Due to scheduled maintenance work on our servers, there may be short service disruptions on this website between 11:00 and 12:00 CEST on March 28th.
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (14,509)

Search Parameters:
Keywords = internet of things

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
35 pages, 4226 KB  
Article
Semantic Agent-Based Intelligent Digital Twins Integrating Demand, Production and Product Through Asset Administration Shells
by Joel Lehmann, Tim Markus Häußermann and Julian Reichwald
Big Data Cogn. Comput. 2026, 10(4), 103; https://doi.org/10.3390/bdcc10040103 (registering DOI) - 26 Mar 2026
Abstract
Complex products and production processes are intertwined and demand expressive, lifecycle-wide digital representations. The Asset Administration Shell emerged as a standard for Digital Twins (DTs), structuring heterogeneous data across cloud-based Industrial Internet of Things (IIoT) infrastructures. However, today’s deployments predominantly realize passive or [...] Read more.
Complex products and production processes are intertwined and demand expressive, lifecycle-wide digital representations. The Asset Administration Shell emerged as a standard for Digital Twins (DTs), structuring heterogeneous data across cloud-based Industrial Internet of Things (IIoT) infrastructures. However, today’s deployments predominantly realize passive or reactive DTs, while intelligent behavior remains underexploited. This paper addresses this gap, proposing an end-to-end architecture operationalizing the DT Reference Model through the integration of machine-interpretable granulated industrial skills, which are semantically accumulated into a knowledge graph enabling discovery and reasoning, while a multi-agent system provides autonomous, utility-based negotiation via machine-to-machine interactions within a federated marketplace. The approach is applied in a real smart manufacturing demonstrator, combining order processes, production orchestration, and lifecycle documentation into a unified execution pipeline spanning IIoT-connected shopfloor assets and cloud-based services. Quantitative experiments evaluating negotiation latency, renegotiation robustness, and utility variation demonstrate stable, predictable behavior even under concurrent demand and failure scenarios. The architecture lays a foundation for interoperable, sovereign collaboration across value chains to realize shared production. The results underline the effectiveness of the tightly coupled enabler technologies realizing proactive, reconfigurable, and semantically enriched intelligent DTs. Full article
20 pages, 4332 KB  
Article
Design and Pilot Evaluation of an IoT-Based Blood Pressure Monitoring System for Rabbits
by Carlos Exequiel Garay, Gonzalo Nicolás Mansilla, Rossana Elena Madrid, Agustina González Colombres and Susana Josefina Jerez
Bioengineering 2026, 13(4), 384; https://doi.org/10.3390/bioengineering13040384 (registering DOI) - 26 Mar 2026
Abstract
Telemedicine, driven by the Internet of Things (IoT) and wireless connectivity, is essential for managing cardiovascular diseases, where hypertension remains the primary risk factor. In preclinical research, rabbits are superior biological models compared to rodents due to their human-like lipid metabolism. However, continuous [...] Read more.
Telemedicine, driven by the Internet of Things (IoT) and wireless connectivity, is essential for managing cardiovascular diseases, where hypertension remains the primary risk factor. In preclinical research, rabbits are superior biological models compared to rodents due to their human-like lipid metabolism. However, continuous blood pressure monitoring in this species remains challenging. The gold-standard technique (direct carotid catheterization) requires terminal procedures, and indirect methods (Doppler, oscillometric) show limited agreement with direct measurements. Furthermore, commercially available implantable telemetry platforms, while enabling real-time monitoring in freely moving animals, require costly surgical implantation, specialized proprietary hardware, and post-operative recovery periods that may confound early hemodynamic data. To address these limitations, this study presents a low-cost, customizable, and minimally invasive monitoring system utilizing a pressure transducer in the central auricular artery. The device integrates an ESP32 microcontroller with IoT technology for digital signal processing and seamless wireless data transmission to the ThingSpeak cloud platform. Unlike implantable telemetry, the proposed approach avoids surgical implantation and its associated costs and recovery time, while still enabling continuous, real-time hemodynamic tracking throughout the experimental period. A pilot evaluation against the BIOPAC MP100 reference (carotid artery) demonstrated relative errors of 1.60% for mean arterial pressure, 8.58% for systolic blood pressure, and 2.43% for diastolic blood pressure. By reducing invasiveness and enhancing remote data accessibility, this system provides a promising framework for the preclinical evaluation of antihypertensive agents and cardiovascular mechanisms, bridging the gap between edge computing and remote clinical diagnostics. Full article
(This article belongs to the Section Biosignal Processing)
Show Figures

