Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (17,809)

Search Parameters:
Keywords = community networks

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
33 pages, 2475 KiB  
Article
Real-Time Detection and Response to Wormhole and Sinkhole Attacks in Wireless Sensor Networks
by Tamara Zhukabayeva, Lazzat Zholshiyeva, Yerik Mardenov, Atdhe Buja, Shafiullah Khan and Noha Alnazzawi
Technologies 2025, 13(8), 348; https://doi.org/10.3390/technologies13080348 - 7 Aug 2025
Abstract
Wireless sensor networks have become a vital technology that is extensively applied across multiple industries, including agriculture, industrial operations, and smart cities, as well as residential smart homes and environmental monitoring systems. Security threats emerge in these systems through hidden routing-level attacks such [...] Read more.
Wireless sensor networks have become a vital technology that is extensively applied across multiple industries, including agriculture, industrial operations, and smart cities, as well as residential smart homes and environmental monitoring systems. Security threats emerge in these systems through hidden routing-level attacks such as Wormhole and Sinkhole attacks. The aim of this research was to develop a methodology for detecting security incidents in WSNs by conducting real-time analysis of Wormhole and Sinkhole attacks. Furthermore, the paper proposes a novel detection methodology combined with architectural enhancements to improve network robustness, measured by hop counts, delays, false data ratios, and route integrity. A real-time WSN infrastructure was developed using ZigBee and Global System for Mobile Communications/General Packet Radio Service (GSM/GPRS) technologies. To realistically simulate Wormhole and Sinkhole attack scenarios and conduct evaluations, we developed a modular cyber–physical architecture that supports real-time monitoring, repeatability, and integration of ZigBee- and GSM/GPRS-based attacker nodes. During the experimentation, Wormhole attacks caused the hop count to decrease from 4 to 3, while the average delay increased by 40%, and false sensor readings were introduced in over 30% of cases. Additionally, Sinkhole attacks led to a 27% increase in traffic concentration at the malicious node, disrupting load balancing and route integrity. The proposed multi-stage methodology includes data collection, preprocessing, anomaly detection using the 3-sigma rule, and risk-based decision making. Simulation results demonstrated that the methodology successfully detected route shortening, packet loss, and data manipulation in real time. Thus, the integration of anomaly-based detection with ZigBee and GSM/GPRS enables a timely response to security threats in critical WSN deployments. Full article
(This article belongs to the Special Issue New Technologies for Sensors)
18 pages, 5296 KiB  
Article
Grid-Search-Optimized, Gated Recurrent Unit-Based Prediction Model for Ionospheric Total Electron Content
by Shuo Zhou, Ziyi Yang, Qiao Yu and Jian Wang
Technologies 2025, 13(8), 347; https://doi.org/10.3390/technologies13080347 - 7 Aug 2025
Abstract
Accurately predicting the ionosphere’s Total Electron Content (TEC) is significant for ensuring the regular operation of satellite navigation and communication systems and space weather prediction. To further improve the accuracy of TEC prediction, this paper proposes a TEC prediction model based on the [...] Read more.
Accurately predicting the ionosphere’s Total Electron Content (TEC) is significant for ensuring the regular operation of satellite navigation and communication systems and space weather prediction. To further improve the accuracy of TEC prediction, this paper proposes a TEC prediction model based on the grid-optimized Gate Recurrent Unit (GRU). This model has the following main features: (1) it uses statistical learning methods to interpolate the missing data of TEC observations; (2) it constructs a sliding time window by using the multi-dimensional time series features of two types of solar activity indices to support modeling; (3) It adopts grid search combined with optimization of network depth, time step length, and other hyperparameters to significantly enhance the model’s ability to extract the characteristics of the ionospheric 11-year cycle and seasonal variations. Taking the EGLIN station as an example, the proposed model is verified. The experimental results show that the root mean square error of the GRU model during the period from 2019 to 2020 was 0.78 TECU, which was significantly lower than those of the CCIR, URSI, and statistical machine learning models. Compared with the other three models, the RMSE error of the GRU model was reduced by 72.73%, 72.64%, and 57.38%, respectively. The above research verifies the advantages of the proposed model in predicting TEC and provides a new idea for ionospheric modeling. Full article
(This article belongs to the Section Environmental Technology)
Show Figures

