Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,162)

Search Parameters:
Keywords = sending system

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
16 pages, 4249 KB  
Article
Analysis Method for the Grid at the Sending End of Renewable Energy Scale Effect Under Typical AC/DC Transmission Scenarios
by Zheng Shi, Yonghao Zhang, Yao Wang, Yan Liang, Jiaojiao Deng and Jie Chen
Electronics 2026, 15(7), 1382; https://doi.org/10.3390/electronics15071382 - 26 Mar 2026
Viewed by 157
Abstract
In the context of the coordinated development of high-proportion renewable energy integration and alternating current/direct current (AC/DC) hybrid transmission, the sending-end power grid faces challenges such as decreased system strength, contracted stability boundaries, and difficulties in covering high-risk operating conditions. This paper proposes [...] Read more.
In the context of the coordinated development of high-proportion renewable energy integration and alternating current/direct current (AC/DC) hybrid transmission, the sending-end power grid faces challenges such as decreased system strength, contracted stability boundaries, and difficulties in covering high-risk operating conditions. This paper proposes a new renewable energy scale impact analysis method that integrates “typical scenario construction-scale ladder comparison–prediction-driven time series injection” in response to the operational constraints of AC/DC transmission. In terms of method implementation, firstly, a two-layer typical scenario system is constructed under unified transmission constraints and fixed grid boundaries: A regular benchmark scenario covers the main operating range, and a set of high-risk scenarios near the boundaries is obtained through multi-objective intelligent search, which is then refined through clustering to form a computable stress-test scenario library. Here, the boundary scenarios are generated by a multi-objective search that simultaneously drives multiple key section load rates towards their limits, subject to AC power-flow feasibility and operational constraints, and the resulting Pareto candidates are reduced into a compact stress-test library by clustering. Secondly, a ladder scenario with increasing renewable energy scale is constructed, and cross-scale comparisons are carried out within the same scenario system to extract the scale effect and critical laws of key safety indicators. Finally, data resampling and Gated Recurrent Unit multi-step prediction are introduced to generate wind power output time series, enabling the temporal mapping of prediction results to scenario injection quantities, and constructing a closed-loop input interface of “prediction–scenario–grid indicators”. The results demonstrate that the proposed hierarchical framework, under unified AC/DC export constraints, can effectively construct a compact stress-test scenario library with enhanced boundary-risk coverage and can reveal how transient voltage security evolves across renewable expansion scales. By coupling boundary-oriented scenario construction, cross-scale comparable assessment, and forecasting-driven time series injection, the framework improves engineering interpretability and practical applicability compared with conventional scenario sampling/reduction workflows. For the forecasting module, the Gated Recurrent Unit (GRU) model achieves MAPE = 8.58% and RMSE = 104.32 kW on the test set, outperforming Linear Regression (LR)/Random Forest (RF)/Support Vector Regression (SVR) in multi-step ahead prediction. Full article
(This article belongs to the Special Issue Applications of Computational Intelligence, 3rd Edition)
Show Figures

