Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (13,581)

Search Parameters:
Keywords = internet of thing

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
17 pages, 9204 KB  
Article
A Smart Greenhouse Integrated with AI, IoT and Renewable Energies for the Optimization of Romaine Lettuce Cultivation
by Luis Alejandro Arias Barragan, Ricardo Alirio Gonzalez, Luis Fernando Rico, Victor Hugo Bernal, Andrea Aparicio and Ricardo Alfonso Gómez
Inventions 2026, 11(3), 44; https://doi.org/10.3390/inventions11030044 - 29 Apr 2026
Abstract
This work presents the design, development, and proof-of-concept validation of a smart greenhouse for romaine lettuce (Lactuca sativa var. longifolia) that integrates Internet of Things (IoT) sensing/actuation with an image-based crop state assessment pipeline. The proposed pipeline combines a lightweight AI [...] Read more.
This work presents the design, development, and proof-of-concept validation of a smart greenhouse for romaine lettuce (Lactuca sativa var. longifolia) that integrates Internet of Things (IoT) sensing/actuation with an image-based crop state assessment pipeline. The proposed pipeline combines a lightweight AI image classifier with fractal texture descriptors (box-counting fractal dimension) to support the non-destructive monitoring of leaf condition and growth stage. The system also implements resilience-oriented resource strategies, including rainwater harvesting, graywater reuse, and a hybrid power supply (photovoltaic + grid backup). Water and energy indicators are reported as estimated values derived from the prototype operating profile and literature-based baseline values (i.e., contextual comparisons rather than a contemporaneous controlled trial). Using an expanded dataset (n = 1500 images) and an independent held-out test subset (n = 350), the image classifier achieved 97.1% accuracy, with detailed precision/recall/F1 metrics reported in the Results. Overall, the proposed architecture and evaluation workflow provide an accessible and reproducible pathway toward sustainable, low-cost smart greenhouses in resource-constrained settings. Full article
Show Figures

