Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (3,678)

Search Parameters:
Keywords = IoT environment

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
21 pages, 598 KB  
Article
Security-Aware Task Offloading in IoT Edge Networks Using Software-Defined Networking
by Ahmed Raoof Tawfeeq Al-Hasani, Ali Broumandnia and Hamid Haj Seyyed Javadi
Math. Comput. Appl. 2026, 31(3), 72; https://doi.org/10.3390/mca31030072 - 1 May 2026
Abstract
The rapid proliferation of Internet of Things (IoT) devices increases the demand for task offloading mechanisms that satisfy strict latency constraints while limiting security exposure in edge computing environments. This paper proposes a security-aware task offloading framework for IoT edge networks, using Software-Defined [...] Read more.
The rapid proliferation of Internet of Things (IoT) devices increases the demand for task offloading mechanisms that satisfy strict latency constraints while limiting security exposure in edge computing environments. This paper proposes a security-aware task offloading framework for IoT edge networks, using Software-Defined Networking (SDN) as a centralized control plane. The SDN controller combines real-time monitoring, threat-aware risk estimation, and a lightweight heuristic decision engine to assign tasks to heterogeneous edge nodes according to latency constraints, resource availability, and task security sensitivity. To avoid optimistic scalability assumptions, the evaluation explicitly models contention through load-dependent queueing delay at edge nodes and reduced effective bandwidth on shared links. Simulation results with realistic IoT task parameters and heterogeneous edge capacities show that the proposed framework achieves an average latency of approximately 125±5 ms, a task completion ratio (TCR) of about 92±2%, and a security success rate (SSR) near 95±1.5%, compared to the considered baselines. These results indicate that incorporating risk assessment into SDN-based offloading decisions can improve security-related outcomes while maintaining practical performance under contention. Limitations include the use of an analytical risk model and a single-controller SDN setting; future work will investigate multi-controller deployments, attack-trace-driven evaluation, and energy-aware extensions. Full article
(This article belongs to the Special Issue Applied Optimization in Automatic Control and Systems Engineering)
23 pages, 2625 KB  
Article
An Enhanced XGBoost-Based Framework for Efficient Multi-Class Cyber Threat Detection in Industrial IoT Networks
by Adel A. Ahmed and Talal A. A. Abdullah
Technologies 2026, 14(5), 274; https://doi.org/10.3390/technologies14050274 - 1 May 2026
Abstract
Securing Industrial IoT (IIoT) network environments remains a significant challenge due to the increasing complexity of interconnected sensors, actuators, gateways, and control systems, which are frequent targets of cyberattacks. These threats can lead to operational disruptions, financial losses, and safety risks. This paper [...] Read more.
Securing Industrial IoT (IIoT) network environments remains a significant challenge due to the increasing complexity of interconnected sensors, actuators, gateways, and control systems, which are frequent targets of cyberattacks. These threats can lead to operational disruptions, financial losses, and safety risks. This paper proposes an efficient multi-stage intrusion detection framework based on an enhanced Extreme Gradient Boosting (XGBoost) model for IIoT environments. The proposed framework integrates data preprocessing, class imbalance handling, hyperparameter optimization, probability calibration, and class-specific decision thresholds within a unified pipeline. In addition, calibrated probability outputs are utilized as continuous indicators of prediction confidence, enabling more reliable and risk-aware decision-making. The hierarchical multi-stage design decomposes the detection task into progressively refined classification levels, improving discrimination among complex and overlapping attack categories. The framework is evaluated using the Edge-IIoTset benchmark dataset, which reflects realistic IIoT network traffic under both normal and malicious conditions. Experimental results demonstrate that the proposed approach achieved significant performance improvements, including up to 21% increase in recall and 15% improvement in macro F1 score compared to the baseline models. Furthermore, the model exhibits low inference latency and supports efficient deployment in time-sensitive IIoT monitoring scenarios. These results indicate that the proposed framework provides an effective and scalable solution for multi-class cyber threat detection in IIoT networks. Full article
(This article belongs to the Special Issue IoT-Enabling Technologies and Applications—2nd Edition)
Show Figures

