Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

Search Results (141)

Search Parameters:
Keywords = contested environments

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
23 pages, 1208 KB  
Article
NeSySwarm-IDS: End-to-End Differentiable Neuro-Symbolic Logic for Privacy-Preserving Intrusion Detection in UAV Swarms
by Gang Yang, Lin Ni, Tao Xia, Qinfang Shi and Jiajian Li
Appl. Sci. 2026, 16(7), 3204; https://doi.org/10.3390/app16073204 - 26 Mar 2026
Viewed by 261
Abstract
Unmanned Aerial Vehicle (UAV) swarms operating in contested environments face a critical “semantic gap” between raw, high-velocity network traffic and high-level mission security constraints, compounded by the risk of privacy leakage during collaborative learning. Existing deep learning (DL)-based Network Intrusion Detection Systems (NIDSs) [...] Read more.
Unmanned Aerial Vehicle (UAV) swarms operating in contested environments face a critical “semantic gap” between raw, high-velocity network traffic and high-level mission security constraints, compounded by the risk of privacy leakage during collaborative learning. Existing deep learning (DL)-based Network Intrusion Detection Systems (NIDSs) suffer from opacity, prohibitive resource consumption, and vulnerability to gradient leakage attacks in federated settings, while traditional rule-based systems fail to handle encrypted payloads and evolving attack patterns. To bridge this gap, we present NeSySwarm-IDS (Neuro-Symbolic Swarm Intrusion Detection System), an end-to-end differentiable neuro-symbolic framework that simultaneously achieves high accuracy, strong privacy guarantees, and built-in interpretability under resource constraints. NeSySwarm-IDS integrates an extremely lightweight 1D convolutional neural network with a differentiable Łukasiewicz fuzzy logic reasoner incorporating attack-specific rules. By aggregating only low-dimensional logic rule weights with calibrated differential privacy noise, we drastically reduce communication overhead while providing (ϵ,δ)-DP guarantees with negligible utility loss. Extensive experiments on the UAV-NIDD dataset and our self-collected dataset demonstrate that NeSySwarm-IDS achieves near-perfect detection accuracy, significantly outperforming traditional machine learning baselines despite using limited training data. A detailed case study on GPS spoofing confirms the interpretability of our approach, providing axiomatic explanations suitable for autonomous mission verification. These results establish that end-to-end neuro-symbolic learning can effectively bridge the semantic gap in UAV swarm security while ensuring privacy and interpretability, offering a practical pathway for deploying trustworthy AI in contested environments. Full article
(This article belongs to the Special Issue Cyberspace Security Technology in Computer Science)
Show Figures

Figure 1

32 pages, 1091 KB  
Article
Securely Scaling Autonomy: The Role of Cryptography in Future Unmanned Aircraft Systems (UASs)
by Paul Rochford, William J. Buchanan, Rich Macfarlane and Madjid Tehrani
Cryptography 2026, 10(2), 20; https://doi.org/10.3390/cryptography10020020 - 20 Mar 2026
Viewed by 293
Abstract
The decentralisation of autonomous Unmanned Aircraft Systems (UASs) introduces significant challenges in terms of establishing secure communication and consensus in contested, resource-constrained environments. This research addresses these challenges by conducting a comprehensive performance evaluation of two cryptographic technologies: Messaging Layer Security (MLS) for [...] Read more.
The decentralisation of autonomous Unmanned Aircraft Systems (UASs) introduces significant challenges in terms of establishing secure communication and consensus in contested, resource-constrained environments. This research addresses these challenges by conducting a comprehensive performance evaluation of two cryptographic technologies: Messaging Layer Security (MLS) for group key exchange, and threshold signatures (FROST and BLS) for decentralised consensus. Seven leading open-source libraries were methodically assessed through a series of static, network-simulated, and novel bulk-signing benchmarks to measure their computational efficiency and practical resilience. This paper confirms that MLS is a viable solution, capable of supporting the group sizes and throughput requirements of a UAS swarm. It corroborates prior work by identifying the Cisco MLSpp library as unsuitable for dynamic environments due to poorly scaling group management functions, while demonstrating that OpenMLS is a highly performant and scalable alternative. Furthermore, the findings show that operating MLS in a ‘key management’ mode offers a dramatic increase in performance and resilience, a critical trade-off for UAS operations. For consensus, the benchmarks reveal a range of compromises for developers to consider, while identifying the Zcash FROST implementation as the most effective all-around performer for sustained, high-volume use cases due to its balance of security features and efficient verification. Full article
Show Figures