Figure 1

38 pages, 2117 KB  
Article
Enabling Sustainable Disaster Management Through AAM and ACS: A Dynamic Strategic Foresight on IoT-Supported System of Systems
by Axel Sikora, Lechosław Tomaszewski, Mehmet Aksit, Dimo Zafirov, Petar Lulchev, Miglena Raykovska, Ivan Georgiev and Georgi Georgiev
Appl. Sci. 2026, 16(9), 4360; https://doi.org/10.3390/app16094360 - 29 Apr 2026
Abstract
This study applies a dynamic strategic foresight to examine how Unmanned Aerial Systems (UAS)-based Advanced Air Mobility (AAM), supported by Advanced Communication Systems (ACS), can be integrated into a coherent System of Systems (SoS) for sustainable and effective Disaster Management (DM). These three [...] Read more.
This study applies a dynamic strategic foresight to examine how Unmanned Aerial Systems (UAS)-based Advanced Air Mobility (AAM), supported by Advanced Communication Systems (ACS), can be integrated into a coherent System of Systems (SoS) for sustainable and effective Disaster Management (DM). These three domains (AAM, ACS, and DM) form a strongly coupled Internet of Things (IoT) triad within an integrated SoS. Using lessons learned from previous or running research projects of the contributing authors, i.e., SUDEM, REGUAS, 5G!Drones, and ETHER, the foresight identifies key enablers—including resilient 5G/6G communication architectures, interoperable data fusion frameworks, and UAS-supported situational awareness. It highlights structural challenges such as fragmented standards, limited cross-agency data integration, and gaps in ACS redundancy for emergency operations. The resulting roadmap outlines development priorities for ACS-enabled AAM, from unified communication protocols and hybrid TN-NTN architectures to education and capacity-building for digital-centric DM. Practically, the findings suggest that policymakers should prioritise harmonised regulatory frameworks for AAM-ACS interoperability and invest in global data exchange standards, while system designers should incorporate redundant communication layers and modular SoS architectures to ensure operational continuity under extreme conditions. Full article
(This article belongs to the Special Issue Novel Technologies and Applications for Internet of Things)
23 pages, 7922 KB  
Article
Hardware-Assisted Security Enhancements for an FPGA-ARM Embedded Vision System in IoT Applications
by Tomyslav Sledevič and Darius Andriukaitis
Electronics 2026, 15(9), 1887; https://doi.org/10.3390/electronics15091887 - 29 Apr 2026
Abstract
EmbeddedField-Programmable Gate Array (FPGA)-Advanced RISC Machine (ARM) systems used in industrial and Internet of Things (IoT) environments increasingly operate as network-connected edge devices. While such connectivity enables distributed processing and remote monitoring, it also exposes embedded vision nodes to security threats, including command [...] Read more.
EmbeddedField-Programmable Gate Array (FPGA)-Advanced RISC Machine (ARM) systems used in industrial and Internet of Things (IoT) environments increasingly operate as network-connected edge devices. While such connectivity enables distributed processing and remote monitoring, it also exposes embedded vision nodes to security threats, including command injection, frame replay, data tampering, and abnormal communication traffic. This paper presents a hardware-assisted security architecture for an FPGA-ARM embedded vision system designed for high-speed image acquisition and network streaming. The proposed solution integrates several lightweight protection mechanisms directly into the FPGA processing pipeline, including frame replay detection, cyclic redundancy check (CRC)-based frame integrity verification, frame sequence monitoring, authenticated command execution, communication anomaly monitoring, and hardware-rooted trust primitives, such as a ring-oscillator physical unclonable function (PUF) and a pseudo-random generator. Optional secure communication is provided via a lightweight ASCON-authenticated encryption core. The architecture was implemented on a Cyclone V System-on-Chip (SoC) platform using an industrial Camera Link camera and evaluated in a low-latency image-acquisition setup operating at 100 fps, with data throughput exceeding 1 Gbps. Experimental results demonstrate that the proposed security architecture introduces only about 1.6% additional FPGA logic utilization while maintaining full real-time acquisition performance. The presented approach demonstrates that practical hardware-level security mechanisms can be integrated into FPGA-based embedded vision nodes with minimal architectural modifications and negligible performance overhead. Full article
31 pages, 2825 KB  
Article
IIoT-Based Remote Monitoring System for Temperature, Current, and Vibration Using PLC and Node-RED in a Data Center Cooling Compressor: A Condition-Based Maintenance Framework
by Jefferson Damián Pinza Apolo, Jonathan Lizandro Bravo Robles, José Luis Dumán Zhicay, Ramiro Xavier Cazares Guerrero, Wilmer Fabian Albarracin Guarochico and Paul Francisco Baldeón Egas
Sensors 2026, 26(9), 2772; https://doi.org/10.3390/s26092772 - 29 Apr 2026
Abstract
Climate control systems are critical to ensuring the continuous operation of data centers, as they maintain the environmental conditions required by sensitive electronic equipment. In this context, continuous supervision of refrigeration compressors is essential to prevent failures that may compromise thermal stability. This [...] Read more.
Climate control systems are critical to ensuring the continuous operation of data centers, as they maintain the environmental conditions required by sensitive electronic equipment. In this context, continuous supervision of refrigeration compressors is essential to prevent failures that may compromise thermal stability. This work presents the design, implementation, and experimental validation of a remote monitoring and condition-based maintenance framework built on Industrial Internet of Things (IIoT) technologies for air-conditioning compressors used in data centers. The proposed architecture integrates industrial-grade sensors for temperature, electric current, and vibration, a Siemens LOGO! programmable logic controller (PLC) for signal acquisition and scaling, a Node-RED middleware layer for data flow management, and the ThingSpeak cloud platform for remote storage and analysis. The novel contributions of this work are: (i) a fully integrated low-cost IIoT stack validated on a Copeland ZR144KCE-TF5 scroll compressor under real operating conditions over a continuous 49-day monitoring period; (ii) a hybrid anomaly detection model that combines Z-score statistical baselines with moving-average prediction error to reduce false positives from transient events; and (iii) a condition-based maintenance decision framework that maps the three monitored variables to ISO 10816-3 vibration severity zones and manufacturer-referenced thermal and electrical thresholds, producing recommended maintenance actions. The framework was applied to the acquired dataset, confirming predominantly stable operation (93.4% of samples in ISO 10816-3 Zones A–B) while detecting an emergent mechanical-wear trend (5.64% of samples in Zone C) concentrated in the final days of the monitoring period and demonstrating the feasibility of the proposed architecture as a scalable and replicable solution for condition monitoring and maintenance decision support in critical technological infrastructures. Full article
(This article belongs to the Section Industrial Sensors)
Show Figures