Graphical abstract

33 pages, 3883 KB  
Article
ABHNet: An Attention-Based Deep Learning Framework for Building Height Estimation Fusing Multimodal Data
by Zhanwu Zhuang, Ning Li, Weiye Xiao, Jiawei Wu and Lei Zhou
ISPRS Int. J. Geo-Inf. 2026, 15(4), 146; https://doi.org/10.3390/ijgi15040146 (registering DOI) - 26 Mar 2026
Abstract
Building height is a key indicator of vertical urbanization and urban morphological complexity, yet accurately mapping building height at fine spatial resolution and large spatial scales remains challenging. This study proposes an attention-based deep learning framework (ABHNet) for building height estimation at a [...] Read more.
Building height is a key indicator of vertical urbanization and urban morphological complexity, yet accurately mapping building height at fine spatial resolution and large spatial scales remains challenging. This study proposes an attention-based deep learning framework (ABHNet) for building height estimation at a 10 m spatial resolution by integrating multi-source remote sensing data and socioeconomic information. The model jointly exploits Sentinel-1 synthetic aperture radar data, Sentinel-2 multispectral imagery, and point of interest (POI) data. The proposed framework is evaluated in Shanghai, a megacity with dense and vertically complex urban structures, using Baidu Maps-derived building height data as reference information. The results demonstrate that the proposed method achieves accurate building height estimation, with a root mean squared error (RMSE) of 3.81 m and a mean absolute error (MAE) of 0.96 m for 2023, and an RMSE of 3.30 m and an MAE of 0.78 m for 2019, indicating robust performance across different time periods. Also, this model is applied in two other cities (Changzhou and Guiyang) and the results indicate good performance. In addition, the expandability of the framework is examined by incorporating higher-resolution ZY-3 imagery, for which the spatial resolution was increased to 2.5 m, highlighting the potential extension of the model to heterogeneous data sources. Overall, this study demonstrates the effectiveness of attention-based deep learning and multimodal data fusion for large-scale and fine-resolution building height estimation using open-source data. Full article
24 pages, 511 KB  
Article
A Secure Authentication Scheme for Hierarchical Federated Learning with Anomaly Detection in IoT-Based Smart Agriculture
by Jihye Choi and Youngho Park
Appl. Sci. 2026, 16(7), 3211; https://doi.org/10.3390/app16073211 - 26 Mar 2026
Abstract
Unmanned Aerial Vehicle (UAV)-assisted hierarchical federated learning (HFL) has emerged as a promising architecture for Internet of Things (IoT)-based smart agriculture, which enables scalable model training over large and sparse farmlands. In this setting, UAVs act as mobile edge servers, aggregating local updates [...] Read more.
Unmanned Aerial Vehicle (UAV)-assisted hierarchical federated learning (HFL) has emerged as a promising architecture for Internet of Things (IoT)-based smart agriculture, which enables scalable model training over large and sparse farmlands. In this setting, UAVs act as mobile edge servers, aggregating local updates from distributed agricultural IoT devices and relaying them to the cloud server. While HFL improves scalability and reduces communication overhead, it still faces critical security threats due to its reliance on public wireless channels and the vulnerability of model aggregation to malicious updates. In this paper, we propose a secure authentication scheme that integrates anomaly detection with elliptic curve cryptography (ECC)-based mutual authentication to protect both the communication and training phases. In the proposed scheme, UAVs authenticate participating clients before receiving their local models, then perform anomaly detection to identify and exclude malicious participants. If a client is found to be malicious, its identity credentials are revoked and broadcast by the cloud server to prevent future participation. The security of the proposed scheme is formally verified using Burrows–Abadi–Needham (BAN) logic, the Real-or-Random (RoR) model, and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool, along with informal security analysis. The performance evaluation includes comparisons of security features, computation cost, and communication cost with other related schemes, and an experimental assessment of anomaly detection performance. The results demonstrate that our scheme provides strong security guarantees, low overhead, and effective malicious client detection, making it well suited for UAV-assisted HFL in smart agriculture. Full article
