Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,059)

Search Parameters:
Keywords = rfid

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
45 pages, 6607 KB  
Review
Traceability and Anti-Counterfeiting in Agri-Food Supply Chains: A Review of RFID, IoT, Blockchain, and AI Technologies
by Mohamed Riad Sebti, Ultan McCarthy, Anastasia Ktenioudaki, Mariateresa Russo and Massimo Merenda
Sensors 2026, 26(5), 1685; https://doi.org/10.3390/s26051685 - 6 Mar 2026
Viewed by 153
Abstract
By 2050, the global population is expected to reach approximately 10 billion, leading to a projected 50% increase in food demand relative to 2013 levels. If not adequately anticipated, this growing demand will place significant strain on agri-food systems worldwide, with disproportionate impacts [...] Read more.
By 2050, the global population is expected to reach approximately 10 billion, leading to a projected 50% increase in food demand relative to 2013 levels. If not adequately anticipated, this growing demand will place significant strain on agri-food systems worldwide, with disproportionate impacts on low- and middle-income countries. Moreover, current projections may underestimate the accelerating effects of climate change, political instability, and civil unrest, which continue to disrupt food production and distribution systems. In this context, technological advancements offer a promising pathway to enhance efficiency, improve transparency, and mitigate risks related to food safety, adulteration, and counterfeiting. Emerging innovations can decouple food production from environmental degradation while strengthening monitoring, verification, and accountability across supply chains. This review examines state-of-the-art technologies developed to support traceability and anti-counterfeiting in agri-food supply chains, considering their application across the full spectrum of stakeholders. To provide a system-level perspective, the review adopts a five-layer socio-technical traceability and anti-counterfeiting framework, comprising identity, sensing, intelligence, integrity, and interaction layers, which is used to map enabling technologies and reinterpret the evolution of traceability systems (TS 1.0–TS 4.0) as a progression of functional capabilities rather than isolated technological upgrades. Using this framework, the review analyzes the advantages and limitations of current solutions and clarifies how traceability and anti-counterfeiting functions emerge through technology integration. It further identifies gaps that hinder large-scale and equitable adoption. Finally, future research directions are outlined to address current technical, economic, and governance challenges and to guide the development of more resilient, trustworthy, and sustainable agri-food traceability systems. Full article
Show Figures

Figure 1

19 pages, 404 KB  
Review
Recent Development on Sorting of Textiles Waste by Fibre Type for Recycling: A Mini Review
by Megan Robinson, Saikat Ghosh, Feng Qian, Chenyu Du, Mauro Vallati and Parikshit Goswami
Textiles 2026, 6(1), 28; https://doi.org/10.3390/textiles6010028 - 2 Mar 2026
Viewed by 193
Abstract
With the rapid expansion of the global textile sector and increasing awareness of the environmental pollution caused by textile waste, enhancing the recycling of textile waste has become essential to reduce the volume of materials sent to landfill or incineration. As recycling technologies [...] Read more.
With the rapid expansion of the global textile sector and increasing awareness of the environmental pollution caused by textile waste, enhancing the recycling of textile waste has become essential to reduce the volume of materials sent to landfill or incineration. As recycling technologies advance, automated sorting systems that are capable of handling large waste streams and accurately identifying materials for appropriate recycling pathways are increasingly recognised as being critical for efficient textile-waste management. Since 2015, over 20 studies have specifically explored technologies and strategies for automating textile sorting of textile wastes. This mini review introduces various textile fibre identification technologies, including traditional visual and tactile examination; label checking and modern identification technology; and NIR, FT-IR, RFID tags. It summarises the current state of sorting processes, with particular emphasis on the development of AI-assisted, fibre-type-based sorting technologies. Commercial scale automated sorting is not established yet for textile waste recycling, due to the complexity of materials used in textiles, the equipment identification limits and high cost of processing, while machine learning and artificial neural networks provide opportunities for future research advancement and commercialisation. Full article
Show Figures