Figure 1

28 pages, 2920 KB  
Article
NIDS-Mamba: Lightweight Network Intrusion Detection for IoT Sensor Networks via State Space Models
by Zixiang Ding, Jiahao Zheng and Xianyun Wu
Sensors 2026, 26(9), 2766; https://doi.org/10.3390/s26092766 - 29 Apr 2026
Abstract
The ubiquity of resource-constrained Internet-of Things (IoT) nodes creates an urgent demand for network intrusion detection systems (NIDSs) optimized for edge devices with limited computing power. In this paper, we propose a new NIDS system based on Mamba. NIDS-Mamba uses a dynamic sparse [...] Read more.
The ubiquity of resource-constrained Internet-of Things (IoT) nodes creates an urgent demand for network intrusion detection systems (NIDSs) optimized for edge devices with limited computing power. In this paper, we propose a new NIDS system based on Mamba. NIDS-Mamba uses a dynamic sparse attention and a lightweight state space to jointly learn from short-term anomaly and long-term attack patterns. We use standardized NF-UNSW-NB15 and NF-CSE-CIC-IDS2018 datasets to verify the effectiveness of this NIDS-Mamba model. We find that this NIDS-Mamba model is very effective in dealing with extreme class imbalance problems. In the NF-CSE-CIC-IDS2018 dataset, the model achieves 98.32% accuracy, 96.98% F1-score, and an AUC of 0.9996. Most notably, the model is very robust in handling extreme class imbalance problems in the NF-UNSW-NB15 dataset. It achieves 97.03% G-Mean, 0.7915 MCC, and 0.9983 AUC, far exceeding other baseline models. Compared to Transformer-based baselines, NIDS-Mamba achieves nearly an order-of-magnitude improvement in throughput while maintaining a parameter footprint compatible with edge deployment constraints. The proposed architecture effectively mitigates the quadratic complexity and memory wall inherent in standard Transformers, ensuring compatibility with Limited RAM and strict energy constraints. The proposed model achieves a compact design with 1.12 million parameters and a peak inference memory of 5.4 MB, ensuring its feasibility for edge-based IoT nodes. These properties make NIDS-Mamba a strong candidate for deployment on IoT gateways and edge sensor nodes in smart home, industrial IoT, and critical infrastructure scenarios. Full article
(This article belongs to the Section Intelligent Sensors)
Show Figures

Figure 1

33 pages, 10766 KB  
Perspective
Blockchain, Artificial Intelligence, and Cyber Defense on Sensor Networks
by Hiroshi Watanabe
Sensors 2026, 26(9), 2762; https://doi.org/10.3390/s26092762 - 29 Apr 2026
Abstract
Inherently, there exists a significant security hole in sensor networks. The majority of sensors are not high-end Internet of Things (IoT) devices with sufficient computing resources. Connected sensors (physical nodes in real networks) are allocated to logical nodes and managed remotely by a [...] Read more.
Inherently, there exists a significant security hole in sensor networks. The majority of sensors are not high-end Internet of Things (IoT) devices with sufficient computing resources. Connected sensors (physical nodes in real networks) are allocated to logical nodes and managed remotely by a supervisor in a virtual network. Data acquired by sensors are then collected by a data center on which artificial intelligence operates. If an adversary spoofs a logical node (e.g., an account in a transport layer security (TLS) session) of a vulnerable sensor on the network, then it can manipulate data input to artificial intelligence. Artificial intelligence cannot verify the integrity of the data input for learning. It is difficult to stop data poisoning with no countermeasures against session spoofing. To avoid session spoofing, physical and logical nodes must be linked seamlessly. One might think this can be achieved by utilizing Hardware Root-of-Trust (HRoT) based on a Physically Unclonable Function (PUF). However, a PUF is based on an expensive System-on-a-Chip (SoC), which has been specifically designed for high-end devices, like expensive smartphones. Many sensors (low-end and middle-end IoT devices) can hardly be protected with existing PUFs. Since the number of IoT devices with a PUF is insufficient to cover the entirety of IoT devices, an attacker can find a vulnerable IoT device with no PUF to perform session spoofing. This is the problem of numbers. To resolve it, we propose Physical Cyber Authentication (PCA). A Blockchain account (a logical node in a TLS session) is anchored to an integrated circuit (IC) chip inside a sensor, allowing Blockchain to manage sensor networks, which provides necessary data to artificial intelligence, thus forming a Blockchain of sensors. Full article
(This article belongs to the Special Issue Blockchain and Artificial Intelligence for IoT Sensors)
Show Figures