Figure 1

29 pages, 1011 KB  
Concept Paper
Digital Identities and the Social Realm: How AI-Driven Platforms Reshape Participation, Recognition, and Group Dynamics
by Oluwaseyi B. Ayeni, Isabella Musinguzi-Karamukyo, Oluwakemi T. Onibalusi and Oluwajuwon M. Omigbodun
Societies 2026, 16(3), 96; https://doi.org/10.3390/soc16030096 - 17 Mar 2026
Viewed by 440
Abstract
This paper argues that digital identity in AI-mediated environments has become a central mechanism through which contemporary societies organise recognition, participation, and belonging. Digital identity is no longer simply a technical representation of the individual. It is produced through infrastructural processes of classification, [...] Read more.
This paper argues that digital identity in AI-mediated environments has become a central mechanism through which contemporary societies organise recognition, participation, and belonging. Digital identity is no longer simply a technical representation of the individual. It is produced through infrastructural processes of classification, ranking, and credibility signalling that determine who becomes visible, who is treated as legitimate, and who is able to participate meaningfully in social and civic life. The paper develops a conceptual framework that treats AI-driven platforms as social infrastructures rather than neutral intermediaries. It shows how identity is inferred through data-driven systems rather than negotiated through social interaction, how recognition is operationalised through visibility and credibility metrics rather than ethical judgement, and how participation becomes conditional on algorithmic allocation of attention rather than guaranteed by access alone. Visibility is identified as the key conversion point through which inferred identity becomes social consequence. Drawing on interdisciplinary literature, the analysis demonstrates that misrecognition, exclusion, and inequality in platform environments are not primarily the result of isolated error or intentional bias. They are patterned outcomes of ordinary optimisation processes that distribute legitimacy and opportunity unevenly across social groups. These dynamics reshape group formation, harden social boundaries, and concentrate risk among populations that are already more vulnerable to misrecognition and reduced contestability. The paper concludes that governing digital identity is a societal challenge rather than a purely technical one. As platforms increasingly perform institutional functions without equivalent accountability, digital identity governance becomes a critical site of social ordering. Addressing this challenge requires public standards for how visibility, recognition, and participation are allocated, meaningful avenues for contestation, and protections against the normalisation of stratified belonging in AI-mediated societies. Full article
(This article belongs to the Special Issue Societal Challenges, Opportunities and Achievement)
Show Figures

