Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (768)

Search Parameters:
Keywords = federated machine learning

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
24 pages, 55999 KB  
Article
A Method for Workout Video Classification via Explainable and Federated Learning
by Ludovica Ciardiello, Patrizia Agnello, Marta Petyx, Fabio Martinelli, Mario Cesarelli, Antonella Santone and Francesco Mercaldo
Bioengineering 2026, 13(6), 603; https://doi.org/10.3390/bioengineering13060603 - 22 May 2026
Abstract
In recent years, the widespread availability of wearable devices and smartphones has enabled the large-scale collection of human activity data, fostering new opportunities for automatic workout recognition and personalized fitness monitoring. However, the centralized storage of video recordings raises critical privacy concerns, particularly [...] Read more.
In recent years, the widespread availability of wearable devices and smartphones has enabled the large-scale collection of human activity data, fostering new opportunities for automatic workout recognition and personalized fitness monitoring. However, the centralized storage of video recordings raises critical privacy concerns, particularly when raw data contain identifiable individuals. Federated Machine Learning provides a paradigm designed with the aim of reducing privacy risks; here, models are collaboratively trained across distributed clients without sharing their sensitive data. In this paper, we propose an approach for workout video classification with Federated Machine Learning, enhanced by explainability through Gradient-weighted Class-Activation Mapping. The proposed method is evaluated on a real-world multi-class exercise video dataset, organized into eight biomechanically coherent macro-classes. In the experimental analysis, we consider several federated configurations in terms of the number of clients, the chosen aggregation strategy, and global communication rounds. The obtained results demonstrate that different aggregation strategies achieve comparable overall accuracy, while explainability effectively highlights the discriminative regions associated with exercise execution, revealing meaningful differences in model behavior between aggregation strategies and uncovering misclassifications driven by contextual biases, demonstrating the trustworthiness of the proposed approach for explainable workout video classification. Full article
(This article belongs to the Special Issue AI and Data Science in Bioengineering: Innovations and Applications)
34 pages, 3248 KB  
Review
Artificial Intelligence Methods for Unmanned Aerial Vehicles Cybersecurity: A Comprehensive Survey
by Thabet Kacem and Kensley Benjamin
Drones 2026, 10(6), 400; https://doi.org/10.3390/drones10060400 - 22 May 2026
Abstract
Unmanned aerial vehicles (UAVs) have been widely used in recent years in various applications thanks to advances in communication, Internet of Things, and electronics. Despite the advantages they offer, there have been reports of cybersecurity attacks, which represent serious threats to their operations. [...] Read more.
Unmanned aerial vehicles (UAVs) have been widely used in recent years in various applications thanks to advances in communication, Internet of Things, and electronics. Despite the advantages they offer, there have been reports of cybersecurity attacks, which represent serious threats to their operations. Classic cryptographic-based solutions and traditional intrusion detection approaches generally struggle to deal with these attacks due to their adaptive and evolving nature. In this context, artificial intelligence (AI) models emerged as potential solutions that hold great promise in addressing these types of attacks. However, most related surveys presented a fragmented picture of the state of the art, failing to cover all sub-types of AI models, and often did not follow structured taxonomies for describing the literature. In this paper, we