15 pages, 332 KB  
Article
Zero-Knowledge Federated Learning for Privacy-Preserving 5G Authentication
by Ahmed Lateef Salih Al-Karawi and Rafet Akdeniz
Computers 2026, 15(4), 206; https://doi.org/10.3390/computers15040206 - 26 Mar 2026
Abstract
Fifth-generation (5G) networks are facing critical security challenges in device authentication for massive Internet of Things deployments while preserving privacy. Traditional federated learning approaches depend on the computationally expensive homomorphic encryption to protect model gradients, resulting in substantial latency and communication overhead, leading [...] Read more.
Fifth-generation (5G) networks are facing critical security challenges in device authentication for massive Internet of Things deployments while preserving privacy. Traditional federated learning approaches depend on the computationally expensive homomorphic encryption to protect model gradients, resulting in substantial latency and communication overhead, leading to impractical energy consumption for resource-constrained 5G devices. This paper proposes Zero-Knowledge Federated Learning (ZK-FL), eliminating homomorphic encryption by enabling devices to prove model correctness without revealing gradients. Our approach integrates zero-knowledge proofs with FL updates, where each device generates a proof Proofi=ZK(Gradienti,Hashi), demonstrating computational integrity. The experimental results from 10,000 authentication attempts demonstrate ZK-FL achieves 78.4 ms average authentication latency versus 342.5 ms for homomorphic encryption-based FL (77% reduction), proof sizes of 0.128 kB versus 512 kB (99.97% reduction), and energy consumption of 284.5 mJ versus 6525 mJ (95% reduction), while maintaining 99.3% authentication success rate with formal privacy guarantees. These results demonstrate ZK-FL enables practical privacy-preserving authentication for massive-scale 5G deployment. Full article
25 pages, 886 KB  
Article
Trajectory and Power Control for Sustainable UAV-Assisted NOMA-Enabled Backscattering IoT
by Tianyi Zhang, Mengqin Gu, Deepak Mishra, Jinhong Yuan and Aruna Seneviratne
Drones 2026, 10(4), 238; https://doi.org/10.3390/drones10040238 - 26 Mar 2026
Abstract
As mobile networks increasingly support sustainable and green Internet of Things (IoT) applications, energy-efficient solutions that address coverage constraints have become paramount. Although backscatter communication (BackCom) offers a low-power option for IoT devices, particularly battery-less IoT nodes, it can suffer from limited coverage. [...] Read more.
As mobile networks increasingly support sustainable and green Internet of Things (IoT) applications, energy-efficient solutions that address coverage constraints have become paramount. Although backscatter communication (BackCom) offers a low-power option for IoT devices, particularly battery-less IoT nodes, it can suffer from limited coverage. To overcome this, we exploit aerial platforms (UAVs) integrated with non-orthogonal multiple access (NOMA) to enhance both coverage and spectral efficiency. In this paper, we propose a UAV-supported NOMA-enabled BackCom system to serve massive backscatter node (BN) networks. We aim to maximize system throughput by jointly optimizing the power allocation and reflection coefficients of the BNs, along with the trajectory and data collection locations of the UAV. We derive closed-form solutions for the reflection coefficients and the optimal collection locations of the UAV and achieve global optimality in power allocation by utilizing the Karush–Kuhn–Tucker (KKT) optimality conditions in conjunction with the golden-section search (GSS). In addition, we formulate the UAV trajectory optimization problem as a Traveling Salesman Problem (TSP) and propose an efficient low-complexity genetic algorithm (GA)-based solution. The numerical results demonstrate that the proposed scheme outperforms the benchmark schemes in terms of sum-throughput rate and achieves an overall performance enhancement of 8.983 dB, underscoring the potential of our approach for large-scale battery-less IoT deployments. Full article
(This article belongs to the Special Issue IoT-Enabled UAV Networks for Secure Communication)
Show Figures