Figure 1

15 pages, 355 KB  
Article
Digital Mediation and Fatwa Authority in Contemporary Islam: A Critical Islamic Legal and Media-Theoretical Framework
by Fouad Ahmed Atallah
Religions 2026, 17(3), 350; https://doi.org/10.3390/rel17030350 - 11 Mar 2026
Viewed by 537
Abstract
In contemporary Muslim societies, digital platforms, algorithmic infrastructures, and networked religious content have fundamentally reshaped not only the circulation of fatwas but also the conditions under which religious authority is constituted, recognized, and contested. This article develops an integrated analytical framework that brings [...] Read more.
In contemporary Muslim societies, digital platforms, algorithmic infrastructures, and networked religious content have fundamentally reshaped not only the circulation of fatwas but also the conditions under which religious authority is constituted, recognized, and contested. This article develops an integrated analytical framework that brings Islamic legal theory (uṣūl al-fiqh) into sustained dialogue with mediatization theory and digital religion scholarship in order to examine how digital mediation reconfigures fatwa authority. Grounded in a qualitative analytical–comparative methodology, the study reconstructs the classical architecture of fatwa authority—rooted in scholarly qualification, isnād-based transmission, contextual discernment, and institutional oversight—and systematically compares it with contemporary digitally mediated environments structured by visibility metrics, platform logics, audience engagement, and algorithmic amplification. It identifies a series of interrelated transformations affecting the epistemic foundations, institutional gatekeeping mechanisms, communicative forms, and normative accountability of fatwa practice. The analysis demonstrates that digital mediation does not merely expand access to religious guidance; it alters the balance between evidentiary reasoning and infrastructural prominence, reshapes the relationship between muftī and mustaftī, and introduces new ambiguities concerning authority, legitimacy, and moral agency—particularly in the context of AI-assisted religious tools. While digital fatwas may enhance accessibility and transnational connectivity, they also risk epistemic fragmentation, erosion of institutional credibility, and the diffusion of accountability. By articulating a Critical Islamic Legal and Media-Theoretical Framework structured around epistemic, institutional, and communicative axes and evaluated through maqāṣid al-sharīʿah, this article offers a systematic model for analyzing digitally mediated Islamic authority. It concludes by outlining jurisprudential and ethical guidelines for integrating digital technologies into the fatwa domain in ways that preserve methodological rigor, moral responsibility, and the integrity of religious guidance. Full article
(This article belongs to the Special Issue Religion, Culture and Spirituality in a Digital World)
22 pages, 5554 KB  
Article
Image Inpainting-Based Point Cloud Restoration for Enhancing Tactical Classification of Unmanned Surface Vehicles
by Hyunjun Jeon, Eon-ho Lee, Jane Shin and Sejin Lee
Sensors 2026, 26(5), 1637; https://doi.org/10.3390/s26051637 - 5 Mar 2026
Viewed by 248
Abstract
The operational effectiveness of Unmanned Surface Vehicles (USVs) in modern naval scenarios depends on robust situational awareness. While LiDAR sensors are integral to 3D perception, their performance is frequently affected by incomplete data resulting from long-range sparsity and target occlusion. This study investigates [...] Read more.
The operational effectiveness of Unmanned Surface Vehicles (USVs) in modern naval scenarios depends on robust situational awareness. While LiDAR sensors are integral to 3D perception, their performance is frequently affected by incomplete data resulting from long-range sparsity and target occlusion. This study investigates a framework to restore incomplete point clouds to support improved surface vessel classification. The framework first estimates the target’s heading angle using a 2D area projection technique, combined with a descriptor to address orientation ambiguity. Subsequently, the 3D point cloud is converted into a 2D multi-channel image representation to leverage a deep learning-based image inpainting algorithm for data restoration. Finally, a high-density keypoint extraction method is applied to the completed point cloud to generate features for classification. This image-based approach is designed to prioritize computational efficiency and inference speed, facilitating deployment on resource-constrained maritime platforms. Experiments conducted on a simulator dataset reveal that the classification of restored point clouds yields higher accuracy compared to using the original, incomplete LiDAR data, particularly at extended distances (>70 m) and challenging aspect angles (0° and 180°). The results suggest the framework’s potential to address perception failures in sparse data scenarios, thereby supporting the operational envelope of USVs in contested environments. Full article
(This article belongs to the Section Sensors and Robotics)
Show Figures

Figure 1

32 pages, 4167 KB  
Article
Dynamic Time-Window Nash Equilibrium Strategies for Spacecraft Pursuit–Evasion Games Under Incomplete Strategies
by Lei Sun, Zengliang Han, Yuhui Wang, Binpeng Tian and Panxing Huang
Machines 2026, 14(3), 280; https://doi.org/10.3390/machines14030280 - 2 Mar 2026
Viewed by 304
Abstract
Spacecraft pursuit–evasion in contested environments is complicated by strategic incompleteness: the evader can switch maneuvering modes and deploy multi-domain countermeasures that degrade the pursuer’s perception, leading to non-stationary information and distributionally ambiguous interference statistics. A dynamic time-window Nash equilibrium framework is developed for [...] Read more.
Spacecraft pursuit–evasion in contested environments is complicated by strategic incompleteness: the evader can switch maneuvering modes and deploy multi-domain countermeasures that degrade the pursuer’s perception, leading to non-stationary information and distributionally ambiguous interference statistics. A dynamic time-window Nash equilibrium framework is developed for linearized Local Vertical Local Horizontal (LVLH) relative motion under interference-induced uncertainty. Perceptual degradation is modeled via an evidence–theoretic belief representation, and the Jensen–Shannon (JS) divergence is introduced to quantify discrepancies between nominal and interference-corrupted beliefs. The divergence metric drives an adaptive time-window partitioning policy and an uncertainty-aware running cost that balances nominal performance objectives with robustness regularization during high-degradation intervals. In each time window, sufficient conditions are provided for the existence of a local Nash equilibrium, and equilibrium strategies are characterized by the Hamilton–Jacobi–Bellman–Isaacs (HJBI) equation. A global consistency result is established: assuming state continuity, additive cost decomposition, and dynamic-programming compatibility at window boundaries, concatenating the window-wise equilibria yields a Nash equilibrium over the entire horizon. Unlike conventional receding-horizon differential games with a fixed replanning grid, the proposed policy partitions the horizon online in response to perceptual-degradation events and stitches adjacent windows through a continuation value. This boundary stitching enables the global consistency guarantee under additive costs and state continuity. To hedge against ambiguity in interference intensity, a variational distributionally robust optimization (DRO) problem with moment-constrained ambiguity sets is formulated, and the dual worst-case distribution is derived. The resulting Karush–Kuhn–Tucker (KKT) system is reformulated as a finite-dimensional variational inequality, for which an accelerated Alternating Direction Method of Multipliers (ADMM) operator-splitting solver is proposed for efficient real-time computation. Numerical simulations validate the framework and demonstrate improved robustness and computational scalability under time-varying interference compared with fixed-window baselines. Full article
Show Figures