bridge this gap by proposing a novel and comprehensive survey inspired by the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) framework, defining the search strategy, inclusion and exclusion criteria, selection process, and classification. We also present a cross-dimensional taxonomy that classifies UAV security research according to the type of AI model, the cyber attacks it thwarts, and the related security properties it enforces. This taxonomy does not stop at describing machine learning (ML) and deep learning (DL) approaches but also examines federated learning (FL), reinforcement learning (RL), graph neural network (GNN), and generative AI (GAI). We also classify the threat vector according to the layer in the UAV functional stack where the attack takes place. In addition, we describe the datasets, tools, and evaluation metrics that were mostly used in the literature. Our survey analyzes the common uses of each AI model type in UAV security and discusses its strengths, limitations, and deployment readiness. The outcome of our taxonomy is a quantitative and qualitative analysis providing quantifiable metrics on the covered security properties per model type. We conclude the paper by discussing the key open challenges and future directions in the field. We intend for this survey to serve as a reference for cybersecurity researchers and practitioners who tackle UAV security using AI. Full article
(This article belongs to the Section Artificial Intelligence in Drones (AID))
32 pages, 2147 KB  
Review
Harnessing Machine Learning for Accelerated Drug Discovery: Opportunities and Unmet Challenges
by Mohamed El-Tanani, Syed Arman Rabbani, Adil Farooq Wali, Frezah Muhana, Yahia El-Tanani and Rakesh Kumar
Pharmaceuticals 2026, 19(6), 810; https://doi.org/10.3390/ph19060810 (registering DOI) - 22 May 2026
Abstract
The process of drug discovery is one of the most expensive, time-consuming, and high-risk endeavors in modern science. Translating initial scientific insights into safe and effective therapies, supported by genomics, structural biology, and computational chemistry, typically requires more than a decade and substantial [...] Read more.
The process of drug discovery is one of the most expensive, time-consuming, and high-risk endeavors in modern science. Translating initial scientific insights into safe and effective therapies, supported by genomics, structural biology, and computational chemistry, typically requires more than a decade and substantial financial investment. Machine learning (ML) has emerged as a powerful tool for improving efficiency across the drug discovery pipeline. By enabling the analysis of large and complex datasets, ML supports target identification, lead discovery, optimization, and prediction of preclinical and clinical outcomes. Its integration with experimental validation and automation is illustrated by recent advances such as protein structure prediction, AI-driven antifibrotic compound discovery, and antibiotic identification. Despite these advances, significant challenges remain. Model generalizability is limited by data scarcity, heterogeneity, and hidden biases. In addition, the translation of in silico predictions into clinically validated outcomes remains a major bottleneck, and regulatory acceptance is constrained by limited model interpretability. Ethical considerations, including data privacy, equitable representation, and the potential misuse of generative models, further complicate adoption. This review examines the applications of ML across the drug discovery pipeline, with a focus on translational and regulatory considerations. It also discusses emerging directions, including hybrid physics–AI approaches, multimodal foundation models, federated learning, and explainable AI. The effective integration of ML will depend on rigorous validation, interdisciplinary collaboration, responsible data governance, and alignment with regulatory frameworks. Full article
Show Figures