Figure 1

30 pages, 4817 KiB  
Article
A Robust Multi-Port Network Interface Architecture with Real-Time CRC-Based Fault Recovery for In-Vehicle Communication Networks
by Sungju Lee, Sungwook Yu and Taikyeong Jeong
Actuators 2025, 14(8), 391; https://doi.org/10.3390/act14080391 - 7 Aug 2025
Abstract
As the automotive industry continues to evolve rapidly, there is a growing demand for high-throughput reliable communication systems within vehicles. This paper presents the implementation and verification of a fault-tolerant Ethernet-based communication protocol tailored for automotive applications operating at 1 Gbps and above. [...] Read more.
As the automotive industry continues to evolve rapidly, there is a growing demand for high-throughput reliable communication systems within vehicles. This paper presents the implementation and verification of a fault-tolerant Ethernet-based communication protocol tailored for automotive applications operating at 1 Gbps and above. The proposed system introduces a multi-port Network Interface Controller (NIC) architecture that supports real-time communication and robust fault handling. To ensure adaptability across various in-vehicle network (IVN) scenarios, the system allows for configurable packet sizes and transmission rates and supports diverse data formats. The architecture integrates cyclic redundancy check (CRC)-based error detection, real-time recovery mechanisms, and file-driven data injection techniques. Functional validation is performed using Verilog HDL simulations, demonstrating deterministic timing behavior, modular scalability, and resilience under fault injection. This paper presents a fault-tolerant Network Interface Controller (NIC), architecture incorporating CRC-based error detection, real-time recovery logic, and file-driven data injection. The system is verified through Verilog HDL simulation, demonstrating correct timing behavior, modular scalability, and robustness against injected transmission faults. Compared to conventional dual-port NICs, the proposed quad-port architecture demonstrates superior scalability and error tolerance under injected fault conditions. Experimental results confirm that the proposed NIC architecture achieves stable multi-port communication under embedded automotive environments. This study further introduces a novel quad-port NIC with an integrated fault injection algorithm and evaluates its performance in terms of error tolerance. Full article
Show Figures

Figure 1

24 pages, 10858 KiB  
Article
The Distribution Characteristics and Influencing Factors of Global Armed Conflict Clusters
by Mengmeng Hao, Shijia Ma, Dong Jiang, Fangyu Ding, Shuai Chen, Jun Zhuo, Genan Wu, Jiping Dong and Jiajie Wu
Systems 2025, 13(8), 670; https://doi.org/10.3390/systems13080670 - 7 Aug 2025
Abstract
Understanding the spatial dynamics and drivers of armed conflict is crucial for anticipating risk and informing targeted interventions. However, current research rarely considers the spatio-temporal clustering characteristics of armed conflicts. Here, we assess the distribution dynamics and driving factors of armed conflict from [...] Read more.
Understanding the spatial dynamics and drivers of armed conflict is crucial for anticipating risk and informing targeted interventions. However, current research rarely considers the spatio-temporal clustering characteristics of armed conflicts. Here, we assess the distribution dynamics and driving factors of armed conflict from the perspective of armed conflict clusters, employing complex network dynamic community detection methods and interpretable machine learning approaches. The results show that conflict clusters vary in terms of regional distribution. Sub-Saharan Africa boasts the highest number of conflict clusters, accounting for 37.9% of the global total and covering 40.4% of the total cluster area. In contrast, South Asia and Afghanistan, despite having a smaller proportion of clusters at 12.1%, hold the second-largest cluster area, which is 18.1% of the total. The characteristics of different conflict networks are influenced by different factors. Historical exposure, socio-economic deprivation, and spatial structure are the primary determinants of conflict patterns, while climatic variables contribute less prominently as part of a broader system of environmental vulnerability. Moreover, the influence of driving factors shows spatial heterogeneity. By integrating cluster-level analysis with interpretable machine learning, this study offers a novel perspective for understanding the multidimensional characteristics of armed conflicts. Full article
Show Figures

