Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (2,157)

Search Parameters:
Keywords = critical security systems

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
36 pages, 1010 KiB  
Article
SIBERIA: A Self-Sovereign Identity and Multi-Factor Authentication Framework for Industrial Access
by Daniel Paredes-García, José Álvaro Fernández-Carrasco, Jon Ander Medina López, Juan Camilo Vasquez-Correa, Imanol Jericó Yoldi, Santiago Andrés Moreno-Acevedo, Ander González-Docasal, Haritz Arzelus Irazusta, Aitor Álvarez Muniain and Yeray de Diego Loinaz
Appl. Sci. 2025, 15(15), 8589; https://doi.org/10.3390/app15158589 (registering DOI) - 2 Aug 2025
Abstract
The growing need for secure and privacy-preserving identity management in industrial environments has exposed the limitations of traditional, centralized authentication systems. In this context, SIBERIA was developed as a modular solution that empowers users to control their own digital identities, while ensuring robust [...] Read more.
The growing need for secure and privacy-preserving identity management in industrial environments has exposed the limitations of traditional, centralized authentication systems. In this context, SIBERIA was developed as a modular solution that empowers users to control their own digital identities, while ensuring robust protection of critical services. The system is designed in alignment with European standards and regulations, including EBSI, eIDAS 2.0, and the GDPR. SIBERIA integrates a Self-Sovereign Identity (SSI) framework with a decentralized blockchain-based infrastructure for the issuance and verification of Verifiable Credentials (VCs). It incorporates multi-factor authentication by combining a voice biometric module, enhanced with spoofing-aware techniques to detect synthetic or replayed audio, and a behavioral biometrics module that provides continuous authentication by monitoring user interaction patterns. The system enables secure and user-centric identity management in industrial contexts, ensuring high resistance to impersonation and credential theft while maintaining regulatory compliance. SIBERIA demonstrates that it is possible to achieve both strong security and user autonomy in digital identity systems by leveraging decentralized technologies and advanced biometric verification methods. Full article
(This article belongs to the Special Issue Blockchain and Distributed Systems)
Show Figures

Figure 1

24 pages, 1380 KiB  
Article
Critical Smart Functions for Smart Living Based on User Perspectives
by Benjamin Botchway, Frank Ato Ghansah, David John Edwards, Ebenezer Kumi-Amoah and Joshua Amo-Larbi
Buildings 2025, 15(15), 2727; https://doi.org/10.3390/buildings15152727 (registering DOI) - 1 Aug 2025
Abstract
Smart living is strongly promoted to enhance the quality of life via the application of innovative solutions, and this is driven by domain specialists and policymakers, including designers, urban planners, computer engineers, and property developers. Nonetheless, the actual user, whose views ought to [...] Read more.
Smart living is strongly promoted to enhance the quality of life via the application of innovative solutions, and this is driven by domain specialists and policymakers, including designers, urban planners, computer engineers, and property developers. Nonetheless, the actual user, whose views ought to be considered during the design and development of smart living systems, has received little attention. Thus, this study aims to identify and examine the critical smart functions to achieve smart living in smart buildings based on occupants’ perceptions. The aim is achieved using a sequential quantitative research method involving a literature review and 221 valid survey data gathered from a case of a smart student residence in Hong Kong. The method is further integrated with descriptive statistics, the Kruskal–Walli’s test, and the criticality test. The results were validated via a post-survey with related experts. Twenty-six critical smart functions for smart living were revealed, with the top three including the ability to protect personal data and information privacy, provide real-time safety and security, and the ability to be responsive to users’ needs. A need was discovered to consider the context of buildings during the design of smart living systems, and the recommendation is for professionals to understand the kind of digital technology to be integrated into a building by strongly considering the context of the building and how smart living will be achieved within it based on users’ perceptions. The study provides valuable insights into the occupants’ perceptions of critical smart features/functions for policymakers and practitioners to consider in the construction of smart living systems, specifically students’ smart buildings. This study contributes to knowledge by identifying the critical smart functions to achieve smart living based on occupants’ perceptions of smart living by considering the specific context of a smart student building facility constructed in Hong Kong. Full article
Show Figures

