IEC 27035 and ISO/IEC 27037, to ensure the integrity, reliability, validity, and legal admissibility of digital evidence throughout the forensic process. Given the complexity of cloud computing infrastructures—such as Chunghwa Telecom HiCloud, Amazon Web Services (AWS), Google Cloud, and Microsoft Azure—we underscore the critical importance of impartial and standardized digital forensic services in cloud-based environments. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

17 pages, 2598 KB  
Article
Evaluating the Performance Impact of Data Sovereignty Features on Data Spaces
by Stanisław Galij, Grzegorz Pawlak and Sławomir Grzyb
Appl. Sci. 2025, 15(17), 9841; https://doi.org/10.3390/app15179841 - 8 Sep 2025
Cited by 1 | Viewed by 1765
Abstract
Data Spaces appear to offer a solution to data sovereignty concerns in public cloud environments, which are managed by third parties and must therefore be considered potentially untrusted. The IDS Connector, a key component of Data Space architecture, acts as a secure gateway, [...] Read more.
Data Spaces appear to offer a solution to data sovereignty concerns in public cloud environments, which are managed by third parties and must therefore be considered potentially untrusted. The IDS Connector, a key component of Data Space architecture, acts as a secure gateway, enforcing data sovereignty by controlling data usage and ensuring that data processing occurs within a trusted and verifiable environment. This study compares the performance of cloud-native data sharing services offered by major cloud providers—Amazon, Microsoft, and Google—with Data Spaces services delivered via two connector implementations: the Dataspace Connector and the Prometheus-X Dataspace Connector. An extensive set of experiments reveals significant differences in the performance of cloud-native managed services, as well as between connector implementations and hosting methods. The results indicate that the differences in the performance of data sharing services are unexpectedly substantial between providers, reaching up to 187%, and that the performance of different connector implementations also varies considerably, with an average difference of 56%. This indicates that the choice of cloud provider and data space Connector implementation has a major impact on the performance of the designed solution. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

25 pages, 1842 KB  
Article
Optimizing Cybersecurity Education: A Comparative Study of On-Premises and Cloud-Based Lab Environments Using AWS EC2
by Adil Khan and Azza Mohamed
Computers 2025, 14(8), 297; https://doi.org/10.3390/computers14080297 - 22 Jul 2025
Cited by 2 | Viewed by 3191
Abstract
The increasing complexity of cybersecurity risks highlights the critical need for novel teaching techniques that provide students with the necessary skills and information. Traditional on-premises laboratory setups frequently lack the scalability, flexibility, and accessibility necessary for efficient training in today’s dynamic world. This [...] Read more.
The increasing complexity of cybersecurity risks highlights the critical need for novel teaching techniques that provide students with the necessary skills and information. Traditional on-premises laboratory setups frequently lack the scalability, flexibility, and accessibility necessary for efficient training in today’s dynamic world. This study compares the efficacy of cloud-based solutions—specifically, Amazon Web Services (AWS) Elastic Compute Cloud (EC2)—against traditional settings like VirtualBox, with the goal of determining their potential to improve cybersecurity education. The study conducts systematic experimentation to compare lab environments based on parameters such as lab completion time, CPU and RAM use, and ease of access. The results show that AWS EC2 outperforms VirtualBox by shortening lab completion times, optimizing resource usage, and providing more remote accessibility. Additionally, the cloud-based strategy provides scalable, cost-effective implementation via a pay-per-use model, serving a wide range of pedagogical needs. These findings show that incorporating cloud technology into cybersecurity curricula can lead to more efficient, adaptable, and inclusive learning experiences, thereby boosting pedagogical methods in the field. Full article
(This article belongs to the Special Issue Cyber Security and Privacy in IoT Era)
Show Figures