Graphical abstract

22 pages, 1239 KB  
Article
Federated Learning-Based Distributed Solar Forecasting for Smart Buildings in Muscat, Oman Using GRU Networks
by Mazhar Baloch, Mohamed Shaik Honnurvali, Touqeer Ahmed, Abdul Manan Sheikh and Sohaib Tahir Chaudhary
Energies 2026, 19(11), 2496; https://doi.org/10.3390/en19112496 - 22 May 2026
Abstract
The present paper suggests a federated learning-based distributed solar forecasting model based on gated recurrent unit (GRU) networks (FL-GRU) to smart buildings in Muscat, Oman. The growing adoption of rooftop photovoltaic (PV) systems in urban settings needs precise, privatizing, and scalable forecasting models [...] Read more.
The present paper suggests a federated learning-based distributed solar forecasting model based on gated recurrent unit (GRU) networks (FL-GRU) to smart buildings in Muscat, Oman. The growing adoption of rooftop photovoltaic (PV) systems in urban settings needs precise, privatizing, and scalable forecasting models able to manage geographically dispersed and statistically heterogeneous data. The suggested solution will include federated learning and GRU networks to train a global forecasting model across several smart buildings and avoid the exchange of raw energy data to overcome these challenges. The local GRU models are trained on local PV generation data and only parameters of the model are relayed to a central aggregation server. This provides privacy of data without compromising the effectiveness of collaborative learning. The proposed framework is tested in a variety of realistic scenarios such as scalability analysis, non-identically distributed (non-IID) data, client dropout, communication constraints, seasonal variability, and privacy saving noise injection. Simulation outcomes show that the proposed FL-GRU model presents a final RMSE of 0.129, MAE of 0.100 and forecasting accuracy of 97%. When increasing the number of clients involved in the process, 2 to 10, RMSE decreases to 0.129, which supports the high scalability advantages. In non-IID scenarios, RMSE ranges between 0.129 and 0.167, and even with half of the clients dropping, the system is robust with an RMSE of 0.172. The proposed FL-GRU is better than the benchmark models, Local GRU, centralized GRU, FL-LSTM, and FL-ANN with a maximum improvement of 22.29% in RMSE reduction. Also, the best predictive consistency is found with correlation analysis with R2 = 0.957. On the whole, the suggested approach can offer an efficient, privacy-aware, and scalable solution to distributed solar energy prediction in smart cities. Full article
(This article belongs to the Special Issue Advanced Artificial Intelligence for Photovoltaic Energy Systems)
23 pages, 4279 KB  
Article
Impact of Server-Side Aggregation on Federated Traffic Classification Under Heterogeneous Data Distributions
by Salam Allawi Hussein and Sándor R. Répás
Big Data Cogn. Comput. 2026, 10(6), 167; https://doi.org/10.3390/bdcc10060167 - 22 May 2026
Abstract
The growing prevalence of encrypted network traffic has rendered traditional payload-based inspection ineffective, shifting attention toward flow-level statistical analysis combined with machine learning. At the same time, privacy regulations and distributed network architectures make centralised data collection increasingly impractical, motivating federated learning as [...] Read more.
The growing prevalence of encrypted network traffic has rendered traditional payload-based inspection ineffective, shifting attention toward flow-level statistical analysis combined with machine learning. At the same time, privacy regulations and distributed network architectures make centralised data collection increasingly impractical, motivating federated learning as a privacy-preserving alternative. Despite its promise, deploying federated learning for encrypted traffic classification in realistic environments remains challenging, particularly under heterogeneous client data distributions that arise when different network sites observe different subsets of services. This paper examines how server-side aggregation affects federated QUIC traffic classification under such heterogeneous conditions. We use a five-class Google QUIC dataset and represent each flow with eight statistical features derived from packet size and timing. We compare a centralised baseline with federated learning under three client partitions: mixed-label clients (C1), service-based single-class clients (C2), and hash-based semi-IID clients (C3). For each case, we evaluate four Flower aggregation strategies: FedAvg, FedAdam, FedAvgM, and FedYogi. Results show that client distribution has a greater impact on performance than the choice of aggregation strategy. Federated models match or closely approach centralised performance in C1 and C3, with accuracy up to 0.9969 and macro-AUC near 1.0. In C2, accuracy drops due to extreme label skew, but adaptive aggregation mitigates the effect. FedYogi achieves the best C2 accuracy of 0.9287, while FedAvgM attains the highest C2 macro-AUC of 0.9885. ROC curves and confusion matrices confirm that the choice of aggregation matters mainly under severe heterogeneity. Full article
Show Figures

