Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (3,364)

Search Parameters:
Keywords = information and computer technologies

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
14 pages, 961 KB  
Entry
Quantum Computing: A Concise Introduction
by Brady D. Lund and Sakib Shahriar
Encyclopedia 2025, 5(4), 173; https://doi.org/10.3390/encyclopedia5040173 (registering DOI) - 19 Oct 2025
Definition
Quantum computing is an emerging field in computing technology that harnesses the principles of quantum mechanics—including superposition, entanglement, and quantum tunneling—to process information in fundamentally new ways. While classical computers use bits that represent states of either 0 or 1, quantum computers use [...] Read more.
Quantum computing is an emerging field in computing technology that harnesses the principles of quantum mechanics—including superposition, entanglement, and quantum tunneling—to process information in fundamentally new ways. While classical computers use bits that represent states of either 0 or 1, quantum computers use quantum bits, or qubits. Unlike classical bits, a qubit can exist in a superposition of the logical states 0 and 1 simultaneously. This property allows quantum-powered systems to perform certain complex computations much faster than classical computing systems. Quantum computing holds great potential to transform many sectors by enabling breakthroughs in quantum cryptography, information retrieval, optimization, and artificial intelligence. Through quantum algorithms such as Grover’s and Shor’s algorithms, quantum computers can significantly accelerate the speed of data searching and break encryption systems that would take classical computers billions of years to crack. While still in the relatively early stages of development, quantum computers hold considerable potential to shape our next generation of computing. Full article
(This article belongs to the Section Mathematics & Computer Science)
Show Figures

Graphical abstract

18 pages, 10816 KB  
Article
From Continuous Integer-Order to Fractional Discrete-Time: A New Computer Virus Model with Chaotic Dynamics
by Imane Zouak, Ahmad Alshanty, Adel Ouannas, Antonio Mongelli, Giovanni Ciccarese and Giuseppe Grassi
Technologies 2025, 13(10), 471; https://doi.org/10.3390/technologies13100471 - 17 Oct 2025
Viewed by 127
Abstract
Computer viruses remain a persistent technological challenge in information security. They require mathematical frameworks that realistically capture their propagation in digital networks. Classical continuous-time, integer-order models often overlook two key aspects of cyber environments: their inherently discrete nature and the memory-dependent effects of [...] Read more.
Computer viruses remain a persistent technological challenge in information security. They require mathematical frameworks that realistically capture their propagation in digital networks. Classical continuous-time, integer-order models often overlook two key aspects of cyber environments: their inherently discrete nature and the memory-dependent effects of networked interactions. In this work, we introduce a fractional-order discrete computer virus (FDCV) model, derived from a three-dimensional continuous integer-order formulation and reformulated into a two-dimensional fractional discrete framework. We analyze its rich dynamical behaviors under both commensurate and incommensurate fractional orders. Leveraging a comprehensive toolbox including bifurcation diagrams, Lyapunov spectra, phase portraits, the 0–1 test for chaos, spectral entropy, and C0 complexity measures, we demonstrate that the FDCV system exhibits persistent chaos and high dynamical complexity across broad parameter regimes. Our findings reveal that fractional-order discrete models not only enhance the dynamical richness compared to integer-order counterparts but also provide a more realistic representation of malware propagation. These insights advance the theoretical study of fractional discrete systems, supporting the development of potential technologies for cybersecurity modeling, detection, and prevention strategies. Full article
Show Figures