Figure 1

27 pages, 2924 KB  
Article
Implementation of a Quantum Authentication Protocol Using Single Photons in Deployed Fiber
by Changho Hong, Youn-Chang Jeong and Se-Wan Ji
Entropy 2026, 28(4), 366; https://doi.org/10.3390/e28040366 - 24 Mar 2026
Viewed by 66
Abstract
With the increasing importance of securing quantum communication networks, practical and robust entity authentication is a critical requirement. Accordingly, we propose and experimentally validate a quantum entity authentication (QEA) protocol specifically designed for integration with BB84-type quantum key distribution (QKD) workflows and existing [...] Read more.
With the increasing importance of securing quantum communication networks, practical and robust entity authentication is a critical requirement. Accordingly, we propose and experimentally validate a quantum entity authentication (QEA) protocol specifically designed for integration with BB84-type quantum key distribution (QKD) workflows and existing terminal architectures. We analyze the protocol’s security against intercept–resend man-in-the-middle (MitM) impersonation, showing that an unauthenticated adversary induces a characteristic 25% correlation error and that the rejection probability approaches unity as the number of detected authentication events increases. For practical realization, the protocol is deployed using weak coherent pulses (WCPs) with decoy-state estimation to bound single-photon contributions and mitigate photon-number-splitting (PNS)-enabled leakage. The system is demonstrated over a field-deployed fiber link of approximately 20 km with ~8 dB optical loss using signal/decoy intensities of ~0.5/~0.15 and sending probabilities 0.88/0.10/0.02 (signal/decoy/vacuum). Across both verification directions, stable operation is observed with quantum bit error rate (QBER) typically fluctuating between 1% and 4% while the sifted key rate remains constant over time. These results provide an experimental basis for integrating physical-layer entity authentication into deployed quantum communication networks. Full article
Show Figures

Figure 1

24 pages, 2603 KB  
Article
Communication-Fairness Trade-Offs in Federated Learning for 6G Resource Allocation: A 200 Client Study
by Nizamuddin Maitlo, Mahmood Hussain Shah, Abdullah Maitlo, Ghulam Mustafa, Kaleem Arshid and Nooruddin Noonari
Inventions 2026, 11(2), 31; https://doi.org/10.3390/inventions11020031 - 20 Mar 2026
Viewed by 205
Abstract
Resource allocation in sixth-generation (6G) networks must meet throughput, latency, and reliability targets while network conditions keep changing. At the same time, the telemetry needed to train good models is distributed across many devices and edge nodes, so sending it to a central [...] Read more.
Resource allocation in sixth-generation (6G) networks must meet throughput, latency, and reliability targets while network conditions keep changing. At the same time, the telemetry needed to train good models is distributed across many devices and edge nodes, so sending it to a central server can violate privacy or data-sharing constraints. Federated learning (FL) helps, but two practical concerns usually determine whether it works in practice: how much communication is needed to achieve strong performance, and whether weaker (tail) clients benefit-not only the average client. In this study, we run large-scale FL on 6G telemetry with 200 clients and quantify the communication fairness trade-off. We evaluate FedAvg and FedProx under multiple settings and benchmark them against a strong centralized model and a local-only baseline. Results are reported as mean ± 95% confidence intervals over five random seeds. We measure the accuracy, macro-F1, AUC, and AP, and we also focus on tail behavior using the worst eligible client accuracy, p10 client accuracy, and fairness gap. By plotting the accuracy/macro-F1 against cumulative communication (bytes), we show that some configurations match the average performance while transmitting far fewer data. Finally, we find that the worst client performance improves early and then stabilizes, and a sensitivity study suggests that FedProx’s μ has a limited impact in this setup. These findings offer actionable guidance for 6G operators and system designers by quantifying how participation and dropout policies translate into concrete communication budgets and tail client behavior. Full article
Show Figures