Figure 1

42 pages, 2328 KB  
Review
Artificial Neural Network Applications in Supply Chain Management: A Literature Review and Classification
by Iman Ghalehkhondabi
Appl. Syst. Innov. 2026, 9(3), 55; https://doi.org/10.3390/asi9030055 - 28 Feb 2026
Viewed by 237
Abstract
Supply Chain Management (SCM) has received considerable attention from the industrial community in recent decades. SCM continues to be an interesting and relevant research topic in many business areas such as revealing supply chain integration benefits, uncertainty and risk mitigation methods, decision-making and [...] Read more.
Supply Chain Management (SCM) has received considerable attention from the industrial community in recent decades. SCM continues to be an interesting and relevant research topic in many business areas such as revealing supply chain integration benefits, uncertainty and risk mitigation methods, decision-making and optimization methodologies, etc. In current supply chain management, huge volumes of data are being developed each second, and emerging technologies such as Radio Frequency Identification (RFID) have amplified the availability of online data. Using Artificial Intelligence (AI) methods that go beyond simply using the huge volume of online data enables Supply Chain (SC) managers to monitor everything in a timely fashion. There are several aspects of an SC that AI—and specifically Artificial Neural Networks (ANNs)—can be applied to better help them manage and optimize. This study aims to review state-of-the-art ANNs and Deep Neural Networks (DNNs) in the field of supply chain management. One hundred high-quality research studies that applied ANNs in supply chain management are reviewed and categorized into four classes: performance optimization, supplier selection, forecasting, and inventory management studies. Our study shows that there is a significant possibility that we could use ANNs and DNNs to better manage supply chains. Across the reviewed studies, neural networks are frequently reported to improve predictive performance and support monitoring/control in complex, nonlinear supply chain settings, often complementing traditional operations research approaches. Finally, the limitations of ANN models and the possibilities for future studies are presented at the end of this study. Full article
(This article belongs to the Section Industrial and Manufacturing Engineering)
Show Figures

Figure 1

15 pages, 960 KB  
Article
ArmTenna: Two-Armed RFID Explorer for Dynamic Warehouse Management
by Abdussalam A. Alajami and Rafael Pous
Sensors 2026, 26(5), 1513; https://doi.org/10.3390/s26051513 - 27 Feb 2026
Viewed by 151
Abstract
Efficient RFID spatial exploration in dynamic warehouse environments is challenging due to occlusions, sensing geometry constraints, and the weak coupling between information acquisition and navigation decisions. Many existing inventory robots treat RFID sensing as a passive data source during exploration, without explicitly optimizing [...] Read more.
Efficient RFID spatial exploration in dynamic warehouse environments is challenging due to occlusions, sensing geometry constraints, and the weak coupling between information acquisition and navigation decisions. Many existing inventory robots treat RFID sensing as a passive data source during exploration, without explicitly optimizing sensing pose or prioritizing inventory-driven frontiers, which can result in incomplete coverage and redundant traversal. This paper presents ArmTenna, an articulated mobile robotic platform that formulates RFID inventory exploration as an active perception problem. The system integrates dual 4-DOF robotic arms carrying directional UHF RFID antennas and a 2-DOF neck-mounted RGB-D camera, enabling adaptive interrogation of candidate regions. We propose a multi-modal frontier exploration framework that combines newly detected EPC tags, average RSSI values, and vision-based product detections into a composite utility function for goal selection. By embedding articulated antenna control directly into the frontier evaluation loop, the robot tightly couples sensing geometry with exploration decisions. Experimental validation with 150 tagged items across three separated warehouse zones shows that ArmTenna achieves up to 97% map coverage, compared to 72% for a baseline platform, while reducing missed-tag regions. These results demonstrate that integrating active sensing pose control with multi-modal frontier evaluation provides an effective and scalable solution for RFID-driven warehouse inventory automation. Full article
Show Figures