Figure 1

24 pages, 1871 KB  
Article
Design and Analysis of Minimum-Weighted Connected Capacitated Vertex Cover Algorithms for Link Monitoring in IoT-Enabled WSNs
by Miray Kol, Ege Erberk Uslu, Zuleyha Akusta Dagdeviren and Orhan Dagdeviren
Sensors 2026, 26(9), 2752; https://doi.org/10.3390/s26092752 - 29 Apr 2026
Abstract
Wireless sensor networks (WSNs) are the backbone of IoT-enabled smart manufacturing, environmental monitoring, and industrial automation. However, their broadcast nature makes communication links vulnerable to eavesdropping, routing manipulation, and denial-of-service attacks. Strategically placing monitor nodes to check each link is an effective approach [...] Read more.
Wireless sensor networks (WSNs) are the backbone of IoT-enabled smart manufacturing, environmental monitoring, and industrial automation. However, their broadcast nature makes communication links vulnerable to eavesdropping, routing manipulation, and denial-of-service attacks. Strategically placing monitor nodes to check each link is an effective approach to protect against attacks, but energy, connectivity, and capacity constraints should be considered while picking monitor nodes. In this paper, we tackle the Minimum-Weighted Connected Capacitated Vertex Cover (MWCCVC) problem, which minimizes monitoring costs, ensures backbone connectivity, and adheres to per-node capacity constraints. Unlike prior works that consider weighted vertex cover, connectivity constraints, or capacitated variants separately, the proposed MWCCVC model jointly integrates all three dimensions within a single vertex cover-based monitoring framework. We first provide a Branch-and-Bound (B&B) solver with linear programming relaxation bounds and constraint-based pruning strategies that produces optimum solutions. Three constructive greedy heuristics (GD, GR, GW) and two hybrid genetic algorithms (HGA, HGA-v2) that combine parameterized greedy decoders with evolutionary search are proposed; all methods guarantee full edge coverage, induced-subgraph connectivity, and max-flow-validated capacity feasibility. Tests on 130 small, 160 medium, and 19 large benchmark instances show that HGA matches B&B optima on every small instance, beats the time-limited B&B by 6.6% on medium instances, where the percentage is computed based on the relative difference in average total weight with respect to B&B, and stays the best on large graphs with up to 1000 nodes. The HGA-v2 tries to balance the quality and speed, with only a 3.1% difference at 10× faster execution. Full article
Show Figures

Figure 1

50 pages, 29943 KB  
Systematic Review
Hybrid Approaches of Machine Learning Algorithms in Predictive Maintenance: A Systematic Literature Review
by Jorge Paredes, Danilo Chavez, Ramiro Isa-Jara and Diego Vargas
Appl. Syst. Innov. 2026, 9(5), 90; https://doi.org/10.3390/asi9050090 - 29 Apr 2026
Abstract
The advent of Industry 4.0 has precipitated the digitization of myriad industrial processes, a feat attributable to the implementation of sophisticated digital enablers such as artificial intelligence (AI) and the Internet of Things (IoT). These technological advances have facilitated the implementation of various [...] Read more.
The advent of Industry 4.0 has precipitated the digitization of myriad industrial processes, a feat attributable to the implementation of sophisticated digital enablers such as artificial intelligence (AI) and the Internet of Things (IoT). These technological advances have facilitated the implementation of various innovative applications, especially in the field of predictive maintenance. This approach facilitates more precise estimation of the remaining useful life (RUL) of equipment, determination of the health index (HI) of machinery, and planning of effective maintenance schedules that circumvent unexpected and costly shutdowns in industrial operations. The employment of hybrid approaches founded on machine learning algorithms in the domain of predictive maintenance signifies a perpetually evolving field of research, wherein novel techniques, methodologies, and strategies are proposed to enhance maintenance efficiency and reliability. In order to furnish a substantial and exhaustive compendium of information, a methodical literature review is hereby presented, offering a meticulous survey of the hybrid approaches utilized within this domain. The study analyzed 77 papers from the 914 papers found on the topic, to find and organize the body of knowledge, and presents a lucid taxonomy, the primary algorithms employed in hybrid approaches, the most prevalent datasets, the applicable technology architectures, and the maturity level of these solutions. This study provides a robust conceptual foundation for future research, underscoring the significance of hybrid approaches as a promising field of study, with considerable potential for advancement in the realm of industrial predictive maintenance. Full article
Show Figures