Figure 1

27 pages, 494 KB  
Article
Khotanese as a Language of the Tarim Borderlands
by Hannes A. Fellner
Religions 2026, 17(3), 295; https://doi.org/10.3390/rel17030295 - 27 Feb 2026
Viewed by 415
Abstract
This paper examines the Khotanese tradition in the political and cultural history of the Tarim Basin in the first millennium CE by foregrounding its role as an active facilitator within a multicultural and continually transforming geopolitical environment. The paper approaches Khotanese as both [...] Read more.
This paper examines the Khotanese tradition in the political and cultural history of the Tarim Basin in the first millennium CE by foregrounding its role as an active facilitator within a multicultural and continually transforming geopolitical environment. The paper approaches Khotanese as both a medium through which local forms of social organization were articulated and a mediator embedded in wider circuits of exchange linking the Tarim Basin with South, Central, and East Asia. Particular attention is given to the linguistic and textual evidence for interaction with other traditions in and around the Tarim Basin, and to cases in which adaptation, (re-)composition, and translation can be associated with identifiable historical settings, institutions, and actors. The paper argues from selected examples that the history of Khotanese illuminates how regional languages sustained local authority while remaining deeply entangled with transregional formations of knowledge, culture, and exchange, and how, in the contested spaces of imperial borderlands, local communities had to hone cultural prestige in and through their languages in order to maintain their standing. Full article
23 pages, 2710 KB  
Article
Online Multi-Sensor Calibration Method for Unmanned Surface Vehicle Swarms in Complex and Contested Environments
by Zhaoqiang Gao, Xixiang Liu and Jiazhou He
Drones 2026, 10(3), 161; https://doi.org/10.3390/drones10030161 - 27 Feb 2026
Viewed by 524
Abstract
In complex maritime environments and scenarios with severe signal interference, unmanned surface vehicle (USV) swarms face dual challenges: unreliable GNSS signals due to interference and difficulties in accurately calibrating multi-sensor installation errors. These issues severely constrain the capability for high-precision cooperative formation operations. [...] Read more.
In complex maritime environments and scenarios with severe signal interference, unmanned surface vehicle (USV) swarms face dual challenges: unreliable GNSS signals due to interference and difficulties in accurately calibrating multi-sensor installation errors. These issues severely constrain the capability for high-precision cooperative formation operations. To address these problems, this paper proposes a cooperative localization and all-source online calibration algorithm based on a unified factor graph optimization framework. First, a tightly coupled all-source graph framework is established, integrating navigation radar, electro-optical systems (EOSs) with laser rangefinders, IMU, and GNSS into a sliding window. By leveraging high-precision mutual observations among the swarm, strong geometric constraints are constructed to mitigate the drift of individual inertial navigation systems. Second, an adaptive GNSS weighting mechanism based on signal quality and a degradation detection strategy based on eigenvalue analysis of the Fisher Information Matrix (FIM) are designed. These mechanisms enable online identification and robust estimation of extrinsic parameters, effectively resolving calibration divergence under weak excitation conditions such as straight-line sailing. Finally, the proposed algorithm is validated using field data from three USVs combined with simulated interference experiments. Results demonstrate that the algorithm can rapidly converge to high-precision calibration parameters without artificial targets (radar translation error < 0.2 m, EOS rotation error < 0.05°). During periods of simulated GNSS interference, the cooperative localization root mean square error (RMSE) is reduced to 2.85 m, representing an accuracy improvement of approximately 84.5% compared to traditional methods. This study achieves a “more accurate as it runs” cooperative navigation effect, providing reliable technical support for USV swarm applications in GNSS-denied environments. Full article
(This article belongs to the Section Unmanned Surface and Underwater Drones)
Show Figures

