Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (902)

Search Parameters:
Keywords = messaging protocol

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
22 pages, 1550 KB  
Article
Leveraging RAG with ACP & MCP for Adaptive Intelligent Tutoring
by Horia Alexandru Modran
Appl. Sci. 2025, 15(21), 11443; https://doi.org/10.3390/app152111443 - 26 Oct 2025
Viewed by 285
Abstract
This paper presents a protocol-driven hybrid architecture that integrates Retrieval-Augmented Generation (RAG) with two complementary protocols—A Model Context Protocol (MCP) and an Agent Communication Protocol (ACP)—to deliver adaptive, transparent, and interoperable intelligent tutoring for higher-education STEM courses. MCP stores, fuses, and exposes session-, [...] Read more.
This paper presents a protocol-driven hybrid architecture that integrates Retrieval-Augmented Generation (RAG) with two complementary protocols—A Model Context Protocol (MCP) and an Agent Communication Protocol (ACP)—to deliver adaptive, transparent, and interoperable intelligent tutoring for higher-education STEM courses. MCP stores, fuses, and exposes session-, task- and course-level context (learning goals, prior errors, instructor flags, and policy constraints), while ACP standardizes multipart messaging and orchestration among specialized tutor agents (retrievers, context managers, pedagogical policy agents, execution tools, and generators). A Python prototype indexes curated course materials (two course corpora: a text-focused PDF and a multimodal PDF/transcript corpus) into a vector store and applies MCP-mediated re-ranking (linear fusion of semantic similarity, MCP relevance, instructor tags, and recency) before RAG prompt assembly. In a held-out evaluation (240 annotated QA pairs) and human studies (36 students, 12 instructors), MCP-aware re-ranking improved Recall@1, increased citation fidelity, reduced unsupported numerical claims, and raised human ratings for factuality and pedagogical appropriateness. Case studies demonstrate improved context continuity, scaffolded hinting under instructor policies, and useful multimodal grounding. The paper concludes that the ACP–MCP–RAG combination enables more trustworthy, auditable, and pedagogically aligned tutoring agents and outlines directions for multimodal extensions, learned re-rankers, and large-scale institutional deployment. Full article
(This article belongs to the Special Issue Applied Machine Learning for Information Retrieval)
Show Figures

Figure 1

21 pages, 2516 KB  
Article
Wide-Area Visual Monitoring System Based on NB-IoT
by Guohua Qiu, Weiyu Tao, Rey-Chue Hwang and Chaofan Xie
Sensors 2025, 25(21), 6589; https://doi.org/10.3390/s25216589 - 26 Oct 2025
Viewed by 267
Abstract
Effective detection of unexpected events in wide-area surveillance remains a critical challenge in the development of intelligent monitoring systems. Recent advancements in Narrowband Internet of Things (NB-IoT) and 5G technologies provide a robust foundation to address this issue. This study presents an integrated [...] Read more.
Effective detection of unexpected events in wide-area surveillance remains a critical challenge in the development of intelligent monitoring systems. Recent advancements in Narrowband Internet of Things (NB-IoT) and 5G technologies provide a robust foundation to address this issue. This study presents an integrated architecture for real-time event detection and response. The system utilizes the Constrained Application Protocol (CoAP) to transmit encapsulated JPEG images from NB-IoT modules to an Internet of Things (IoT) server. Upon receipt, images are decoded, processed, and archived in a centralized database. Subsequently, image data are transmitted to client applications via WebSocket, leveraging the Message Queuing Telemetry Transport (MQTT) protocol. By performing temporal image comparison, the system identifies abnormal events within the monitored area. Once an anomaly is detected, a visual alert is generated and presented through an interactive interface. The test results show that the image recognition accuracy is consistently above 98%. This approach enables intelligent, scalable, and responsive wide-area surveillance reliably, overcoming the constraints of conventional isolated and passive monitoring systems. Full article
Show Figures