Figure 1

36 pages, 7813 KB  
Systematic Review
Smart Indoor Lighting for Sustainable Buildings: A Systematic Bibliometric Review of Human-Centric Control, IoT Platforms, and Automation-Related Optimization
by Luis Tipán, Cristian Cuji and Jorge Muñoz-Pilco
Sustainability 2026, 18(9), 4411; https://doi.org/10.3390/su18094411 - 30 Apr 2026
Abstract
Indoor lighting systems are a significant contributor to building energy consumption while also directly affecting occupant comfort and circadian regulation. Recent advances in smart lighting have introduced adaptive and human-centric approaches; however, the integration of optimization-oriented control strategies with interoperable automation frameworks remains [...] Read more.
Indoor lighting systems are a significant contributor to building energy consumption while also directly affecting occupant comfort and circadian regulation. Recent advances in smart lighting have introduced adaptive and human-centric approaches; however, the integration of optimization-oriented control strategies with interoperable automation frameworks remains only partially articulated in the literature. This study presents a systematic bibliometric review of smart indoor lighting research, with particular attention to the roles of hyper-heuristics (HH), Internet of Things (IoT) platforms, and IFTTT/Event–Condition–Action (ECA) automation. A PRISMA-based methodology was applied across Scopus, Web of Science, and IEEE Xplore for the period 2010–2025. A total of 5529 records were identified, with 5229 screened after duplicate removal, and 27 core studies included following eligibility assessment. To reduce the risk of over-interpreting null intersections, the review also incorporated a search-sensitivity analysis based on expanded query formulations and title–abstract screening. Bibliometric analysis was conducted using MATLAB and VOSviewer to identify publication trends, technological clusters, and patterns of fragmentation across the literature. The results indicate rapid growth in IoT-based and energy-aware lighting systems, alongside mature research in circadian and comfort-driven lighting. However, explicit indexed evidence connecting hyper-heuristics with IoT platforms and IFTTT/ECA frameworks remains sparse and fragmented in the available literature. Co-occurrence analysis further reveals weak metadata-level connections between optimization techniques and IoT protocols, while the sensitivity analysis confirms that broadened retrieval improves recall but still yields only limited directly relevant evidence. Overall, the review identifies a gap in the explicit convergence of optimization, interoperable IoT infrastructure, and event-driven automation for human-centric indoor lighting. On this basis, it outlines a conceptual integration framework combining hyper-heuristics, IoT middleware, and event-driven control. The findings provide a structured roadmap for future research and implementation-oriented studies aimed at improving both energy efficiency and human-centric comfort in smart indoor environments. Full article
(This article belongs to the Special Issue Smart Grid and Sustainable Energy Systems)
22 pages, 2321 KB  
Article
A Deployment-Aware Data Processing Approach for Accuracy and Authenticity Evaluation of Artificial Emotional Intelligence in IoT Edge with Deep Learning
by Şükrü Mustafa Kaya
Appl. Sci. 2026, 16(9), 4394; https://doi.org/10.3390/app16094394 - 30 Apr 2026
Abstract
Artificial Emotional Intelligence (AEI) has gained significant attention for enabling machines to recognize and interpret human affective states through modalities such as speech. While deep learning-based speech emotion recognition (SER) models have achieved promising accuracy levels, their practical deployment in resource-constrained IoT edge [...] Read more.
Artificial Emotional Intelligence (AEI) has gained significant attention for enabling machines to recognize and interpret human affective states through modalities such as speech. While deep learning-based speech emotion recognition (SER) models have achieved promising accuracy levels, their practical deployment in resource-constrained IoT edge environments remains insufficiently explored. In particular, there is a lack of systematic evaluation approaches that jointly consider classification performance, computational efficiency, and deployment feasibility under edge-oriented operational constraints. In this study, I address this gap by proposing a deployment-aware evaluation perspective for SER systems operating under IoT edge constraints. Rather than introducing a new model architecture, I focus on establishing a unified and reproducible evaluation framework that reflects practical deployment considerations for edge-based intelligent systems. Within this framework, three widely used deep learning architectures, convolutional neural networks (CNN), long short-term memory (LSTM), and dense neural networks, are systematically analyzed using the EMODB dataset. The experimental results demonstrate that CNN-based models achieve the most consistent classification performance, with peak validation accuracy reaching approximately 84%, while also providing a favorable balance between recognition performance and computational efficiency. To better reflect deployment-oriented evaluation, the study also considers latency-related behavior and computational characteristics relevant to edge computing environments based on benchmark-driven estimations. The findings highlight the importance of deployment-aware evaluation strategies and provide practical insights for selecting suitable model architectures in edge-oriented speech emotion recognition scenarios. This study contributes to bridging the gap between theoretical deep learning performance and practical feasibility considerations in IoT-based intelligent systems. Full article
Show Figures