Figure 1

26 pages, 1033 KiB  
Article
Internet of Things Platform for Assessment and Research on Cybersecurity of Smart Rural Environments
by Daniel Sernández-Iglesias, Llanos Tobarra, Rafael Pastor-Vargas, Antonio Robles-Gómez, Pedro Vidal-Balboa and João Sarraipa
Future Internet 2025, 17(8), 351; https://doi.org/10.3390/fi17080351 (registering DOI) - 1 Aug 2025
Abstract
Rural regions face significant barriers to adopting IoT technologies, due to limited connectivity, energy constraints, and poor technical infrastructure. While urban environments benefit from advanced digital systems and cloud services, rural areas often lack the necessary conditions to deploy and evaluate secure and [...] Read more.
Rural regions face significant barriers to adopting IoT technologies, due to limited connectivity, energy constraints, and poor technical infrastructure. While urban environments benefit from advanced digital systems and cloud services, rural areas often lack the necessary conditions to deploy and evaluate secure and autonomous IoT solutions. To help overcome this gap, this paper presents the Smart Rural IoT Lab, a modular and reproducible testbed designed to replicate the deployment conditions in rural areas using open-source tools and affordable hardware. The laboratory integrates long-range and short-range communication technologies in six experimental scenarios, implementing protocols such as MQTT, HTTP, UDP, and CoAP. These scenarios simulate realistic rural use cases, including environmental monitoring, livestock tracking, infrastructure access control, and heritage site protection. Local data processing is achieved through containerized services like Node-RED, InfluxDB, MongoDB, and Grafana, ensuring complete autonomy, without dependence on cloud services. A key contribution of the laboratory is the generation of structured datasets from real network traffic captured with Tcpdump and preprocessed using Zeek. Unlike simulated datasets, the collected data reflect communication patterns generated from real devices. Although the current dataset only includes benign traffic, the platform is prepared for future incorporation of adversarial scenarios (spoofing, DoS) to support AI-based cybersecurity research. While experiments were conducted in an indoor controlled environment, the testbed architecture is portable and suitable for future outdoor deployment. The Smart Rural IoT Lab addresses a critical gap in current research infrastructure, providing a realistic and flexible foundation for developing secure, cloud-independent IoT solutions, contributing to the digital transformation of rural regions. Full article
Show Figures

Figure 1

21 pages, 2608 KiB  
Article
Quality and Quantity Losses of Tomatoes Grown by Small-Scale Farmers Under Different Production Systems
by Tintswalo Molelekoa, Edwin M. Karoney, Nazareth Siyoum, Jarishma K. Gokul and Lise Korsten
Horticulturae 2025, 11(8), 884; https://doi.org/10.3390/horticulturae11080884 (registering DOI) - 1 Aug 2025
Abstract
Postharvest losses amongst small-scale farmers in developing countries are high due to inadequate resources and infrastructure. Among the various affected crops, tomatoes are particularly vulnerable; however, studies on postharvest losses of most fruits and vegetables are limited. Therefore, this study aimed to assess [...] Read more.
Postharvest losses amongst small-scale farmers in developing countries are high due to inadequate resources and infrastructure. Among the various affected crops, tomatoes are particularly vulnerable; however, studies on postharvest losses of most fruits and vegetables are limited. Therefore, this study aimed to assess postharvest tomato losses under different production systems within the small-scale supply chain using the indirect assessment (questionnaires and interviews) and direct quantification of losses. Farmers reported tomato losses due to insects (82.35%), cracks, bruises, and deformities (70.58%), and diseases (64.71%). Chemical sprays were the main form of pest and disease control reported by all farmers. The direct quantification sampling data revealed that 73.07% of the tomatoes were substandard at the farm level, with 47.92% and 25.15% categorized as medium-quality and poor-quality, respectively. The primary contributors to the losses were decay (39.92%), mechanical damage (31.32%), and blotchiness (27.99%). Postharvest losses were significantly higher under open-field production systems compared to closed tunnels. The fungi associated with decay were mainly Geotrichum, Fusarium spp., and Alternaria spp. These findings demonstrate the main drivers behind postharvest losses, which in turn highlight the critical need for intervention through training and support, including the use of postharvest loss reduction technologies to enhance food security. Full article
(This article belongs to the Section Postharvest Biology, Quality, Safety, and Technology)
Show Figures