Figure 1

28 pages, 1068 KB  
Review
The Epigenetic Battleground: Host Chromatin at the Core of Infection
by Fabrício Castro Machado and Nilmar Silvio Moretti
Epigenomes 2026, 10(1), 13; https://doi.org/10.3390/epigenomes10010013 - 15 Feb 2026
Cited by 1 | Viewed by 624
Abstract
Chromatin dynamics are usually modulated by histone epigenetic post-translational modifications, which rapidly and reversibly govern accessibility and transcriptional responsiveness. During microbial infection, this regulatory layer becomes a highly contested interface where host defense mechanisms and pathogen-driven subversion strategies converge and compete. Many infectious [...] Read more.
Chromatin dynamics are usually modulated by histone epigenetic post-translational modifications, which rapidly and reversibly govern accessibility and transcriptional responsiveness. During microbial infection, this regulatory layer becomes a highly contested interface where host defense mechanisms and pathogen-driven subversion strategies converge and compete. Many infectious agents exploit chromatin to reprogram gene expression, creating cellular environments that are conducive to infection, proliferation, and persistence. Diverse strategies have been described for viruses, bacteria, fungi, protozoa and nematodes, including the direct secretion of acetyltransferases and methyltransferases, interference with host chromatin-binding proteins, subcellular localization of transcriptional factors or epigenetic regulators, and metabolic availability manipulation. Concurrently, host cells activate immune and stress-response genes to mount rapid, adaptable antimicrobial responses. Recent advances in genome-wide, single-cell, and spatial omics profiling have begun to reveal the temporal and cell-type-specific dynamics of the host genome at the core of infection. This review synthesizes current insights into how chromatin is rewired by the major categories of pathogens during infection, highlighting representative case studies across infective agents and the functional consequences for immunity and cell fate. In addition, we discuss emerging techniques for epigenomic and transcriptomic data collection, and the potential of targeted host-directed therapeutic strategies. Chromatin regulation is thus a promising field of study and a possible target for next-generation interventions. Full article
Show Figures