Figure 1

31 pages, 2447 KB  
Article
Application-Oriented Evaluation of Federated Learning for IoT Intrusion Detection Under Non-IID Conditions in Wireless Sensor Networks
by Walaa Alayed, Hassam Ahmed Tahir and Waqar Ul Hassan
Appl. Sci. 2026, 16(10), 5092; https://doi.org/10.3390/app16105092 - 20 May 2026
Abstract
Federated learning is a distributed machine learning paradigm that enables multiple devices to collaboratively train a shared model while keeping their raw data localized. Federated learning has become an attractive solution for intrusion detection in Internet of Things (IoT)-based wireless sensor networks because [...] Read more.
Federated learning is a distributed machine learning paradigm that enables multiple devices to collaboratively train a shared model while keeping their raw data localized. Federated learning has become an attractive solution for intrusion detection in Internet of Things (IoT)-based wireless sensor networks because it enables collaborative model training without transferring raw traffic data. However, real deployments rarely satisfy the common assumption that client data are independent and identically distributed (IID). In practical wireless sensor networks, data heterogeneity naturally arises from spatial variation, uneven attack exposure, traffic imbalance, and differences in sensing conditions, which can substantially affect detection reliability and deployment feasibility. This study presents an application-oriented evaluation of federated intrusion detection under controlled non-IID conditions using three representative datasets: WSN-DS, CIC-IDS-2017, and UNSW-NB15. An LSTM-based intrusion detection model is trained in a federated setting and assessed using three aggregation strategies, namely, FedAvg, FedProx, and SCAFFOLD, under label skew, quantity skew, and feature skew scenarios. The results show that standard FedAvg degrades markedly as heterogeneity increases, with accuracy reductions of up to 23.4 percentage points and substantially higher communication cost under extreme non-IID settings. In contrast, FedProx and SCAFFOLD improve convergence stability and reduce the impact of client drift, with SCAFFOLD showing the strongest overall robustness and up to 45% lower communication cost than FedAvg due to faster convergence. These results demonstrate that non-IID awareness is essential for building deployable privacy-preserving intrusion detection systems for resource-constrained IoT environments. The study provides practical guidance for selecting federated aggregation strategies in wireless sensor network security applications where robustness, bandwidth efficiency, and real-world data heterogeneity must be jointly considered. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

19 pages, 4108 KB  
Article
Robust Federated Learning for Anomaly Detection in Connected Autonomous Vehicle Networks Under Adversarial Attacks
by Abu Zahid Md Jalal Uddin, Atahar Nayeem and Touhid Bhuiyan
Automation 2026, 7(3), 80; https://doi.org/10.3390/automation7030080 (registering DOI) - 20 May 2026
Abstract
Connected and autonomous vehicles (CAVs) increasingly rely on vehicle-to-everything (V2X) communication and distributed sensing infrastructures to support cooperative driving and intelligent transportation services. While these capabilities improve traffic efficiency and safety, they also expand the attack surface of vehicular networks and expose in-vehicle [...] Read more.
Connected and autonomous vehicles (CAVs) increasingly rely on vehicle-to-everything (V2X) communication and distributed sensing infrastructures to support cooperative driving and intelligent transportation services. While these capabilities improve traffic efficiency and safety, they also expand the attack surface of vehicular networks and expose in-vehicle communication systems such as the Controller Area Network (CAN) bus to a wide range of cyber threats. Machine learning-based anomaly detection has emerged as a promising approach for identifying malicious CAN traffic patterns; however, conventional centralized learning requires large-scale data aggregation from vehicles, which raises privacy and scalability concerns. Federated learning (FL) enables collaborative model training across distributed vehicles without requiring the exchange of raw in-vehicle data, making it attractive for privacy-preserving vehicular security applications. Nevertheless, FL systems remain vulnerable to adversarial participants that manipulate local training data or model updates to poison the global model during aggregation. In this work, we present a systematic robustness evaluation of federated anomaly detection in connected vehicular networks under adversarial conditions. The study compares six aggregation strategies, including Federated Averaging (FedAvg), coordinate-wise Median, Trimmed Mean, Krum, Multi-Krum, and Geometric Median (GeoMed), within a non-IID federated CAN bus anomaly detection setting. The evaluation covers label-flipping attacks, gradient-scaling attacks, and a feature-triggered backdoor attack. In addition, the analysis examines malicious client participation, attack-strength variation, learning-rate sensitivity, Trimmed Mean beta sensitivity, multi-seed reliability, and server-side aggregation time. The results show that FedAvg is vulnerable under strong adversarial manipulation, while Trimmed Mean is sensitive to the selected trimming fraction. Median and GeoMed provide strong robustness against gradient-scaling attacks, whereas Multi-Krum achieves the strongest resistance to label-flipping and backdoor attacks. These findings demonstrate that no single aggregation strategy is optimal across all threat models. Instead, robust aggregation for federated CAV anomaly detection should be selected according to the expected attack type, reliability requirement, and computational overhead. Full article
Show Figures