Figure 1

44 pages, 5183 KB  
Article
A Blockchain-Based Framework for Secure Data Stream Dissemination in Federated IoT Environments
by Jakub Sychowiec and Zbigniew Zieliński
Electronics 2025, 14(10), 2067; https://doi.org/10.3390/electronics14102067 - 20 May 2025
Viewed by 1797
Abstract
An industrial-scale increase in applications of the Internet of Things (IoT), a significant number of which are based on the concept of federation, presents unique security challenges due to their distributed nature and the need for secure communication between components from different administrative [...] Read more.
An industrial-scale increase in applications of the Internet of Things (IoT), a significant number of which are based on the concept of federation, presents unique security challenges due to their distributed nature and the need for secure communication between components from different administrative domains. A federation may be created for the duration of a mission, such as military operations or Humanitarian Assistance and Disaster Relief (HADR) operations. These missions often occur in very difficult or even hostile environments, posing additional challenges for ensuring reliability and security. The heterogeneity of devices, protocols, and security requirements in different domains further complicates the requirements for the secure distribution of data streams in federated IoT environments. The effective dissemination of data streams in federated environments also ensures the flexibility to filter and search for patterns in real-time to detect critical events or threats (e.g., fires and hostile objects) with changing information needs of end users. The paper presents a novel and practical framework for secure and reliable data stream dissemination in federated IoT environments, leveraging blockchain, Apache Kafka brokers, and microservices. To authenticate IoT devices and verify data streams, we have integrated a hardware and software IoT gateway with the Hyperledger Fabric (HLF) blockchain platform, which records the distinguishing features of IoT devices (fingerprints). In this paper, we analyzed our platform’s security, focusing on secure data distribution. We formally discussed potential attack vectors and ways to mitigate them through the platform’s design. We thoroughly assess the effectiveness of the proposed framework by conducting extensive performance tests in two setups: the Amazon Web Services (AWS) cloud-based and Raspberry Pi resource-constrained environments. Implementing our framework in the AWS cloud infrastructure has demonstrated that it is suitable for processing audiovisual streams in environments that require immediate interoperability. The results are promising, as the average time it takes for a consumer to read a verified data stream is in the order of seconds. The measured time for complete processing of an audiovisual stream corresponds to approximately 25 frames per second (fps). The results obtained also confirmed the computational stability of our framework. Furthermore, we have confirmed that our environment can be deployed on resource-constrained commercial off-the-shelf (COTS) platforms while maintaining low operational costs. Full article
(This article belongs to the Special Issue Feature Papers in "Computer Science & Engineering", 2nd Edition)
Show Figures

Figure 1

14 pages, 2383 KB  
Article
Performance Variability in Public Clouds: An Empirical Assessment
by Sanjay Ahuja, Victor H. Lopez Chalacan and Hugo Resendez
Information 2025, 16(5), 402; https://doi.org/10.3390/info16050402 - 14 May 2025
Viewed by 2490
Abstract
Cloud computing is now established as a viable alternative to on-premise infrastructure from both a system administration and cost perspective. This research provides insight into cluster computing performance and variability in cloud-provisioned infrastructure from two popular public cloud providers, Amazon Web Services (AWS) [...] Read more.
Cloud computing is now established as a viable alternative to on-premise infrastructure from both a system administration and cost perspective. This research provides insight into cluster computing performance and variability in cloud-provisioned infrastructure from two popular public cloud providers, Amazon Web Services (AWS) and Google Cloud Platform (GCP). In order to evaluate the perforance variability between these two providers, synthetic benchmarks including Memory bandwidth (STREAM), Interleave or Random (IoR) performance, and Computational CPU performance by NAS Parallel Benchmarks-Embarrassingly Parallel (NPB-EP) were used. A comparative examination of the two cloud platforms is provided in the context of our research methodology and design. We conclude with a discussion of the results of the experiment and an assessment of the suitability of public cloud platforms for certain types of computing workloads. Both AWS and GCP have their strong points, and this study provides recommendations depending on user needs for high throughput and/or performance predictability across CPU, memory, and Input/Output (I/O). In addition, the study discusses other factors to help users decide between cloud vendors such as ease of use, documentation, and types of instances offered. Full article
(This article belongs to the Special Issue Performance Engineering in Cloud Computing)
Show Figures

Figure 1

21 pages, 8259 KB  
Article
A Cloud Computing Framework for Space Farming Data Analysis
by Adrian Genevie Janairo, Ronnie Concepcion, Marielet Guillermo and Arvin Fernando
AgriEngineering 2025, 7(5), 149; https://doi.org/10.3390/agriengineering7050149 - 8 May 2025
Cited by 2 | Viewed by 2665
Abstract
This study presents a system framework by which cloud resources are utilized to analyze crop germination status in a 2U CubeSat. This research aims to address the onboard computing constraints in nanosatellite missions to boost space agricultural practices. Through the Espressif Simple Protocol [...] Read more.
This study presents a system framework by which cloud resources are utilized to analyze crop germination status in a 2U CubeSat. This research aims to address the onboard computing constraints in nanosatellite missions to boost space agricultural practices. Through the Espressif Simple Protocol for Network-on-Wireless (ESP-NOW) technology, communication between ESP-32 modules were established. The corresponding sensor readings and image data were securely streamed through Amazon Web Service Internet of Things (AWS IoT) to an ESP-NOW receiver and Roboflow. Real-time plant growth predictor monitoring was implemented through the web application provisioned at the receiver end. On the other hand, sprouts on germination bed were determined through the custom-trained Roboflow computer vision model. The feasibility of remote data computational analysis and monitoring for a 2U CubeSat, given its minute form factor, was successfully demonstrated through the proposed cloud framework. The germination detection model resulted in a mean average precision (mAP), precision, and recall of 99.5%, 99.9%, and 100.0%, respectively. The temperature, humidity, heat index, LED and Fogger states, and bed sprouts data were shown in real time through a web dashboard. With this use case, immediate actions can be performed accordingly when abnormalities occur. The scalability nature of the framework allows adaptation to various crops to support sustainable agricultural activities in extreme environments such as space farming. Full article
Show Figures