Figure 1

30 pages, 17252 KB  
Article
From BIM to Digital Twin: A Data-Driven Closed-Loop Framework for Dynamic Construction Progress Management
by Han Wu, Zhaoyi Zeng, Yangfa Peng, Qi Yang, Hao Deng, Jian Yu and Peng Zhou
Buildings 2026, 16(9), 1788; https://doi.org/10.3390/buildings16091788 - 30 Apr 2026
Abstract
Traditional construction progress management is hindered by reliance on manual monitoring, delayed information feedback, and a lack of proactive correction capabilities. To address these issues, this study proposes a data-driven closed-loop framework for dynamic progress management leveraging Building Information Modeling (BIM) and Digital [...] Read more.
Traditional construction progress management is hindered by reliance on manual monitoring, delayed information feedback, and a lack of proactive correction capabilities. To address these issues, this study proposes a data-driven closed-loop framework for dynamic progress management leveraging Building Information Modeling (BIM) and Digital Twin (DT). The proposed framework is operationalized through three integrated modules: (i) a dynamic perception layer that synchronizes on-site conditions via IoT and digitized construction logs; (ii) a stochastic prediction engine coupling machine learning with Monte Carlo Simulation (MCS) to quantify delay risks; and (iii) an optimization module based on a Constraint Satisfaction Problem (CSP) model for automated strategy generation. The system’s efficacy was preliminarily evaluated through a prototype application on a primary school building project. Findings from this case indicate that the framework enables near real-time synchronization for schedule deviation warnings, effectively compressing the information latency from days to within a single management cycle. Furthermore, within the empirical scope of the case study, the implementation of DT-driven strategies was associated with a 3-day schedule advancement relative to the simulated baseline and a 15% reduction in the resource idle rate compared to the pre-deployment phase. This study provides a potential pathway for enhancing progress control precision in similar construction environments. Full article
Show Figures