Figure 1

31 pages, 1333 KB  
Article
Optimal Security Task Offloading in Cognitive IoT Networks: Provably Optimal Threshold Policies and Model-Free Learning
by Ning Wang and Yali Ren
IoT 2026, 7(2), 30; https://doi.org/10.3390/iot7020030 - 26 Mar 2026
Abstract
The proliferation of Internet of Things (IoT) devices has introduced significant security challenges. Resource-constrained devices face sophisticated threats but lack the computational capacity for advanced security analysis. This study investigates optimal security task allocation in Cognitive IoT (CIoT) networks. It specifically examines when [...] Read more.
The proliferation of Internet of Things (IoT) devices has introduced significant security challenges. Resource-constrained devices face sophisticated threats but lack the computational capacity for advanced security analysis. This study investigates optimal security task allocation in Cognitive IoT (CIoT) networks. It specifically examines when IoT devices should process security tasks locally or offload them to Mobile Edge Computing (MEC) servers. The problem is formulated as a Continuous-Time Markov Decision Process (CTMDP). The study demonstrates that the optimal offloading policy has a threshold structure. Security tasks are offloaded to MEC servers when the offloading queue length is below a critical threshold, k. Otherwise, tasks are processed locally. This structural property is robust to changes in MEC server configurations and threat arrival patterns. It ensures an optimal and easily implementable security policy under the exponential model. Theoretical analysis establishes upper bounds on the performance of AI-based security controllers using the same models. The results also show that standard model-free Q-learning algorithms can recover optimal thresholds without any prior knowledge of the system parameters. Simulations across multiple reinforcement learning architectures, including Q-learning, State–Action–Reward–State–Action (SARSA), and Deep Q-networks (DQN), confirm that all methods converge to the predicted threshold. This empirically validates the analytical findings. The threshold structure remains effective under practical imperfections such as imperfect sensing and parameter estimation errors. Systems maintain 85% to 93% of their optimal performance. This work extends threshold Markov Decision Process (MDP) analysis from classical queuing theory to the context of CIoT security offloading. It provides optimal and practical policies and model-free algorithms for use by resource-constrained devices. Full article
Show Figures