Figure 1

33 pages, 1749 KB  
Article
LLM-Conductor: A Closed-Loop Resource-Adaptive Architecture for Secure LLM Deployment in Industrial Sensor Networks and IIoT Systems
by Kai Xu, Diming Zhang and Xuguo Wang
Sensors 2026, 26(9), 2733; https://doi.org/10.3390/s26092733 - 28 Apr 2026
Abstract
To address the bottlenecks of missing decision-making closed loop, insufficient experience reuse, and decoupled resource scheduling in industrial LLM deployment, this paper proposes LLM-Conductor, a three-layer collaborative architecture that enables monitoring-feedback autonomous decision-making, structured policy memory, and joint policy-resource optimization.Through ablation studies, horizontal [...] Read more.
To address the bottlenecks of missing decision-making closed loop, insufficient experience reuse, and decoupled resource scheduling in industrial LLM deployment, this paper proposes LLM-Conductor, a three-layer collaborative architecture that enables monitoring-feedback autonomous decision-making, structured policy memory, and joint policy-resource optimization.Through ablation studies, horizontal comparisons with ISOLATEGPT and ReAct, and graded resource-reduction experiments across six tiers, the results demonstrate that the security risk incidence rate is reduced from 70.6 percent to 1.3 percent, the multi-application collaborative task completion rate reaches 100 percent, and token utilization improves to 88.9 percent. Under constraints of at least 512 MB memory and at least 0.5 GHz CPU, the core task completion rate remains above 95 percent. By deeply coupling decision-making with resource scheduling, this architecture provides an integrated pathway toward efficient, secure, and reliable LLM deployment in Industrial Internet of Things scenarios. Current validation focuses on software-layer interaction patterns under simulated resource-constrained environments, with physical-layer industrial integration reserved for future work. Full article
(This article belongs to the Section Intelligent Sensors)
Show Figures

Figure 1

14 pages, 3605 KB  
Article
High-Performance Self-Powered Photodetector Based on Silver Triangular Nanoplate-Modified P3HT/ZnO Heterojunctions
by Jun Zhou, Qian Qiao, Sijie Chen, Xuan Yu, Xiaoming Yu, Cao Li, Jian Zheng, Cunxi Zhang and Rui Wang
Sensors 2026, 26(9), 2725; https://doi.org/10.3390/s26092725 - 28 Apr 2026
Abstract
Self-powered photodetectors have attracted widespread attention in Internet of Things applications due to their low power consumption and high sensitivity. In this study, plasmonic self-powered poly(3-hexylthiophene)/zinc oxide (P3HT/ZnO) heterojunction photodetectors incorporating silver triangular nanoplates (AgTNPs) were fabricated using sol–gel and spin-coating techniques. The [...] Read more.
Self-powered photodetectors have attracted widespread attention in Internet of Things applications due to their low power consumption and high sensitivity. In this study, plasmonic self-powered poly(3-hexylthiophene)/zinc oxide (P3HT/ZnO) heterojunction photodetectors incorporating silver triangular nanoplates (AgTNPs) were fabricated using sol–gel and spin-coating techniques. The experimental results demonstrate that the incorporation of AgTNP nanostructures significantly enhances the photoelectric conversion efficiency of the plasmonic P3HT/AgTNPs/ZnO photodetectors across both the ultraviolet and visible spectral regions. The responsivity enhancement ratio of the plasmonic devices reached its maximum under illumination at a wavelength of 525 nm. Compared with the reference P3HT/ZnO device, the responsivity values of the P3HT/AgTNPs-1/ZnO and P3HT/AgTNPs-2/ZnO devices increased by factors of 3.24 and 4.21, respectively. The optimal P3HT/AgTNPs-2/ZnO device exhibited responsivity values of 9.49, 10.80, and 10.47 mA/W under irradiation at wavelengths of 440 nm, 460 nm, and 525 nm, respectively. The mechanism of performance enhancement induced by the plasmonic AgTNPs is also discussed. This work demonstrates that embedding triangular plasmonic metal nanoplates within semiconductor heterojunctions constitutes an effective strategy for performance enhancement, providing new insights for the rational design of high-performance optoelectronic devices. Full article
(This article belongs to the Section Optical Sensors)
Show Figures