Figure 1

23 pages, 7922 KB  
Article
Hardware-Assisted Security Enhancements for an FPGA-ARM Embedded Vision System in IoT Applications
by Tomyslav Sledevič and Darius Andriukaitis
Electronics 2026, 15(9), 1887; https://doi.org/10.3390/electronics15091887 - 29 Apr 2026
Abstract
EmbeddedField-Programmable Gate Array (FPGA)-Advanced RISC Machine (ARM) systems used in industrial and Internet of Things (IoT) environments increasingly operate as network-connected edge devices. While such connectivity enables distributed processing and remote monitoring, it also exposes embedded vision nodes to security threats, including command [...] Read more.
EmbeddedField-Programmable Gate Array (FPGA)-Advanced RISC Machine (ARM) systems used in industrial and Internet of Things (IoT) environments increasingly operate as network-connected edge devices. While such connectivity enables distributed processing and remote monitoring, it also exposes embedded vision nodes to security threats, including command injection, frame replay, data tampering, and abnormal communication traffic. This paper presents a hardware-assisted security architecture for an FPGA-ARM embedded vision system designed for high-speed image acquisition and network streaming. The proposed solution integrates several lightweight protection mechanisms directly into the FPGA processing pipeline, including frame replay detection, cyclic redundancy check (CRC)-based frame integrity verification, frame sequence monitoring, authenticated command execution, communication anomaly monitoring, and hardware-rooted trust primitives, such as a ring-oscillator physical unclonable function (PUF) and a pseudo-random generator. Optional secure communication is provided via a lightweight ASCON-authenticated encryption core. The architecture was implemented on a Cyclone V System-on-Chip (SoC) platform using an industrial Camera Link camera and evaluated in a low-latency image-acquisition setup operating at 100 fps, with data throughput exceeding 1 Gbps. Experimental results demonstrate that the proposed security architecture introduces only about 1.6% additional FPGA logic utilization while maintaining full real-time acquisition performance. The presented approach demonstrates that practical hardware-level security mechanisms can be integrated into FPGA-based embedded vision nodes with minimal architectural modifications and negligible performance overhead. Full article
28 pages, 9414 KB  
Article
FCDNet: An Efficient and Cost-Effective Strawberry Disease Detection Model for Smart Farming Management
by Ruoyu Ouyang, Junying Jiang, Yujia Shao, Jialei Zhan and Xiaoyu Zhang
Plants 2026, 15(9), 1341; https://doi.org/10.3390/plants15091341 - 28 Apr 2026
Viewed by 56
Abstract
With the rapid development of precision agriculture and smart farming management, accurate crop disease detection has become a critical tool for optimizing agricultural resource allocation, controlling operational costs, and supporting scientific plant protection strategies. However, real-world field environments are often characterized by strong [...] Read more.
With the rapid development of precision agriculture and smart farming management, accurate crop disease detection has become a critical tool for optimizing agricultural resource allocation, controlling operational costs, and supporting scientific plant protection strategies. However, real-world field environments are often characterized by strong background interference, multiple concurrent diseases, and fine-grained lesion differences, posing significant challenges to existing detection methods in practical agricultural Internet of Things (IoT) applications. In this paper, we propose Freq-spatial Context Dynamic Network(FCDNet), an efficient and cost-effective detection model tailored for multi-category strawberry disease recognition in complex field management scenarios. The proposed model integrates a Freq-Spatial Feature Module (FSFM), a Context Guide Fusion Module (CGFM), and a Task Align Dynamic Detection Head (TADDH), enabling enhanced expression of high-frequency micro-lesions, adaptive filtering of field background noise, and spatial alignment of classification and regression tasks, while maintaining a lightweight architecture suitable for low-cost agricultural edge devices. Extensive experiments conducted on the newly constructed Strawberry Disease Dataset-7(S7DD) demonstrate that FCDNet consistently outperforms existing mainstream methods, achieving an F1-score of 91.0% and an mAP@0.5 of 94.6%. The model’s architectural robustness and capacity for generalization are further substantiated by evaluations across diverse agricultural datasets using PlantDoc and ALDOD. Ultimately, FCDNet became a practical and cost-effective tool for real-time detection of strawberry diseases, directly supporting more accurate yield forecasting and risk management in smart agriculture systems. Full article
(This article belongs to the Special Issue Advances in Artificial Intelligence for Plant Research—2nd Edition)
Show Figures