Figure 1

20 pages, 1257 KB  
Article
Detecting AI-Generated Network Traffic Using Transformer–MLP Ensemble
by Byeongchan Kim, Abhishek Chaudhary and Sunoh Choi
Appl. Sci. 2025, 15(21), 11338; https://doi.org/10.3390/app152111338 - 22 Oct 2025
Viewed by 281
Abstract
The rapid growth of generative artificial intelligence (AI) has enabled diverse applications but also introduced new attack techniques. Similar to deepfake media, generative AI can be exploited to create AI-generated traffic that evades existing intrusion detection systems (IDSs). This paper proposes a Dual [...] Read more.
The rapid growth of generative artificial intelligence (AI) has enabled diverse applications but also introduced new attack techniques. Similar to deepfake media, generative AI can be exploited to create AI-generated traffic that evades existing intrusion detection systems (IDSs). This paper proposes a Dual Detection System to detect such synthetic network traffic in the Message Queuing Telemetry Transport (MQTT) protocol widely used in Internet of Things (IoT) environments. The system operates in two stages: (i) primary filtering with a Long Short-Term Memory (LSTM) model to detect malicious traffic, and (ii) secondary verification with a Transformer–MLP ensemble to identify AI-generated traffic. Experimental results show that the proposed method achieves an average accuracy of 99.1 ± 0.6% across different traffic types (normal, malicious, and AI-generated), with nearly 100% detection of synthetic traffic. These findings demonstrate that the proposed dual detection system effectively overcomes the limitations of single-model approaches and significantly enhances detection performance. Full article
Show Figures

Figure 1

16 pages, 6589 KB  
Article
An Enhanced Steganography-Based Botnet Communication Method in BitTorrent
by Gyeonggeun Park, Youngho Cho and Gang Qu
Electronics 2025, 14(20), 4081; https://doi.org/10.3390/electronics14204081 - 17 Oct 2025
Viewed by 276
Abstract
In a botnet attack, significant damage can occur when an attacker gains control over a large number of compromised network devices. Botnets have evolved from traditional centralized architectures to decentralized Peer-to-Peer (P2P) and hybrid forms. Recently, a steganography-based botnet (Stego-botnet) has emerged, which [...] Read more.
In a botnet attack, significant damage can occur when an attacker gains control over a large number of compromised network devices. Botnets have evolved from traditional centralized architectures to decentralized Peer-to-Peer (P2P) and hybrid forms. Recently, a steganography-based botnet (Stego-botnet) has emerged, which conceals command and control (C&C) messages within cover media such as images or video files shared over social networking sites (SNS). This type of Stego-botnet can evade conventional detection systems, as identifying hidden messages embedded in media transmitted via SNS platforms is inherently challenging. However, the inherent file size limitations of SNS platforms restrict the achievable payload capacity of such Stego-botnets. Moreover, the centralized characteristics of conventional botnet architectures expose attackers to a higher risk of identification. To overcome these challenges, researchers have explored network steganography techniques leveraging P2P networks such as BitTorrent, Google Suggest, and Skype. Among these, a hidden communication method utilizing Bitfield messages in BitTorrent has been proposed, demonstrating improved concealment compared to prior studies. Nevertheless, existing approaches still fail to achieve sufficient payload capacity relative to traditional digital steganography techniques. In this study, we extend P2P-based network steganography methods—particularly within the BitTorrent protocol—to address these limitations. We propose a novel botnet C&C communication model that employs network steganography over BitTorrent and validate its feasibility through experimental implementation. Furthermore, our results show that the proposed Stego-botnet achieves a higher payload capacity and outperforms existing Stego-botnet models in terms of both efficiency and concealment performance. Full article
Show Figures