Graphical abstract

24 pages, 2410 KiB  
Article
Predictive Modeling and Simulation of CO2 Trapping Mechanisms: Insights into Efficiency and Long-Term Sequestration Strategies
by Oluchi Ejehu, Rouzbeh Moghanloo and Samuel Nashed
Energies 2025, 18(15), 4071; https://doi.org/10.3390/en18154071 (registering DOI) - 31 Jul 2025
Abstract
This study presents a comprehensive analysis of CO2 trapping mechanisms in subsurface reservoirs by integrating numerical reservoir simulations, geochemical modeling, and machine learning techniques to enhance the design and evaluation of carbon capture and storage (CCS) strategies. A two-dimensional reservoir model was [...] Read more.
This study presents a comprehensive analysis of CO2 trapping mechanisms in subsurface reservoirs by integrating numerical reservoir simulations, geochemical modeling, and machine learning techniques to enhance the design and evaluation of carbon capture and storage (CCS) strategies. A two-dimensional reservoir model was developed to simulate CO2 injection dynamics under realistic geomechanical and geochemical conditions, incorporating four primary trapping mechanisms: residual, solubility, mineralization, and structural trapping. To improve computational efficiency without compromising accuracy, advanced machine learning models, including random forest, gradient boosting, and decision trees, were deployed as smart proxy models for rapid prediction of trapping behavior across multiple scenarios. Simulation outcomes highlight the critical role of hysteresis, aquifer dynamics, and producer well placement in enhancing CO2 trapping efficiency and maintaining long-term storage stability. To support the credibility of the model, a qualitative validation framework was implemented by comparing simulation results with benchmarked field studies and peer-reviewed numerical models. These comparisons confirm that the modeled mechanisms and trends align with established CCS behavior in real-world systems. Overall, the study demonstrates the value of combining traditional reservoir engineering with data-driven approaches to optimize CCS performance, offering scalable, reliable, and secure solutions for long-term carbon sequestration. Full article
Show Figures

Figure 1

24 pages, 4753 KiB  
Article
A Secure Satellite Transmission Technique via Directional Variable Polarization Modulation with MP-WFRFT
by Zhiyu Hao, Zukun Lu, Xiangjun Li, Xiaoyu Zhao, Zongnan Li and Xiaohui Liu
Aerospace 2025, 12(8), 690; https://doi.org/10.3390/aerospace12080690 (registering DOI) - 31 Jul 2025
Abstract
Satellite communications are pivotal to global Internet access, connectivity, and the advancement of information warfare. Despite these importance, the open nature of satellite channels makes them vulnerable to eavesdropping, making the enhancement of interception resistance in satellite communications a critical issue in both [...] Read more.
Satellite communications are pivotal to global Internet access, connectivity, and the advancement of information warfare. Despite these importance, the open nature of satellite channels makes them vulnerable to eavesdropping, making the enhancement of interception resistance in satellite communications a critical issue in both academic and industrial circles. Within the realm of satellite communications, polarization modulation and quadrature techniques are essential for information transmission and interference suppression. To boost electromagnetic countermeasures in complex battlefield scenarios, this paper integrates multi-parameter weighted-type fractional Fourier transform (MP-WFRFT) with directional modulation (DM) algorithms, building upon polarization techniques. Initially, the operational mechanisms of the polarization-amplitude-phase modulation (PAPM), MP-WFRFT, and DM algorithms are elucidated. Secondly, it introduces a novel variable polarization-amplitude-phase modulation (VPAPM) scheme that integrates variable polarization with amplitude-phase modulation. Subsequently, leveraging the VPAPM modulation scheme, an exploration of the anti-interception capabilities of MP-WFRFT through parameter adjustment is presented. Rooted in an in-depth analysis of simulation data, the anti-scanning capabilities of MP-WFRFT are assessed in terms of scale vectors in the horizontal and vertical direction. Finally, exploiting the potential of the robust anti-scanning capabilities of MP-WFRFT and the directional property of antenna arrays in DM, the paper proposes a secure transmission technique employing directional variable polarization modulation with MP-WFRFT. The performance simulation analysis demonstrates that the integration of MP-WFRFT and DM significantly outperforms individual secure transmission methods, improving anti-interception performance by at least an order of magnitude at signal-to-noise ratios above 10 dB. Consequently, this approach exhibits considerable potential and engineering significance for its application within satellite communication systems. Full article
(This article belongs to the Section Astronautics & Space Science)
Show Figures