Figure 1

21 pages, 697 KB  
Article
Assessing Internet of Things Readiness on University Campuses: A Smart Campus-Oriented Approach
by Dejan Arsenijević, Jasmina Arsenijević, Srđan Tegeltija, Xiaoshuan Zhang, Gordana Ostojić and Stevan Stankovski
IoT 2026, 7(2), 39; https://doi.org/10.3390/iot7020039 - 27 Apr 2026
Viewed by 84
Abstract
The Internet of Things (IoT) is increasingly recognized as a core digital infrastructure supporting digital transformation, particularly in complex environments such as university campuses, which can be conceptualized as smart campus ecosystems. However, many organizations encounter difficulties when implementing IoT due to insufficient [...] Read more.
The Internet of Things (IoT) is increasingly recognized as a core digital infrastructure supporting digital transformation, particularly in complex environments such as university campuses, which can be conceptualized as smart campus ecosystems. However, many organizations encounter difficulties when implementing IoT due to insufficient organizational and technological readiness. This paper presents the University Campus IoT (UCIoT) readiness assessment model, which conceptualizes IoT readiness as a manifestation of organizational digital transformation readiness within the smart campus context. The model consists of 24 dimensions grouped into organizational and technological categories and is implemented through structured questionnaires and a supporting software tool. The model was developed using the design science research methodology and evaluated through a case study conducted at the University Campus of Novi Sad, Serbia. The results demonstrate that the model provides a structured and realistic assessment of IoT readiness and helps identify organizational and technological bottlenecks relevant to IoT implementation. The main contribution of this research is a context-specific readiness assessment framework tailored to university campuses that integrates organizational, technological, and client readiness dimensions. Full article
29 pages, 9465 KB  
Systematic Review
Digital Twins for Thermal Comfort and Energy Efficiency in Buildings: A Systematic Review
by Anwar Basunbul, Raneem Anwar, Rana El Shafei, Abrar Baamer, Samah Elkhateeb and Marwa Abouhassan
Buildings 2026, 16(9), 1715; https://doi.org/10.3390/buildings16091715 - 27 Apr 2026
Viewed by 213
Abstract
This systematic review builds upon 51 published empirical studies out of 354 studies that were published between 2020 and 2025 to assess the effectiveness of building-scale digital twins (DTs) in providing thermal comfort and energy efficiency, and improving the indoor environment and system [...] Read more.
This systematic review builds upon 51 published empirical studies out of 354 studies that were published between 2020 and 2025 to assess the effectiveness of building-scale digital twins (DTs) in providing thermal comfort and energy efficiency, and improving the indoor environment and system reliability. The results show that there is a rapidly developing field focused on five thematic clusters: system architecture, artificial intelligence and machine learning (AI/ML)-driven control, human-centric engagement, predictive maintenance, and blockchain-enabled cybersecurity. Existing DT frameworks not only achieve real-time building information modeling (BIM)–Internet of Things (IoT) integration with prediction errors under 10%, but reinforcement learning controllers are also able to achieve 25–40% heating, ventilation, and air conditioning (HVAC) energy savings, and human-centric interfaces increase thermal satisfaction from 0.64 up to 1.2 Likert points. Predictive maintenance models have diagnostic accuracies of 91–97%, and new blockchain applications enhance data integrity, but largely at the prototype level. The cross-cluster convergence signifies the transition towards adaptive, socio-technical systems with an equilibrium of efficiency, comfort, reliability, and trust. The major weaknesses identified in this paper were a lack of longitudinal validation, climatic bias and ethical governance. A framework of a modular six-layer architecture is proposed after the review of 51 studies, which facilitates scalable, interoperable, and ethically robust DT deployments. Full article
(This article belongs to the Section Building Energy, Physics, Environment, and Systems)
Show Figures

Figure 1

35 pages, 5703 KB  
Article
An Interpretable Agent-Assisted Pipeline for Statistical Anomaly Detection in IoT Temperature Time Series
by Luis Miguel Pires and José Braga de Vasconcelos
Electronics 2026, 15(9), 1840; https://doi.org/10.3390/electronics15091840 - 27 Apr 2026
Viewed by 223
Abstract
The research presents an interpretable framework which detects anomalies in IoT temperature time-series data with low complexity for use in edge environments that lack resources. The proposed solution uses three traditional statistical filters which include Hampel and Interquartile Range (IQR) and Z-Score to [...] Read more.
The research presents an interpretable framework which detects anomalies in IoT temperature time-series data with low complexity for use in edge environments that lack resources. The proposed solution uses three traditional statistical filters which include Hampel and Interquartile Range (IQR) and Z-Score to build an agent-assisted decision layer which selects the best method through a multi-criteria cost function. The framework runs tests on a structured synthetic dataset which contains seven different anomaly tests and on an actual IoT dataset which was gathered from eight separate sensor points. The researchers use standard anomaly detection metrics which include precision and recall and F1-score and false positive rate to conduct their complete evaluation. The proposed method is tested against two machine learning baseline methods which are Isolation Forest and One-Class Support Vector Machine (OC-SVM). The results show that the agent-assisted method achieves detection results which match industry standards while showing high interpretability and low processing needs. The framework demonstrates its ability to function in actual IoT environments through its use of authentic real-world data, and also basic statistical techniques together with an adjustable decision system create a strong and understandable method to detect anomalies in IoT sensing systems. Full article
(This article belongs to the Section Artificial Intelligence)
Show Figures

