Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (575)

Search Parameters:
Keywords = communication rounds

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
24 pages, 1981 KB  
Article
A Lightweight Batch Authenticated Key Agreement Scheme Based on Fog Computing for VANETs
by Lihui Li, Huacheng Zhang, Song Li, Jianming Liu and Chi Chen
Symmetry 2025, 17(8), 1350; https://doi.org/10.3390/sym17081350 - 18 Aug 2025
Viewed by 182
Abstract
In recent years, fog-based vehicular ad hoc networks (VANETs) have become a hot research topic. Due to the inherent insecurity of open wireless channels between vehicles and fog nodes, establishing session keys through authenticated key agreement (AKA) protocols is critically important for securing [...] Read more.
In recent years, fog-based vehicular ad hoc networks (VANETs) have become a hot research topic. Due to the inherent insecurity of open wireless channels between vehicles and fog nodes, establishing session keys through authenticated key agreement (AKA) protocols is critically important for securing communications. However, existing AKA schemes face several critical challenges: (1) When a large number of vehicles initiate AKA requests within a short time window, existing schemes that process requests one by one individually incur severe signaling congestion, resulting in significant quality of service degradation. (2) Many AKA schemes incur excessive computational and communication overheads due to the adoption of computationally intensive cryptographic primitives (e.g., bilinear pairings and scalar multiplications on elliptic curve groups) and unreasonable design choices, making them unsuitable for the low-latency requirements of VANETs. To address these issues, we propose a lightweight batch AKA scheme based on fog computing. In our scheme, when a group of vehicles requests AKA sessions with the same fog node within the set time interval, the fog node aggregates these requests and, with assistance from the traffic control center, establishes session keys for all vehicles by a round of operations. It has significantly reduced the operational complexity of the entire system. Moreover, our scheme employs Lagrange interpolation and lightweight cryptographic tools, thereby significantly reducing both computational and communication overheads. Additionally, our scheme supports conditional privacy preservation and includes a revocation mechanism for malicious vehicles. Security analysis demonstrates that the proposed scheme meets the security and privacy requirements of VANETs. Performance evaluation indicates that our scheme outperforms existing state-of-the-art solutions in terms of efficiency. Full article
(This article belongs to the Special Issue Applications Based on Symmetry in Applied Cryptography)
Show Figures

Figure 1

13 pages, 857 KB  
Article
Software Agents as Information-Sharing Enhancers in Security-Sensitive Organizations
by Yonit Rusho, Daphne Ruth Raban, Michal Chalamish and Vered Pnueli
Future Internet 2025, 17(8), 373; https://doi.org/10.3390/fi17080373 - 18 Aug 2025
Viewed by 302
Abstract
This study examines the influence of software agents on information-sharing behavior within security-sensitive organizations, where confidentiality and hierarchical culture often limit the flow of knowledge. While such organizations aim to collect, analyze, and disseminate information for security purposes, internal sharing dynamics are shaped [...] Read more.
This study examines the influence of software agents on information-sharing behavior within security-sensitive organizations, where confidentiality and hierarchical culture often limit the flow of knowledge. While such organizations aim to collect, analyze, and disseminate information for security purposes, internal sharing dynamics are shaped by competing norms of secrecy and collaboration. To explore this tension, we developed a digital simulation game in which participants from security-sensitive organizations engaged in collaborative tasks over three rounds. In rounds two and three, software agents were introduced to interact with participants by sharing public and classified information. A total of 28 participants took part, generating 1626 text-based interactions. Findings indicate that (1) information-sharing patterns in security-sensitive contexts differ significantly from those in non-sensitive environments; (2) when software agents share classified information, participants are more likely to share sensitive data in return; (3) when participants are aware of the agents’ presence, they reduce classified sharing and increase public sharing; and (4) agents that share both public and classified information lead to decreased public and increased classified sharing. These results provide insight into the role of artificial agents in shaping communication behaviors in secure environments and inform strategies for training and design in knowledge-sensitive organizational settings. Full article
Show Figures