Figure 1

26 pages, 2059 KiB  
Article
Integration and Development Path of Smart Grid Technology: Technology-Driven, Policy Framework and Application Challenges
by Tao Wei, Haixia Li and Junfeng Miao
Processes 2025, 13(8), 2428; https://doi.org/10.3390/pr13082428 - 31 Jul 2025
Viewed by 43
Abstract
As a key enabling technology for energy transition, the smart grid is propelling the global power system to evolve toward greater efficiency, reliability, and sustainability. Based on the three-dimensional analysis framework of “technology–policy–application”, this study systematically sorts out the technical architecture, regional development [...] Read more.
As a key enabling technology for energy transition, the smart grid is propelling the global power system to evolve toward greater efficiency, reliability, and sustainability. Based on the three-dimensional analysis framework of “technology–policy–application”, this study systematically sorts out the technical architecture, regional development mode, and typical application scenarios of the smart grid, revealing the multi-dimensional challenges that it faces. By using the methods of literature review, cross-national case comparison, and technology–policy collaborative analysis, the differentiated paths of China, the United States, and Europe in the development of smart grids are compared, aiming to promote the integration and development of smart grid technologies. From a technical perspective, this paper proposes a collaborative framework comprising the perception layer, network layer, and decision-making layer. Additionally, it analyzes the integration pathways of critical technologies, including sensors, communication protocols, and artificial intelligence. At the policy level, by comparing the differentiated characteristics in policy orientation and market mechanisms among China, the United States, and Europe, the complementarity between government-led and market-driven approaches is pointed out. At the application level, this study validates the practical value of smart grids in optimizing energy management, enhancing power supply reliability, and promoting renewable energy consumption through case analyses in urban smart energy systems, rural electrification, and industrial sectors. Further research indicates that insufficient technical standardization, data security risks, and the lack of policy coordination are the core bottlenecks restricting the large-scale development of smart grids. This paper proposes that a new type of intelligent and resilient power system needs to be constructed through technological innovation, policy coordination, and international cooperation, providing theoretical references and practical paths for energy transition. Full article
Show Figures