Figure 1

29 pages, 2359 KB  
Article
DC-PBFT: A Censorship-Resistant PBFT Consensus Algorithm Based on Power Balancing
by Jiawei Lin and Jiali Zheng
Electronics 2026, 15(9), 1818; https://doi.org/10.3390/electronics15091818 - 24 Apr 2026
Viewed by 209
Abstract
The classic design of the Practical Byzantine Fault Tolerance (PBFT) protocol relies on a centralized primary node, which not only creates a performance bottleneck but also introduces severe data censorship risks, threatening the data integrity and security of Edge Computing networks. To address [...] Read more.
The classic design of the Practical Byzantine Fault Tolerance (PBFT) protocol relies on a centralized primary node, which not only creates a performance bottleneck but also introduces severe data censorship risks, threatening the data integrity and security of Edge Computing networks. To address this challenge, this paper proposes DC-PBFT (Decoupled PBFT), a censorship-resistant consensus protocol for Edge-Internet of Things (Edge-IoT) environments. The core innovation of DC-PBFT lies in the decoupling of the Proposer and Primary roles, supplemented by Verifiable Random Function (VRF)-based dynamic role rotation, which fundamentally eliminates the arbitrary power of a single node. Building on this, the protocol introduces a parallel group consensus mechanism: an elected Consensus Committee (CC) composed of Active Edge Nodes leads the consensus, while an independent Replica Network (RN) performs parallel validation. When a disagreement arises, the protocol triggers a global disagreement arbitration process involving all nodes to guarantee final consistency and attribute fault. To ensure long-term incentive compatibility, we also designed a hybrid election mechanism combining Proof-of-Stake and dynamic reputation, along with corresponding economic incentives and a tiered penalty system. Theoretical analysis proves that DC-PBFT satisfies Consistency and Liveness, and achieves strong censorship resistance guarantees. Simulation results demonstrate that DC-PBFT’s scalability significantly outperforms PBFT and RepChain; its reputation mechanism effectively improves long-term performance under sustained Byzantine attacks; and, compared to asynchronous censorship-resistant protocols like HoneyBadgerBFT, DC-PBFT achieves censorship resistance with over 45% lower transaction confirmation latency. Full article
Show Figures