Figure 1

21 pages, 2085 KB  
Article
Edge vs. Cloud: Empirical Insights into Data-Driven Condition Monitoring
by Chikumbutso Christopher Walani and Wesley Doorsamy
Big Data Cogn. Comput. 2025, 9(5), 121; https://doi.org/10.3390/bdcc9050121 - 8 May 2025
Cited by 9 | Viewed by 5018
Abstract
This study evaluates edge and cloud computing paradigms in the context of data-driven condition monitoring of rotating electrical machines. Two well-known platforms, the Raspberry Pi and Amazon Web Services Elastic Compute Cloud, are used to compare and contrast these two computing paradigms in [...] Read more.
This study evaluates edge and cloud computing paradigms in the context of data-driven condition monitoring of rotating electrical machines. Two well-known platforms, the Raspberry Pi and Amazon Web Services Elastic Compute Cloud, are used to compare and contrast these two computing paradigms in terms of different metrics associated with their application suitability. The tested induction machine fault diagnosis models are developed using popular algorithms, namely support vector machines, k-nearest neighbours, and decision trees. The findings reveal that while the cloud platform offers superior computational and memory resources, making it more suitable for complex machine learning tasks, it also incurs higher costs and latency. On the other hand, the edge platform excels in real-time processing and reduces network data burden, but its computational and memory resources are found to be a limitation with certain tasks. The study provides both quantitative and qualitative insights into the trade-offs involved in selecting the most suitable computing approach for condition monitoring applications. Although the scope of the empirical study is primarily limited to factors such as computational efficiency, scalability, and resource utilisation, particularly in the context of specific machine learning models, this paper offers broader discussion and future research directions of other key issues, including latency, network variability, and energy consumption. Full article
(This article belongs to the Special Issue Application of Cloud Computing in Industrial Internet of Things)
Show Figures

Figure 1

36 pages, 889 KB  
Review
Securing Blockchain Systems: A Layer-Oriented Survey of Threats, Vulnerability Taxonomy, and Detection Methods
by Mohammad Jaminur Islam, Saminur Islam, Mahmud Hossain, Shahid Noor and S. M. Riazul Islam
Future Internet 2025, 17(5), 205; https://doi.org/10.3390/fi17050205 - 3 May 2025
Cited by 5 | Viewed by 7906
Abstract
Blockchain technology is emerging as a pivotal framework to enhance the security of internet-based systems, especially as advancements in machine learning (ML), artificial intelligence (AI), and cyber–physical systems such as smart grids and IoT applications in healthcare continue to accelerate. Although these innovations [...] Read more.
Blockchain technology is emerging as a pivotal framework to enhance the security of internet-based systems, especially as advancements in machine learning (ML), artificial intelligence (AI), and cyber–physical systems such as smart grids and IoT applications in healthcare continue to accelerate. Although these innovations promise significant improvements, security remains a critical challenge. Blockchain offers a secure foundation for integrating diverse technologies; however, vulnerabilities—including adversarial exploits—can undermine performance and compromise application reliability. To address these risks effectively, it is essential to comprehensively analyze the vulnerability landscape of blockchain systems. This paper contributes in two key ways. First, it presents a unique layer-based framework for analyzing and illustrating security attacks within blockchain architectures. Second, it introduces a novel taxonomy that classifies existing research on blockchain vulnerability detection. Our analysis reveals that while ML and deep learning offer promising approaches for detecting vulnerabilities, their effectiveness often depends on access to extensive and high-quality datasets. Additionally, the layer-based framework demonstrates that vulnerabilities span all layers of a blockchain system, with attacks frequently targeting the consensus process, network integrity, and smart contract code. Overall, this paper provides a comprehensive overview of blockchain security threats and detection methods, emphasizing the need for a multifaceted approach to safeguard these evolving systems. Full article
(This article belongs to the Special Issue Security and Privacy in Blockchains and the IoT—3rd Edition)
Show Figures

Graphical abstract

Back to TopTop