Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (545)

Search Parameters:
Keywords = IoT application domains

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
28 pages, 1328 KiB  
Review
Security Issues in IoT-Based Wireless Sensor Networks: Classifications and Solutions
by Dung T. Nguyen, Mien L. Trinh, Minh T. Nguyen, Thang C. Vu, Tao V. Nguyen, Long Q. Dinh and Mui D. Nguyen
Future Internet 2025, 17(8), 350; https://doi.org/10.3390/fi17080350 (registering DOI) - 1 Aug 2025
Abstract
In recent years, the Internet of Things (IoT) has experienced considerable developments and has played an important role in various domains such as industry, agriculture, healthcare, transportation, and environment, especially for smart cities. Along with that, wireless sensor networks (WSNs) are considered to [...] Read more.
In recent years, the Internet of Things (IoT) has experienced considerable developments and has played an important role in various domains such as industry, agriculture, healthcare, transportation, and environment, especially for smart cities. Along with that, wireless sensor networks (WSNs) are considered to be important components of the IoT system (WSN-IoT) to create smart applications and automate processes. As the number of connected IoT devices increases, privacy and security issues become more complicated due to their external working environments and limited resources. Hence, solutions need to be updated to ensure that data and user privacy are protected from threats and attacks. To support the safety and reliability of such systems, in this paper, security issues in the WSN-IoT are addressed and classified as identifying security challenges and requirements for different kinds of attacks in either WSNs or IoT systems. In addition, security solutions corresponding to different types of attacks are provided, analyzed, and evaluated. We provide different comparisons and classifications based on specific goals and applications that hopefully can suggest suitable solutions for specific purposes in practical. We also suggest some research directions to support new security mechanisms. Full article
Show Figures

Figure 1

16 pages, 1550 KiB  
Article
Understanding and Detecting Adversarial Examples in IoT Networks: A White-Box Analysis with Autoencoders
by Wafi Danesh, Srinivas Rahul Sapireddy and Mostafizur Rahman
Electronics 2025, 14(15), 3015; https://doi.org/10.3390/electronics14153015 - 29 Jul 2025
Viewed by 30
Abstract
Novel networking paradigms such as the Internet of Things (IoT) have expanded their usage and deployment to various application domains. Consequently, unseen critical security vulnerabilities such as zero-day attacks have emerged in such deployments. The design of intrusion detection systems for IoT networks [...] Read more.
Novel networking paradigms such as the Internet of Things (IoT) have expanded their usage and deployment to various application domains. Consequently, unseen critical security vulnerabilities such as zero-day attacks have emerged in such deployments. The design of intrusion detection systems for IoT networks is often challenged by a lack of labeled data, which complicates the development of robust defenses against adversarial attacks. As deep learning-based network intrusion detection systems, network intrusion detection systems (NIDS) have been used to counteract emerging security vulnerabilities. However, the deep learning models used in such NIDS are vulnerable to adversarial examples. Adversarial examples are specifically engineered samples tailored to a specific deep learning model; they are developed by minimal perturbation of network packet features, and are intended to cause misclassification. Such examples can bypass NIDS or enable the rejection of regular network traffic. Research in the adversarial example detection domain has yielded several prominent methods; however, most of those methods involve computationally expensive retraining steps and require access to labeled data, which are often lacking in IoT network deployments. In this paper, we propose an unsupervised method for detecting adversarial examples that performs early detection based on the intrinsic characteristics of the deep learning model. Our proposed method requires neither computationally expensive retraining nor extra hardware overhead for implementation. For the work in this paper, we first perform adversarial example generation on a deep learning model using autoencoders. After successful adversarial example generation, we perform adversarial example detection using the intrinsic characteristics of the layers in the deep learning model. A robustness analysis of our approach reveals that an attacker can easily bypass the detection mechanism by using low-magnitude log-normal Gaussian noise. Furthermore, we also test the robustness of our detection method against further compromise by the attacker. We tested our approach on the Kitsune datasets, which are state-of-the-art datasets obtained from deployed IoT network scenarios. Our experimental results show an average adversarial example generation time of 0.337 s and an average detection rate of almost 100%. The robustness analysis of our detection method reveals a reduction of almost 100% in adversarial example detection after compromise by the attacker. Full article
Show Figures