Figure 1

38 pages, 10593 KB  
Article
Real-World Experimental Evaluation of DDoS and DRDoS Attacks on Industrial IoT Communication in an Automated Cyber-Physical Production Line
by Tibor Horak, Roman Ruzarovsky, Roman Zelník, Martin Csekei and Ján Šido
Machines 2026, 14(3), 258; https://doi.org/10.3390/machines14030258 - 25 Feb 2026
Viewed by 372
Abstract
Automated production lines are increasingly being expanded with Industrial Internet of Things (IIoT) devices, creating complex Cyber-Physical Systems (CPSs) that connect physical production with control and information infrastructure. However, the convergence of Information Technology (IT) and Operational Technology (OT) layers creates new entry [...] Read more.
Automated production lines are increasingly being expanded with Industrial Internet of Things (IIoT) devices, creating complex Cyber-Physical Systems (CPSs) that connect physical production with control and information infrastructure. However, the convergence of Information Technology (IT) and Operational Technology (OT) layers creates new entry points for attacks targeting communication availability. Most existing studies analyze Distributed Denial of Service (DDoS) attacks primarily in simulation or testbed environments, with limited experimental verification of their impact on real-world production systems. This article presents an experimental evaluation of the impact of DDoS and Distributed Reflection Denial of Service (DRDoS) attacks carried out directly on a physical automated production line with integrated IIoT infrastructure during real operation. Three attack scenarios (TCP SYN flood, TCP ACK flood, and ICMP reflected attack) were implemented, targeting Programmable Logic Controllers (PLCs), Radio-Frequency Identification (RFID) subsystems, and selected IIoT devices. The results showed rapid degradation of deterministic PROFINET communication, disruption of the link between the OT and IT layers, loss of digital product representation, and physical interruption of the production process. Based on the findings, a minimally invasive security solution based on perimeter protection was designed and experimentally verified. The results emphasize the need to design IIoT-based manufacturing systems with an emphasis on network segmentation and architectural separation of the IT and OT layers. Full article
Show Figures

Figure 1

21 pages, 1714 KB  
Article
Lightweight Authentication and Dynamic Key Generation for IMU-Based Canine Motion Recognition IoT Systems
by Guanyu Chen, Hiroki Watanabe, Kohei Matsumura and Yoshinari Takegawa
Future Internet 2026, 18(2), 111; https://doi.org/10.3390/fi18020111 - 20 Feb 2026
Viewed by 218
Abstract
The integration of wearable inertial measurement units (IMU) in animal welfare Internet of Things (IoT) systems has become crucial for monitoring animal behaviors and enhancing welfare management. However, the vulnerability of IoT devices to network and hardware attacks poses significant risks, potentially compromising [...] Read more.
The integration of wearable inertial measurement units (IMU) in animal welfare Internet of Things (IoT) systems has become crucial for monitoring animal behaviors and enhancing welfare management. However, the vulnerability of IoT devices to network and hardware attacks poses significant risks, potentially compromising data integrity and misleading caregivers, negatively impacting animal welfare. Additionally, current animal monitoring solutions often rely on intrusive tagging methods, such as Radio Frequency Identification (RFID) or ear tagging, which may cause unnecessary stress and discomfort to animals. In this study, we propose a lightweight integrity and provenance-oriented security stack that complements standard transport security, specifically tailored to IMU-based animal motion IoT systems. Our system utilizes a 1D-convolutional neural network (CNN) model, achieving 88% accuracy for precise motion recognition, alongside a lightweight behavioral fingerprinting CNN model attaining 83% accuracy, serving as an auxiliary consistency signal to support collar–animal association and reduce mis-attribution risks. We introduce a dynamically generated pre-shared key (PSK) mechanism based on SHA-256 hashes derived from motion features and timestamps, further securing communication channels via application-layer Hash-based Message Authentication Code (HMAC) combined with Message Queuing Telemetry Transport (MQTT)/Transport Layer Security (TLS) protocols. In our design, MQTT/TLS provides primary device authentication and channel protection, while behavioral fingerprinting and per-window dynamic–HMAC provide auxiliary provenance cues and tamper-evident integrity at the application layer. Experimental validation is conducted primarily via offline, dataset-driven experiments on a public canine IMU dataset; system-level overhead and sensor-to-edge latency are measured on a Raspberry Pi-based testbed by replaying windows through the MQTT/TLS pipeline. Overall, this work integrates motion recognition, behavioral fingerprinting, and dynamic key management into a cohesive, lightweight telemetry integrity/provenance stack and provides a foundation for future extensions to multi-species adaptive scenarios and federated learning applications. Full article
(This article belongs to the Special Issue Secure Integration of IoT and Cloud Computing)
Show Figures