Figure 1

29 pages, 2518 KB  
Review
AI and Machine Learning for Proteomics-Driven Drug Discovery: Methods, Tools, and Best Practices
by Suman Basak
Curr. Issues Mol. Biol. 2026, 48(5), 532; https://doi.org/10.3390/cimb48050532 - 20 May 2026
Abstract
Proteomics has become central to pharmacological research by providing quantitative readouts of protein abundance, post-translational modifications, interactions, and spatial context. However, proteomic datasets are high-dimensional, heterogeneous, and frequently affected by missingness, batch effects, and limited cohort size. Artificial intelligence (AI) and machine learning [...] Read more.
Proteomics has become central to pharmacological research by providing quantitative readouts of protein abundance, post-translational modifications, interactions, and spatial context. However, proteomic datasets are high-dimensional, heterogeneous, and frequently affected by missingness, batch effects, and limited cohort size. Artificial intelligence (AI) and machine learning (ML) can help convert these complex data into decision-relevant outputs for target identification, biomarker discovery, pharmacodynamic monitoring, and drug repurposing. This review critically compares supervised learning, ensemble methods, dimensionality reduction, clustering, deep learning, graph learning, survival modeling, causal inference, and calibration approaches in proteomics-driven drug discovery. We also summarize major software ecosystems for mass-spectrometry processing, targeted assays, spectrum prediction, phosphoproteomics, structure modeling, and reproducible workflows. Emphasis is placed on model selection, benchmarking, missing-data handling, batch correction, interpretability, uncertainty, experimental validation, and translational readiness. Finally, we highlight emerging directions, including contrastive learning, diffusion models, graph-based integration, and federated analytics. Full article
Show Figures

Graphical abstract

16 pages, 2307 KB  
Article
A Federated Learning Framework for Data-Sovereign Predictive Maintenance in Distributed Smart Manufacturing
by Md Sazol Ahmmed, Sriram Praneeth Isanaka and Frank Liou
Appl. Sci. 2026, 16(10), 5084; https://doi.org/10.3390/app16105084 - 20 May 2026
Abstract
Predictive maintenance enables early detection of machine failures and reduces unexpected production downtime. However, conventional approaches typically rely on centralized data collection and model training which introduce challenges related to data sovereignty, communication overhead and data ownership. To address these challenges, this research [...] Read more.
Predictive maintenance enables early detection of machine failures and reduces unexpected production downtime. However, conventional approaches typically rely on centralized data collection and model training which introduce challenges related to data sovereignty, communication overhead and data ownership. To address these challenges, this research proposes a collaborative federated learning framework for predictive maintenance that can be deployed in distributed smart manufacturing systems. The proposed data-sovereign federated learning approach allows multiple factories to collaboratively train a machine failure prediction model while maintaining data locality. In the framework, each factory trains a local multilayer perceptron (MLP) model using its own machine operational data, while a central server aggregates local model parameters using the Federated Averaging (FedAvg) algorithm to construct a global predictive model. The proposed framework was evaluated using the publicly available AI4I 2020 predictive maintenance dataset, where multiple factories are simulated by partitioning the dataset into distributed clients. Experimental results show that the federated learning model achieves competitive performance compared to centralized machine learning baselines, attaining an accuracy of 97.17%, precision of 0.6000, recall of 0.5000, and F1-score of 0.5455. These results demonstrate that federated learning can enable effective predictive maintenance while maintaining data sovereignty in distributed manufacturing environments. Full article
Show Figures