Figure 1

12 pages, 2500 KiB  
Article
Deep Learning-Based Optical Camera Communication with a 2D MIMO-OOK Scheme for IoT Networks
by Huy Nguyen and Yeng Min Jang
Electronics 2025, 14(15), 3011; https://doi.org/10.3390/electronics14153011 - 29 Jul 2025
Viewed by 169
Abstract
Radio frequency (RF)-based wireless systems are broadly used in communication systems such as mobile networks, satellite links, and monitoring applications. These systems offer outstanding advantages over wired systems, particularly in terms of ease of installation. However, researchers are looking for safer alternatives as [...] Read more.
Radio frequency (RF)-based wireless systems are broadly used in communication systems such as mobile networks, satellite links, and monitoring applications. These systems offer outstanding advantages over wired systems, particularly in terms of ease of installation. However, researchers are looking for safer alternatives as a result of worries about possible health problems connected to high-frequency radiofrequency transmission. Using the visible light spectrum is one promising approach; three cutting-edge technologies are emerging in this regard: Optical Camera Communication (OCC), Light Fidelity (Li-Fi), and Visible Light Communication (VLC). In this paper, we propose a Multiple-Input Multiple-Output (MIMO) modulation technology for Internet of Things (IoT) applications, utilizing an LED array and time-domain on-off keying (OOK). The proposed system is compatible with both rolling shutter and global shutter cameras, including commercially available models such as CCTV, webcams, and smart cameras, commonly deployed in buildings and industrial environments. Despite the compact size of the LED array, we demonstrate that, by optimizing parameters such as exposure time, camera focal length, and channel coding, our system can achieve up to 20 communication links over a 20 m distance with low bit error rate. Full article
(This article belongs to the Special Issue Advances in Optical Communications and Optical Networks)
Show Figures

Figure 1

17 pages, 3604 KiB  
Article
Binary-Weighted Neural Networks Using FeRAM Array for Low-Power AI Computing
by Seung-Myeong Cho, Jaesung Lee, Hyejin Jo, Dai Yun, Jihwan Moon and Kyeong-Sik Min
Nanomaterials 2025, 15(15), 1166; https://doi.org/10.3390/nano15151166 - 28 Jul 2025
Viewed by 87
Abstract
Artificial intelligence (AI) has become ubiquitous in modern computing systems, from high-performance data centers to resource-constrained edge devices. As AI applications continue to expand into mobile and IoT domains, the need for energy-efficient neural network implementations has become increasingly critical. To meet this [...] Read more.
Artificial intelligence (AI) has become ubiquitous in modern computing systems, from high-performance data centers to resource-constrained edge devices. As AI applications continue to expand into mobile and IoT domains, the need for energy-efficient neural network implementations has become increasingly critical. To meet this requirement of energy-efficient computing, this work presents a BWNN (binary-weighted neural network) architecture implemented using FeRAM (Ferroelectric RAM)-based synaptic arrays. By leveraging the non-volatile nature and low-power computing of FeRAM-based CIM (computing in memory), the proposed CIM architecture indicates significant reductions in both dynamic and standby power consumption. Simulation results in this paper demonstrate that scaling the ferroelectric capacitor size can reduce dynamic power by up to 6.5%, while eliminating DRAM-like refresh cycles allows standby power to drop by over 258× under typical conditions. Furthermore, the combination of binary weight quantization and in-memory computing enables energy-efficient inference without significant loss in recognition accuracy, as validated using MNIST datasets. Compared to prior CIM architectures of SRAM-CIM, DRAM-CIM, and STT-MRAM-CIM, the proposed FeRAM-CIM exhibits superior energy efficiency, achieving 230–580 TOPS/W in a 45 nm process. These results highlight the potential of FeRAM-based BWNNs as a compelling solution for edge-AI and IoT applications where energy constraints are critical. Full article
(This article belongs to the Special Issue Neuromorphic Devices: Materials, Structures and Bionic Applications)
Show Figures