Figure 1

21 pages, 1778 KB  
Article
A Post-Quantum Authentication and Key Agreement Protocol Based on Lattice-Based KEM for Secure Network Environments
by Xiaoping Chen, Wangyu Wu, Guangmin Liang, Haonan Tan and Yicheng Yu
Entropy 2026, 28(5), 490; https://doi.org/10.3390/e28050490 (registering DOI) - 24 Apr 2026
Viewed by 139
Abstract
In emerging environments such as cloud computing and the Internet of Things (IoT), secure authentication and key negotiation play a crucial role in protecting data transmitted over public networks. However, many existing authentication protocols are still designed based on classical public-key cryptography primitives, [...] Read more.
In emerging environments such as cloud computing and the Internet of Things (IoT), secure authentication and key negotiation play a crucial role in protecting data transmitted over public networks. However, many existing authentication protocols are still designed based on classical public-key cryptography primitives, and quantum computing may threaten their security. To address this challenge, we propose a post-quantum authentication and key agreement protocol that uses the lattice-based Kyber key encapsulation mechanism (KEM). Our proposed protocol integrates cryptographic authentication, smart card protection, and post-quantum key encapsulation mechanisms, enabling mutual authentication between users and servers and securely establishing session keys. The security of the protocol is formally analyzed in the Real-or-Random (ROR) model under the random oracle assumption and the IND-CCA security of the underlying KEM scheme. Furthermore, through informal security analysis, we have further demonstrated that the protocol possesses important security properties, including anonymity, untraceability, perfect forward confidentiality, and resistance to known attacks. In addition, the computational cost and communication overhead of the proposed scheme are evaluated and compared with several representative authentication protocols. The results show that the proposed protocol can provide strong security while maintaining low computational cost and communication overhead. Full article
(This article belongs to the Special Issue Quantum Information Security)
41 pages, 3214 KB  
Review
The Intelligent Home: A Systematic Review of Technological Pillars, Emerging Paradigms, and Future Directions
by Khalil M. Abdelnaby, Mohammed A. F. Al-Husainy, Mohammad O. Alhawarat, Mohamed A. Rohaim, Khairy M. Assar and Khaled A. Elshafey
Symmetry 2026, 18(5), 718; https://doi.org/10.3390/sym18050718 - 24 Apr 2026
Viewed by 156
Abstract
Home automation is undergoing a paradigm shift from connected IoT environments with rule based control to intelligent homes exhibiting ambient intelligence and proactive adaptation. Artificial intelligence, privacy-preserving sensing, and converging connectivity standards are the primary forces driving this transition. This systematic literature review [...] Read more.
Home automation is undergoing a paradigm shift from connected IoT environments with rule based control to intelligent homes exhibiting ambient intelligence and proactive adaptation. Artificial intelligence, privacy-preserving sensing, and converging connectivity standards are the primary forces driving this transition. This systematic literature review synthesizes the technological foundations, architectural developments, emerging paradigms, and socio-technical challenges characterizing the next generation of smart homes, evaluated against the original Ambient Intelligence (AmI) vision. Following PRISMA 2020 guidelines, searches were conducted across four databases—IEEE Xplore, ACM Digital Library, Scopus, and Web of Science—covering studies published between January 2020 and June 2025. From 3450 records, 113 studies were selected through a two-reviewer screening procedure with inter-rater reliability assessments. Quality was assessed using a modified JBI Critical Appraisal Checklist, and findings were synthesized through thematic analysis. Three converging technological pillars were identified: multi-modal privacy-preserving sensing including mmWave radar; a hierarchical cloud-edge TinyML intelligence engine; and unified connectivity through the Matter/Thread standard. Emerging paradigms include LLM-based cognitive orchestration, hyper-personalization, Digital Twin simulation, and grid-interactive prosumer energy management. Realizing that the intelligent home vision requires addressing the privacy–security–trust trilemma, algorithmic bias, system reliability, and human–agent collaboration, a research roadmap encompassing explainable AI, privacy-by-design, lifelong learning, and standardized ethical auditing is proposed. Full article
24 pages, 1869 KB  
Article
Neuro-Fuzzy Approach for Detecting DDoS Attacks in IoT Environments Applied to Biosignal Monitoring
by Angela M. Parra and Marcia M. Bayas
Technologies 2026, 14(5), 253; https://doi.org/10.3390/technologies14050253 - 24 Apr 2026
Viewed by 257
Abstract
Distributed denial-of-service (DDoS) attacks pose a critical threat to the availability of the Internet of Medical Things (IoMT). This paper proposes an intrusion detection system (IDS) based on a hybrid neuro-fuzzy-inspired approach to identify DDoS attacks in IoMT environments. The architecture combines an [...] Read more.
Distributed denial-of-service (DDoS) attacks pose a critical threat to the availability of the Internet of Medical Things (IoMT). This paper proposes an intrusion detection system (IDS) based on a hybrid neuro-fuzzy-inspired approach to identify DDoS attacks in IoMT environments. The architecture combines an ensemble of decision trees, a sigmoidal smoothing mechanism, and a multilayer neural meta-classifier, enabling the modeling of nonlinear relationships between legitimate and malicious traffic without requiring explicit fuzzy rules or a formal fuzzy inference mechanism. The evaluation was conducted using the public DoS/DDoS-MQTT-IoT dataset, which was extended by incorporating legitimate traffic generated by electrocardiography (ECG) monitoring devices to approximate real operational IoMT conditions. The model was validated using stratified cross-validation and bootstrap procedures. In the extended IoMT scenario including ECG traffic, the proposed approach achieved an area under the ROC curve (AUC) of 0.904 and an F1 score of 0.823. Finally, the IDS was integrated into an intrusion detection and prevention system (IDPS) capable of detecting anomalous traffic patterns within three seconds and automatically blocking malicious IP addresses after repeated detections. Full article
Show Figures