Figure 1

20 pages, 3466 KB  
Review
AI-Driven Hybrid Detection and Classification Framework for Secure Sleep Health IoT Networks
by Prajoona Valsalan and Mohammad Maroof Siddiqui
Clocks & Sleep 2026, 8(2), 23; https://doi.org/10.3390/clockssleep8020023 - 28 Apr 2026
Abstract
Sleep disorders, such as insomnia, obstructive sleep apnea (OSA), narcolepsy, REM sleep behavior disorder, and circadian rhythm disturbances, represent a rapidly expanding global health burden that is strongly associated with cardiovascular, metabolic, neurological, and psychiatric diseases. Advancements in wearable sensing technologies and Internet [...] Read more.
Sleep disorders, such as insomnia, obstructive sleep apnea (OSA), narcolepsy, REM sleep behavior disorder, and circadian rhythm disturbances, represent a rapidly expanding global health burden that is strongly associated with cardiovascular, metabolic, neurological, and psychiatric diseases. Advancements in wearable sensing technologies and Internet of Medical Things (IoMT) infrastructures have expanded the possibilities for continuous, home-based sleep assessment beyond conventional polysomnography laboratories. These Sleep Health Internet of Things (S-HIoT) systems combine multimodal physiological sensing (EEG, ECG, SpO2, respiratory effort and actigraphy) with wireless communication and cloud-based analytics for automated sleep-stage classification and disorder detection. Nonetheless, the digitization of sleep medicine brings about significant cybersecurity concerns. The constant transmission of sensitive biomedical information makes S-HIoT networks open to anomalous traffic flows, signal manipulation, replay attacks, spoofing, and data integrity violation. Existing studies mostly focus on analyzing physiological signals and network intrusion detection independently, resulting in a systemic vulnerability of cyber–physical sleep monitoring ecosystems. With the aim of addressing this empirical deficiency, this review integrates emerging advances (2022–2026) in the AI-assisted categorization of sleep phases and IoMT anomaly detector designs on the finer analysis of CNN, LSTM/BiLSTM, Transformer-based systems, and a component part of federated schemes and the lightweight, edge-deployable intruder assessor models available. The aim of this study is to uncover a gap in the literature: integrated architectures to trade off audiences of faithfulness of physiological modeling with communication-layer security. To counter it, we present a single framework to include CNN-based spatial feature extraction, Bidirectional Long Short-Term Memory (BiLSTM)-based temporal models and Random Forest-based ensemble classification using a dual task-learning approach. We propose a multi-objective optimization framework to jointly optimize the performance of sleep-stage prediction and that of network anomaly detection. Performance on publicly available datasets (Sleep-EDF and CICIoMT2024) confirms that hybrid integration can be tailored to achieve high accuracy [99.8% sleep staging; 98.6% anomaly detection] whilst being characterized by low inference latency (<45 ms), which is promising for feasibility in real-time deployment in view of targeting edge devices. This work presents a comprehensive framework for developing secure, intelligent, and clinically robust digital sleep health ecosystems by bridging chronobiological signal modeling with cybersecurity mechanisms. Furthermore, it highlights future research directions, including explainable AI, federated secure learning, adversarial robustness, and energy-aware edge optimization. Full article
(This article belongs to the Section Computational Models)
Show Figures