Figure 1

30 pages, 5198 KB  
Article
Security Authentication Scheme for Vehicle-to-Everything Computing Task Offloading Environments
by Yubao Liu, Chenhao Li, Quanchao Sun and Haiyue Jiang
Sensors 2025, 25(20), 6428; https://doi.org/10.3390/s25206428 - 17 Oct 2025
Viewed by 108
Abstract
Computational task offloading is a key technology in the field of vehicle-to-everything (V2X) communication, where security issues represent a core challenge throughout the offloading process. We must ensure the legitimacy of both the offloading entity (requesting vehicle) and the offloader (edge server or [...] Read more.
Computational task offloading is a key technology in the field of vehicle-to-everything (V2X) communication, where security issues represent a core challenge throughout the offloading process. We must ensure the legitimacy of both the offloading entity (requesting vehicle) and the offloader (edge server or assisting vehicle), as well as the confidentiality and integrity of task data during transmission and processing. To this end, we propose a security authentication scheme for the V2X computational task offloading environment. We conducted rigorous formal and informal analyses of the scheme, supplemented by verification using the formal security verification tool AVISPA. This demonstrates that the proposed scheme possesses fundamental security properties in the V2X environment, capable of resisting various threats and attacks. Furthermore, compared to other related authentication schemes, our proposed solution exhibits favorable performance in terms of computational and communication overhead. Finally, we conducted network simulations using NS-3 to evaluate the scheme’s performance at the network layer. Overall, the proposed scheme provides reliable and scalable security guarantees tailored to the requirements of computing task offloading in V2X environments. Full article
(This article belongs to the Section Vehicular Sensing)
Show Figures

Figure 1

16 pages, 2887 KB  
Article
Enhanced Reality Exercise System Designed for People with Limited Mobility
by Ahmet Özkurt, Tolga Olcay and Taner Akkan
Appl. Sci. 2025, 15(20), 11146; https://doi.org/10.3390/app152011146 - 17 Oct 2025
Viewed by 81
Abstract
People with limited mobility experience disadvantages when participating in outdoor activities such as cycling, which can lead to negative consequences. This study proposes an indoor physical cycling activity, with the help of technological solutions, for people with limited mobility. The aim is to [...] Read more.
People with limited mobility experience disadvantages when participating in outdoor activities such as cycling, which can lead to negative consequences. This study proposes an indoor physical cycling activity, with the help of technological solutions, for people with limited mobility. The aim is to use enhanced reality (ER) technology, based on virtual reality, to exercise in the person’s own indoor environment. In this system, real track and speed information is received by a 360-degree camera, GPS, and gyroscope sensors and presented to the mechanical system in the electromechanical bike structure with real-time interaction. The pedal force system of the exercise bike is driven using information of the incline, and data from the bike’s speed sensor and head movements are transferred in real time to the track image on the user’s head-up display, creating a realistic experience. With this system, it is possible to maintain an experience close to real cycling through human–computer interaction with hardware and software integration. Thus, using this system, people with limited mobility can improve their quality of life by performing indoor physical activities with an experience close to reality. Full article
27 pages, 1786 KB  
Review
Adaptive Equivalent Consumption Minimization Strategies for Plug-In Hybrid Electric Vehicles: A Review
by Massimo Sicilia, Davide Cervone, Pierpaolo Polverino and Cesare Pianese
Energies 2025, 18(20), 5475; https://doi.org/10.3390/en18205475 - 17 Oct 2025
Viewed by 225
Abstract
Adaptive Equivalent Consumption Minimization Strategies (A-ECMSs) are one of the best methodologies to optimize fuel consumption of plug-in hybrid vehicles (PHEVs) coupled with low computational requirements. In this paper, a review of A-ECMSs is proposed. Starting from an economic-environmental contextualization, hybrid vehicles are [...] Read more.
Adaptive Equivalent Consumption Minimization Strategies (A-ECMSs) are one of the best methodologies to optimize fuel consumption of plug-in hybrid vehicles (PHEVs) coupled with low computational requirements. In this paper, a review of A-ECMSs is proposed. Starting from an economic-environmental contextualization, hybrid vehicles are presented and classified, together with their modeling methodologies and the physical-mathematical representation of their components. Next, the control theory for hybrid vehicles is introduced and classified, deriving the A-ECMS approach. Several works accounting for different A-ECMS implementations, based on technology integration, time horizon, adaptivity mechanism, and technique, are addressed. The literature analysis shows a broad coverage of possibilities: the simple proportional-integral (PI) rule for equivalence factor adaptivity is often used, imposing a given battery state-of-charge (SoC); it is possible to optimally plan the battery SoC trajectory through offline optimization with optimal algorithms or by predicting ahead conditions with model predictive control (MPC) or neural networks (NNs); the integration with emerging technologies such as Vehicle-To-Everything (V2X) can be helpful, accounting also for car-following data and GPS information. Moreover, speed prediction is another common technique to optimally plan the battery SoC trajectory. Depending on available on-board computational power and data, it is possible to choose the best A-ECMS according to its application. Full article
(This article belongs to the Section E: Electric Vehicles)
Show Figures