Figure 1

29 pages, 1270 KB  
Systematic Review
Reactive to Predictive Mobility Management: A Systematic Review of ML-Driven Handover Optimization in 5G and Beyond
by Teresia Ankome and Eisuke Hanada
Mach. Learn. Knowl. Extr. 2026, 8(5), 133; https://doi.org/10.3390/make8050133 - 18 May 2026
Viewed by 145
Abstract
Handover optimization is essential for seamless connectivity in 5G and beyond networks. Existing approaches present fundamental challenges of centralized solutions achieving coordination and accuracy but creating privacy risks under the General Data Protection Regulation (GDPR), while distributed privacy-preserving approaches protect user data but [...] Read more.
Handover optimization is essential for seamless connectivity in 5G and beyond networks. Existing approaches present fundamental challenges of centralized solutions achieving coordination and accuracy but creating privacy risks under the General Data Protection Regulation (GDPR), while distributed privacy-preserving approaches protect user data but lack the network-wide visibility necessary for optimal mobility decisions. This systematic review synthesizes 49 peer-reviewed studies published between 2010 and 2025, identified through a PRISMA-compliant search across IEEE Xplore, ScienceDirect, SpringerLink, MDPI, ACM Digital Library, and Google Scholar. Eligible studies addressed cellular handover or mobility management using traditional signal-based, Machine Learning, Federated Learning, Software-Defined Networking strategies, and reported quantitative performance metrics. A structured quality assessment evaluated methodological rigor, dataset validation, benchmarking practices, handover-specific metrics, and scalability. Synthesis evidence shows that existing approaches do not simultaneously satisfy critical requirements for next-generation mobility management of accuracy, privacy, scalability, and real-time network-wide coordination. Machine learning achieves high accuracy (up to 97%) but depends on centralized data; Reinforcement Learning supports real-time adaptation but incurs high computational costs; federated learning preserve privacy but suffers from limited global coordination; and software-defined networking enables centralized control but requires continuous transmission of raw data. Evidence quality is further limited to simulation-based assessments and limited real-world datasets. Overall, the reviews identify a clear evolution from reactive threshold-based methods towards proactive prediction and highlights the need for unified, privacy-preserving and globally coordinated handover frameworks. The findings point toward integrating federated learning with Software-Defined Mobile Networking as promising architectural direction for 6G mobility management. Full article
Show Figures

Figure 1

15 pages, 1281 KB  
Article
An Empirical Study of Federated BERT for Decentralized Twitter Sentiment Analysis
by Oumaima Louzar, Abdelaziz Elbaghdadi, Ahmed El Oualkadi, Ouafae Baida and Abdelouahid Lyhyaoui
Informatics 2026, 13(5), 73; https://doi.org/10.3390/informatics13050073 - 18 May 2026
Viewed by 145
Abstract
Twitter/x has become a key platform for analyzing public opinion on a large scale; however, traditional centralized approaches raise significant concerns regarding privacy and data governance. To address these challenges, this paper presents an empirical study of a federated learning approach based on [...] Read more.
Twitter/x has become a key platform for analyzing public opinion on a large scale; however, traditional centralized approaches raise significant concerns regarding privacy and data governance. To address these challenges, this paper presents an empirical study of a federated learning approach based on a BERT model for decentralized sentiment analysis at the tweet level. This study focuses on evaluating the effectiveness of transformer-based models under realistic non-independent and identically distributed (non-IID) data distributions across distributed clients. The proposed approach enables collaborative model training without sharing raw tweet data, thereby preserving user privacy while leveraging knowledge from multiple sources. The model is evaluated over 100 communication rounds using the Sentiment140 dataset, distributed among four clients with heterogeneous data distributions. Experimental results demonstrate stable convergence and robust performance, with an accuracy of 95.00%, an F1 score of 95.00%, and a PR-AUC of 96.76%. It should be noted that the federated model performs within 1.2% of a centralized baseline, indicating minimal performance degradation despite data sharing constraints. Full article
Show Figures