Graphical abstract

22 pages, 1390 KB  
Article
BIM Collaboration Format (BCF) as an Example of Reification and Serialization in Building Information Modeling (BIM) Practice
by Andrzej Szymon Borkowski, Magdalena Kładź and Mikołaj Michalak
Buildings 2026, 16(9), 1669; https://doi.org/10.3390/buildings16091669 - 23 Apr 2026
Viewed by 215
Abstract
Building Information Modeling (BIM) has fundamentally changed the way interdisciplinary coordination works in construction projects; however, the theoretical mechanisms underlying open collaboration standards in this field remain insufficiently explored. This article fills this gap by presenting a systematic analysis of the BIM Collaboration [...] Read more.
Building Information Modeling (BIM) has fundamentally changed the way interdisciplinary coordination works in construction projects; however, the theoretical mechanisms underlying open collaboration standards in this field remain insufficiently explored. This article fills this gap by presenting a systematic analysis of the BIM Collaboration Format (BCF) through the lens of reification and serialization, two fundamental concepts in information systems theory. Although the BCF format is widely used in the industry and implemented in major BIM tools for clash detection and issue tracking, the existing literature treats it primarily as an operational tool, overlooking the deeper information systems principles that govern its architecture. The analysis demonstrates that BCF achieves reification by transforming informal coordination knowledge—such as verbally communicated clashes, scattered email threads, and undocumented design decisions—into first-class objects (Topic, Comment, Viewpoint) equipped with unique identifiers, typed attributes, ownership, temporal metadata, and formalized inter-object relationships. Further analysis was conducted on BCF’s serialization mechanisms, including XML encoding for file exchange, JSON for RESTful API communication, and ZIP archiving as a distribution container, each of which was selected to balance human readability, schema validation, compression, and cross-platform portability. The complementarity of these two mechanisms was examined: reification determines what to preserve and in what structure, while serialization determines how to encode and in what format, which together enable interoperable, auditable, and automatable coordination workflows in heterogeneous software environments. The analysis was illustrated with a real-world BCF example from a major infrastructure project in Poland, demonstrating practical alignment between theoretical constructs and their implementation. The research results provide both a conceptual foundation for researchers working on openBIM standards and practical guidance for practitioners seeking to optimize issue management, the implementation of a Common Data Environment (CDE), and the specification of Exchange Information Requirements (EIR). The study contributes new knowledge in three areas: (1) To the best of the authors’ knowledge, it provides the first systematic theoretical analysis of BCF through the lens of reification and serialization, filling a gap between the format’s widespread practical use and its limited theoretical understanding. (2) It demonstrates how the formal criteria of reification (unique identity, typed attributes, ownership, temporal metadata, and inter-object relationships) map onto specific BCF entities, offering a transferable analytical framework for evaluating other openBIM standards. (3) It identifies the complementarity of reification and serialization as a design principle that can guide the development of future standards for digital twins and IoT-based facility management. Full article
(This article belongs to the Section Construction Management, and Computers & Digitization)
Back to TopTop