Figure 1

20 pages, 5610 KiB  
Article
The Gut Microbial Adaptation of Wild Goitered Gazelles Under Antibiotic Pressure in the Qaidam Basin
by Qing Zhao, Yiran Wang, Jingqing Ma and Wen Qin
Microorganisms 2025, 13(8), 1842; https://doi.org/10.3390/microorganisms13081842 - 7 Aug 2025
Abstract
Gut microbiota plays a vital role in host resilience but may be disrupted under environmental antibiotic pressure. The goitered gazelle (Gazella subgutturosa), a keystone ungulate in the Qaidam Basin, is crucial for ecosystem stability. We aimed to investigate how this species [...] Read more.
Gut microbiota plays a vital role in host resilience but may be disrupted under environmental antibiotic pressure. The goitered gazelle (Gazella subgutturosa), a keystone ungulate in the Qaidam Basin, is crucial for ecosystem stability. We aimed to investigate how this species responds to antibiotic pressure through gut microbial adaptation. Using 16S rRNA sequencing and weighted gene co-expression network analysis (WGCNA) on fecal and soil samples from six regions, we identified 18 microbial modules, of which three were strongly associated with antibiotics (|r| ≥ 0.75, p < 0.05). Gut microbial α-diversity was lowest in the antibiotic-rich, vegetation-poor TGL region and highest in XRH, where diverse vegetation appeared to buffer antibiotic impact. Antibiotic pressure can reshape gut microbial communities, exerting both adaptive benefits and adverse effects. High-quality habitats may alleviate the negative impacts of antibiotic pressure. Full article
(This article belongs to the Section Gut Microbiota)
Show Figures

Figure 1

30 pages, 2584 KiB  
Article
Travel Frequent-Route Identification Based on the Snake Algorithm Using License Plate Recognition Data
by Feiyang Liu, Jie Zeng, Jinjun Tang and TianJian Yu
Mathematics 2025, 13(15), 2536; https://doi.org/10.3390/math13152536 - 7 Aug 2025
Abstract
Path flow always plays a critical role in extracting vehicle travel patterns and reflecting network-scale traffic features. However, the comprehensive topological structure of urban road networks induces massive route choices, so frequent travel routes have been gradually regarded as an ideal countermeasure to [...] Read more.
Path flow always plays a critical role in extracting vehicle travel patterns and reflecting network-scale traffic features. However, the comprehensive topological structure of urban road networks induces massive route choices, so frequent travel routes have been gradually regarded as an ideal countermeasure to represent traffic states. Widely used license plate recognition (LPR) devices can collect the abundant traffic features of all vehicles, but their sparse spatial distributions restrict the conventional models in frequent travel identification. Therefore, this study develops a network reconstruction method to construct a topological network from the LPR dataset, avoiding the adverse effects caused by the sparse distribution of detectors on the road network and further uses the Snake algorithm to fully utilize the road network structure and traffic attributes for clustering to obtain various travel patterns, with frequent routes under different travel patterns finally identified based on Steiner trees and frequent item recognition. To address the sparse spatial distribution of LPR devices, we utilize the word2vec model to extract spatial correlations among intersections. A threshold-based method is then applied to transform the correlation matrix into a reconstructed network, connecting intersections with strong vehicle transition relationships. This community structure can be interpreted as representing different travel patterns. Consequently, the Snake algorithm is employed to cluster intersections into distinct categories, reflecting these varied travel patterns. By leveraging the word2vec model, the detector installation rate requirement for Snake is significantly reduced, ensuring that the clustering results accurately represent the intrinsic relevance of traffic roads. Subsequently, frequent routes are identified from both macro- and micro-perspectives using the Steiner tree and Frequent Pattern Growth (FP Growth) algorithm, respectively. Validated on the LPR dataset in Changsha, China, the experiment results demonstrate that the proposed method can effectively identify travel patterns and extract frequent routes in the sparsely installed LPR devices. Full article
Show Figures