Figure 1

25 pages, 3021 KB  
Proceeding Paper
Certification of AI-Based Aviation Systems: A Methodology for Continuous Safety Assurance Across the System Life Cycle
by André Schoeman and Aarti Panday
Eng. Proc. 2026, 132(1), 7; https://doi.org/10.3390/engproc2026132007 (registering DOI) - 13 May 2026
Viewed by 165
Abstract
Artificial Intelligence (AI) is emerging as a transformative enabler in aviation, with applications spanning Guidance, Navigation and Control (GNC), Air Traffic Management (ATM), and predictive maintenance. However, the adoption of AI in safety-critical domains remains constrained by the absence of established certification guidance. [...] Read more.
Artificial Intelligence (AI) is emerging as a transformative enabler in aviation, with applications spanning Guidance, Navigation and Control (GNC), Air Traffic Management (ATM), and predictive maintenance. However, the adoption of AI in safety-critical domains remains constrained by the absence of established certification guidance. Traditional standards such as Aerospace Recommended Practice (ARP), ARP4754B, ARP4761A, DO-178C, and DO-254 assume deterministic behaviour and verifiable logic, whereas AI exhibits adaptive and non-deterministic characteristics. Regulatory initiatives, including the European Union Artificial Intelligence Act, the European Union Aviation Safety Agency (EASA) AI Roadmap 2.0, the Federal Aviation Administration (FAA) AI Safety Assurance Roadmap, and ISO/IEC Technical Report (TR) 5469:2024, signal progress but remain fragmented, exploratory, and often limited to low-level autonomous use cases. This study adopts a qualitative approach combining literature and standards analysis with expert interviews to identify gaps in post-deployment assurance, data governance, explainability, and accountability. A conceptual life cycle-oriented framework is proposed that embeds AI-specific assurance activities such as dataset validation, iterative verification, drift detection, and retraining oversight into established certification processes. The framework extends classical and emerging verification and validation models into operational service, linking machine learning constituents to system-level safety arguments and regulatory expectations to support the development of trustworthy and certifiable AI-enabled aviation systems. Full article
Show Figures

Figure 1

30 pages, 5665 KB  
Article
Modeling Employment Sectoral Distribution Using POI Data: Assessing Tourism Functions in Data-Scarce Destinations
by Feng Xing and Sophia Shuang Chen
Land 2026, 15(5), 831; https://doi.org/10.3390/land15050831 (registering DOI) - 13 May 2026
Viewed by 200
Abstract
With the advancement of urbanization, the functions of cities continue to expand and deepen, among which the tourism function plays an increasingly important role in urban and regional economic development. To resolve the challenges in data acquisition for urban function classification and assessment, [...] Read more.
With the advancement of urbanization, the functions of cities continue to expand and deepen, among which the tourism function plays an increasingly important role in urban and regional economic development. To resolve the challenges in data acquisition for urban function classification and assessment, this study introduces POI data and machine learning methods to construct an employment sector distribution model. This enables the estimation of tourism-related employment data in Pacific Island countries. The tourism function of these cities is quantitatively evaluated based on two dimensions: functional scale and functional intensity. The results show that: (1) The constructed employment sector distribution model demonstrates strong predictive performance. The error rate for the total employed population in each island country is below 10%. The Bootstrap robustness test confirms that predicted values for all countries fall within the 95% confidence interval. The number of tourism employees shows a significant positive correlation with inbound tourist numbers and the count of tourism-related POIs at the 0.01 level. Empirical validation shows tourism-related sector error rates of 4.44% for Ningbo and 9.02% for Wuxi, both of which are under 10%. (2) Tourism in thirteen countries, including Samoa and Tonga, constitutes a fundamental function of the national economy, whereas in Papua New Guinea, tourism is a non-fundamental function, reflecting a lower degree of economic reliance on the tourism sector. (3) A provisional typology of tourism functions is proposed, identifying Fiji and The Cook Islands as robustly specialized, while Papua New Guinea remains characterized by stable low-specialization. The remaining 11 countries occupy transitional positions where classification is sensitive to prediction uncertainty. Subject to this caveat, the PICs are provisionally categorized into three groups: medium-to-large specialized (Fiji, Cook Islands, Vanuatu, and Samoa), small specialized (Tuvalu, Palau, Solomon Islands, and Tonga), and low-specialization (Papua New Guinea, Kiribati, Federated States of Micronesia, Nauru, Niue, and Marshall Islands). The classification results can guide these island nations in enhancing their tourism functions, fostering sound regional development, and enabling more effective participation in global governance. Full article
Show Figures