Figure 1

23 pages, 2648 KB  
Article
QL-AODV: Q-Learning-Enhanced Multi-Path Routing Protocol for 6G-Enabled Autonomous Aerial Vehicle Networks
by Abdelhamied A. Ateya, Nguyen Duc Tu, Ammar Muthanna, Andrey Koucheryavy, Dmitry Kozyrev and János Sztrik
Future Internet 2025, 17(10), 473; https://doi.org/10.3390/fi17100473 - 16 Oct 2025
Viewed by 343
Abstract
With the arrival of sixth-generation (6G) wireless systems comes radical potential for the deployment of autonomous aerial vehicle (AAV) swarms in mission-critical applications, ranging from disaster rescue to intelligent transportation. However, 6G-supporting AAV environments present challenges such as dynamic three-dimensional topologies, highly restrictive [...] Read more.
With the arrival of sixth-generation (6G) wireless systems comes radical potential for the deployment of autonomous aerial vehicle (AAV) swarms in mission-critical applications, ranging from disaster rescue to intelligent transportation. However, 6G-supporting AAV environments present challenges such as dynamic three-dimensional topologies, highly restrictive energy constraints, and extremely low latency demands, which substantially degrade the efficiency of conventional routing protocols. To this end, this work presents a Q-learning-enhanced ad hoc on-demand distance vector (QL-AODV). This intelligent routing protocol uses reinforcement learning within the AODV protocol to support adaptive, data-driven route selection in highly dynamic aerial networks. QL-AODV offers four novelties, including a multipath route set collection methodology that retains up to ten candidate routes for each destination using an extended route reply (RREP) waiting mechanism, a more detailed RREP message format with cumulative node buffer usage, enabling informed decision-making, a normalized 3D state space model recording hop count, average buffer occupancy, and peak buffer saturation, optimized to adhere to aerial network dynamics, and a light-weighted distributed Q-learning approach at the source node that uses an ε-greedy policy to balance exploration and exploitation. Large-scale simulations conducted with NS-3.34 for various node densities and mobility conditions confirm the better performance of QL-AODV compared to conventional AODV. In high-mobility environments, QL-AODV offers up to 9.8% improvement in packet delivery ratio and up to 12.1% increase in throughput, while remaining persistently scalable for various network sizes. The results prove that QL-AODV is a reliable, scalable, and intelligent routing method for next-generation AAV networks that will operate in intensive environments that are expected for 6G. Full article
(This article belongs to the Special Issue Moving Towards 6G Wireless Technologies—2nd Edition)
Show Figures

Figure 1

25 pages, 371 KB  
Article
Security Analysis and Designing Advanced Two-Party Lattice-Based Authenticated Key Establishment and Key Transport Protocols for Mobile Communication
by Mani Rajendran, Dharminder Chaudhary, S. A. Lakshmanan and Cheng-Chi Lee
Future Internet 2025, 17(10), 472; https://doi.org/10.3390/fi17100472 - 16 Oct 2025
Viewed by 200
Abstract
In this paper, we have proposed a two-party authenticated key establishment (AKE), and authenticated key transport protocols based on lattice-based cryptography, aiming to provide security against quantum attacks for secure communication. This protocol enables two parties, who may share long-term public keys, to [...] Read more.
In this paper, we have proposed a two-party authenticated key establishment (AKE), and authenticated key transport protocols based on lattice-based cryptography, aiming to provide security against quantum attacks for secure communication. This protocol enables two parties, who may share long-term public keys, to securely establish a shared session key, and transportation of the session key from the server while achieving mutual authentication. Our construction leverages the hardness of lattice problems Ring Learning With Errors (Ring-LWE), ensuring robustness against quantum and classical adversaries. Unlike traditional schemes whose security depends upon number-theoretic assumptions being vulnerable to quantum attacks, our protocol ensures security in the post-quantum era. The proposed protocol ensures forward secrecy, and provides security even if the long-term key is compromised. This protocol also provides essential property key freshness and resistance against man-in-the-middle attacks, impersonation attacks, replay attacks, and key mismatch attacks. On the other hand, the proposed key transport protocol provides essential property key freshness, anonymity, and resistance against man-in-the-middle attacks, impersonation attacks, replay attacks, and key mismatch attacks. A two-party key transport protocol is a cryptographic protocol in which one party (typically a trusted key distribution center or sender) securely generates and sends a session key to another party. Unlike key exchange protocols (where both parties contribute to key generation), key transport protocols rely on one party to generate the key and deliver it securely. The protocol possesses a minimum number of exchanged messages and can reduce the number of communication rounds to help minimize the communication overhead. Full article
Show Figures