Figure 1

26 pages, 5549 KiB  
Article
Intrusion Detection and Real-Time Adaptive Security in Medical IoT Using a Cyber-Physical System Design
by Faeiz Alserhani
Sensors 2025, 25(15), 4720; https://doi.org/10.3390/s25154720 (registering DOI) - 31 Jul 2025
Viewed by 47
Abstract
The increasing reliance on Medical Internet of Things (MIoT) devices introduces critical cybersecurity vulnerabilities, necessitating advanced, adaptive defense mechanisms. Recent cyber incidents—such as compromised critical care systems, modified therapeutic device outputs, and fraudulent clinical data inputs—demonstrate that these threats now directly impact life-critical [...] Read more.
The increasing reliance on Medical Internet of Things (MIoT) devices introduces critical cybersecurity vulnerabilities, necessitating advanced, adaptive defense mechanisms. Recent cyber incidents—such as compromised critical care systems, modified therapeutic device outputs, and fraudulent clinical data inputs—demonstrate that these threats now directly impact life-critical aspects of patient security. In this paper, we introduce a machine learning-enabled Cognitive Cyber-Physical System (ML-CCPS), which is designed to identify and respond to cyber threats in MIoT environments through a layered cognitive architecture. The system is constructed on a feedback-looped architecture integrating hybrid feature modeling, physical behavioral analysis, and Extreme Learning Machine (ELM)-based classification to provide adaptive access control, continuous monitoring, and reliable intrusion detection. ML-CCPS is capable of outperforming benchmark classifiers with an acceptable computational cost, as evidenced by its macro F1-score of 97.8% and an AUC of 99.1% when evaluated with the ToN-IoT dataset. Alongside classification accuracy, the framework has demonstrated reliable behaviour under noisy telemetry, maintained strong efficiency in resource-constrained settings, and scaled effectively with larger numbers of connected devices. Comparative evaluations, radar-style synthesis, and ablation studies further validate its effectiveness in real-time MIoT environments and its ability to detect novel attack types with high reliability. Full article
Show Figures

Figure 1

26 pages, 2653 KiB  
Article
Attacker Attribution in Multi-Step and Multi-Adversarial Network Attacks Using Transformer-Based Approach
by Romina Torres and Ana García
Appl. Sci. 2025, 15(15), 8476; https://doi.org/10.3390/app15158476 - 30 Jul 2025
Viewed by 112
Abstract
Recent studies on network intrusion detection using deep learning primarily focus on detecting attacks or classifying attack types, but they often overlook the challenge of attributing each attack to its specific source among many potential adversaries (multi-adversary attribution). This is a critical and [...] Read more.
Recent studies on network intrusion detection using deep learning primarily focus on detecting attacks or classifying attack types, but they often overlook the challenge of attributing each attack to its specific source among many potential adversaries (multi-adversary attribution). This is a critical and underexplored issue in cybersecurity. In this study, we address the problem of attacker attribution in complex, multi-step network attack (MSNA) environments, aiming to identify the responsible attacker (e.g., IP address) for each sequence of security alerts, rather than merely detecting the presence or type of attack. We propose a deep learning approach based on Transformer encoders to classify sequences of network alerts and attribute them to specific attackers among many candidates. Our pipeline includes data preprocessing, exploratory analysis, and robust training/validation using stratified splits and 5-fold cross-validation, all applied to real-world multi-step attack datasets from capture-the-flag (CTF) competitions. We compare the Transformer-based approach with a multilayer perceptron (MLP) baseline to quantify the benefits of advanced architectures. Experiments on this challenging dataset demonstrate that our Transformer model achieves near-perfect accuracy (99.98%) and F1-scores (macro and weighted ≈ 99%) in attack attribution, significantly outperforming the MLP baseline (accuracy 80.62%, macro F1 65.05% and weighted F1 80.48%). The Transformer generalizes robustly across all attacker classes, including those with few samples, as evidenced by per-class metrics and confusion matrices. Our results show that Transformer-based models are highly effective for multi-adversary attack attribution in MSNA, a scenario not or under-addressed in the previous intrusion detection systems (IDS) literature. The adoption of advanced architectures and rigorous validation strategies is essential for reliable attribution in complex and imbalanced environments. Full article
(This article belongs to the Special Issue Application of Deep Learning for Cybersecurity)
Show Figures