Figure 1

7 pages, 167 KB  
Proceeding Paper
Negotiating Forest Rights Debates: A Game Theoretic Analysis of Stakeholder Behaviour in the Western Himalayas
by Aanchal Seth
Proceedings 2026, 135(1), 3; https://doi.org/10.3390/proceedings2026135003 - 14 Feb 2026
Viewed by 381
Abstract
This study employs cooperative, behavioural, and experimental game theory to examine how forest rights are negotiated among tribal communities, government agencies, and civil society organisations in the western Himalayas. It explores how claims over access, governance, and benefit-sharing regarding forest resources are asserted, [...] Read more.
This study employs cooperative, behavioural, and experimental game theory to examine how forest rights are negotiated among tribal communities, government agencies, and civil society organisations in the western Himalayas. It explores how claims over access, governance, and benefit-sharing regarding forest resources are asserted, contested, and mediated in a complex socio-political environment. This research adopts a mixed-methods approach. Qualitative data from in-depth interviews and focus group discussions. Quantitative data from structured surveys and field-based experiments. The findings underscore the importance of integrating traditional knowledge systems with modern development policies. This study emphasises the need for sustainable and inclusive strategies that protect both the environment and local livelihoods. Full article
(This article belongs to the Proceedings of The 1st International Electronic Conference on Games (IECGA 2025))
26 pages, 609 KB  
Review
Generative Behavioral Explanation in Micro-Foundational HRM: A Functional Architecture for the Safety–CLB Recursive Mechanism
by Manabu Fujimoto
Adm. Sci. 2026, 16(2), 77; https://doi.org/10.3390/admsci16020077 - 4 Feb 2026
Viewed by 446
Abstract
Micro-foundational HRM has advanced our understanding of how employees perceive and respond to HR practices, yet explanations of how HR systems can generate and sustain coordinated action in day-to-day work remain underspecified. This article presents a theory-building integrative review that specifies a constrained, [...] Read more.
Micro-foundational HRM has advanced our understanding of how employees perceive and respond to HR practices, yet explanations of how HR systems can generate and sustain coordinated action in day-to-day work remain underspecified. This article presents a theory-building integrative review that specifies a constrained, generative mechanism grounded in observable interaction episodes. We propose a functional architecture that assigns constructs to distinct explanatory roles: enabling states (Role A), interaction episodes as the behavioral engine (Role B), and emergent coordination products (Role C). Psychological safety is positioned as an enabling condition that shifts the likelihood and quality of enactment, whereas collective leadership behavior (CLB) is defined as response-inclusive influence episodes (an influence attempt plus an observable response such as uptake, contestation, neglect, or sanction). We formalize a recursive safety–CLB cycle in which response patterns update subsequent safety and influence dispersion over time, which can yield divergent coordination trajectories even when HR conditions are broadly similar. The framework generates discriminant predictions about response profiles, dispersion versus centralization of influence, and temporal signatures, and it clarifies minimal design requirements for testing recursion with episode-level and intensive longitudinal evidence. We discuss implications for micro-foundational HRM, measurement alignment, and testable design-relevant implications for HR system design as an interaction-relevant cue environment. Full article
Show Figures

Figure 1

36 pages, 1719 KB  
Article
Sustaining the Modern Pilgrimage: Governance, Community Impacts, and Environmental Challenges on Korea’s Jeju Olle Trail
by Bradley S. Brennan, Daniel Kessler, Yiheng Luo and Kyung Mi Bae
Sustainability 2026, 18(3), 1540; https://doi.org/10.3390/su18031540 - 3 Feb 2026
Cited by 1 | Viewed by 763
Abstract
The Jeju Olle Trail has evolved from a grassroots initiative into a contested space where post-pandemic growth intersects with environmental limits and fragmented governance. Moving beyond environment-centric models, this study examines the trail as a transcultural walking tourism system. The authors triangulated 900 [...] Read more.
The Jeju Olle Trail has evolved from a grassroots initiative into a contested space where post-pandemic growth intersects with environmental limits and fragmented governance. Moving beyond environment-centric models, this study examines the trail as a transcultural walking tourism system. The authors triangulated 900 user-generated content (UGC) narratives from major travel platforms (Korean, Chinese, and English) with semi-structured interviews from three key institutional informants (NTO, RTO, and NPO). The analysis explores how sustainable experiences are negotiated in practice. Findings suggest that Self-Determination Theory (SDT) constructs like autonomy are not universal constants but are culturally mediated through Western “digital detox,” Korean “collective healing,” and Chinese chūxīn (original heart) narratives. Institutional and narrative data indicate that these experiences appear linked to managing governance tensions between national mandates and localized stewardship. The study concludes that experiential sustainability involves navigating trade-offs regarding narratively signaled environmental impacts and community capacity. By framing walking tourism as a governance-dependent practice, this research demonstrates how culturally embedded mechanisms shape destination viability. Full article
Show Figures