Figure 1

15 pages, 3315 KB  
Article
RFID Ultra-High Frequency Tag Antenna Based on SRR Resonant Superstrate
by Zhenhao Huang, Minghan Ke, Haonan Zhang, Lihao Luo, Chaohai Zhang and Guozhi Zhang
Sensors 2026, 26(4), 1233; https://doi.org/10.3390/s26041233 - 13 Feb 2026
Viewed by 238
Abstract
Addressing the pressing need to extend the communication range of RF RFID tag antennas, this paper introduces a novel UHF RFID tag antenna technology based on resonant superstrate regulation using a Split-Ring Resonator (SRR). First, a finite element model of the UHF RFID [...] Read more.
Addressing the pressing need to extend the communication range of RF RFID tag antennas, this paper introduces a novel UHF RFID tag antenna technology based on resonant superstrate regulation using a Split-Ring Resonator (SRR). First, a finite element model of the UHF RFID folded dipole antenna was constructed based on the tag chip’s port impedance. Subsequently, a Two-element SRR resonant superstrate was employed to enhance the dipole antenna’s gain through “resonance and near-field coupling” technology. A folded dipole antenna gain-enhancing SRR resonant superstrate unit was designed, and a multi-parameter joint optimization method was adopted to obtain the optimal SRR resonant superstrate configuration for regulating the dipole antenna. Near-field coupling technology was used to design SRR resonant superstrate elements that enhance the folded dipole antenna’s gain. A multi-parameter joint optimization method was employed to obtain the optimal structural parameter set for the SRR resonant superstrate-controlled dipole antenna. Finally, simulations and experimental measurements of the RFID antenna performance revealed that: within the 920–925 MHz band, the maximum measured forward reading distance enhancement reached 62.1%. The research findings significantly enhance the practical performance of UHF RFID tags in complex environments, enabling more stable and efficient long-range identification in applications such as logistics tracking, asset management, and smart warehousing. Full article
(This article belongs to the Section Electronic Sensors)
Show Figures

Figure 1

18 pages, 6606 KB  
Data Descriptor
Annotated IoT Dataset of Waste Collection Events
by Peter Tarábek, Andrej Michalek, Roman Hriník, Ľubomír Králik and Karol Decsi
Data 2026, 11(2), 38; https://doi.org/10.3390/data11020038 - 11 Feb 2026
Viewed by 284
Abstract
This work presents a curated dataset of multimodal sensor measurements from Internet of Things (IoT) units mounted on waste collection vehicles. Each unit records multiple data streams including GPS position, vehicle velocity, radar-based container presence, accelerometer readings of the lifting arm, and RFID [...] Read more.
This work presents a curated dataset of multimodal sensor measurements from Internet of Things (IoT) units mounted on waste collection vehicles. Each unit records multiple data streams including GPS position, vehicle velocity, radar-based container presence, accelerometer readings of the lifting arm, and RFID tag identifiers of the bins. The dataset provides two complementary forms of annotation: (1) algorithmically generated events that were manually cleaned through visual inspection of sensor signals, offering large-scale coverage across 5 vehicles over a total of 25 collection days, and (2) manually validated events derived from synchronized video recordings, representing ground truth for 3 vehicles over 8 collection days. In total, the dataset contains 12,391 annotated waste collection events. The dataset spans diverse operational conditions with varying container sizes and includes both RFID-equipped and non-RFID bins. It can be used to train and evaluate machine learning models for event detection, anomaly recognition, or explainability studies, and to support practical applications such as Pay-as-you-throw (PAYT) waste management schemes. By combining multimodal sensor signals with reliable annotations, the dataset represents a unique resource for advancing research in smart waste collection and the broader field of IoT-enabled urban services. Full article
(This article belongs to the Section Information Systems and Data Management)
Show Figures