Figure 1

20 pages, 2632 KB  
Article
Lightweight Dynamic Advanced Encryption Standard Encryption Based on S-Box Reconfiguration and Real-Time Key Expansion for Secure Over-the-Air Communication
by Xinlei Hou and Wei Wang
Electronics 2025, 14(16), 3274; https://doi.org/10.3390/electronics14163274 - 18 Aug 2025
Viewed by 278
Abstract
The Advanced Encryption Standard (AES) symmetric encryption algorithm plays a crucial role in data encryption. To address the limitations of the fixed Substitution-box (S-box) and static key expansion strategy in AES. This paper proposes an improved AES scheme that integrates a dynamic S-box [...] Read more.
The Advanced Encryption Standard (AES) symmetric encryption algorithm plays a crucial role in data encryption. To address the limitations of the fixed Substitution-box (S-box) and static key expansion strategy in AES. This paper proposes an improved AES scheme that integrates a dynamic S-box structure with a key expansion mechanism based on dynamic perturbations. The dynamic S-box is generated by selecting affine transformation pairs and irreducible polynomials, and its cryptographic properties are tested in SageMath9.3 to obtain a set of S-boxes superior to the standard AES. In the key expansion process, the perturbation values generated by the hash function will be incorporated into the round key generation process to reduce the correlation between round keys. The improved AES algorithm, when applied to Over-the-Air (OTA) systems, not only achieves significant savings in storage resources of in-vehicle Electronic Control Units (ECUs) but also enhances the security of OTA communications. Furthermore, it consumes only a small amount of ECU computational resources, thereby effectively meeting the lightweight requirements of in-vehicle electronic control units. Full article
Show Figures

Figure 1

20 pages, 6757 KB  
Article
FLUID: Dynamic Model-Agnostic Federated Learning with Pruning and Knowledge Distillation for Maritime Predictive Maintenance
by Alexandros S. Kalafatelis, Angeliki Pitsiakou, Nikolaos Nomikos, Nikolaos Tsoulakos, Theodoros Syriopoulos and Panagiotis Trakadas
J. Mar. Sci. Eng. 2025, 13(8), 1569; https://doi.org/10.3390/jmse13081569 - 15 Aug 2025
Viewed by 359
Abstract
Predictive maintenance (PdM) is vital to maritime operations; however, the traditional deep learning solutions currently offered heavily depend on centralized data aggregation, which is impractical under the limited connectivity, privacy concerns, and resource constraints found in maritime vessels. Federated Learning addresses privacy by [...] Read more.
Predictive maintenance (PdM) is vital to maritime operations; however, the traditional deep learning solutions currently offered heavily depend on centralized data aggregation, which is impractical under the limited connectivity, privacy concerns, and resource constraints found in maritime vessels. Federated Learning addresses privacy by training models locally, yet most FL methods assume homogeneous client architectures and exchange full model weights, leading to heavy communication overhead and sensitivity to system heterogeneity. To overcome these challenges, we introduce FLUID, a dynamic, model-agnostic FL framework that combines client clustering, structured pruning, and student–teacher knowledge distillation. FLUID first groups vessels into resource tiers and calibrates pruning strategies on the most capable client to determine optimal sparsity levels. In subsequent FL rounds, clients exchange logits over a small reference set, decoupling global aggregation from specific model architectures. We evaluate FLUID on a real-world heavy-fuel-oil purifier dataset under realistic heterogeneous deployment. With mixed pruning across clients, FLUID achieves a global R2 of 0.9352, compared with 0.9757 for a centralized baseline. Predictive consistency also remains high for client-based data, with a mean per-client MAE of 0.02575 ± 0.0021 and a mean RMSE of 0.0419 ± 0.0036. These results demonstrate FLUID’s ability to deliver accurate, efficient, and privacy-preserving PdM in heterogeneous maritime fleets. Full article
(This article belongs to the Special Issue Intelligent Solutions for Marine Operations)
Show Figures