Figure 1

28 pages, 2918 KiB  
Article
Machine Learning-Powered KPI Framework for Real-Time, Sustainable Ship Performance Management
by Christos Spandonidis, Vasileios Iliopoulos and Iason Athanasopoulos
J. Mar. Sci. Eng. 2025, 13(8), 1440; https://doi.org/10.3390/jmse13081440 - 28 Jul 2025
Viewed by 169
Abstract
The maritime sector faces escalating demands to minimize emissions and optimize operational efficiency under tightening environmental regulations. Although technologies such as the Internet of Things (IoT), Artificial Intelligence (AI), and Digital Twins (DT) offer substantial potential, their deployment in real-time ship performance analytics [...] Read more.
The maritime sector faces escalating demands to minimize emissions and optimize operational efficiency under tightening environmental regulations. Although technologies such as the Internet of Things (IoT), Artificial Intelligence (AI), and Digital Twins (DT) offer substantial potential, their deployment in real-time ship performance analytics is at an emerging state. This paper proposes a machine learning-driven framework for real-time ship performance management. The framework starts with data collected from onboard sensors and culminates in a decision support system that is easily interpretable, even by non-experts. It also provides a method to forecast vessel performance by extrapolating Key Performance Indicator (KPI) values. Furthermore, it offers a flexible methodology for defining KPIs for every crucial component or aspect of vessel performance, illustrated through a use case focusing on fuel oil consumption. Leveraging Artificial Neural Networks (ANNs), hybrid multivariate data fusion, and high-frequency sensor streams, the system facilitates continuous diagnostics, early fault detection, and data-driven decision-making. Unlike conventional static performance models, the framework employs dynamic KPIs that evolve with the vessel’s operational state, enabling advanced trend analysis, predictive maintenance scheduling, and compliance assurance. Experimental comparison against classical KPI models highlights superior predictive fidelity, robustness, and temporal consistency. Furthermore, the paper delineates AI and ML applications across core maritime operations and introduces a scalable, modular system architecture applicable to both commercial and naval platforms. This approach bridges advanced simulation ecosystems with in situ operational data, laying a robust foundation for digital transformation and sustainability in maritime domains. Full article
(This article belongs to the Section Ocean Engineering)
Show Figures

Figure 1

20 pages, 4403 KiB  
Review
Digital Twins’ Application for Geotechnical Engineering: A Review of Current Status and Future Directions in China
by Wenhui Tan, Siying Wu, Yan Li and Qifeng Guo
Appl. Sci. 2025, 15(15), 8229; https://doi.org/10.3390/app15158229 - 24 Jul 2025
Viewed by 241
Abstract
The digital wave, represented by new technologies such as big data, IoT, and artificial intelligence, is sweeping the globe, driving all industries toward digitalization and intelligent transformation. Digital twins are becoming an indispensable opportunity for new infrastructure initiatives. As geotechnical engineering constitutes a [...] Read more.
The digital wave, represented by new technologies such as big data, IoT, and artificial intelligence, is sweeping the globe, driving all industries toward digitalization and intelligent transformation. Digital twins are becoming an indispensable opportunity for new infrastructure initiatives. As geotechnical engineering constitutes a critical component of new infrastructure, its corresponding digital transformation is essential to align with these initiatives. However, due to the difficulty of modeling, the demand for computing resources, interdisciplinary integration, and other issues, current digital twin applications in geotechnical engineering remain in their nascent stage. This paper delineates the developmental status of geotechnical digital twin technology in China, and it focuses on the advantages and disadvantages of digital twins in five application fields, identifying key challenges, including intelligent sensing and interconnectivity of multi-source heterogeneous physical entities, integrated sharing of 3D geological models and structural models, unified platforms for lifecycle information management, standardization of digital twin data protocols, and theoretical frameworks for digital twin modeling. Furthermore, this study systematically expounds future research priorities across four dimensions: intelligent sensing and interoperability technologies for geotechnical engineering; knowledge graph development and model-based systems engineering; integrated digital twin entity technologies combining 3D geological bodies with engineering structures; and precision enhancement, temporal extension, and spatial expansion of geotechnical digital twins. This paper systematically reviews the application status of digital twin technology in geotechnical engineering for the first time, reveals the common technical challenges in cross-domain implementation, and proposes a theoretical framework for digital twin accuracy improvement and spatiotemporal expansion for geotechnical engineering characteristics, which fills the knowledge gap in the adaptability of existing research in professional fields. These insights aim to provide references for advancing digitalization, intelligent transformation, and sustainable development of geotechnical engineering. Full article
Show Figures