Figure 1

33 pages, 12260 KB  
Article
Open-Source Smart Wireless IoT Solar Sensor
by Victor-Valentin Stoica, Alexandru-Viorel Pălăcean, Dumitru-Cristian Trancă and Florin-Alexandru Stancu
Appl. Sci. 2025, 15(20), 11059; https://doi.org/10.3390/app152011059 - 15 Oct 2025
Viewed by 247
Abstract
IoT (Internet of Things)-enabled solar irradiance sensors are evolving toward energy harvesting, interoperability, and open-source availability, yet current solutions remain either costly, closed, or limited in robustness. Based on a thorough literature review and identification of future trends, we propose an open-source smart [...] Read more.
IoT (Internet of Things)-enabled solar irradiance sensors are evolving toward energy harvesting, interoperability, and open-source availability, yet current solutions remain either costly, closed, or limited in robustness. Based on a thorough literature review and identification of future trends, we propose an open-source smart wireless sensor that employs a small photovoltaic module simultaneously as sensing element and energy harvester. The device integrates an ESP32 microcontroller, precision ADC (Analog-to-Digital converter), and programmable load to sweep the PV (photovoltaic) I–V (Current–Voltage) curve and compute irradiance from electrical power and solar-cell temperature via a calibrated third-order polynomial. Supporting Modbus RTU (Remote Terminal Unit)/TCP (Transmission Control Protocol), MQTT (Message Queuing Telemetry Transport), and ZigBee, the sensor operates from batteries or supercapacitors through sleep–wake cycles. Validation against industrial irradiance meters across 0–1200 W/m2 showed average errors below 5%, with deviations correlated to irradiance volatility and sampling cadence. All hardware, firmware, and data-processing tools are released as open source to enable reproducibility and distributed PV monitoring applications. Full article
Show Figures

Figure 1

21 pages, 534 KB  
Article
Quantum Enabled Data Authentication Without Classical Control Interaction
by Piotr Zawadzki, Grzegorz Dziwoki, Marcin Kucharczyk, Jan Machniewski, Wojciech Sułek, Jacek Izydorczyk, Weronika Izydorczyk, Piotr Kłosowski, Adam Dustor, Wojciech Filipowski, Krzysztof Paszek and Anna Zawadzka
Electronics 2025, 14(20), 4037; https://doi.org/10.3390/electronics14204037 - 14 Oct 2025
Viewed by 180
Abstract
We present a quantum-assisted data authentication protocol that integrates classical information-theoretic security with quantum communication techniques. We assume only that the participants have access to open classical and quantum channels, and share a random static key material. Building on the Wegman–Carter paradigm, our [...] Read more.
We present a quantum-assisted data authentication protocol that integrates classical information-theoretic security with quantum communication techniques. We assume only that the participants have access to open classical and quantum channels, and share a random static key material. Building on the Wegman–Carter paradigm, our scheme employs universal hashing for message authentication and leverages quantum channels to securely transmit random nonces, eliminating the need for key recycling. The protocol utilizes polar codes within Wyner’s wiretap channel model to ensure confidentiality and reliability, even in the presence of an all-powerful adversary. Security analysis demonstrates that the protocol inherits strong guarantees from both classical and quantum frameworks, provided the quantum channel maintains low loss and noise. Full article
(This article belongs to the Special Issue Recent Advances in Information Security and Data Privacy)
Show Figures

Figure 1

16 pages, 2694 KB  
Article
Leveraging Hierarchical Asymmetry for Efficient Resource Discovery in Message Queuing Telemetry Transport
by Hung-Yu Chien, An-Tong Shih and Yuh-Ming Huang
Symmetry 2025, 17(10), 1722; https://doi.org/10.3390/sym17101722 - 13 Oct 2025
Viewed by 210
Abstract
With the rapid growth of the Internet of Things, efficient resource discovery has become essential for effective resource management. Although Message Queuing Telemetry Transport is one of the most widely adopted IoT communication protocols, it lacks a native resource discovery mechanism or any [...] Read more.
With the rapid growth of the Internet of Things, efficient resource discovery has become essential for effective resource management. Although Message Queuing Telemetry Transport is one of the most widely adopted IoT communication protocols, it lacks a native resource discovery mechanism or any resource discovery standards. The existing Message Queuing Telemetry Transport resource discovery relies on symmetric full-mesh synchronization, which causes excessive traffic and unacceptable latency as the system scales up: this restricts its use to only small-size deployments. To overcome these limitations, this paper proposes a Hierarchical Message Queuing Telemetry Transport resource discovery and distribution framework, inspired by the hierarchical design of the Domain Name System. By introducing hierarchical asymmetry, the framework reduces communication overhead, enhances scalability, and maintains efficient real-time query performance, as demonstrated by implementation and simulation results. Full article
Show Figures