Figure 1

29 pages, 919 KB  
Article
DDoS Defense Strategy Based on Blockchain and Unsupervised Learning Techniques in SDN
by Shengmin Peng, Jialin Tian, Xiangyu Zheng, Shuwu Chen and Zhaogang Shu
Future Internet 2025, 17(8), 367; https://doi.org/10.3390/fi17080367 - 13 Aug 2025
Viewed by 350
Abstract
With the rapid development of technologies such as cloud computing, big data, and the Internet of Things (IoT), Software-Defined Networking (SDN) is emerging as a new network architecture for the modern Internet. SDN separates the control plane from the data plane, allowing a [...] Read more.
With the rapid development of technologies such as cloud computing, big data, and the Internet of Things (IoT), Software-Defined Networking (SDN) is emerging as a new network architecture for the modern Internet. SDN separates the control plane from the data plane, allowing a central controller, the SDN controller, to quickly direct the routing devices within the topology to forward data packets, thus providing flexible traffic management for communication between information sources. However, traditional Distributed Denial of Service (DDoS) attacks still significantly impact SDN systems. This paper proposes a novel dual-layer strategy capable of detecting and mitigating DDoS attacks in an SDN network environment. The first layer of the strategy enhances security by using blockchain technology to replace the SDN flow table storage container in the northbound interface of the SDN controller. Smart contracts are then used to process the stored flow table information. We employ the time window algorithm and the token bucket algorithm to construct the first layer strategy to defend against obvious DDoS attacks. To detect and mitigate less obvious DDoS attacks, we design a second-layer strategy that uses a composite data feature correlation coefficient calculation method and the Isolation Forest algorithm from unsupervised learning techniques to perform binary classification, thereby identifying abnormal traffic. We conduct experimental validation using the publicly available DDoS dataset CIC-DDoS2019. The results show that using this strategy in the SDN network reduces the average deviation of round-trip time (RTT) by approximately 38.86% compared with the original SDN network without this strategy. Furthermore, the accuracy of DDoS attack detection reaches 97.66% and an F1 score of 92.2%. Compared with other similar methods, under comparable detection accuracy, the deployment of our strategy in small-scale SDN network topologies provides faster detection speeds for DDoS attacks and exhibits less fluctuation in detection time. This indicates that implementing this strategy can effectively identify DDoS attacks without affecting the stability of data transmission in the SDN network environment. Full article
(This article belongs to the Special Issue DDoS Attack Detection for Cyber–Physical Systems)
Show Figures

Figure 1

21 pages, 787 KB  
Article
Rethinking Modbus-UDP for Real-Time IIoT Systems
by Ivan Cibrario Bertolotti
Future Internet 2025, 17(8), 356; https://doi.org/10.3390/fi17080356 - 5 Aug 2025
Viewed by 378
Abstract
The original Modbus specification for RS-485 and RS-232 buses supported broadcast transmission. As the protocol evolved into Modbus-TCP, to use the TCP transport, this useful feature was lost, likely due to the point-to-point nature of TCP connections. Later proposals did not restore the [...] Read more.
The original Modbus specification for RS-485 and RS-232 buses supported broadcast transmission. As the protocol evolved into Modbus-TCP, to use the TCP transport, this useful feature was lost, likely due to the point-to-point nature of TCP connections. Later proposals did not restore the broadcast transmission capability, although they used UDP as transport and UDP, by itself, would have supported it. Moreover, they did not address the inherent lack of reliable delivery of UDP, leaving datagram loss detection and recovery to the application layer. This paper describes a novel redesign of Modbus-UDP that addresses the aforementioned shortcomings. It achieves a mean round-trip time of only 38% with respect to Modbus-TCP and seamlessly supports a previously published protocol based on Modbus broadcast. In addition, the built-in retransmission of Modbus-UDP reacts more efficiently than the equivalent Modbus-TCP mechanism, exhibiting 50% of its round-trip standard deviation when subject to a 1% two-way IP datagram loss probability. Combined with the lower overhead of UDP versus TCP, this makes the redesigned Modbus-UDP protocol better suited for a variety of Industrial Internet of Things systems with limited computing and communication resources. Full article
Show Figures