Figure 1

73 pages, 2702 KB  
Review
Towards an End-to-End Digital Framework for Precision Crop Disease Diagnosis and Management Based on Emerging Sensing and Computing Technologies: State over Past Decade and Prospects
by Chijioke Leonard Nkwocha and Abhilash Kumar Chandel
Computers 2025, 14(10), 443; https://doi.org/10.3390/computers14100443 - 16 Oct 2025
Viewed by 129
Abstract
Early detection and diagnosis of plant diseases is critical for ensuring global food security and sustainable agricultural practices. This review comprehensively examines latest advancements in crop disease risk prediction, onset detection through imaging techniques, machine learning (ML), deep learning (DL), and edge computing [...] Read more.
Early detection and diagnosis of plant diseases is critical for ensuring global food security and sustainable agricultural practices. This review comprehensively examines latest advancements in crop disease risk prediction, onset detection through imaging techniques, machine learning (ML), deep learning (DL), and edge computing technologies. Traditional disease detection methods, which rely on visual inspections, are time-consuming, and often inaccurate. While chemical analyses are accurate, they can be time consuming and leave less flexibility to promptly implement remedial actions. In contrast, modern techniques such as hyperspectral and multispectral imaging, thermal imaging, and fluorescence imaging, among others can provide non-invasive and highly accurate solutions for identifying plant diseases at early stages. The integration of ML and DL models, including convolutional neural networks (CNNs) and transfer learning, has significantly improved disease classification and severity assessment. Furthermore, edge computing and the Internet of Things (IoT) facilitate real-time disease monitoring by processing and communicating data directly in/from the field, reducing latency and reliance on in-house as well as centralized cloud computing. Despite these advancements, challenges remain in terms of multimodal dataset standardization, integration of individual technologies of sensing, data processing, communication, and decision-making to provide a complete end-to-end solution for practical implementations. In addition, robustness of such technologies in varying field conditions, and affordability has also not been reviewed. To this end, this review paper focuses on broad areas of sensing, computing, and communication systems to outline the transformative potential of end-to-end solutions for effective implementations towards crop disease management in modern agricultural systems. Foundation of this review also highlights critical potential for integrating AI-driven disease detection and predictive models capable of analyzing multimodal data of environmental factors such as temperature and humidity, as well as visible-range and thermal imagery information for early disease diagnosis and timely management. Future research should focus on developing autonomous end-to-end disease monitoring systems that incorporate these technologies, fostering comprehensive precision agriculture and sustainable crop production. Full article
32 pages, 5047 KB  
Review
Review of Advances in Fire Extinguishing Based on Computer Vision Applications: Methods, Challenges, and Future Directions
by Valentyna Loboichenko, Grzegorz Wilk-Jakubowski, Lukasz Pawlik, Jacek Lukasz Wilk-Jakubowski, Roman Shevchenko, Olga Shevchenko, Radoslaw Harabin, Artur Kuchcinski, Valentyna Fedorchuk-Moroz, Anastasiia Khmyrova and Ivan Rushchak
Sensors 2025, 25(20), 6399; https://doi.org/10.3390/s25206399 (registering DOI) - 16 Oct 2025
Viewed by 331
Abstract
This paper examines the state-of-the-art in fire suppression technologies based on computer vision applications in the subject areas of computer science and engineering. The study involves a two-stage analysis of publications using keywords. This paper presents a bibliographic analysis of scientific literature from [...] Read more.
This paper examines the state-of-the-art in fire suppression technologies based on computer vision applications in the subject areas of computer science and engineering. The study involves a two-stage analysis of publications using keywords. This paper presents a bibliographic analysis of scientific literature from the Scopus database using VOSviewer software and the author’s methodological approach. General keywords were used for the initial analysis of the dataset, followed by a more detailed study with additional criteria and specific keywords. The categories considered in the article are as follows: Firefighting Robots, Fire Detection, Fire Suppression, Aerial Vehicles, and Computer Vision. It is shown that the research includes technical aspects of fire robots and systems, as well as the improvement of their software and hardware. The subsequent review highlights the important role of computer vision in improving the efficiency and effectiveness of fire suppression systems. It is noted that key advances include the development of sophisticated fire detection algorithms and the implementation of automated fire suppression systems. The study also discusses the challenges and future directions in this field, emphasizing the need for continuous innovation and interdisciplinary collaboration. This review provides valuable information for researchers, engineers, and practitioners in the field of fire safety by offering a comprehensive overview of state-of-the-art technologies and their applications in fire suppression. Full article
(This article belongs to the Section Sensing and Imaging)
Show Figures