Figure 1

16 pages, 3989 KiB  
Article
Secure Context-Aware Traffic Light Scheduling System: Integrity of Vehicles’ Identities
by Marah Yahia, Maram Bani Younes, Firas Najjar, Ahmad Audat and Said Ghoul
World Electr. Veh. J. 2025, 16(8), 448; https://doi.org/10.3390/wevj16080448 - 7 Aug 2025
Abstract
Autonomous vehicles and intelligent traffic transportation are widely investigated for road networks. Context-aware traffic light scheduling algorithms determine signal phases by analyzing the real-time characteristics and contextual information of competing traffic flows. The context of traffic flows mainly considers the existence of regular, [...] Read more.
Autonomous vehicles and intelligent traffic transportation are widely investigated for road networks. Context-aware traffic light scheduling algorithms determine signal phases by analyzing the real-time characteristics and contextual information of competing traffic flows. The context of traffic flows mainly considers the existence of regular, emergency, or heavy vehicles. This is an important factor in setting the phases of the traffic light schedule and assigning a high priority for emergency vehicles to pass through the signalized intersection first. VANET technology, through its communication capabilities and the exchange of data packets among moving vehicles, is utilized to collect real-time traffic information for the analyzed road scenarios. This introduces an attractive environment for hackers, intruders, and criminals to deceive drivers and intelligent infrastructure by manipulating the transmitted packets. This consequently leads to the deployment of less efficient traffic light scheduling algorithms. Therefore, ensuring secure communications between traveling vehicles and verifying the integrity of transmitted data are crucial. In this work, we investigate the possible attacks on the integrity of transferred messages and vehicles’ identities and their effects on the traffic light schedules. Then, a new secure context-aware traffic light scheduling system is proposed that guarantees the integrity of transmitted messages and verifies the vehicles’ identities. Finally, a comprehensive series of experiments were performed to assess the proposed secure system in comparison to the absence of security mechanisms within a simulated road intersection. We can infer from the experimental study that attacks on the integrity of vehicles have different effects on the efficiency of the scheduling algorithm. The throughput of the signalized intersection and the waiting delay time of traveling vehicles are highly affected parameters. Full article
Show Figures

Figure 1

25 pages, 663 KiB  
Systematic Review
IoT Devices and Their Impact on Learning: A Systematic Review of Technological and Educational Affordances
by Dimitris Tsipianitis, Anastasia Misirli, Konstantinos Lavidas and Vassilis Komis
IoT 2025, 6(3), 45; https://doi.org/10.3390/iot6030045 - 7 Aug 2025
Abstract
A principal factor of the fourth Industrial Revolution is the Internet of Things (IoT), a network of “smart” objects that communicate by exchanging helpful information about themselves and their environment. Our research aims to address the gaps in the existing literature regarding the [...] Read more.
A principal factor of the fourth Industrial Revolution is the Internet of Things (IoT), a network of “smart” objects that communicate by exchanging helpful information about themselves and their environment. Our research aims to address the gaps in the existing literature regarding the educational and technological affordances of IoT applications in learning environments in secondary education. Our systematic review using the PRISMA method allowed us to extract 25 empirical studies from the last 10 years. We present the categorization of educational and technological affordances, as well as the devices used in these environments. Moreover, our findings indicate widespread adoption of organized educational activities and design-based learning, often incorporating tangible interfaces, smart objects, and IoT applications, which enhance student engagement and interaction. Additionally, we identify the impact of IoT-based learning on knowledge building, autonomous learning, student attitude, and motivation. The results suggest that the IoT can facilitate personalized and experiential learning, fostering a more immersive and adaptive educational experience. Based on these findings, we discuss key recommendations for educators, policymakers, and researchers, while also addressing this study’s limitations and potential directions for future research. Full article
Show Figures

Figure 1

12 pages, 545 KiB  
Article
Signal Detection Based on Separable CNN for OTFS Communication Systems
by Ying Wang, Zixu Zhang, Hang Li, Tao Zhou and Zhiqun Cheng
Entropy 2025, 27(8), 839; https://doi.org/10.3390/e27080839 - 7 Aug 2025
Abstract
This paper proposes a low-complexity signal detection method for orthogonal time frequency space (OTFS) communication systems, based on a separable convolutional neural network (SeCNN), termed SeCNN-OTFS. A novel SeparableBlock architecture is introduced, which integrates residual connections and a channel attention mechanism to enhance [...] Read more.
This paper proposes a low-complexity signal detection method for orthogonal time frequency space (OTFS) communication systems, based on a separable convolutional neural network (SeCNN), termed SeCNN-OTFS. A novel SeparableBlock architecture is introduced, which integrates residual connections and a channel attention mechanism to enhance feature discrimination and training stability under high Doppler conditions. By decomposing standard convolutions into depthwise and pointwise operations, the model achieves a substantial reduction in computational complexity. To validate its effectiveness, simulations are conducted under a standard OTFS configuration with 64-QAM modulation, comparing the proposed SeCNN-OTFS with conventional CNN-based models and classical linear estimators, such as least squares (LS) and minimum mean square error (MMSE). The results show that SeCNN-OTFS consistently outperforms LS and MMSE, and when the signal-to-noise ratio (SNR) exceeds 12.5 dB, its bit error rate (BER) performance becomes nearly identical to that of 2D-CNN. Notably, SeCNN-OTFS requires only 19% of the parameters compared to 2D-CNN, making it highly suitable for resource-constrained environments such as satellite and IoT communication systems. For scenarios where higher accuracy is required and computational resources are sufficient, the CNN-OTFS model—with conventional convolutional layers replacing the separable convolutional layers—can be adopted as a more precise alternative. Full article
Show Figures