Figure 1

28 pages, 9414 KB  
Article
FCDNet: An Efficient and Cost-Effective Strawberry Disease Detection Model for Smart Farming Management
by Ruoyu Ouyang, Junying Jiang, Yujia Shao, Jialei Zhan and Xiaoyu Zhang
Plants 2026, 15(9), 1341; https://doi.org/10.3390/plants15091341 - 28 Apr 2026
Abstract
With the rapid development of precision agriculture and smart farming management, accurate crop disease detection has become a critical tool for optimizing agricultural resource allocation, controlling operational costs, and supporting scientific plant protection strategies. However, real-world field environments are often characterized by strong [...] Read more.
With the rapid development of precision agriculture and smart farming management, accurate crop disease detection has become a critical tool for optimizing agricultural resource allocation, controlling operational costs, and supporting scientific plant protection strategies. However, real-world field environments are often characterized by strong background interference, multiple concurrent diseases, and fine-grained lesion differences, posing significant challenges to existing detection methods in practical agricultural Internet of Things (IoT) applications. In this paper, we propose Freq-spatial Context Dynamic Network(FCDNet), an efficient and cost-effective detection model tailored for multi-category strawberry disease recognition in complex field management scenarios. The proposed model integrates a Freq-Spatial Feature Module (FSFM), a Context Guide Fusion Module (CGFM), and a Task Align Dynamic Detection Head (TADDH), enabling enhanced expression of high-frequency micro-lesions, adaptive filtering of field background noise, and spatial alignment of classification and regression tasks, while maintaining a lightweight architecture suitable for low-cost agricultural edge devices. Extensive experiments conducted on the newly constructed Strawberry Disease Dataset-7(S7DD) demonstrate that FCDNet consistently outperforms existing mainstream methods, achieving an F1-score of 91.0% and an mAP@0.5 of 94.6%. The model’s architectural robustness and capacity for generalization are further substantiated by evaluations across diverse agricultural datasets using PlantDoc and ALDOD. Ultimately, FCDNet became a practical and cost-effective tool for real-time detection of strawberry diseases, directly supporting more accurate yield forecasting and risk management in smart agriculture systems. Full article
(This article belongs to the Special Issue Advances in Artificial Intelligence for Plant Research—2nd Edition)
Show Figures

Figure 1

27 pages, 6230 KB  
Article
A Digital Twin Prototype for a Deep-Sea Observation Network: Virtual Environment Reconstruction and Data-Driven Predictive Analytics
by Xinya Zhang, Ruixin Chen and Rufu Qin
J. Mar. Sci. Eng. 2026, 14(9), 800; https://doi.org/10.3390/jmse14090800 - 27 Apr 2026
Viewed by 103
Abstract
Effective operation and maintenance (O&M) of deep-sea observation networks are challenged by complex environments and energy limitations. While digital twin (DT) technology offers promising solutions, existing frameworks struggle with high-fidelity, multi-platform orchestration and predictions of electrical energy state. This study proposes a DT [...] Read more.
Effective operation and maintenance (O&M) of deep-sea observation networks are challenged by complex environments and energy limitations. While digital twin (DT) technology offers promising solutions, existing frameworks struggle with high-fidelity, multi-platform orchestration and predictions of electrical energy state. This study proposes a DT framework for a deep-sea observation network (DSON-DT), encompassing telemetry acquisition, predictive analytics, and feedback control to realize a closed-loop workflow for monitoring and managing platform states within virtual scenes. Powered by real-time Internet of underwater things (IoUT) data, a high-fidelity virtual environment is constructed in the Unreal Engine 5 game engine, accurately mapping ambient marine environments and reconstructing platform dynamic behaviors via data-driven approaches and geometric constraints. An improved auto-regressive long short-term memory (AR-LSTM) network is proposed to forecast the battery state of charge (SoC). Experimental results show that this algorithm effectively mitigates the impacts of severe deep-sea noise and the flat open-circuit voltage plateau, suppressing state oscillations to provide reliable references for proactive endurance management. The Vue.js-based web prototype, deployed via pixel streaming, offers seamless interfaces for interactive visualization, analysis, and remote operation. This research achieves comprehensive situational awareness for deep-sea platforms, providing validated technical support for the holistic evaluation and intelligent O&M of heterogeneous marine infrastructures. Full article
(This article belongs to the Special Issue Advances in Ocean Observing Technology and System)
Show Figures