Figure 1

23 pages, 3580 KB  
Article
Distributed Collaborative Data Processing Framework for Unmanned Platforms Based on Federated Edge Intelligence
by Siyang Liu, Nanliang Shan, Xianqiang Bao and Xinghua Xu
Sensors 2025, 25(15), 4752; https://doi.org/10.3390/s25154752 - 1 Aug 2025
Viewed by 453
Abstract
Unmanned platforms such as unmanned aerial vehicles, unmanned ground vehicles, and autonomous underwater vehicles often face challenges of data, device, and model heterogeneity when performing collaborative data processing tasks. Existing research does not simultaneously address issues from these three aspects. To address this [...] Read more.
Unmanned platforms such as unmanned aerial vehicles, unmanned ground vehicles, and autonomous underwater vehicles often face challenges of data, device, and model heterogeneity when performing collaborative data processing tasks. Existing research does not simultaneously address issues from these three aspects. To address this issue, this study designs an unmanned platform cluster architecture inspired by the cloud-edge-end model. This architecture integrates federated learning for privacy protection, leverages the advantages of distributed model training, and utilizes edge computing’s near-source data processing capabilities. Additionally, this paper proposes a federated edge intelligence method (DSIA-FEI), which comprises two key components. Based on traditional federated learning, a data sharing mechanism is introduced, in which data is extracted from edge-side platforms and placed into a data sharing platform to form a public dataset. At the beginning of model training, random sampling is conducted from the public dataset and distributed to each unmanned platform, so as to mitigate the impact of data distribution heterogeneity and class imbalance during collaborative data processing in unmanned platforms. Moreover, an intelligent model aggregation strategy based on similarity measurement and loss gradient is developed. This strategy maps heterogeneous model parameters to a unified space via hierarchical parameter alignment, and evaluates the similarity between local and global models of edge devices in real-time, along with the loss gradient, to select the optimal model for global aggregation, reducing the influence of device and model heterogeneity on cooperative learning of unmanned platform swarms. This study carried out extensive validation on multiple datasets, and the experimental results showed that the accuracy of the DSIA-FEI proposed in this paper reaches 0.91, 0.91, 0.88, and 0.87 on the FEMNIST, FEAIR, EuroSAT, and RSSCN7 datasets, respectively, which is more than 10% higher than the baseline method. In addition, the number of communication rounds is reduced by more than 40%, which is better than the existing mainstream methods, and the effectiveness of the proposed method is verified. Full article
Show Figures

Figure 1

22 pages, 2909 KB  
Article
Novel Federated Graph Contrastive Learning for IoMT Security: Protecting Data Poisoning and Inference Attacks
by Amarudin Daulay, Kalamullah Ramli, Ruki Harwahyu, Taufik Hidayat and Bernardi Pranggono
Mathematics 2025, 13(15), 2471; https://doi.org/10.3390/math13152471 - 31 Jul 2025
Viewed by 528
Abstract
Malware evolution presents growing security threats for resource-constrained Internet of Medical Things (IoMT) devices. Conventional federated learning (FL) often suffers from slow convergence, high communication overhead, and fairness issues in dynamic IoMT environments. In this paper, we propose FedGCL, a secure and efficient [...] Read more.
Malware evolution presents growing security threats for resource-constrained Internet of Medical Things (IoMT) devices. Conventional federated learning (FL) often suffers from slow convergence, high communication overhead, and fairness issues in dynamic IoMT environments. In this paper, we propose FedGCL, a secure and efficient FL framework integrating contrastive graph representation learning for enhanced feature discrimination, a Jain-index-based fairness-aware aggregation mechanism, an adaptive synchronization scheduler to optimize communication rounds, and secure aggregation via homomorphic encryption within a Trusted Execution Environment. We evaluate FedGCL on four benchmark malware datasets (Drebin, Malgenome, Kronodroid, and TUANDROMD) using 5 to 15 graph neural network clients over 20 communication rounds. Our experiments demonstrate that FedGCL achieves 96.3% global accuracy within three rounds and converges to 98.9% by round twenty—reducing required training rounds by 45% compared to FedAvg—while incurring only approximately 10% additional computational overhead. By preserving patient data privacy at the edge, FedGCL enhances system resilience without sacrificing model performance. These results indicate FedGCL’s promise as a secure, efficient, and fair federated malware detection solution for IoMT ecosystems. Full article
Show Figures

Figure 1

22 pages, 2678 KB  
Article
Federated Semi-Supervised Learning with Uniform Random and Lattice-Based Client Sampling
by Mei Zhang and Feng Yang
Entropy 2025, 27(8), 804; https://doi.org/10.3390/e27080804 - 28 Jul 2025
Viewed by 325
Abstract
Federated semi-supervised learning (Fed-SSL) has emerged as a powerful framework that leverages both labeled and unlabeled data distributed across clients. To reduce communication overhead, real-world deployments often adopt partial client participation, where only a subset of clients is selected in each round. However, [...] Read more.
Federated semi-supervised learning (Fed-SSL) has emerged as a powerful framework that leverages both labeled and unlabeled data distributed across clients. To reduce communication overhead, real-world deployments often adopt partial client participation, where only a subset of clients is selected in each round. However, under non-i.i.d. data distributions, the choice of client sampling strategy becomes critical, as it significantly affects training stability and final model performance. To address this challenge, we propose a novel federated averaging semi-supervised learning algorithm, called FedAvg-SSL, that considers two sampling approaches, uniform random sampling (standard Monte Carlo) and a structured lattice-based sampling, inspired by quasi-Monte Carlo (QMC) techniques, which ensures more balanced client participation through structured deterministic selection. On the client side, each selected participant alternates between updating the global model and refining the pseudo-label model using local data. We provide a rigorous convergence analysis, showing that FedAvg-SSL achieves a sublinear convergence rate with linear speedup. Extensive experiments not only validate our theoretical findings but also demonstrate the advantages of lattice-based sampling in federated learning, offering insights into the interplay among algorithm performance, client participation rates, local update steps, and sampling strategies. Full article
(This article belongs to the Special Issue Number Theoretic Methods in Statistics: Theory and Applications)
Show Figures