Figure 1

29 pages, 1751 KiB  
Article
The Structure of the Semantic Network Regarding “East Asian Cultural Capital” on Chinese Social Media Under the Framework of Cultural Development Policy
by Tianyi Tao and Han Woo Park
Information 2025, 16(8), 673; https://doi.org/10.3390/info16080673 - 7 Aug 2025
Abstract
This study focuses on cultural and urban development policies under China’s 14th Five-Year Plan, exploring the content and semantic structure of discussions on the “East Asian Cultural Capital” project on the Weibo platform. It analyzes how national cultural development policies are reflected in [...] Read more.
This study focuses on cultural and urban development policies under China’s 14th Five-Year Plan, exploring the content and semantic structure of discussions on the “East Asian Cultural Capital” project on the Weibo platform. It analyzes how national cultural development policies are reflected in the discourse system related to the “East Asian Cultural Capital” on social media and emphasizes the guiding role of policies in the dissemination of online culture. When China announced the 14th Five-Year Plan in 2021, the strategic direction and policy framework for cultural development over the five-year period from 2021 to 2025 were clearly outlined. This study employs text mining and semantic network analysis methods to analyze user-generated content on Weibo from 2023 to 2024, aiming to understand public perception and discourse trends. Word frequency and TF-IDF analyses identify key terms and issues, while centrality and CONCOR clustering analyses reveal the semantic structure and discourse communities. MR-QAP regression is employed to compare network changes across the two years. Findings highlight that urban cultural development, heritage preservation, and regional exchange are central themes, with digital media, cultural branding, trilateral cooperation, and cultural–economic integration emerging as key factors in regional collaboration. Full article
(This article belongs to the Special Issue Semantic Networks for Social Media and Policy Insights)
Show Figures

Figure 1

17 pages, 374 KiB  
Article
Construction of Inequalities for Network Quantum Steering Detection
by Jia Ji and Kan He
Axioms 2025, 14(8), 615; https://doi.org/10.3390/axioms14080615 - 7 Aug 2025
Abstract
Quantum network correlations are crucial for long-distance quantum communication, quantum cryptography, and distributed quantum computing. Detecting network steering is particularly challenging in complex network structures. We have studied the steering inequality criteria for a 2-forked 3-layer tree-shaped network. Assuming the first and third [...] Read more.
Quantum network correlations are crucial for long-distance quantum communication, quantum cryptography, and distributed quantum computing. Detecting network steering is particularly challenging in complex network structures. We have studied the steering inequality criteria for a 2-forked 3-layer tree-shaped network. Assuming the first and third layers are trusted and the second layer is untrusted, we derived a steering inequality criterion using the correlation matrix between trusted and untrusted observables. In particular, we apply the steering criterion to three classes of measurements which are of special significance: local orthogonal observables, mutually unbiased measurements, and general symmetric informationally complete measurements. We further illustrate the effectiveness of our method through an example. Full article
(This article belongs to the Special Issue Mathematical Foundations of Quantum Computing)
Show Figures