Figure 1

18 pages, 6502 KB  
Article
Design of a Passive Distributed RFID-Based Temperature Monitoring System for Grain Storage
by Qiuju Liang, Yuanwei Zhou, Guilin Yu, Zhiguo Wang, Wen Du, Hua Fan, Can Zhu, Zhenbing Li, Tong Yang and Gang Li
Electronics 2026, 15(4), 752; https://doi.org/10.3390/electronics15040752 - 10 Feb 2026
Viewed by 234
Abstract
In grain storage and transportation, biological activity, including respiration and metabolism, generates heat, creating temperature gradients that can induce moisture migration and form high-humidity areas. This accelerates fungal and insect activity, leading to quality degradation. Long-term, distributed temperature monitoring inside grain piles is [...] Read more.
In grain storage and transportation, biological activity, including respiration and metabolism, generates heat, creating temperature gradients that can induce moisture migration and form high-humidity areas. This accelerates fungal and insect activity, leading to quality degradation. Long-term, distributed temperature monitoring inside grain piles is essential for ensuring safe storage and early risk warning. Radio Frequency Identification (RFID) technology has become widely adopted in storage temperature monitoring due to its low cost, maintenance-free operation, and high security. However, traditional RFID systems have limited communication ranges, and the large size of storage facilities necessitates the deployment of multiple readers, which increases costs. Additionally, the high density and fluctuating moisture content of bulk grain lead to significant RF signal absorption and scattering, weakening the accessibility of purely wireless systems to deeper parts of the grain pile. To address these issues, a passive distributed temperature monitoring system based on RFID technology is proposed. The system utilizes RFID readers to harvest RF energy for passive power supply, with an external antenna ensuring stable energy harvesting and data transmission. Single-bus multi-point temperature sensor modules are integrated into the system, enabling distributed temperature measurements across grain piles or warehouses. Experimental results show that the system achieves a temperature collection success rate of 98%, with an accuracy of ±1 °C and a polling cycle of less than 30 s, providing a low-cost, battery-free, and scalable solution for grain storage monitoring, significantly improving storage quality. Full article
Show Figures

Figure 1

13 pages, 14598 KB  
Article
CSL-YMS: Sensor-Fusion and Energy Efficient Task Scheduling
by Sunita Dahiya, Rashmi Chawla and Giancarlo Fortino
Appl. Sci. 2026, 16(4), 1732; https://doi.org/10.3390/app16041732 - 10 Feb 2026
Viewed by 239
Abstract
In many IIoT-based yard operations, accurately identifying the spatial position of containers is becoming increasingly relevant as operators try to automate stacking and retrieval processes by technologies like Container Spatial Localization (CSL). Despite this automation in IIoT, RTK-GPS–based container stacker positioning frequently lacks [...] Read more.
In many IIoT-based yard operations, accurately identifying the spatial position of containers is becoming increasingly relevant as operators try to automate stacking and retrieval processes by technologies like Container Spatial Localization (CSL). Despite this automation in IIoT, RTK-GPS–based container stacker positioning frequently lacks precision, which causes disruptions in stacking and reduces efficiency in space utilisation. Though it offers placement precision accurately up to 3 cm, this is still insufficient in high-volume Yard Management Systems (YMS). Consequently, this yields to variable container orientation, waste of usable space, increased man input is required in handling goods, and potential automated system failures. This research proposes a novel methodology that combines conventional RTK-GPS measurements with angular information captured from a BHI-260AP–based spreader sensor, allowing the system to correct container placement errors arising from orientation rather than only from positioning. In addition to the spatial positioning problem, we found that continuous IIoT operation raises concerns regarding energy use, particularly when micro-controllers remain active throughout the task cycle. As a solution, this integrates a dynamic task scheduling approach that puts the device in sleep modes whenever computation is not required. In our experiments, this strategy improved overall power efficiency by 34.44%, which makes long automated operation more practical. Full article
(This article belongs to the Section Transportation and Future Mobility)
Show Figures