Figure 1

21 pages, 2794 KiB  
Article
Medical Data over Sound—CardiaWhisper Concept
by Radovan Stojanović, Jovan Đurković, Mihailo Vukmirović, Blagoje Babić, Vesna Miranović and Andrej Škraba
Sensors 2025, 25(15), 4573; https://doi.org/10.3390/s25154573 - 24 Jul 2025
Viewed by 265
Abstract
Data over sound (DoS) is an established technique that has experienced a resurgence in recent years, finding applications in areas such as contactless payments, device pairing, authentication, presence detection, toys, and offline data transfer. This study introduces CardiaWhisper, a system that extends the [...] Read more.
Data over sound (DoS) is an established technique that has experienced a resurgence in recent years, finding applications in areas such as contactless payments, device pairing, authentication, presence detection, toys, and offline data transfer. This study introduces CardiaWhisper, a system that extends the DoS concept to the medical domain by using a medical data-over-sound (MDoS) framework. CardiaWhisper integrates wearable biomedical sensors with home care systems, edge or IoT gateways, and telemedical networks or cloud platforms. Using a transmitter device, vital signs such as ECG (electrocardiogram) signals, PPG (photoplethysmogram) signals, RR (respiratory rate), and ACC (acceleration/movement) are sensed, conditioned, encoded, and acoustically transmitted to a nearby receiver—typically a smartphone, tablet, or other gadget—and can be further relayed to edge and cloud infrastructures. As a case study, this paper presents the real-time transmission and processing of ECG signals. The transmitter integrates an ECG sensing module, an encoder (either a PLL-based FM modulator chip or a microcontroller), and a sound emitter in the form of a standard piezoelectric speaker. The receiver, in the form of a mobile phone, tablet, or desktop computer, captures the acoustic signal via its built-in microphone and executes software routines to decode the data. It then enables a range of control and visualization functions for both local and remote users. Emphasis is placed on describing the system architecture and its key components, as well as the software methodologies used for signal decoding on the receiver side, where several algorithms are implemented using open-source, platform-independent technologies, such as JavaScript, HTML, and CSS. While the main focus is on the transmission of analog data, digital data transmission is also illustrated. The CardiaWhisper system is evaluated across several performance parameters, including functionality, complexity, speed, noise immunity, power consumption, range, and cost-efficiency. Quantitative measurements of the signal-to-noise ratio (SNR) were performed in various realistic indoor scenarios, including different distances, obstacles, and noise environments. Preliminary results are presented, along with a discussion of design challenges, limitations, and feasible applications. Our experience demonstrates that CardiaWhisper provides a low-power, eco-friendly alternative to traditional RF or Bluetooth-based medical wearables in various applications. Full article
Show Figures