Figure 1

20 pages, 1205 KB  
Review
LLMs for Commit Messages: A Survey and an Agent-Based Evaluation Protocol on CommitBench
by Mohamed Mehdi Trigui and Wasfi G. Al-Khatib
Computers 2025, 14(10), 427; https://doi.org/10.3390/computers14100427 - 7 Oct 2025
Viewed by 543
Abstract
Commit messages are vital for traceability, maintenance, and onboarding in modern software projects, yet their quality is frequently inconsistent. Recent large language models (LLMs) can transform code diffs into natural language summaries, offering a path to more consistent and informative commit messages. This [...] Read more.
Commit messages are vital for traceability, maintenance, and onboarding in modern software projects, yet their quality is frequently inconsistent. Recent large language models (LLMs) can transform code diffs into natural language summaries, offering a path to more consistent and informative commit messages. This paper makes two contributions: (i) it provides a systematic survey of automated commit message generation with LLMs, critically comparing prompt-only, fine-tuned, and retrieval-augmented approaches; and (ii) it specifies a transparent, agent-based evaluation blueprint centered on CommitBench. Unlike prior reviews, we include a detailed dataset audit, preprocessing impacts, evaluation metrics, and error taxonomy. The protocol defines dataset usage and splits, prompting and context settings, scoring and selection rules, and reporting guidelines (results by project, language, and commit type), along with an error taxonomy to guide qualitative analysis. Importantly, this work emphasizes methodology and design rather than presenting new empirical benchmarking results. The blueprint is intended to support reproducibility and comparability in future studies. Full article
Show Figures

Graphical abstract

15 pages, 479 KB  
Article
Security of Quantum Key Distribution with One-Time-Pad-Protected Error Correction and Its Performance Benefits
by Roman Novak
Entropy 2025, 27(10), 1032; https://doi.org/10.3390/e27101032 - 1 Oct 2025
Viewed by 400
Abstract
In quantum key distribution (QKD), public discussion over the authenticated classical channel inevitably leaks information about the raw key to a potential adversary, which must later be mitigated by privacy amplification. To limit this leakage, a one-time pad (OTP) has been proposed to [...] Read more.
In quantum key distribution (QKD), public discussion over the authenticated classical channel inevitably leaks information about the raw key to a potential adversary, which must later be mitigated by privacy amplification. To limit this leakage, a one-time pad (OTP) has been proposed to protect message exchanges in various settings. Building on the security proof of Tomamichel and Leverrier, which is based on a non-asymptotic framework and considers the effects of finite resources, we extend the analysis to the OTP-protected scheme. We show that when the OTP key is drawn from the entropy pool of the same QKD session, the achievable quantum key rate is identical to that of the reference protocol with unprotected error-correction exchange. This equivalence holds for a fixed security level, defined via the diamond distance between the real and ideal protocols modeled as completely positive trace-preserving maps. At the same time, the proposed approach reduces the computational requirements: for non-interactive low-density parity-check codes, the encoding problem size is reduced by the square of the syndrome length, while privacy amplification requires less compression. The technique preserves security, avoids the use of QKD keys between sessions, and has the potential to improve performance. Full article
(This article belongs to the Section Quantum Information)
Show Figures