Figure 1

25 pages, 892 KB  
Article
Rabbit: Adaptive Lossless Compression for Floating-Point Time Series via Temporal Locality-Aware Dynamic Encoding
by Qinhong Lei, Wenhui Chen, Yan Wang and Ya Guo
Symmetry 2026, 18(4), 558; https://doi.org/10.3390/sym18040558 (registering DOI) - 25 Mar 2026
Abstract
With the advancement of IoT technology, a vast amount of floating-point time series data has emerged, posing significant challenges for data storage and transmission. To address this issue, the efficient compression of floating-point time series data has become increasingly important. In the field [...] Read more.
With the advancement of IoT technology, a vast amount of floating-point time series data has emerged, posing significant challenges for data storage and transmission. To address this issue, the efficient compression of floating-point time series data has become increasingly important. In the field of lossless compression where precision loss is not allowed, compression and decompression are a symmetrical and reversible transformation. The optimization of its encoding and decoding strategies remains the current optimal path for lossless compression. Based on the existing lossless compression algorithms for time series, this paper proposes Rabbit, which is a new floating-point time series data stream lossless compression algorithm. This method can perceive the data characteristics and, by leveraging the temporal locality of the time series, predict the branch distribution of the data stream during compression, thereby dynamically encoding the flag bits. This algorithm designs a TOE encoding method specifically for the significant bits to reduce the number of compressed bits. Compared with traditional floating-point compression schemes, its performance has been significantly improved. Experimental evaluations on 28 datasets show that this algorithm consistently outperforms existing methods with an average improvement of 4.15% over the baseline ACTF algorithm. Notably, on datasets such as server31, server34, and server41, the compression ratio can be reduced by up to 43.04%. Additionally, the compression and decompression time metrics have improved by 4.27% and 3.74%, respectively. Overall, Rabbit offers an effective lossless compression approach for floating-point time-series data, improving the compression ratio without compromising encoding/decoding throughput. Full article
(This article belongs to the Special Issue Symmetry and Asymmetry in Data Compression)
Show Figures

Figure 1

28 pages, 7008 KB  
Article
Multimodal Deep Learning Framework for Profiling Socio-Economic Indicators and Public Health Determinants in Urban Environments
by Esaie Dufitimana, Jean Pierre Bizimana, Ernest Uwayezu, Paterne Gahungu and Emmy Mugisha
Urban Sci. 2026, 10(4), 177; https://doi.org/10.3390/urbansci10040177 (registering DOI) - 25 Mar 2026
Abstract
Urbanization significantly enhances socio-economic conditions, health, and well-being for many by improving access to services, education, and economic opportunities. However, socio-economic and public health disparities are also being exacerbated by urbanization. The reliable data required to monitor these conditions are often unavailable, outdated, [...] Read more.
Urbanization significantly enhances socio-economic conditions, health, and well-being for many by improving access to services, education, and economic opportunities. However, socio-economic and public health disparities are also being exacerbated by urbanization. The reliable data required to monitor these conditions are often unavailable, outdated, or inconsistent. This study introduces a multimodal deep learning framework that integrates satellite imagery with street network datasets to predict urban socio-economic indicators and public health determinants at the sector level as a political administrative unit of public health planning in Rwanda. We extracted latent visual and topological embeddings of the urban built environment, using a Convolutional Neural Network (CNN) and Graph Neural Network (GNN). These embeddings were fused through an attentional mechanism to train a multi-task regression model that simultaneously predicts multiple socio-economic indicators and public health determinants. This framework was applied to the City of Kigali in Rwanda. Overall, the multimodal fusion model achieved the best average performance across targets, with an average correlation of 0.68 and MAE of 1.26 for socio-economic indicators, and 0.68 and 1.46 for public health determinants, demonstrating the benefit of integrating visual and topological information. The learned fused embedding space arranges socio-economic indicators and public health determinant deciles along a continuous morphological gradient from sparsely built rural settings to dense urban settings, demonstrating that the urban form encodes latent signals that capture socio-economic indicators and health determinants. Moreover, the study reveals a strong relationship between socio-economic indicators and the public health index, with education, cooking materials, and floor materials exhibiting a correlation above 0.96. This work demonstrates the utility of an integrated framework for socio-economic indicator profiling and public health planning in data-scarce urban contexts, offering a scalable approach for monitoring the indicators of Sustainable Development Goals in rapidly changing urban environments. Full article
(This article belongs to the Topic Geospatial AI: Systems, Model, Methods, and Applications)
Show Figures