Figure 1

29 pages, 2504 KiB  
Review
Bridging Gaps in Vaccine Access and Equity: A Middle Eastern Perspective
by Laith N. AL-Eitan, Diana L. Almahdawi, Rabi A. Abu Khiarah and Mansour A. Alghamdi
Vaccines 2025, 13(8), 806; https://doi.org/10.3390/vaccines13080806 - 29 Jul 2025
Viewed by 356
Abstract
Vaccine equity and access remain critical challenges in global health, particularly in regions with complex socio-political landscapes, like the Middle East. This review examines disparities in vaccine distribution within the Middle Eastern context, analyzing the unique challenges and opportunities across the region. It [...] Read more.
Vaccine equity and access remain critical challenges in global health, particularly in regions with complex socio-political landscapes, like the Middle East. This review examines disparities in vaccine distribution within the Middle Eastern context, analyzing the unique challenges and opportunities across the region. It provides an overview of the area’s diverse finances and its impact on healthcare accessibility. We examine vaccination rates and identify critical barriers to vaccination, which may be particular issues in developing countries, such as vaccine thermostability, logistical hurdles, financial constraints, and socio-cultural factors, or broader problems, like political instability, economic limitations, and deficiencies in healthcare infrastructure. However, we also highlight successful efforts at the regional and national levels to improve vaccine equity, along with their outcomes and impacts. Ultimately, by drawing on the experiences of previous programs and initiatives, we propose strategies to bridge the gaps in vaccine access through sustainable financing, local manufacturing, and the strengthening of health systems. This approach emphasizes the importance of regional collaboration and long-term self-sufficiency in enhancing global health security and achieving more equitable outcomes in the Middle East. Full article
Show Figures

Figure 1

16 pages, 1550 KiB  
Article
Understanding and Detecting Adversarial Examples in IoT Networks: A White-Box Analysis with Autoencoders
by Wafi Danesh, Srinivas Rahul Sapireddy and Mostafizur Rahman
Electronics 2025, 14(15), 3015; https://doi.org/10.3390/electronics14153015 - 29 Jul 2025
Viewed by 187
Abstract
Novel networking paradigms such as the Internet of Things (IoT) have expanded their usage and deployment to various application domains. Consequently, unseen critical security vulnerabilities such as zero-day attacks have emerged in such deployments. The design of intrusion detection systems for IoT networks [...] Read more.
Novel networking paradigms such as the Internet of Things (IoT) have expanded their usage and deployment to various application domains. Consequently, unseen critical security vulnerabilities such as zero-day attacks have emerged in such deployments. The design of intrusion detection systems for IoT networks is often challenged by a lack of labeled data, which complicates the development of robust defenses against adversarial attacks. As deep learning-based network intrusion detection systems, network intrusion detection systems (NIDS) have been used to counteract emerging security vulnerabilities. However, the deep learning models used in such NIDS are vulnerable to adversarial examples. Adversarial examples are specifically engineered samples tailored to a specific deep learning model; they are developed by minimal perturbation of network packet features, and are intended to cause misclassification. Such examples can bypass NIDS or enable the rejection of regular network traffic. Research in the adversarial example detection domain has yielded several prominent methods; however, most of those methods involve computationally expensive retraining steps and require access to labeled data, which are often lacking in IoT network deployments. In this paper, we propose an unsupervised method for detecting adversarial examples that performs early detection based on the intrinsic characteristics of the deep learning model. Our proposed method requires neither computationally expensive retraining nor extra hardware overhead for implementation. For the work in this paper, we first perform adversarial example generation on a deep learning model using autoencoders. After successful adversarial example generation, we perform adversarial example detection using the intrinsic characteristics of the layers in the deep learning model. A robustness analysis of our approach reveals that an attacker can easily bypass the detection mechanism by using low-magnitude log-normal Gaussian noise. Furthermore, we also test the robustness of our detection method against further compromise by the attacker. We tested our approach on the Kitsune datasets, which are state-of-the-art datasets obtained from deployed IoT network scenarios. Our experimental results show an average adversarial example generation time of 0.337 s and an average detection rate of almost 100%. The robustness analysis of our detection method reveals a reduction of almost 100% in adversarial example detection after compromise by the attacker. Full article
Show Figures