Figure 1

34 pages, 1007 KB  
Systematic Review
Fake News in Tourism: A Systematic Literature Review
by Fanni Kaszás, Soňa Chovanová Supeková and Richard Keklak
Soc. Sci. 2025, 14(8), 454; https://doi.org/10.3390/socsci14080454 - 24 Jul 2025
Viewed by 725
Abstract
In recent years, the number of fake news stories has significantly increased in the world of media, especially with the widespread use of social media. It has impacted several industries, including tourism. From a tourism point of view, the spread of fake news [...] Read more.
In recent years, the number of fake news stories has significantly increased in the world of media, especially with the widespread use of social media. It has impacted several industries, including tourism. From a tourism point of view, the spread of fake news can contribute to the reduction of the popularity of a destination. It may influence travel decisions by discouraging tourists from visiting certain places and thus damage the reputation of the destination, contributing to economic loss. After a literature review on the communication aspect of fake news and a general introduction of fake news in the tourism and hospitality industry, we conducted a systematic literature review (SLR), a research methodology to collect, identify, and analyse available research studies through a systematic procedure. The current SLR is based on the Scopus, Web of Science, and Google Scholar databases of existing literature on the topic of fake news in the tourism and hospitality industry. The study identifies, lists, and examines existing papers and conference proceedings from a vast array of disciplines, in order to give a well-rounded view on the issue of fake news in the tourism and hospitality industry. After selecting a total of 54 previous studies from more than 20 thousand results for the keywords ‘fake news’ and ‘tourism,’ we have analysed 39 papers in total. The SLR aimed to highlight existing gaps in the literature and areas that may require further exploration in future primary research. We have found that there is relatively limited academic literature available on the subject of fake news affecting tourism destinations, compared to studies focused on hospitality services. Full article
(This article belongs to the Special Issue Creating Resilient Societies in a Changing World)
Show Figures

Figure 1

31 pages, 4220 KB  
Article
A Novel Multi-Server Federated Learning Framework in Vehicular Edge Computing
by Fateme Mazloomi, Shahram Shah Heydari and Khalil El-Khatib
Future Internet 2025, 17(7), 315; https://doi.org/10.3390/fi17070315 - 19 Jul 2025
Viewed by 437
Abstract
Federated learning (FL) has emerged as a powerful approach for privacy-preserving model training in autonomous vehicle networks, where real-world deployments rely on multiple roadside units (RSUs) serving heterogeneous clients with intermittent connectivity. While most research focuses on single-server or hierarchical cloud-based FL, multi-server [...] Read more.
Federated learning (FL) has emerged as a powerful approach for privacy-preserving model training in autonomous vehicle networks, where real-world deployments rely on multiple roadside units (RSUs) serving heterogeneous clients with intermittent connectivity. While most research focuses on single-server or hierarchical cloud-based FL, multi-server FL can alleviate the communication bottlenecks of traditional setups. To this end, we propose an edge-based, multi-server FL (MS-FL) framework that combines performance-driven aggregation at each server—including statistical weighting of peer updates and outlier mitigation—with an application layer handover protocol that preserves model updates when vehicles move between RSU coverage areas. We evaluate MS-FL on both MNIST and GTSRB benchmarks under shard- and Dirichlet-based non-IID splits, comparing it against single-server FL and a two-layer edge-plus-cloud baseline. Over multiple communication rounds, MS-FL with the Statistical Performance-Aware Aggregation method and Dynamic Weighted Averaging Aggregation achieved up to a 20-percentage-point improvement in accuracy and consistent gains in precision, recall, and F1-score (95% confidence), while matching the low latency of edge-only schemes and avoiding the extra model transfer delays of cloud-based aggregation. These results demonstrate that coordinated cooperation among servers based on model quality and seamless handovers can accelerate convergence, mitigate data heterogeneity, and deliver robust, privacy-aware learning in connected vehicle environments. Full article
Show Figures