Graphical abstract

29 pages, 766 KiB  
Article
Interpretable Fuzzy Control for Energy Management in Smart Buildings Using JFML-IoT and IEEE Std 1855-2016
by María Martínez-Rojas, Carlos Cano, Jesús Alcalá-Fdez and José Manuel Soto-Hidalgo
Appl. Sci. 2025, 15(15), 8208; https://doi.org/10.3390/app15158208 - 23 Jul 2025
Viewed by 163
Abstract
This paper presents an interpretable and modular framework for energy management in smart buildings based on fuzzy logic and the IEEE Std 1855-2016. The proposed system builds upon the JFML-IoT library, enabling the integration and execution of fuzzy rule-based systems on resource-constrained IoT [...] Read more.
This paper presents an interpretable and modular framework for energy management in smart buildings based on fuzzy logic and the IEEE Std 1855-2016. The proposed system builds upon the JFML-IoT library, enabling the integration and execution of fuzzy rule-based systems on resource-constrained IoT devices using a lightweight and extensible architecture. Unlike conventional data-driven controllers, this approach emphasizes semantic transparency, expert-driven control logic, and compliance with fuzzy markup standards. The system is designed to enhance both operational efficiency and user comfort through transparent and explainable decision-making. A four-layer architecture structures the system into Perception, Communication, Processing, and Application layers, supporting real-time decisions based on environmental data. The fuzzy logic rules are defined collaboratively with domain experts and encoded in Fuzzy Markup Language to ensure interoperability and formalization of expert knowledge. While adherence to IEEE Std 1855-2016 facilitates system integration and standardization, the scientific contribution lies in the deployment of an interpretable, IoT-based control system validated in real conditions. A case study is conducted in a realistic indoor environment, using temperature, humidity, illuminance, occupancy, and CO2 sensors, along with HVAC and lighting actuators. The results demonstrate that the fuzzy inference engine generates context-aware control actions aligned with expert expectations. The proposed framework also opens possibilities for incorporating user-specific preferences and adaptive comfort strategies in future developments. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

19 pages, 313 KiB  
Article
Survey on the Role of Mechanistic Interpretability in Generative AI
by Leonardo Ranaldi
Big Data Cogn. Comput. 2025, 9(8), 193; https://doi.org/10.3390/bdcc9080193 - 23 Jul 2025
Viewed by 487
Abstract
The rapid advancement of artificial intelligence (AI) and machine learning has revolutionised how systems process information, make decisions, and adapt to dynamic environments. AI-driven approaches have significantly enhanced efficiency and problem-solving capabilities across various domains, from automated decision-making to knowledge representation and predictive [...] Read more.
The rapid advancement of artificial intelligence (AI) and machine learning has revolutionised how systems process information, make decisions, and adapt to dynamic environments. AI-driven approaches have significantly enhanced efficiency and problem-solving capabilities across various domains, from automated decision-making to knowledge representation and predictive modelling. These developments have led to the emergence of increasingly sophisticated models capable of learning patterns, reasoning over complex data structures, and generalising across tasks. As AI systems become more deeply integrated into networked infrastructures and the Internet of Things (IoT), their ability to process and interpret data in real-time is essential for optimising intelligent communication networks, distributed decision making, and autonomous IoT systems. However, despite these achievements, the internal mechanisms that drive LLMs’ reasoning and generalisation capabilities remain largely unexplored. This lack of transparency, compounded by challenges such as hallucinations, adversarial perturbations, and misaligned human expectations, raises concerns about their safe and beneficial deployment. Understanding the underlying principles governing AI models is crucial for their integration into intelligent network systems, automated decision-making processes, and secure digital infrastructures. This paper provides a comprehensive analysis of explainability approaches aimed at uncovering the fundamental mechanisms of LLMs. We investigate the strategic components contributing to their generalisation abilities, focusing on methods to quantify acquired knowledge and assess its representation within model parameters. Specifically, we examine mechanistic interpretability, probing techniques, and representation engineering as tools to decipher how knowledge is structured, encoded, and retrieved in AI systems. Furthermore, by adopting a mechanistic perspective, we analyse emergent phenomena within training dynamics, particularly memorisation and generalisation, which also play a crucial role in broader AI-driven systems, including adaptive network intelligence, edge computing, and real-time decision-making architectures. Understanding these principles is crucial for bridging the gap between black-box AI models and practical, explainable AI applications, thereby ensuring trust, robustness, and efficiency in language-based and general AI systems. Full article
Show Figures