Figure 1

28 pages, 1044 KB  
Article
A Post-Quantum Secure RFID Authentication Protocol Based on NTRU Encryption Algorithm
by Hu Liu, Hengyu Wu, Ning Ge and Qingkuan Dong
Sensors 2026, 26(3), 1038; https://doi.org/10.3390/s26031038 - 5 Feb 2026
Viewed by 263
Abstract
As a non-contact identification technology, RFID (Radio Frequency Identification) is widely used in various Internet of Things applications. However, RFID systems are highly vulnerable to diverse attacks due to the openness of communication links between readers and tags, leading to serious security and [...] Read more.
As a non-contact identification technology, RFID (Radio Frequency Identification) is widely used in various Internet of Things applications. However, RFID systems are highly vulnerable to diverse attacks due to the openness of communication links between readers and tags, leading to serious security and privacy concerns. Numerous RFID authentication protocols have been designed that employ hash functions and symmetric cryptography to secure communications. Despite these efforts, such schemes generally exhibit limitations in key management flexibility and scalability, which significantly restricts their applicability in large-scale RFID deployments. Confronted with this challenge, public key cryptography offers an effective solution. Taking into account factors such as parameter size, computational complexity, and resistance to quantum attacks, the NTRU algorithm emerges as one of the most promising choices. Since the NTRU signature algorithm is highly complex and requires large parameters, there are currently only a few NTRU encryption-based RFID authentication protocols available, all of which exhibit significant security flaws—such as supporting only one-way authentication, failing to address public key distribution, and so on. Moreover, performance evaluations of the algorithm in these contexts are often incomplete. This paper proposes a mutual authentication protocol for RFID based on the NTRU encryption algorithm to address security and privacy issues. The security of the protocol is analyzed using the BAN-logic tools and some non-formalized methods, and it is further validated through simulation with the AVISPA tool. With the parameter set (N, p, q) = (443, 3, 2048), the NTRU algorithm can provide 128 bits of post-quantum security strength. This configuration not only demonstrates greater foresight at the theoretical security level but also offers significant advantages in practical energy consumption and computation time when compared to traditional algorithms such as ECC, making it a highly competitive candidate in the field of post-quantum cryptography. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

23 pages, 5335 KB  
Article
Design of a Low-Power RFID Sensor System Based on RF Energy Harvesting and Anti-Collision Algorithm
by Xin Mao, Xuran Zhu and Jincheng Lei
Sensors 2026, 26(3), 1023; https://doi.org/10.3390/s26031023 - 4 Feb 2026
Viewed by 285
Abstract
Passive radio frequency identification (RFID) sensing systems integrate wireless energy transfer with information identification. However, conventional passive RFID systems still face three key challenges in practical applications: low RF energy harvesting efficiency, high power consumption of sensor loads, and high complexity of tag [...] Read more.
Passive radio frequency identification (RFID) sensing systems integrate wireless energy transfer with information identification. However, conventional passive RFID systems still face three key challenges in practical applications: low RF energy harvesting efficiency, high power consumption of sensor loads, and high complexity of tag anti-collision algorithms. To address these issues, this paper proposes a hardware–software co-optimized RFID sensor system. For hardware, low threshold RF Schottky diodes are selected, and an input inductor is introduced into the voltage multiplier rectifier to boost the signal amplitude, thereby enhancing the radio frequency to direct current (RF-DC) energy conversion efficiency. In terms of loading, a low-power management strategy is implemented for the power supply and control logic of the sensor node to minimize the overall system energy consumption. For algorithmic implementation, a Dual-Threshold Stepped Dynamic Frame Slotted ALOHA (DTS-DFSA) anti-collision algorithm is proposed, which adaptively adjusts the frame length based on the observed collision ratio, eliminating the need for complex tag population estimation. The algorithm features low computational complexity and is well suited for resource constrained embedded platforms. Through simulation validation, we compare the conversion efficiency of the RF energy harvesting circuit before and after improvement, the current of the sensor load in active and idle states, and the performance of the proposed algorithm against the low-complexity DFSA (LC-DFSA). The results show that the maximum conversion efficiency of the improved RF energy harvesting circuit has increased from 60.56% to 68.69%; specifically, the sensor load current drastically drops from approximately 2.0 mA in the active state to around 74 μA in the idle state, validating the efficacy of the proposed power gating strategy, and the proposed DTS-DFSA algorithm outperforms existing low-complexity schemes in both identification efficiency and computational complexity. Full article
(This article belongs to the Topic Advanced Energy Harvesting Technology, 2nd Edition)
Show Figures