Figure 1

24 pages, 2815 KiB  
Article
Blockchain-Powered LSTM-Attention Hybrid Model for Device Situation Awareness and On-Chain Anomaly Detection
by Qiang Zhang, Caiqing Yue, Xingzhe Dong, Guoyu Du and Dongyu Wang
Sensors 2025, 25(15), 4663; https://doi.org/10.3390/s25154663 - 28 Jul 2025
Viewed by 222
Abstract
With the increasing scale of industrial devices and the growing complexity of multi-source heterogeneous sensor data, traditional methods struggle to address challenges in fault detection, data security, and trustworthiness. Ensuring tamper-proof data storage and improving prediction accuracy for imbalanced anomaly detection for potential [...] Read more.
With the increasing scale of industrial devices and the growing complexity of multi-source heterogeneous sensor data, traditional methods struggle to address challenges in fault detection, data security, and trustworthiness. Ensuring tamper-proof data storage and improving prediction accuracy for imbalanced anomaly detection for potential deployment in the Industrial Internet of Things (IIoT) remain critical issues. This study proposes a blockchain-powered Long Short-Term Memory Network (LSTM)–Attention hybrid model: an LSTM-based Encoder–Attention–Decoder (LEAD) for industrial device anomaly detection. The model utilizes an encoder–attention–decoder architecture for processing multivariate time series data generated by industrial sensors and smart contracts for automated on-chain data verification and tampering alerts. Experiments on real-world datasets demonstrate that the LEAD achieves an F0.1 score of 0.96, outperforming baseline models (Recurrent Neural Network (RNN): 0.90; LSTM: 0.94; and Bi-directional LSTM (Bi-LSTM, 0.94)). We simulate the system using a private FISCO-BCOS network with a multi-node setup to demonstrate contract execution, anomaly data upload, and tamper alert triggering. The blockchain system successfully detects unauthorized access and data tampering, offering a scalable solution for device monitoring. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

23 pages, 1734 KiB  
Article
Design and Implementation of a Cost-Effective Failover Mechanism for Containerized UPF
by Kiem Nguyen Trung and Younghan Kim
Electronics 2025, 14(15), 2991; https://doi.org/10.3390/electronics14152991 - 27 Jul 2025
Viewed by 231
Abstract
Private 5G networks offer exclusive, secure wireless communication with full control deployments for many clients, such as enterprises and campuses. In these networks, edge computing plays a critical role by hosting both application services and the User Plane Functions (UPFs) as containerized workloads [...] Read more.
Private 5G networks offer exclusive, secure wireless communication with full control deployments for many clients, such as enterprises and campuses. In these networks, edge computing plays a critical role by hosting both application services and the User Plane Functions (UPFs) as containerized workloads close to end devices, reducing latency and ensuring stringent Quality of Service (QoS). However, edge environments often face resource constraints and unpredictable failures such as network disruptions or hardware malfunctions, which can severely affect the reliability of the network. In addition, existing redundancy-based UPF resilience strategies, which maintain standby instances, incur substantial overheads and degrade resource efficiency and scalability for the applications. To address this issue, this study introduces a novel design that enables quick detection of UPF failures and two failover mechanisms to restore failed UPF instances either within the cluster hosting the failed UPF or across multiple clusters, depending on that cluster’s resource availability and health. We implemented and evaluated our proposed approach on a Kubernetes-based testbed, and the results demonstrate that our approach reduces UPF redeployment time by up to 37% compared to baseline methods and lowers system cost by up to 50% under high-reliability requirements compared to traditional redundancy-based failover methods. These findings demonstrate that our design can serve as a complementary solution alongside traditional resilience strategies, offering a particularly cost-effective and resource-efficient alternative for edge computing and other constrained environments. Full article
(This article belongs to the Special Issue Advances in Intelligent Systems and Networks, 2nd Edition)
Show Figures