Figure 1

35 pages, 2073 KiB  
Review
Using the Zero Trust Five-Step Implementation Process with Smart Environments: State-of-the-Art Review and Future Directions
by Shruti Kulkarni, Alexios Mylonas and Stilianos Vidalis
Future Internet 2025, 17(7), 313; https://doi.org/10.3390/fi17070313 - 18 Jul 2025
Viewed by 311
Abstract
There is a growing pressure on industry to secure environments and demonstrate their commitment in taking right steps to secure their products. This is because of the growing number of security compromises in the IT industry, Operational Technology environment, Internet of Things environment [...] Read more.
There is a growing pressure on industry to secure environments and demonstrate their commitment in taking right steps to secure their products. This is because of the growing number of security compromises in the IT industry, Operational Technology environment, Internet of Things environment and smart home devices. These compromises are not just about data breaches or data exfiltration, but also about unauthorised access to devices that are not configured correctly and vulnerabilities in software components, which usually lead to insecure authentication and authorisation. Incorrect configurations are usually in the form of devices being made available on the Internet (public domain), reusable credentials, access granted without verifying the requestor, and easily available credentials like default credentials. Organisations seeking to address the dual pressure of demonstrating steps in the right direction and addressing unauthorised access to resources can find a viable approach in the form of the zero trust concept. Zero trust principles are about moving security controls closer to the data, applications, assets and services and are based on the principle of “never trust, always verify”. As it stands today, zero trust research has advanced far beyond the concept of “never trust, always verify”. This paper provides the culmination of a literature review of research conducted in the space of smart home devices and IoT and the applicability of the zero trust five-step implementation process to secure them. We discuss the history of zero trust, the tenets of zero trust, the five-step implementation process for zero trust, and its adoption for smart home devices and Internet of Things, and we provide suggestions for future research. Full article
Show Figures

Figure 1

24 pages, 2173 KiB  
Article
A Novel Ensemble of Deep Learning Approach for Cybersecurity Intrusion Detection with Explainable Artificial Intelligence
by Abdullah Alabdulatif
Appl. Sci. 2025, 15(14), 7984; https://doi.org/10.3390/app15147984 - 17 Jul 2025
Viewed by 504
Abstract
In today’s increasingly interconnected digital world, cyber threats have grown in frequency and sophistication, making intrusion detection systems a critical component of modern cybersecurity frameworks. Traditional IDS methods, often based on static signatures and rule-based systems, are no longer sufficient to detect and [...] Read more.
In today’s increasingly interconnected digital world, cyber threats have grown in frequency and sophistication, making intrusion detection systems a critical component of modern cybersecurity frameworks. Traditional IDS methods, often based on static signatures and rule-based systems, are no longer sufficient to detect and respond to complex and evolving attacks. To address these challenges, Artificial Intelligence and machine learning have emerged as powerful tools for enhancing the accuracy, adaptability, and automation of IDS solutions. This study presents a novel, hybrid ensemble learning-based intrusion detection framework that integrates deep learning and traditional ML algorithms with explainable artificial intelligence for real-time cybersecurity applications. The proposed model combines an Artificial Neural Network and Support Vector Machine as base classifiers and employs a Random Forest as a meta-classifier to fuse predictions, improving detection performance. Recursive Feature Elimination is utilized for optimal feature selection, while SHapley Additive exPlanations (SHAP) provide both global and local interpretability of the model’s decisions. The framework is deployed using a Flask-based web interface in the Amazon Elastic Compute Cloud environment, capturing live network traffic and offering sub-second inference with visual alerts. Experimental evaluations using the NSL-KDD dataset demonstrate that the ensemble model outperforms individual classifiers, achieving a high accuracy of 99.40%, along with excellent precision, recall, and F1-score metrics. This research not only enhances detection capabilities but also bridges the trust gap in AI-powered security systems through transparency. The solution shows strong potential for application in critical domains such as finance, healthcare, industrial IoT, and government networks, where real-time and interpretable threat detection is vital. Full article
Show Figures