Figure 1

23 pages, 782 KB  
Article
Computational Economics of Circular Construction: Machine Learning and Digital Twins for Optimizing Demolition Waste Recovery and Business Value
by Marta Torres-Polo and Eduardo Guzmán Ortíz
Computation 2026, 14(4), 76; https://doi.org/10.3390/computation14040076 - 25 Mar 2026
Abstract
Construction and demolition waste (CDW) represents a critical environmental challenge in the building sector, with global generation exceeding 3.57 billion tonnes annually. The circular economy (CE) framework offers a transformative pathway through selective deconstruction and material recovery, yet implementation faces significant barriers including [...] Read more.
Construction and demolition waste (CDW) represents a critical environmental challenge in the building sector, with global generation exceeding 3.57 billion tonnes annually. The circular economy (CE) framework offers a transformative pathway through selective deconstruction and material recovery, yet implementation faces significant barriers including information asymmetry, supply chain fragmentation, and regulatory uncertainty. This study conducts a systematic literature review using the Context–Mechanism–Outcome (CMO) framework to analyze how computational methods, specifically Digital Twins (DT), Building Information Modeling (BIM), Internet of Things (IoT), blockchain, artificial intelligence, and robotics, act as enablers for resilience in CDW management. Following PRISMA 2020 guidelines and realist synthesis principles, we analyzed 42 high-quality empirical studies from Web of Science and Scopus (2015–2025). Our analysis identifies seven primary mechanisms: traceability (M1), simulation (M2), classification (M3), tracking (M4), collaboration (M5), analytics (M6) and robotics (M7). These mechanisms interact with four critical contexts (information asymmetry, supply chain fragmentation, economic uncertainty, operational risks) to generate outcomes at two levels: resilience capabilities (visibility, monitoring, collaboration, flexibility, anticipation) and performance indicators (recovery rates, cost reduction, CO2 emissions mitigation, occupational safety). Key findings from the CMO analysis reveal that blockchain-enabled traceability increases material recovery rates by 15–25%, DT simulation reduces deconstruction costs by 20–30%, and computer vision automation improves sorting accuracy to 85–95%. The study contributes middle-range theories explaining how digital technologies enable circular transitions under specific contextual conditions, offering actionable strategic implications for researchers, project managers, technology developers, and policymakers committed to advancing computational economics in sustainable construction. Full article
Show Figures

Graphical abstract

20 pages, 829 KB  
Article
Performance Analysis of Algorithms for Treating Outliers in PdM from UAVs
by Dragos Alexandru Andrioaia, Petru Gabriel Puiu, George Culea, Ioan Viorel Banu, Sorin-Eugen Popa and Enachi Andrei
Processes 2026, 14(7), 1038; https://doi.org/10.3390/pr14071038 - 24 Mar 2026
Abstract
Due to their vast potential, Unmanned Aerial Vehicles (UAVs) are increasingly being utilized in various applications. To prevent in-flight failures and loss of control, implementing Internet of Things (IoT)-based Predictive Maintenance (PdM) systems is crucial. However, data collected from PdM systems often contains [...] Read more.
Due to their vast potential, Unmanned Aerial Vehicles (UAVs) are increasingly being utilized in various applications. To prevent in-flight failures and loss of control, implementing Internet of Things (IoT)-based Predictive Maintenance (PdM) systems is crucial. However, data collected from PdM systems often contains outliers, which can significantly degrade the accuracy and performance of predictive models. In this paper, we present a comparative performance analysis of several outlier detection methods, namely K-Nearest Neighbors (KNN), Autoencoder (AE), and Isolation Forest (IForest). The datasets used to evaluate these methods were acquired from a UAV predictive maintenance system designed to estimate the Remaining Useful Life (RUL) of Li-ion batteries and detect faults in Brushless DC (BLDC) motors. Ultimately, this study aims to determine the most effective outlier detection method for UAV predictive maintenance datasets. Full article
(This article belongs to the Section Automation Control Systems)
Show Figures