Figure 1

29 pages, 1829 KB  
Review
A Comprehensive Review of Cybersecurity Threats to Wireless Infocommunications in the Quantum-Age Cryptography
by Ivan Laktionov, Grygorii Diachenko, Dmytro Moroz and Iryna Getman
IoT 2025, 6(4), 61; https://doi.org/10.3390/iot6040061 - 16 Oct 2025
Viewed by 386
Abstract
The dynamic growth in the dependence of numerous industrial sectors, businesses, and critical infrastructure on infocommunication technologies necessitates the enhancement of their resilience to cyberattacks and radio-frequency threats. This article addresses a relevant scientific and applied issue, which is to formulate prospective directions [...] Read more.
The dynamic growth in the dependence of numerous industrial sectors, businesses, and critical infrastructure on infocommunication technologies necessitates the enhancement of their resilience to cyberattacks and radio-frequency threats. This article addresses a relevant scientific and applied issue, which is to formulate prospective directions for improving the effectiveness of cybersecurity approaches for infocommunication networks through a comparative analysis and logical synthesis of the state-of-the-art of applied research on cyber threats to the information security of mobile and satellite networks, including those related to the rapid development of quantum computing technologies. The article presents results on the systematisation of cyberattacks at the physical, signalling and cryptographic levels, as well as threats to cryptographic protocols and authentication systems. Particular attention is given to the prospects for implementing post-quantum cryptography, hybrid cryptographic models and the integration of threat detection mechanisms based on machine learning and artificial intelligence algorithms. The article proposes a classification of current threats according to architectural levels, analyses typical protocol vulnerabilities in next-generation mobile networks and satellite communications, and identifies key research gaps in existing cybersecurity approaches. Based on a critical analysis of scientific and applied literature, this article identifies key areas for future research. These include developing lightweight cryptographic algorithms, standardising post-quantum cryptographic models, creating adaptive cybersecurity frameworks and optimising protection mechanisms for resource-constrained devices within information and digital networks. Full article
(This article belongs to the Special Issue Cybersecurity in the Age of the Internet of Things)
Show Figures

Figure 1

13 pages, 358 KB  
Article
Nurses’ Adoption, Perceived Usability, and Satisfaction with an Updated Electronic Handover Page Within the Electronic Medical Record: A Mixed-Methods Study
by Rebecca Miriam Jedwab, Anthony T. Pham, Yixin Qu, Rebecca Brook, Joanne Foster, James-Norbert Garduce, Siwen Li, Jane M. Smith and Naomi Dobroff
Nurs. Rep. 2025, 15(10), 369; https://doi.org/10.3390/nursrep15100369 - 15 Oct 2025
Viewed by 196
Abstract
Background/Objective: Clinical handover of patient information is a key component of patient care in hospitals. Nurses use a structured framework to minimise communication errors. Electronic Medical Record (EMR) systems can support patient safety and clinical handover with contemporaneous documentation. The aim of this [...] Read more.
Background/Objective: Clinical handover of patient information is a key component of patient care in hospitals. Nurses use a structured framework to minimise communication errors. Electronic Medical Record (EMR) systems can support patient safety and clinical handover with contemporaneous documentation. The aim of this study was to evaluate nurses’ adoption, perceived usability, and satisfaction with an updated handover page within the EMR. Methods: A pre-post mixed-methods study across a large Australian tertiary healthcare organisation examined handover page adoption using data from the EMR, and perceived usability and satisfaction were measured using a survey (handover page updated in EMR on 23 September 2024). Descriptive and inferential statistical analyses were conducted for quantitative data, and content analysis was used for qualitative data. Results: Adoption of the handover page was not statistically significant post-update (Wilcoxon signed-rank test z = −1.376, p = 0.169). Improved usability of the updated handover page post-update was demonstrated by a statistically significant decrease in the need to navigate away from the page to find relevant clinical information during handover (Fisher’s Exact Test p = 0.042). Nurses’ satisfaction increased, indicated by statistically significant increases in two items of the End User Computing Satisfaction Scale (precise information (Mann–Whitney U = 963.50, p = 0.040); and sufficient information (Mann–Whitney U = 927.50, p = 0.034)). Free-text comments indicated adoption and acceptability of the updated handover page by nurses, although a gap remains in the practice process. Conclusions: A co-designed solution to update the handover page within the EMR had good usability and satisfaction among nurses. Updates or implementations to digital health technologies must be continuously evaluated by specialist informatics teams to ensure appropriate adoption, usability and satisfaction by nurses, and positive repercussions for patient safety. Full article
Show Figures