Figure 1

29 pages, 10822 KB  
Article
Spatial Modelling of Groundwater Potential Zones Using GIS-Based Machine Learning Techniques: A Case Study of Abuja, Nigeria
by Danlami Ibrahim, Tatsuya Nemoto and Venkatesh Raghavan
Geosciences 2026, 16(5), 195; https://doi.org/10.3390/geosciences16050195 - 12 May 2026
Viewed by 315
Abstract
In many African nations, including Nigeria, groundwater remains the most readily available source of clean water. However, finding and developing these resources in heterogeneous terrain, such as the Federal Capital Territory (FCT), Abuja, is challenging due to the uneven distribution of the aquifers [...] Read more.
In many African nations, including Nigeria, groundwater remains the most readily available source of clean water. However, finding and developing these resources in heterogeneous terrain, such as the Federal Capital Territory (FCT), Abuja, is challenging due to the uneven distribution of the aquifers and complex geological settings. Using a GIS-based machine learning approach that incorporates surface and subsurface hydrogeological parameters, this study defines groundwater potential zones (GWPZ). Nine conditioning factors were derived from remote sensing, geophysical and climatic datasets. Aquifer thickness, depth to bedrock, geology, rainfall, slope, LULC, lineament density, drainage density and distance from river were among these variables. Three machine learning models: Extreme Gradient Boosting (XGBoost), Support Vector Machine (SVM) and Random Forest (RF) were trained and validated using 2410 borehole records (productive and abortive). Hold-out validation (80:20), 10-fold cross-validation, ROC-AUC, and confusion matrix were used to assess each model’s performance. The ensemble models outperformed the SVM, achieving higher predictive accuracy and better generalisation (XGBoost: 0.89, RF: 0.88 and SVM: 0.87). The generated maps categorised the study area into five GWPZs: very high, high, moderate, low and very low. These findings provide a scientific foundation for groundwater exploration and sustainable water resource management in the study area. Full article
(This article belongs to the Special Issue AI and Machine Learning in Hydrogeology)
Show Figures

Figure 1

31 pages, 986 KB  
Review
A Survey of Machine Learning Approaches to IoT Security
by Iosef Georgian, Teșulă Adrian Zamfirel, Nicolae Goga and Răzvan Crăciunescu
Algorithms 2026, 19(5), 384; https://doi.org/10.3390/a19050384 - 11 May 2026
Viewed by 343
Abstract
The explosive growth of the Internet of Things (IoT) has expanded the attack surface across industrial systems, smart cities, healthcare, and homes, motivating a synthesis of recent advances in machine learning for IoT security and a clear statement of remaining gaps. This review [...] Read more.
The explosive growth of the Internet of Things (IoT) has expanded the attack surface across industrial systems, smart cities, healthcare, and homes, motivating a synthesis of recent advances in machine learning for IoT security and a clear statement of remaining gaps. This review conducted a systematic search of MDPI, IEEE Xplore, Nature, ScienceDirect, and SpringerLink for publications from 2023 to 2025, screening them for domain relevance and organizing findings into a taxonomy of ML methods, threat types, and deployment contexts, with particular attention to datasets, edge constraints, and privacy considerations. We find that the field is shifting from signature-based detection to supervised and deep learning approaches that report high accuracy on benchmark traffic, while federated learning enables privacy-preserving, distributed intrusion detection with near-real-time edge performance. Across domains, prevalent threats include DDoS, unauthorized access, and malware; persistent challenges include device heterogeneity, rapid exploit weaponization, nonstandardized evaluation, concept drift, adversarial/poisoning risks, and governance and privacy constraints that hinder real world rollouts. We conclude that ML materially strengthens IoT resilience but requires rigorous, industry-scale validation, lightweight and explainable models, protocol-aware designs, robust federated aggregation, and SDN/NFV orchestration; we outline benchmark and deployment priorities to translate laboratory gains into operational security. Full article
Show Figures

Figure 1

Back to TopTop