Figure 1

31 pages, 2472 KiB  
Article
Increase in Grain Production Potential of China Under 2030 Well-Facilitated Farmland Construction Goal
by Jianya Zhao, Fanhao Yang, Yanglan Zhang and Shu Wang
Land 2025, 14(8), 1538; https://doi.org/10.3390/land14081538 - 27 Jul 2025
Viewed by 334
Abstract
To promote high-quality agricultural development and implement the “storing grain in the land” strategy, the construction of Well-Facilitated Farmland (WFF) plays a critical role in enhancing grain production capacity and optimizing the spatial distribution of food supply, thereby contributing to national food security. [...] Read more.
To promote high-quality agricultural development and implement the “storing grain in the land” strategy, the construction of Well-Facilitated Farmland (WFF) plays a critical role in enhancing grain production capacity and optimizing the spatial distribution of food supply, thereby contributing to national food security. However, accurately assessing the potential impact of WFF construction on China’s grain production and regional self-sufficiency by 2030 remains a significant challenge. Existing studies predominantly focus on the provincial level, while fine-grained analyses at the city level are still lacking. This study quantifies the potential increase in grain production in China under the 2030 WFF construction target by employing effect size analysis, multi-weight prediction, and Monte Carlo simulation across multiple spatial scales (national, provincial, and city levels), thereby addressing the research gap at finer spatial resolutions. By integrating 2030 population projections and applying a grain self-sufficiency calculation formula, it further evaluates the contribution of WFF to regional grain self-sufficiency: (1) WFF could generate an additional 31–48 million tons of grain, representing a 5.26–8.25% increase; (2) grain supply in major crop-producing regions would expand, while the supply–demand gap in balanced regions would narrow; and (3) the number of cities with grain self-sufficiency ratios below 50% would decrease by 11.1%, while those exceeding 200% would increase by 25.5%. These findings indicate that WFF construction not only enhances overall grain production potential but also facilitates a transition from “overall supply-demand balance” to “structural security” within China’s food system. This study provides critical data support and policy insights for building a more resilient and regionally adaptive agricultural system. Full article
Show Figures

Figure 1

29 pages, 2060 KiB  
Review
Integrated Management Practices Foster Soil Health, Productivity, and Agroecosystem Resilience
by Xiongwei Liang, Shaopeng Yu, Yongfu Ju, Yingning Wang and Dawei Yin
Agronomy 2025, 15(8), 1816; https://doi.org/10.3390/agronomy15081816 - 27 Jul 2025
Viewed by 373
Abstract
Sustainable farmland management is vital for global food security and for mitigating environmental degradation and climate change. While individual practices such as crop rotation and no-tillage are well-documented, this review synthesizes current evidence to illuminate the critical synergistic effects of integrating four key [...] Read more.
Sustainable farmland management is vital for global food security and for mitigating environmental degradation and climate change. While individual practices such as crop rotation and no-tillage are well-documented, this review synthesizes current evidence to illuminate the critical synergistic effects of integrating four key strategies: crop rotation, conservation tillage, organic amendments, and soil microbiome management. Crop rotation enhances nutrient cycling and disrupts pest cycles, while conservation tillage preserves soil structure, reduces erosion, and promotes carbon sequestration. Organic amendments replenish soil organic matter and stimulate biological activity, and a healthy soil microbiome boosts plant resilience to stress and enhances nutrient acquisition through key functional groups like arbuscular mycorrhizal fungi (AMFs). Critically, the integration of these practices yields amplified benefits that far exceed their individual contributions. Integrated management systems not only significantly increase crop yields (by up to 15–30%) and soil organic carbon but also deliver profound global ecosystem services, with a potential to sequester 2.17 billion tons of CO2 and reduce soil erosion by 2.41 billion tons annually. Despite challenges such as initial yield variability, leveraging these synergies through precision agriculture represents the future direction for the field. This review concludes that a holistic, systems-level approach is essential for building regenerative and climate-resilient agroecosystems. Full article
(This article belongs to the Special Issue Advances in Tillage Methods to Improve the Yield and Quality of Crops)
Show Figures

Figure 1

Back to TopTop