Figure 1

18 pages, 3873 KB  
Article
An Adaptive JPEG Steganography Algorithm Based on the UT-GAN Model
by Lina Tan, Yi Li, Yan Zeng and Peng Chen
Electronics 2025, 14(20), 4046; https://doi.org/10.3390/electronics14204046 - 15 Oct 2025
Viewed by 217
Abstract
Adversarial examples pose severe challenges to information security, as their impacts directly extend to steganography and steganalysis technologies. This scenario, in turn, has further spurred the research and application of adversarial steganography. In response, we propose a novel adversarial embedding scheme rooted in [...] Read more.
Adversarial examples pose severe challenges to information security, as their impacts directly extend to steganography and steganalysis technologies. This scenario, in turn, has further spurred the research and application of adversarial steganography. In response, we propose a novel adversarial embedding scheme rooted in a hybrid, partially data-driven approach. The proposed scheme first leverages an adversarial neural network (UT-GAN, Universal Transform Generative Adversarial Network) to generate stego images as a preprocessing step. Subsequently, it dynamically adjusts the cost function with the aid of a DCTR (Discrete Cosine Transform Residual)-based gradient calculator to optimize the images, ensuring that the final adversarial images can resist detection by steganalysis tools. The encoder in this scheme adopts a unique architecture, where its internal parameters are determined by a partially data-driven mechanism. This design not only enhances the capability of traditional steganography schemes to counter advanced steganalysis technologies but also effectively reduces the computational overhead during stego image generation. Full article
(This article belongs to the Special Issue Digital Intelligence Technology and Applications, 2nd Edition)
Show Figures

Figure 1

27 pages, 29857 KB  
Systematic Review
Smart Cities: A Systematic Review of Emerging Technologies
by Dante D. Sanchez-Gallegos, Diana E. Carrizales-Espinoza, Catherine Torres-Charles and Jesus Carretero
Smart Cities 2025, 8(5), 173; https://doi.org/10.3390/smartcities8050173 - 14 Oct 2025
Viewed by 230
Abstract
In the 21st century, rapid urbanisation has brought both challenges and opportunities. Smart cities have emerged as innovative solutions to meet the complex demands of urban life. Information and Communication Technology (ICT) serves as the backbone of this transformation, integrating infrastructure, public services, [...] Read more.
In the 21st century, rapid urbanisation has brought both challenges and opportunities. Smart cities have emerged as innovative solutions to meet the complex demands of urban life. Information and Communication Technology (ICT) serves as the backbone of this transformation, integrating infrastructure, public services, and environmental sustainability. Within ICT, the computing continuum has become a key paradigm for efficient resource management, while Artificial Intelligence (AI) and the Internet of Things (IoT) enhance urban planning, optimise resource use, and strengthen governance. This paper systematically reviews smart city developments from January 2020 to June 2025, focusing on technological advances and sustainability goals in databases such as Scopus, IEEE Xplore, and Web of Science. By synthesising the literature, it identifies common challenges, implementation strategies, and future directions. The review highlights the central role of the computing continuum and AI, covering enabling technologies, applications, case studies, and deployment challenges. Our findings indicate that the IoT, AI, and data analytics are currently dominant approaches, yet significant gaps remain in citizen participation, equitable access, and long-term governance. Overall, smart cities aim to integrate data, digital technologies, and intelligent infrastructure to improve the quality of life while promoting sustainable, resilient, and inclusive services. Full article
Show Figures