Figure 1

22 pages, 9878 KB  
Article
Field Trial of a Low-Cost Sensor Network for Hydrometeorological Monitoring of Water Pans and Small Dams in Kenya
by Nils Michalke, John M. Gathenya, Joseph K. Sang and Rehema Ndeda
Hydrology 2026, 13(4), 101; https://doi.org/10.3390/hydrology13040101 - 24 Mar 2026
Abstract
Water pans and small dams play a vital role in supplying domestic water in rural regions characterised by seasonal rainfall regimes, with increasing importance as a climate change adaptation measure. Despite their small individual size, the collective impact of numerous water pans is [...] Read more.
Water pans and small dams play a vital role in supplying domestic water in rural regions characterised by seasonal rainfall regimes, with increasing importance as a climate change adaptation measure. Despite their small individual size, the collective impact of numerous water pans is significant. Commercially available monitoring systems are often too costly to be justified for these decentralised infrastructures, resulting in limited data availability that impedes detailed studies aimed at improving their performance. Here, we developed a low-cost monitoring station network that measures water level (JSN-SR04T ultrasonic sensor), precipitation (3D-printed tipping-bucket gauge), and air temperature and humidity (DHT22 sensor). Each station costs less than 12,000 KES (≈93 USD in March 2026), making it suitable for such decentralised multi-site monitoring. A field trial conducted from June to November 2025 at four water pans in the Kakia-Esamburmbur Catchment, Kenya, compared the collected data with an automatic weather station and manual observations. Water level measurements were more accurate than manual reference readings, while air temperature showed biases of 1.4 to 1.8 °C. Precipitation data were largely inaccurate due to inadequate sensor levelling. Overall operational reliability reached 83%, indicating potential for improvements to reduce maintenance efforts and fully exploit the advantages of its low-cost hardware. Full article
Show Figures

Figure 1

16 pages, 2833 KB  
Article
Research on a Space–Time Modulation-Based Angle Demodulation Method for Magnetic Encoders
by Song Jin and Shuaihang Li
Appl. Sci. 2026, 16(7), 3128; https://doi.org/10.3390/app16073128 - 24 Mar 2026
Abstract
This paper presents a high-precision angle demodulation method for magnetic encoders by integrating orthogonal-signal correction with space–time modulation (STM). The proposed approach specifically addresses a critical vulnerability of STM-based high-frequency pulse interpolation: its interpolation accuracy is highly sensitive to zero-crossing timing jitter of [...] Read more.
This paper presents a high-precision angle demodulation method for magnetic encoders by integrating orthogonal-signal correction with space–time modulation (STM). The proposed approach specifically addresses a critical vulnerability of STM-based high-frequency pulse interpolation: its interpolation accuracy is highly sensitive to zero-crossing timing jitter of the quadrature signals. In practical magnetic encoders, non-idealities such as DC offsets, amplitude mismatch, and phase non-orthogonality in the sine/cosine outputs induce jitter and shift in the zero-crossing points. This directly leads to fluctuations in high-frequency counts and amplifies the final angle error. To mitigate this issue, an online orthogonal-signal correction module is first developed. This module sequentially performs offset estimation, amplitude normalization, and real-time phase orthogonalization, thereby enhancing the orthogonality and zero-crossing stability of the quadrature signals at the source. This preprocessing significantly reduces the sensitivity of the subsequent interpolation counting to noise and signal imperfections. Based on the corrected signals, an STM pulse-counting interpolator is adopted to convert angle information into a time-domain phase (time) difference, and high-frequency counting is used for fine subdivision. A Kalman-filter-based predictor is employed to estimate angular velocity and compensate the intrinsic latency of counting-based demodulation in dynamic conditions. Experimental results demonstrate that the proposed phase orthogonalization correction markedly suppresses zero-crossing timing jitter and enhances the stability of high-frequency pulse interpolation. Consequently, the overall demodulation error is reduced by more than 30 percent compared with existing methods, and the final angle error is maintained within 0.033°. Full article
Show Figures