Figure 1

33 pages, 15612 KB  
Article
A Personalized Multimodal Federated Learning Framework for Skin Cancer Diagnosis
by Shuhuan Fan, Awais Ahmed, Xiaoyang Zeng, Rui Xi and Mengshu Hou
Electronics 2025, 14(14), 2880; https://doi.org/10.3390/electronics14142880 - 18 Jul 2025
Viewed by 528
Abstract
Skin cancer is one of the most prevalent forms of cancer worldwide, and early and accurate diagnosis critically impacts patient outcomes. Given the sensitive nature of medical data and its fragmented distribution across institutions (data silos), privacy-preserving collaborative learning is essential to enable [...] Read more.
Skin cancer is one of the most prevalent forms of cancer worldwide, and early and accurate diagnosis critically impacts patient outcomes. Given the sensitive nature of medical data and its fragmented distribution across institutions (data silos), privacy-preserving collaborative learning is essential to enable knowledge-sharing without compromising patient confidentiality. While federated learning (FL) offers a promising solution, existing methods struggle with heterogeneous and missing modalities across institutions, which reduce the diagnostic accuracy. To address these challenges, we propose an effective and flexible Personalized Multimodal Federated Learning framework (PMM-FL), which enables efficient cross-client knowledge transfer while maintaining personalized performance under heterogeneous and incomplete modality conditions. Our study contains three key contributions: (1) A hierarchical aggregation strategy that decouples multi-module aggregation from local deployment via global modular-separated aggregation and local client fine-tuning. Unlike conventional FL (which synchronizes all parameters in each round), our method adopts a frequency-adaptive synchronization mechanism, updating parameters based on their stability and functional roles. (2) A multimodal fusion approach based on multitask learning, integrating learnable modality imputation and attention-based feature fusion to handle missing modalities. (3) A custom dataset combining multi-year International Skin Imaging Collaboration(ISIC) challenge data (2018–2024) to ensure comprehensive coverage of diverse skin cancer types. We evaluate PMM-FL through diverse experiment settings, demonstrating its effectiveness in heterogeneous and incomplete modality federated learning settings, achieving 92.32% diagnostic accuracy with only a 2% drop in accuracy under 30% modality missingness, with a 32.9% communication overhead decline compared with baseline FL methods. Full article
(This article belongs to the Special Issue Multimodal Learning and Transfer Learning)
Show Figures

Figure 1

16 pages, 2371 KB  
Article
Exploring Patterns of Ethnic Diversification and Residential Intermixing in the Neighborhoods of Riga, Latvia
by Sindija Balode and Māris Bērziņš
Urban Sci. 2025, 9(7), 274; https://doi.org/10.3390/urbansci9070274 - 16 Jul 2025
Viewed by 420
Abstract
Residential segregation remains a persistent challenge in European urban environments and is an increasing focal point in urban policy debates. This study investigates the changing geographies of ethnic diversity and residential segregation in Riga, the capital city of Latvia. The research addresses the [...] Read more.
Residential segregation remains a persistent challenge in European urban environments and is an increasing focal point in urban policy debates. This study investigates the changing geographies of ethnic diversity and residential segregation in Riga, the capital city of Latvia. The research addresses the complex dynamics of ethnic residential patterns within the distinctive context of post-socialist urban transformation, examining how historical legacies of ethnic diversity interact with contemporary migration flows to reshape neighborhood ethnic composition. Using geo-referenced data from 2000, 2011, and 2021 census rounds, we examined changes in the spatial distribution of five major ethnic groups. Our analysis employs the Dissimilarity Index to measure ethnic residential segregation and the Location Quotient to identify the residential concentration of ethnic groups across the city. The findings reveal that Riga’s ethnic landscape is undergoing a gradual yet impactful transformation. The spatial distribution of ethnic groups is shifting, with the increasing segregation of certain groups, particularly traditional ethnic minorities, coupled with a growing concentration of Europeans and non-Europeans in the inner city. The findings reveal distinctive patterns of ethnic diversification and demographic change, wherein long-term trends intersect with contemporary migration dynamics to produce unique trajectories of ethnic residential segregation, which differ from those observed in Western European contexts. However, the specific dynamics in Riga, particularly the persistence of traditional ethnic minority communities and the emergence of new ethnic groups, highlight the unique context of post-socialist urban landscapes. Full article
Show Figures