Figure 1

13 pages, 323 KiB  
Article
Application-Oriented Study of Next-Generation Alternant Codes over Gaussian Integers for Secure and Efficient Communication
by Muhammad Sajjad and Nawaf A. Alqwaifly
Mathematics 2025, 13(14), 2263; https://doi.org/10.3390/math13142263 - 13 Jul 2025
Viewed by 302
Abstract
This paper presents the construction and analysis of a novel class of alternant codes over Gaussian integers, aimed at enhancing error correction capabilities in high-reliability communication systems. These codes are constructed using parity-check matrices derived from finite commutative local rings with unity, specifically [...] Read more.
This paper presents the construction and analysis of a novel class of alternant codes over Gaussian integers, aimed at enhancing error correction capabilities in high-reliability communication systems. These codes are constructed using parity-check matrices derived from finite commutative local rings with unity, specifically Zn[i], where i2=1. A detailed algebraic investigation of the polynomial xn1 over these rings is conducted to facilitate the systematic construction of such codes. The proposed alternant codes extend the principles of classical BCH and Goppa codes to complex integer domains, enabling richer algebraic structures and greater error-correction potential. We evaluate the performance of these codes in terms of error correction capability, and redundancy. Numerical results show that the proposed codes outperform classical short-length codes in scenarios requiring moderate block lengths, such as those applicable in certain segments of 5G and IoT networks. Unlike conventional codes, these constructions allow enhanced structural flexibility that can be tuned for various application-specific parameters. While the potential relevance to quantum-safe communication is acknowledged, it is not the primary focus of this study. This work demonstrates how extending classical coding techniques into non-traditional algebraic domains opens up new directions for designing robust and efficient communication codes. Full article
(This article belongs to the Special Issue Mathematics for Algebraic Coding Theory and Cryptography)
18 pages, 3495 KiB  
Article
Next-Generation Light Harvesting: MXene (Ti3C2Tx)-Based Metamaterial Absorbers for a Broad Wavelength Range from 0.3 μm to 18 μm
by Abida Parveen, Deepika Tyagi, Vijay Laxmi, Naeem Ullah, Faisal Ahmad, Ahsan Irshad, Keyu Tao and Zhengbiao Ouyang
Materials 2025, 18(14), 3273; https://doi.org/10.3390/ma18143273 - 11 Jul 2025
Viewed by 375
Abstract
Electromagnetic wave (EMW) absorption materials are crucial for a wide range of applications, yet most existing materials suffer from complex fabrication and narrow absorption bands, particularly under harsh environmental conditions. In this study, we introduce a broadband metamaterial absorber based on Ti3 [...] Read more.
Electromagnetic wave (EMW) absorption materials are crucial for a wide range of applications, yet most existing materials suffer from complex fabrication and narrow absorption bands, particularly under harsh environmental conditions. In this study, we introduce a broadband metamaterial absorber based on Ti3C2O2 MXene, a novel two-dimensional material that uniquely combines high electrical and metallic conductivity with hydrophilicity, biocompatibility, and an extensive surface area. Through advanced finite-difference time-domain (FDTD) simulations, the proposed absorber achieves over 95% absorption from 0.3 µm to 18 µm. Additionally, other MXene variants, including Ti3C2F2 and Ti3C2(OH)2, demonstrate robust absorption above 85%. This absorber not only outperforms previously reported structures in terms of efficiency and spectral coverage but also opens avenues for integration into applications such as infrared sensing, energy harvesting, wearable electronics, and Internet of Things (IoT) systems. Full article
Show Figures