Figure 1

21 pages, 559 KiB  
Review
Interest Flooding Attacks in Named Data Networking and Mitigations: Recent Advances and Challenges
by Simeon Ogunbunmi, Yu Chen, Qi Zhao, Deeraj Nagothu, Sixiao Wei, Genshe Chen and Erik Blasch
Future Internet 2025, 17(8), 357; https://doi.org/10.3390/fi17080357 - 6 Aug 2025
Abstract
Named Data Networking (NDN) represents a promising Information-Centric Networking architecture that addresses limitations of traditional host-centric Internet protocols by emphasizing content names rather than host addresses for communication. While NDN offers advantages in content distribution, mobility support, and built-in security features, its stateful [...] Read more.
Named Data Networking (NDN) represents a promising Information-Centric Networking architecture that addresses limitations of traditional host-centric Internet protocols by emphasizing content names rather than host addresses for communication. While NDN offers advantages in content distribution, mobility support, and built-in security features, its stateful forwarding plane introduces significant vulnerabilities, particularly Interest Flooding Attacks (IFAs). These IFA attacks exploit the Pending Interest Table (PIT) by injecting malicious interest packets for non-existent or unsatisfiable content, leading to resource exhaustion and denial-of-service attacks against legitimate users. This survey examines research advances in IFA detection and mitigation from 2013 to 2024, analyzing seven relevant published detection and mitigation strategies to provide current insights into this evolving security challenge. We establish a taxonomy of attack variants, including Fake Interest, Unsatisfiable Interest, Interest Loop, and Collusive models, while examining their operational characteristics and network performance impacts. Our analysis categorizes defense mechanisms into five primary approaches: rate-limiting strategies, PIT management techniques, machine learning and artificial intelligence methods, reputation-based systems, and blockchain-enabled solutions. These approaches are evaluated for their effectiveness, computational requirements, and deployment feasibility. The survey extends to domain-specific implementations in resource-constrained environments, examining adaptations for Internet of Things deployments, wireless sensor networks, and high-mobility vehicular scenarios. Five critical research directions are proposed: adaptive defense mechanisms against sophisticated attackers, privacy-preserving detection techniques, real-time optimization for edge computing environments, standardized evaluation frameworks, and hybrid approaches combining multiple mitigation strategies. Full article
Show Figures

Figure 1

35 pages, 5296 KiB  
Article
A Multi-Class Intrusion Detection System for DDoS Attacks in IoT Networks Using Deep Learning and Transformers
by Sheikh Abdul Wahab, Saira Sultana, Noshina Tariq, Maleeha Mujahid, Javed Ali Khan and Alexios Mylonas
Sensors 2025, 25(15), 4845; https://doi.org/10.3390/s25154845 - 6 Aug 2025
Abstract
The rapid proliferation of Internet of Things (IoT) devices has significantly increased vulnerability to Distributed Denial of Service (DDoS) attacks, which can severely disrupt network operations. DDoS attacks in IoT networks disrupt communication and compromise service availability, causing severe operational and economic losses. [...] Read more.
The rapid proliferation of Internet of Things (IoT) devices has significantly increased vulnerability to Distributed Denial of Service (DDoS) attacks, which can severely disrupt network operations. DDoS attacks in IoT networks disrupt communication and compromise service availability, causing severe operational and economic losses. In this paper, we present a Deep Learning (DL)-based Intrusion Detection System (IDS) tailored for IoT environments. Our system employs three architectures—Convolutional Neural Networks (CNNs), Deep Neural Networks (DNNs), and Transformer-based models—to perform binary, three-class, and 12-class classification tasks on the CiC IoT 2023 dataset. Data preprocessing includes log normalization to stabilize feature distributions and SMOTE-based oversampling to mitigate class imbalance. Experiments on the CIC-IoT 2023 dataset show that, in the binary classification task, the DNN achieved 99.2% accuracy, the CNN 99.0%, and the Transformer 98.8%. In three-class classification (benign, DDoS, and non-DDoS), all models attained near-perfect performance (approximately 99.9–100%). In the 12-class scenario (benign plus 12 attack types), the DNN, CNN, and Transformer reached 93.0%, 92.7%, and 92.5% accuracy, respectively. The high precision, recall, and ROC-AUC values corroborate the efficacy and generalizability of our approach for IoT DDoS detection. Comparative analysis indicates that our proposed IDS outperforms state-of-the-art methods in terms of detection accuracy and efficiency. These results underscore the potential of integrating advanced DL models into IDS frameworks, thereby providing a scalable and effective solution to secure IoT networks against evolving DDoS threats. Future work will explore further enhancements, including the use of deeper Transformer architectures and cross-dataset validation, to ensure robustness in real-world deployments. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