Figure 1

13 pages, 232 KB  
Article
Virtual Team-Based Care Planning for Older Adults with Dementia: Enablers, Barriers, and Lessons from Hospital-to-Long-Term Care Transitions
by Lillian Hung, Paulina Santaella, Denise Connelly, Mariko Sakamoto, Jim Mann, Ian Chan, Karen Lok Yi Wong, Mona Upreti, Harleen Hundal, Marie Lee Yous and Joanne Collins
J. Dement. Alzheimer's Dis. 2025, 2(4), 34; https://doi.org/10.3390/jdad2040034 - 26 Sep 2025
Viewed by 483
Abstract
Background: Transitions from hospital to long-term care (LTC) facilities are critical periods for older adults living with dementia, often involving complex medical, cognitive, and psychosocial needs. Virtual team-based care has emerged as a promising strategy to improve communication, coordination, and continuity of care [...] Read more.
Background: Transitions from hospital to long-term care (LTC) facilities are critical periods for older adults living with dementia, often involving complex medical, cognitive, and psychosocial needs. Virtual team-based care has emerged as a promising strategy to improve communication, coordination, and continuity of care during these transitions. However, there is limited evidence on how such approaches are implemented in practice, particularly with respect to inclusion, equity, and engagement of older adults and families. Objective: This study aimed to identify the enablers and barriers to delivering virtual team-based care to support older adults with dementia in transitioning from hospital to LTC. Methods: We conducted a qualitative study using semi-structured interviews, focus groups, and a policy review. Data were collected from 60 participants, including healthcare providers, older adults, and family care partners across hospital and LTC settings in British Columbia, Canada. Thematic analysis was conducted using a hybrid inductive and deductive approach. Eighteen institutional policies and guidelines on virtual care and dementia transitions were reviewed to contextualize findings. Results: Four themes were identified: (1) enhancing communication and collaboration, (2) engaging families in care planning, (3) digital access and literacy, and (4) organizational readiness and infrastructure. While virtual huddles and secure messaging platforms supported timely coordination, implementation was inconsistent due to infrastructure limitations, unclear protocols, and staffing pressures. Institutional policies emphasized privacy and security but lacked guidance for inclusive engagement of older adults and families. Many participants described limited access to reliable technology, a lack of training, and the absence of tools tailored for individuals with cognitive impairment. Conclusions: Virtual care has the potential to support more coordinated and inclusive transitions for people with dementia, but its success depends on more than technology. Structured protocols, inclusive policies, and leadership commitment are essential to ensure equitable access and meaningful engagement. The proposed VIRTUAL framework offers practical tips for strengthening virtual team-based care by embedding ethical, relational, and infrastructural readiness across settings. Full article
23 pages, 3141 KB  
Article
Machine Learning-Assisted Cryptographic Security: A Novel ECC-ANN Framework for MQTT-Based IoT Device Communication
by Kalimu Karimunda, Jean de Dieu Marcel Ufitikirezi, Roman Bumbálek, Tomáš Zoubek, Petr Bartoš, Radim Kuneš, Sandra Nicole Umurungi, Anozie Chukwunyere, Mutagisha Norbelt and Gao Bo
Computation 2025, 13(10), 227; https://doi.org/10.3390/computation13100227 - 26 Sep 2025
Viewed by 568
Abstract
The Internet of Things (IoT) has surfaced as a revolutionary technology, enabling ubiquitous connectivity between devices and revolutionizing traditional lifestyles through smart automation. As IoT systems proliferate, securing device-to-device communication and server–client data exchange has become crucial. This paper presents a novel security [...] Read more.
The Internet of Things (IoT) has surfaced as a revolutionary technology, enabling ubiquitous connectivity between devices and revolutionizing traditional lifestyles through smart automation. As IoT systems proliferate, securing device-to-device communication and server–client data exchange has become crucial. This paper presents a novel security framework that integrates elliptic curve cryptography (ECC) with artificial neural networks (ANNs) to enhance the Message Queuing Telemetry Transport (MQTT) protocol. Our study evaluated multiple machine learning algorithms, with ANN demonstrating superior performance in anomaly detection and classification. The hybrid approach not only encrypts communications but also employs the optimized ANN model to detect and classify anomalous traffic patterns. The proposed model demonstrates robust security features, successfully identifying and categorizing various attack types with 90.38% accuracy while maintaining message confidentiality through ECC encryption. Notably, this framework retains the lightweight characteristics essential for IoT devices, making it especially relevant for environments where resources are constrained. To our knowledge, this represents the first implementation of an integrated ECC-ANN approach for securing MQTT-based IoT communications, offering a promising solution for next-generation IoT security requirements. Full article
(This article belongs to the Section Computational Engineering)
Show Figures