Graphical abstract

23 pages, 11674 KB  
Article
High-Precision Individual Identification Method for UAVs Based on FFS-SPWVD and DIR-YOLOv11
by Jian Yu, Mingwei Qin, Liang Han, Song Lu, Yinghui Zhou and Jun Jiang
Electronics 2026, 15(3), 680; https://doi.org/10.3390/electronics15030680 - 4 Feb 2026
Viewed by 300
Abstract
As the threat from malicious UAVs continues to intensify, accurate identification of individual UAVs has become a critical challenge in regulatory and security domains. Existing single-signal analysis methods suffer from limited recognition accuracy. To address this issue, this paper proposes a high-precision individual [...] Read more.
As the threat from malicious UAVs continues to intensify, accurate identification of individual UAVs has become a critical challenge in regulatory and security domains. Existing single-signal analysis methods suffer from limited recognition accuracy. To address this issue, this paper proposes a high-precision individual identification method for UAVs based on FFS-SPWVD and DIR-YOLOv11. The proposed method first employs a frame-by-frame search strategy combined with the smoothing pseudo-Wigner–Ville distribution (SPWVD) algorithm to obtain effective time–frequency feature representations of flight control signals. Building on this foundation, the YOLOv11n network is adopted as the baseline architecture. To enhance the extraction of time–frequency texture features from UAV signals in complex environments, a Multi-Branch Auxiliary Multi-Scale Fusion Network is incorporated into the neck network. Meanwhile, partial space–frequency selective convolutions are introduced into selected C3k2 modules to alleviate the increased computational burden caused by architectural modifications and to reduce the overall number of model parameters. Experimental results on the public DroneRFb-DIR dataset demonstrate that the proposed method effectively extracts flight control frames and performs high-resolution time–frequency analysis. In individual UAV identification tasks, the proposed approach achieves 96.17% accuracy, 97.82% mAP50, and 95.29% recall, outperforming YOLOv11, YOLOv12, and YOLOv13. This study demonstrates that the proposed method achieves both high accuracy and computational efficiency in individual UAV recognition, providing a practical technical solution for whitelist identification and group size estimation in application scenarios such as border patrol, traffic control, and large-scale events. Full article
Show Figures