Figure 1

24 pages, 449 KB  
Article
Digital Learning and Usage Practices of German Students in a Continuum of Formal and Informal Contexts—Results of a Diary Study
by Therese Rosemann
Educ. Sci. 2026, 16(2), 208; https://doi.org/10.3390/educsci16020208 - 29 Jan 2026
Viewed by 580
Abstract
In the “culture of digitality”, new (digital) spaces of opportunity in the contested field of formal and informal learning contexts are constantly emerging, forcing students to orient themselves and take responsibility for selecting information. To deal with the associated challenges (e.g., cognitive overload) [...] Read more.
In the “culture of digitality”, new (digital) spaces of opportunity in the contested field of formal and informal learning contexts are constantly emerging, forcing students to orient themselves and take responsibility for selecting information. To deal with the associated challenges (e.g., cognitive overload) this brings, digital skills are required, which can be acquired through various learning and usage practices. The aim of this study is to examine the interplay between students’ individual (digital) learning environments and their (digital) learning and usage practices, which are shaped by the culture of digitality, to derive actionable recommendations for the promotion of digital competencies. Thus, the multivariate results of a quantitative 10-day diary study with 70 students from a German University demonstrate that merely owning digital media is not sufficient to stimulate processes for developing digital competencies. Instead, students need to be encouraged to use these media in a way that actively promotes learning and reflection. Against the backdrop of these findings, there is a discussion about how learning environments can be designed to support and accompany students’ individual digital learning practices. Full article
(This article belongs to the Special Issue Investigating Informal Learning in the Age of Technology)
Show Figures

Figure 1

30 pages, 965 KB  
Article
Guarded Swarms: Building Trusted Autonomy Through Digital Intelligence and Physical Safeguards
by Uwe M. Borghoff, Paolo Bottoni and Remo Pareschi
Future Internet 2026, 18(1), 64; https://doi.org/10.3390/fi18010064 - 21 Jan 2026
Viewed by 755
Abstract
Autonomous UAV/UGV swarms increasingly operate in contested environments where purely digital control architectures are vulnerable to cyber compromise, communication denial, and timing faults. This paper presents Guarded Swarms, a hybrid framework that combines digital coordination with hardware-level analog safety enforcement. The architecture builds [...] Read more.
Autonomous UAV/UGV swarms increasingly operate in contested environments where purely digital control architectures are vulnerable to cyber compromise, communication denial, and timing faults. This paper presents Guarded Swarms, a hybrid framework that combines digital coordination with hardware-level analog safety enforcement. The architecture builds on Topic-Based Communication Space Petri Nets (TB-CSPN) for structured multi-agent coordination, extending this digital foundation with independent analog guard channels—thrust clamps, attitude limiters, proximity sensors, and emergency stops—that operate in parallel at the actuator interface. Each channel can unilaterally veto unsafe commands within microseconds, independently of software state. The digital–analog interface is formalized via timing contracts that specify sensor-consistency windows and actuation latency bounds. A two-robot case study demonstrates token-based arbitration at the digital level and OR-style inhibition at the analog level. The framework ensures local safety deterministically while maintaining global coordination as a best-effort property. This paper presents an architectural contribution establishing design principles and interface contracts. Empirical validation remains future work. Full article
(This article belongs to the Special Issue Intelligent Agents and Their Application)
Show Figures

Graphical abstract

21 pages, 1865 KB  
Article
The Politics of Green Buildings: Neoliberal Environmental Governance and LEED’s Uneven Geography in Istanbul
by Emre Demirtas and Tugba Ayas Onol
Buildings 2026, 16(2), 363; https://doi.org/10.3390/buildings16020363 - 15 Jan 2026
Cited by 2 | Viewed by 716
Abstract
This study critically examines the relationship between neoliberal environmentalism and green certification systems by quantitatively analyzing LEED-certified buildings in Istanbul. It explores how green building practices intersect with market-oriented urban environmental governance through an analysis of the spatial distribution, ownership types, access typologies, [...] Read more.
This study critically examines the relationship between neoliberal environmentalism and green certification systems by quantitatively analyzing LEED-certified buildings in Istanbul. It explores how green building practices intersect with market-oriented urban environmental governance through an analysis of the spatial distribution, ownership types, access typologies, and functional uses of certified projects. The findings reveal that nearly 80% of LEED-certified buildings in Istanbul are developed by private companies, and that 88.6% of these buildings are private spaces with limited or no public access. These projects are predominantly high-end offices or residential developments, with a large share holding “Gold” certification. Correlation analysis identifies an inverse relationship between LEED project density and socioeconomic vulnerability, raising critical questions about spatial justice and equity in access to sustainable urban environments. This study contributes to the growing body of critical literature that frames urban sustainability not merely as a technocratic checklist of standards but as a normative and contested terrain in which justice, equity, and inclusivity must be placed at the center. Full article
(This article belongs to the Section Architectural Design, Urban Science, and Real Estate)
Show Figures

Figure 1

Back to TopTop