Figure 1

42 pages, 9538 KB  
Review
Functional Foods from Edible Mushrooms and Mycelia: Processing Technologies, Health Benefits, Innovations, and Market Trends
by Lorena Vieira Bentolila de Aguiar, Larissa Batista do Nascimento Soares, Giovanna Lima-Silva, Daiane Barão Pereira, Vítor Alves Pessoa, Aldenora dos Santos Vasconcelos, Roberta Pozzan, Josilene Lima Serra, Ceci Sales-Campos, Larissa Ramos Chevreuil and Walter José Martínez-Burgos
Fermentation 2026, 12(4), 173; https://doi.org/10.3390/fermentation12040173 - 24 Mar 2026
Abstract
The global functional food market continues to expand, and edible mushrooms are emerging as high-value ingredients due to their rich nutritional profile, particularly their high protein content, balanced amino acid composition, and dietary fiber. This growing industrial interest is reflected in the registration [...] Read more.
The global functional food market continues to expand, and edible mushrooms are emerging as high-value ingredients due to their rich nutritional profile, particularly their high protein content, balanced amino acid composition, and dietary fiber. This growing industrial interest is reflected in the registration of more than 322 patents in the past five years according to the Derwent Innovation patent database. Recent advances include the integration of precision mycology (PM) and omics-based approaches, such as CRISPR-Cas9, into solid-state fermentation and submerged fermentation, enabling improvements in natural umami flavor and bioactive composition. Innovative products, including meat analogues with fibrous textures, functional beverages such as kombucha and juices, and fermented dairy products such as yogurts and cheeses, have been formulated to deliver prebiotic, antioxidant, and immunomodulatory properties. Future trends indicate a shift towards the production of high-value nutraceutical peptides and biomass, together with the adoption of artificial intelligence (AI) and the Internet of Things (IoT) to enhance bioreactor automation and scalability. Nevertheless, significant challenges remain, including regulatory constraints, the scarcity of clinical validation in humans, and the need for strict control over the bioaccumulation of heavy metals in mushroom-derived raw materials. Addressing these gaps will be critical for advancing regulatory frameworks, improving industrial standardization, and supporting the translational development of mushroom-based functional foods. Full article
(This article belongs to the Special Issue Fermented Foods for Boosting Health: 2nd Edition)
Show Figures

Figure 1

26 pages, 791 KB  
Article
A Kyber-Based Lightweight Cloud-Assisted Authentication Scheme for Medical IoT
by He Yan, Zhenyu Wang, Liuming Lin, Jing Sun and Shuanggen Liu
Sensors 2026, 26(7), 2021; https://doi.org/10.3390/s26072021 - 24 Mar 2026
Viewed by 44
Abstract
The Medical Internet of Things (MIoT) has promoted smart healthcare through the deep integration of wearable devices, wireless communication, and cloud services. However, this framework faces security risks, as attackers may exploit public channels to impersonate legitimate devices or services and steal sensitive [...] Read more.
The Medical Internet of Things (MIoT) has promoted smart healthcare through the deep integration of wearable devices, wireless communication, and cloud services. However, this framework faces security risks, as attackers may exploit public channels to impersonate legitimate devices or services and steal sensitive data. Therefore, establishing authentication between wearable devices and servers prior to data transmission is crucial. Existing schemes suffer from two critical drawbacks: vulnerability to quantum attacks and excessively high communication overhead, highlighting the need for improved solutions. The authors of this paper present a multi-factor identity authentication protocol to achieve post-quantum security and privacy protection. The scheme integrates lattice-based Kyber key encapsulation and a fuzzy commitment mechanism to secure biological templates and enable post-quantum key agreement. Additionally, hash functions and lightweight error correction codes are employed to reduce terminal communication overhead. The security of the scheme is rigorously proved in the Real-or-Random model, and the analysis confirms that the scheme satisfies common security requirements for wireless networks. The proposed scheme is also compared with existing schemes, and the results demonstrate that it achieves a balance between security and overhead. Full article
(This article belongs to the Special Issue Cyber Security and Privacy in Internet of Things (IoT))
Show Figures

Figure 1

Back to TopTop