Figure 1

13 pages, 3006 KB  
Article
A Novel Controller for Fuel Cell Generators Based on CAN Bus
by Ching-Hsu Chan, Fuh-Liang Wen, Chu-Po Wen and Kevin Karindra Putra Pradana
Appl. Syst. Innov. 2025, 8(5), 138; https://doi.org/10.3390/asi8050138 - 24 Sep 2025
Viewed by 560
Abstract
The novel design and modular implementation of a distributed control system for a fuel cell generator, aimed at monitoring and actuation, are presented. Two ESP32 NodeMCU microcontrollers and MCP2515 modules are used for the controller area network (CAN) bus communication protocol. To compare [...] Read more.
The novel design and modular implementation of a distributed control system for a fuel cell generator, aimed at monitoring and actuation, are presented. Two ESP32 NodeMCU microcontrollers and MCP2515 modules are used for the controller area network (CAN) bus communication protocol. To compare this setup with a traditional battery management system (BMS), small rated-power fuel cell generators were connected individually via the CAN bus to form a larger stacked output. An RFID interface was introduced into the CAN bus system to enhance its applicability in stacked fuel cells, without interfering with original message frames, arbitration mechanisms, or CRC efficiency across various sectors. Additionally, to provide a clearer understanding of the system’s features and functions, a PC-based logic analyzer was employed as an analytical tool to monitor and analyze data transmitted over the CAN bus. Comprehensive insights into the system’s performance are supported by logic analysis of its complex applications in series-connected fuel cells. The advantages of the RFID-based CAN bus are further enhanced by modern communication protocols, offering greater scalability and flexibility, with potential applications in industrial automation, autonomous vehicles, and smart green power grids. Full article
Show Figures

Figure 1

27 pages, 2835 KB  
Article
Textile Defect Detection Using Artificial Intelligence and Computer Vision—A Preliminary Deep Learning Approach
by Rúben Machado, Luis A. M. Barros, Vasco Vieira, Flávio Dias da Silva, Hugo Costa and Vitor Carvalho
Electronics 2025, 14(18), 3692; https://doi.org/10.3390/electronics14183692 - 18 Sep 2025
Viewed by 2113
Abstract
Fabric defect detection is essential for quality assurance in textile manufacturing, where manual inspection is inefficient and error-prone. This paper presents a real-time deep learning-based system leveraging YOLOv11 for detecting defects such as holes, color bleeding and creases on solid-colored, patternless cotton and [...] Read more.
Fabric defect detection is essential for quality assurance in textile manufacturing, where manual inspection is inefficient and error-prone. This paper presents a real-time deep learning-based system leveraging YOLOv11 for detecting defects such as holes, color bleeding and creases on solid-colored, patternless cotton and linen fabrics using edge computing. The system runs on an NVIDIA Jetson Orin Nano platform and supports real-time inference, Message Queuing Telemetry (MQTT)-based defect reporting, and optional Real-Time Messaging Protocol (RTMP) video streaming or local recording storage. Each detected defect is logged with class, confidence score, location and unique ID in a Comma Separated Values (CSV) file for further analysis. The proposed solution operates with two RealSense cameras placed approximately 1 m from the fabric under controlled lighting conditions, tested in a real industrial setting. The system achieves a mean Average Precision (mAP@0.5) exceeding 82% across multiple synchronized video sources while maintaining low latency and consistent performance. The architecture is designed to be modular and scalable, supporting plug-and-play deployment in industrial environments. Its flexibility in integrating different camera sources, deep learning models, and output configurations makes it a robust platform for further enhancements, such as adaptive learning mechanisms, real-time alerts, or integration with Manufacturing Execution System/Enterprise Resource Planning (MES/ERP) pipelines. This approach advances automated textile inspection and reduces dependency on manual processes. Full article
(This article belongs to the Special Issue Deep/Machine Learning in Visual Recognition and Anomaly Detection)
Show Figures

Figure 1

Back to TopTop