Figure 1

11 pages, 2705 KB  
Proceeding Paper
Understanding Exoplanet Habitability: A Bayesian ML Framework for Predicting Atmospheric Absorption Spectra
by Vasuda Trehan, Kevin H. Knuth and M. J. Way
Phys. Sci. Forum 2025, 12(1), 9; https://doi.org/10.3390/psf2025012009 - 13 Oct 2025
Viewed by 72
Abstract
The evolution of space technology in recent years, fueled by advancements in computing such as Artificial Intelligence (AI) and machine learning (ML), has profoundly transformed our capacity to explore the cosmos. Missions like the James Webb Space Telescope (JWST) have made information about [...] Read more.
The evolution of space technology in recent years, fueled by advancements in computing such as Artificial Intelligence (AI) and machine learning (ML), has profoundly transformed our capacity to explore the cosmos. Missions like the James Webb Space Telescope (JWST) have made information about distant objects more easily accessible, resulting in extensive amounts of valuable data. As part of this work-in-progress study, we are working to create an atmospheric absorption spectrum prediction model for exoplanets. The eventual model will be based on both collected observational spectra and synthetic spectral data generated by the ROCKE-3D general circulation model (GCM) developed by the climate modeling program at NASA’s Goddard Institute for Space Studies (GISS). In this initial study, spline curves are used to describe the bin heights of simulated atmospheric absorption spectra as a function of one of the values of the planetary parameters. Bayesian Adaptive Exploration is then employed to identify areas of the planetary parameter space for which more data are needed to improve the model. The resulting system will be used as a forward model so that planetary parameters can be inferred given a planet’s atmospheric absorption spectrum. This work is expected to contribute to a better understanding of exoplanetary properties and general exoplanet climates and habitability. Full article
Show Figures

Figure 1

19 pages, 20388 KB  
Article
Radar-Based Gesture Recognition Using Adaptive Top-K Selection and Multi-Stream CNNs
by Jiseop Park and Jaejin Jeong
Sensors 2025, 25(20), 6324; https://doi.org/10.3390/s25206324 - 13 Oct 2025
Viewed by 354
Abstract
With the proliferation of the Internet of Things (IoT), gesture recognition has attracted attention as a core technology in human–computer interaction (HCI). In particular, mmWave frequency-modulated continuous-wave (FMCW) radar has emerged as an alternative to vision-based approaches due to its robustness to illumination [...] Read more.
With the proliferation of the Internet of Things (IoT), gesture recognition has attracted attention as a core technology in human–computer interaction (HCI). In particular, mmWave frequency-modulated continuous-wave (FMCW) radar has emerged as an alternative to vision-based approaches due to its robustness to illumination changes and advantages in privacy. However, in real-world human–machine interface (HMI) environments, hand gestures are inevitably accompanied by torso- and arm-related reflections, which can also contain gesture-relevant variations. To effectively capture these variations without discarding them, we propose a preprocessing method called Adaptive Top-K Selection, which leverages vector entropy to summarize and preserve informative signals from both hand and body reflections. In addition, we present a Multi-Stream EfficientNetV2 architecture that jointly exploits temporal range and Doppler trajectories, together with radar-specific data augmentation and a training optimization strategy. In experiments on the publicly available FMCW gesture dataset released by the Karlsruhe Institute of Technology, the proposed method achieved an average accuracy of 99.5%. These results show that the proposed approach enables accurate and reliable gesture recognition even in realistic HMI environments with co-existing body reflections. Full article
(This article belongs to the Special Issue Sensor Technologies for Radar Detection)
Show Figures