Figure 1

15 pages, 12735 KB  
Article
Upper-Bound Electromagnetic Performance of Substrate-Free Epidermal Tattoo Antennas for UHF Applications
by Adina Bianca Barba, Alessio Mostaccio, Rasha Ahmed Hanafy Bayomi, Sunghoon Lee, Gaetano Marrocco, Takao Someya and Cecilia Occhiuzzi
Sensors 2026, 26(3), 1011; https://doi.org/10.3390/s26031011 - 4 Feb 2026
Viewed by 350
Abstract
Substrate-free epidermal antennas promise imperceptible and long-term wearable sensing, yet their electromagnetic performance is fundamentally constrained by the properties of ultrathin conductors. In this work, gold nanomesh is employed for the first time as the radiating conductor of a substrate-free epidermal tattoo antenna [...] Read more.
Substrate-free epidermal antennas promise imperceptible and long-term wearable sensing, yet their electromagnetic performance is fundamentally constrained by the properties of ultrathin conductors. In this work, gold nanomesh is employed for the first time as the radiating conductor of a substrate-free epidermal tattoo antenna operating in the UHF RFID band. Owing to its RF-thin nature, the nanomesh behavior is governed by sheet resistance rather than skin-depth effects, imposing a strict upper bound on achievable radiation efficiency. By combining surface-impedance modeling, full-wave simulations, and on-body experiments, we demonstrate that ohmic losses set a geometry-independent limit on the realized gain of on-skin antennas. An inductively coupled loop architecture is optimized to approach this bound while ensuring mechanical robustness and impedance stability. Measurements on phantoms and human subjects confirm the predicted performance limits within a few decibels, enabling reliable UHF RFID read ranges up to 30–40 cm under standard regulatory constraints. Full article
(This article belongs to the Special Issue Microwaves for Biomedical Applications and Sensing)
Show Figures

Figure 1

20 pages, 555 KB  
Systematic Review
Ensuring Safe Newborn Delivery Through Standards: A Scoping Review of Technologies Aligned with Healthcare Accreditation and Regulatory Frameworks
by Abdallah Alsuhaimi and Khalid Saad Alkhurayji
Healthcare 2026, 14(3), 377; https://doi.org/10.3390/healthcare14030377 - 2 Feb 2026
Viewed by 319
Abstract
Background/Objectives: Safe delivery and correct identification of newborns are critical aspects of healthcare systems globally. The accreditation of healthcare and standards regulation significantly promotes the adoption of modern technologies to address risks related to infant abduction and misidentification. The effectiveness and extent of [...] Read more.
Background/Objectives: Safe delivery and correct identification of newborns are critical aspects of healthcare systems globally. The accreditation of healthcare and standards regulation significantly promotes the adoption of modern technologies to address risks related to infant abduction and misidentification. The effectiveness and extent of these mandates vary across settings and countries. Therefore, this study aims to map and explore modern technologies used for safe newborn delivery and correct identification aligned with healthcare accreditation and regulatory frameworks. Methods: This review adheres to the Preferred Reporting Items for Systematic Review and Meta-Analysis extension for scoping reviews (PRISMA-ScR) guidelines. The Problem, Intervention, Comparison, and Outcome (PICO) framework was employed to facilitate the development of the research question. This study examined studies reporting technologies such as radio frequency identification (RFID), biometric identification, and real-time monitoring across healthcare settings for infant protection through the Normalization Process Theory (NPT). Among three databases and search engines (PubMed, Google Scholar, and Web of Science). The risk of bias for each study was assessed using the AACODS Checklist, SQUIRE 2.0 Checklist, TIDieR Checklist, and JBI tools. Results: Out of 8753 records, only 27 reports were eligible to be included in this review. The most frequently reported technologies were RFID systems (11 studies, 37.9%) and biometric systems such as footprint and facial recognition (6 studies, 20.7%). Despite strong technological potential, many healthcare institutions struggled with the adoption of infant protection technologies. Accreditation systems among the high-resource settings actively mandate advanced technologies and support the integration of staff training and simulation drills. Comparably, middle- and low-income regions usually face challenges related to regulatory enforcement, infrastructure, staff readiness, and limited adoption of modern technologies. Conclusions: Accreditation and standards development are critical catalysts for the adoption of modern infant protection technology. Standards must be comprehensible, adaptable, and supported by investment in human resources and infrastructure. Future regulation must focus on strengthening enforcement, continuous quality improvement, and capacity building to achieve sustainable protection across the world. Full article
Show Figures

Figure 1

Back to TopTop