40 pages, 87432 KiB  
Article
Optimizing Urban Mobility Through Complex Network Analysis and Big Data from Smart Cards
by Li Sun, Negin Ashrafi and Maryam Pishgar
IoT 2025, 6(3), 44; https://doi.org/10.3390/iot6030044 - 6 Aug 2025
Abstract
Urban public transportation systems face increasing pressure from shifting travel patterns, rising peak-hour demand, and the need for equitable and resilient service delivery. While complex network theory has been widely applied to analyze transit systems, limited attention has been paid to behavioral segmentation [...] Read more.
Urban public transportation systems face increasing pressure from shifting travel patterns, rising peak-hour demand, and the need for equitable and resilient service delivery. While complex network theory has been widely applied to analyze transit systems, limited attention has been paid to behavioral segmentation within such networks. This study introduces a frequency-based framework that differentiates high-frequency (HF) and low-frequency (LF) passengers to examine how distinct user groups shape network structure, congestion vulnerability, and robustness. Using over 20 million smart-card records from Beijing’s multimodal transit system, we construct and analyze directed weighted networks for HF and LF users, integrating topological metrics, temporal comparisons, and community detection. Results reveal that HF networks are densely connected but structurally fragile, exhibiting lower modularity and significantly greater efficiency loss during peak periods. In contrast, LF networks are more spatially dispersed yet resilient, maintaining stronger intracommunity stability. Peak-hour simulation shows a 70% drop in efficiency and a 99% decrease in clustering, with HF networks experiencing higher vulnerability. Based on these findings, we propose differentiated policy strategies for each user group and outline a future optimization framework constrained by budget and equity considerations. This study contributes a scalable, data-driven approach to integrating passenger behavior with network science, offering actionable insights for resilient and inclusive transit planning. Full article
(This article belongs to the Special Issue IoT-Driven Smart Cities)
Show Figures

Figure 1

23 pages, 3031 KiB  
Article
Integrated Capuchin Search Algorithm-Optimized Multilayer Perceptron for Robust and Precise Prediction of Blast-Induced Airblast in a Blasting Mining Operation
by Kesalopa Gaopale, Takashi Sasaoka, Akihiro Hamanaka and Hideki Shimada
Geosciences 2025, 15(8), 306; https://doi.org/10.3390/geosciences15080306 - 6 Aug 2025
Abstract
Blast-induced airblast poses a significant environmental and operational issue for surface mining, affecting safety, regulatory adherence, and the well-being of surrounding communities. Despite advancements in machine learning methods for predicting airblast, present studies neglect essential geomechanical characteristics, specifically rock mass strength (RMS), which [...] Read more.
Blast-induced airblast poses a significant environmental and operational issue for surface mining, affecting safety, regulatory adherence, and the well-being of surrounding communities. Despite advancements in machine learning methods for predicting airblast, present studies neglect essential geomechanical characteristics, specifically rock mass strength (RMS), which is vital for energy transmission and pressure-wave attenuation. This paper presents a capuchin search algorithm-optimized multilayer perceptron (CapSA-MLP) that incorporates RMS, hole depth (HD), maximum charge per delay (MCPD), monitoring distance (D), total explosive mass (TEM), and number of holes (NH). Blast datasets from a granite quarry were utilized to train and test the model in comparison to benchmark approaches, such as particle swarm optimized artificial neural network (PSO-ANN), multivariate regression analysis (MVRA), and the United States Bureau of Mines (USBM) equation. CapSA-MLP outperformed PSO-ANN (RMSE = 1.120, R2 = 0.904 compared to RMSE = 1.284, R2 = 0.846), whereas MVRA and USBM exhibited lower accuracy. Sensitivity analysis indicated RMS as the main input factor. This study is the first to use CapSA-MLP with RMS for airblast prediction. The findings illustrate the significance of metaheuristic optimization in developing adaptable, generalizable models for various rock types, thereby improving blast design and environmental management in mining activities. Full article
(This article belongs to the Section Geomechanics)
Show Figures

Figure 1

Back to TopTop