Figure 1

39 pages, 1037 KB  
Article
IoT-Oriented Digital Signature Defense Against Single-Trace Belief Propagation Attacks in Post-Quantum Cryptography
by Maksim Iavich and Nursulu Kapalova
J. Cybersecur. Priv. 2026, 6(3), 77; https://doi.org/10.3390/jcp6030077 - 27 Apr 2026
Viewed by 41
Abstract
Post-quantum cryptographic implementations in Internet-of-Things (IoT) devices are significantly threatened by physical side-channel attacks, where practical attack risks are increased by physical accessibility and resource limitations. In particular, recent work has shown that belief propagation-based attacks can recover secret keys from lattice-based digital [...] Read more.
Post-quantum cryptographic implementations in Internet-of-Things (IoT) devices are significantly threatened by physical side-channel attacks, where practical attack risks are increased by physical accessibility and resource limitations. In particular, recent work has shown that belief propagation-based attacks can recover secret keys from lattice-based digital signatures using only a single side-channel trace of the Number Theoretic Transform (NTT). This work introduces the Quantum-Randomized Number Theoretic Transform (QR-NTT), an implementation-level defense mechanism that integrates quantum-derived entropy directly into the execution flow of lattice-based signature algorithms. Rather than treating randomness as a static input, QR-NTT uses quantum entropy to introduce controlled variability in execution ordering, arithmetic factor usage, and memory access behavior while preserving mathematical correctness and constant-time execution. The proposed framework is designed for embedded platforms and remains compatible with existing post-quantum cryptographic standards and IoT communication protocols. A complete implementation on an ARM Cortex-M4 platform, coupled with commercial quantum random number generator (QRNG) hardware, demonstrates that QR-NTT significantly degrades the effectiveness of template matching and belief propagation attacks. Experimental evaluation shows a reduction in single-trace attack success rates from over 90% to below 3% and an increase of approximately two orders of magnitude in the number of traces required for successful key recovery. These security gains are achieved with moderate overheads of 18.3% in execution time and 1.8 KB of additional memory while remaining well within practical IoT constraints. The results indicate that quantum-derived entropy can be leveraged as a practical implementation-level defense against physical attacks, complementing algorithmic post-quantum security. QR-NTT demonstrates a viable path toward strengthening the real-world resilience of post-quantum IoT systems without sacrificing deployability. Full article
(This article belongs to the Section Cryptography and Cryptology)
21 pages, 697 KB  
Article
Assessing Internet of Things Readiness on University Campuses: A Smart Campus-Oriented Approach
by Dejan Arsenijević, Jasmina Arsenijević, Srđan Tegeltija, Xiaoshuan Zhang, Gordana Ostojić and Stevan Stankovski
IoT 2026, 7(2), 39; https://doi.org/10.3390/iot7020039 - 27 Apr 2026
Viewed by 56
Abstract
The Internet of Things (IoT) is increasingly recognized as a core digital infrastructure supporting digital transformation, particularly in complex environments such as university campuses, which can be conceptualized as smart campus ecosystems. However, many organizations encounter difficulties when implementing IoT due to insufficient [...] Read more.
The Internet of Things (IoT) is increasingly recognized as a core digital infrastructure supporting digital transformation, particularly in complex environments such as university campuses, which can be conceptualized as smart campus ecosystems. However, many organizations encounter difficulties when implementing IoT due to insufficient organizational and technological readiness. This paper presents the University Campus IoT (UCIoT) readiness assessment model, which conceptualizes IoT readiness as a manifestation of organizational digital transformation readiness within the smart campus context. The model consists of 24 dimensions grouped into organizational and technological categories and is implemented through structured questionnaires and a supporting software tool. The model was developed using the design science research methodology and evaluated through a case study conducted at the University Campus of Novi Sad, Serbia. The results demonstrate that the model provides a structured and realistic assessment of IoT readiness and helps identify organizational and technological bottlenecks relevant to IoT implementation. The main contribution of this research is a context-specific readiness assessment framework tailored to university campuses that integrates organizational, technological, and client readiness dimensions. Full article
Back to TopTop