Figure 1

18 pages, 5006 KiB  
Article
Time-Domain ADC and Security Co-Design for SiP-Based Wireless SAW Sensor Readers
by Zhen Mao, Bing Li, Linning Peng and Jinghe Wei
Sensors 2025, 25(14), 4308; https://doi.org/10.3390/s25144308 - 10 Jul 2025
Viewed by 275
Abstract
The signal-processing architecture of passive surface acoustic wave (SAW) sensors presents significant implementation challenges due to its radar-like operational principle and the inherent complexity of discrete component-based hardware design. While System-in-Package (SiP) has demonstrated remarkable success in miniaturizing electronic systems for smartphones, automotive [...] Read more.
The signal-processing architecture of passive surface acoustic wave (SAW) sensors presents significant implementation challenges due to its radar-like operational principle and the inherent complexity of discrete component-based hardware design. While System-in-Package (SiP) has demonstrated remarkable success in miniaturizing electronic systems for smartphones, automotive electronics, and IoT applications, its potential for revolutionizing SAW sensor interrogator design remains underexplored. This paper presents a novel architecture that synergistically combines time-domain ADC design with SiP-based miniaturization to achieve unprecedented simplification of SAW sensor readout systems. The proposed time-domain ADC incorporates an innovative delay chain calibration methodology that integrates physical unclonable function (PUF) principles during time-to-digital converter (TDC) characterization, enabling the simultaneous generation of unique system IDs. The experimental results demonstrate that the integrated security mechanism provides variable-length bit entropy for device authentication, and has a reliability of 97.56 and uniqueness of 49.43, with 53.28 uniformity, effectively addressing vulnerability concerns in distributed sensor networks. The proposed SiP is especially suitable for space-constrained IoT applications requiring robust physical-layer security. This work advances the state-of-the-art wireless sensor interfaces by demonstrating how time-domain signal processing and advanced packaging technologies can be co-optimized to address performance and security challenges in next-generation sensor systems. Full article
Show Figures

Figure 1

32 pages, 6788 KiB  
Article
Knee Osteoarthritis Detection and Classification Using Autoencoders and Extreme Learning Machines
by Jarrar Amjad, Muhammad Zaheer Sajid, Ammar Amjad, Muhammad Fareed Hamid, Ayman Youssef and Muhammad Irfan Sharif
AI 2025, 6(7), 151; https://doi.org/10.3390/ai6070151 - 8 Jul 2025
Viewed by 542
Abstract
Background/Objectives: Knee osteoarthritis (KOA) is a prevalent disorder affecting both older adults and younger individuals, leading to compromised joint function and mobility. Early and accurate detection is critical for effective intervention, as treatment options become increasingly limited as the disease progresses. Traditional diagnostic [...] Read more.
Background/Objectives: Knee osteoarthritis (KOA) is a prevalent disorder affecting both older adults and younger individuals, leading to compromised joint function and mobility. Early and accurate detection is critical for effective intervention, as treatment options become increasingly limited as the disease progresses. Traditional diagnostic methods rely heavily on the expertise of physicians and are susceptible to errors. The demand for utilizing deep learning models in order to automate and improve the accuracy of KOA image classification has been increasing. In this research, a unique deep learning model is presented that employs autoencoders as the primary mechanism for feature extraction, providing a robust solution for KOA classification. Methods: The proposed model differentiates between KOA-positive and KOA-negative images and categorizes the disease into its primary severity levels. Levels of severity range from “healthy knees” (0) to “severe KOA” (4). Symptoms range from typical joint structures to significant joint damage, such as bone spur growth, joint space narrowing, and bone deformation. Two experiments were conducted using different datasets to validate the efficacy of the proposed model. Results: The first experiment used the autoencoder for feature extraction and classification, which reported an accuracy of 96.68%. Another experiment using autoencoders for feature extraction and Extreme Learning Machines for actual classification resulted in an even higher accuracy value of 98.6%. To test the generalizability of the Knee-DNS system, we utilized the Butterfly iQ+ IoT device for image acquisition and Google Colab’s cloud computing services for data processing. Conclusions: This work represents a pioneering application of autoencoder-based deep learning models in the domain of KOA classification, achieving remarkable accuracy and robustness. Full article
(This article belongs to the Special Issue AI in Bio and Healthcare Informatics)
Show Figures

Figure 1

Back to TopTop