Figure 1

21 pages, 1615 KB  
Article
Fostering a Sustainable Campus: A Successful Selective Waste Collection Initiative in a Brazilian University
by Geovana Dagostim Savi-Bortolotto, Ana Carolina Pescador, Tiago Bortolotto, Camila Garbin Sandi, Alícia Viana de Oliveira, Matheus Rodrigues Pereira Mendes, Kátia Cilene Rodrigues Madruga and Afonso Henrique da Silva Júnior
Sustainability 2025, 17(14), 6377; https://doi.org/10.3390/su17146377 - 11 Jul 2025
Viewed by 636
Abstract
This study reports a successful selective waste collection initiative led by UFSC’s Araranguá campus in a municipality without a recycling system. The initiative, named “Recicla UFSC Ara”, was structured around three main components: (i) the installation of color-coded bins for recyclable waste (including [...] Read more.
This study reports a successful selective waste collection initiative led by UFSC’s Araranguá campus in a municipality without a recycling system. The initiative, named “Recicla UFSC Ara”, was structured around three main components: (i) the installation of color-coded bins for recyclable waste (including paper, plastic, metals, and polystyrene) and non-recyclable waste in indoor and common areas; (ii) the establishment of a Voluntary Delivery Point (PEV) to gather specific recyclable materials, such as glass, electronics waste, plastic bottles, writing instruments, and bottle caps; and (iii) the execution of periodic educational community-focused campaigns aimed at encouraging participation from both the university and the broader local community. Recyclables were manually sorted and weighed during regular collection rounds, and contamination rates were calculated. Quantitative data collected from 2022 to 2025 were analyzed using descriptive statistics and one-way ANOVA to assess waste generation and contamination trends. Gathered recyclables were directed to appropriate partner institutions, including local “Ecoponto”, non-profit organizations, and corporate recycling programs. The study also conducted a literature review of similar university-led waste management programs to identify standard practices and regional specificities, providing a comparative analysis that highlights both shared elements and distinctive contributions of the UFSC model. Results demonstrate a significant volume of waste diverted from landfills and a gradual improvement in waste disposal practices among the university community. Targeted communication and operational changes mitigated key challenges, improper disposal, and logistical issues. This case underscores the role of universities as agents of environmental education and local sustainable development. Full article
Show Figures

Figure 1

20 pages, 1669 KB  
Article
Multi-Level Asynchronous Robust State Estimation for Distribution Networks Considering Communication Delays
by Xianglong Zhang, Ying Liu, Songlin Gu, Yuzhou Tian and Yifan Gao
Energies 2025, 18(14), 3640; https://doi.org/10.3390/en18143640 - 9 Jul 2025
Viewed by 351
Abstract
With the hierarchical evolution of distribution network control architectures, distributed state estimation has become a focal point of research. To address communication delays arising from inter-level data exchanges, this paper proposes a multi-level, asynchronous, robust state estimation algorithm that accounts for such delays. [...] Read more.
With the hierarchical evolution of distribution network control architectures, distributed state estimation has become a focal point of research. To address communication delays arising from inter-level data exchanges, this paper proposes a multi-level, asynchronous, robust state estimation algorithm that accounts for such delays. First, a multi-level state estimation model is formulated based on the concept of a maximum normal measurement rate, and a hierarchical decoupling modeling approach is developed. Then, an event-driven broadcast transmission strategy is designed to unify boundary information exchanged between levels during iteration. A multi-threaded parallel framework is constructed to decouple receiving, computation, and transmission tasks, thereby enhancing asynchronous scheduling capabilities across threads. Additionally, a round-based synchronization mechanism is proposed to enforce fully synchronized iterations in the initial stages, thereby improving the overall process of asynchronous state estimation. Case study results demonstrate that the proposed algorithm achieves high estimation accuracy and strong robustness, while reducing the average number of iterations by nearly 40% and shortening the runtime by approximately 35% compared to conventional asynchronous methods, exhibiting superior estimation performance and computational efficiency under communication delay conditions. Full article
Show Figures

Figure 1

Back to TopTop