Figure 1

20 pages, 2179 KB  
Article
Parallel Multi-Level Simulation for Large-Scale Detailed Intelligent Transportation System Modeling
by Vitaly Stepanyants, Arseniy Karpov, Arthur Margaryan, Aleksandr Amerikanov, Dmitry Telpukhov, Roman Solovyev and Aleksandr Romanov
Future Transp. 2025, 5(4), 141; https://doi.org/10.3390/futuretransp5040141 - 12 Oct 2025
Viewed by 317
Abstract
Nowadays, the problems of traffic accidents, inefficiency, and congestion still affect transportation systems. Conventional solutions often do not resolve and can even exacerbate the problems. Intelligent transportation system (ITS) technology, including intelligent vehicles, could provide a solution for these problems. However, such technologies [...] Read more.
Nowadays, the problems of traffic accidents, inefficiency, and congestion still affect transportation systems. Conventional solutions often do not resolve and can even exacerbate the problems. Intelligent transportation system (ITS) technology, including intelligent vehicles, could provide a solution for these problems. However, such technologies should be thoroughly verified and validated before their large-scale adoption. Computer simulation can be used for this task to avoid the expenses of real-world testing. Modern consumer hardware computers are not powerful enough to handle large-scale scenes with high detail. Therefore, a parallel simulation approach employing multiple computers, each processing a separate scene of limited size, is proposed. To define the requirements for a suitable simulation tool, the needs of ITS simulation and Digital Twin technology are discussed, and existing simulation environments suitable for ITS technology verification and validation are evaluated. Further, an architecture for a parallel and multi-level simulation environment for large-scale detailed ITS modeling is proposed. The proposed integrated simulation environment uses the nanoscopic CARLA and microscopic SUMO simulators to implement multi-level and parallel nanoscopic simulation by creating a large scene on the microscopic simulation level and combining the information from multiple parallelly executed nanoscopic scenes. Special handling for nanoscopic scene logic is proposed using a concept of Buffer Zones that allows traffic participants to perceive environmental information beyond the logical boundary of the scene they belong to. The proposed approaches are demonstrated in a series of experiments as a proof of concept and are integrated into the CAVISE simulation environment. Full article
Show Figures

Figure 1

31 pages, 3879 KB  
Review
Current Status and Future Prospects of Key Technologies in Variable-Rate Spray
by Yuxuan Jiao, Zhu Sun, Yongkui Jin, Longfei Cui, Xuemei Zhang, Shuai Wang, Songchao Zhang, Chun Chang, Suming Ding and Xinyu Xue
Agriculture 2025, 15(20), 2111; https://doi.org/10.3390/agriculture15202111 - 10 Oct 2025
Viewed by 351
Abstract
The traditional continuous, quantitative spraying technology ignores the severity of pests, diseases and grasses, spatial distribution and other differences, resulting in low effective utilization of pesticides, environmental pollution and other problems. Variable-rate spray technology has become an important development direction in the field [...] Read more.
The traditional continuous, quantitative spraying technology ignores the severity of pests, diseases and grasses, spatial distribution and other differences, resulting in low effective utilization of pesticides, environmental pollution and other problems. Variable-rate spray technology has become an important development direction in the field of precision agriculture by dynamically sensing crop canopy morphology, pest and disease distribution, and environmental parameters, adjusting the application amount in real time, and significantly improving pesticide utilization. In this study, we systematically review the core progress of variable-rate spray technology; focus on the technical system of information detection, spray volume model, and control system; analyze the current bottlenecks; and propose an optimization path to adapt to the complex agricultural conditions. At the level of information perception, LiDAR, machine vision, and multi-source sensor fusion technology constitute the main perception architecture, and infrared and ultrasonic sensors assist target recognition in complex scenes. In the construction of the spray volume model, models based on canopy volume, leaf area density, etc., are used to realize dynamic application decision by fusing equipment operating parameters, pest and disease levels, meteorological conditions, and so on. The control system takes the solenoid valve + PID control as the core program, and improves the response speed through PWM regulation and closed-loop feedback. The current technical bottlenecks are mainly concentrated in the sensor dynamic detection accuracy, model environmental adaptability, and the reliability of the execution parts. In the future, it is necessary to further promote anti-jamming multi-source heterogeneous sensor data fusion, multi-factor adaptive spray model development, lightweight edge computing deployment, and solenoid valve structural parameter optimization and other technical research, with a view to promoting the application of variable-rate spray technology to the field on a large scale and providing a theoretical reference and technological support for the green transformation of agriculture. Full article
Show Figures

Figure 1

Back to TopTop