Figure 1

16 pages, 256 KB  
Article
The Experiences of Justice-Involved Neurodiverse Children in England and Wales: How Can We Close the Rights Gap?
by Anne-Marie Day
Societies 2026, 16(3), 84; https://doi.org/10.3390/soc16030084 - 2 Mar 2026
Viewed by 652
Abstract
Children with special educational needs and disabilities (SEND) and those defined as ‘neurodiverse’ are significantly over-represented in the English and Welsh youth (juvenile) justice system (YJS). Evidence points to a number of significant challenges in neurodiverse children’s lives before entering the justice system [...] Read more.
Children with special educational needs and disabilities (SEND) and those defined as ‘neurodiverse’ are significantly over-represented in the English and Welsh youth (juvenile) justice system (YJS). Evidence points to a number of significant challenges in neurodiverse children’s lives before entering the justice system that increase the likelihood of criminalisation. Then, once in the youth justice system, they encounter further challenges that are both harmful and arguably inconsistent with their human rights. This paper discusses research showing that neurodiverse children often have their rights compromised both prior to and throughout their involvement with the youth justice system. The concluding section of the paper will focus on best practices and recent developments in England and Wales that seek to close the rights gap for this group of children. It is hoped that, by considering both the advances and challenges in England and Wales, the paper will provide a useful case study for international jurisdictions seeking to close this gap for neurodiverse children in youth justice systems. Full article
(This article belongs to the Special Issue Neurodivergence and Human Rights)
21 pages, 1469 KB  
Article
Development of Surveillance Robots Based on Face Recognition Using High-Order Statistical Features and Evidence Theory
by Slim Ben Chaabane, Rafika Harrabi, Anas Bushnag and Hassene Seddik
J. Imaging 2026, 12(3), 107; https://doi.org/10.3390/jimaging12030107 - 28 Feb 2026
Viewed by 400
Abstract
The recent advancements in technologies such as artificial intelligence (AI), computer vision (CV), and Internet of Things (IoT) have significantly extended various fields, particularly in surveillance systems. These innovations enable real-time facial recognition processing, enhancing security and ensuring safety. However, mobile robots are [...] Read more.
The recent advancements in technologies such as artificial intelligence (AI), computer vision (CV), and Internet of Things (IoT) have significantly extended various fields, particularly in surveillance systems. These innovations enable real-time facial recognition processing, enhancing security and ensuring safety. However, mobile robots are commonly employed in surveillance systems to handle risky tasks that are beyond human capability. In this paper, we present a prototype of a cost-effective mobile surveillance robot built on the Raspberry PI 4, designed for integration into various industrial environments. This smart robot detects intruders using IoT and face recognition technology. The proposed system is equipped with a passive infrared (PIR) sensor and a camera for capturing live-streaming video and photos, which are sent to the control room through IoT technology. Additionally, the system uses face recognition algorithms to differentiate between company staff and potential intruders. The face recognition method combines high-order statistical features and evidence theory to improve facial recognition accuracy and robustness. High-order statistical features are used to capture complex patterns in facial images, enhancing discrimination between individuals. Evidence theory is employed to integrate multiple information sources, allowing for better decision-making under uncertainty. This approach effectively addresses challenges such as variations in lighting, facial expressions, and occlusions, resulting in a more reliable and accurate face recognition system. When the system detects an unfamiliar individual, it sends out alert notifications and emails to the control room with the captured picture using IoT. A web interface has also been set up to control the robot from a distance through Wi-Fi connection. The proposed face recognition method is evaluated, and a comparative analysis with existing techniques is conducted. Experimental results with 400 test images of 40 individuals demonstrate the effectiveness of combining various attribute images in improving human face recognition performance. Experimental results indicate that the algorithm can identify human faces with an accuracy of 98.63%. Full article
Show Figures

Figure 1

20 pages, 4351 KB  
Article
STGCN- and IMOPSO-PSD-Based Optimization of Unit Operation Modes of Asynchronous Networking Sending-End Power Systems with High-Penetration Renewable Energy
by Dan Zhang, Yan Liu, Xuhui Zhu, Weixin Wang, Kaiyuan Yu and Keyi Xu
Energies 2026, 19(5), 1141; https://doi.org/10.3390/en19051141 - 25 Feb 2026
Viewed by 272
Abstract
To address the coordinated control need for optimizing clean power transmission and ensuring stable operation of asynchronous sending-end power systems with high-penetration renewable energy, this paper proposes a fast optimization method for unit operation modes based on spatio-temporal graph convolutional network (STGCN) and [...] Read more.
To address the coordinated control need for optimizing clean power transmission and ensuring stable operation of asynchronous sending-end power systems with high-penetration renewable energy, this paper proposes a fast optimization method for unit operation modes based on spatio-temporal graph convolutional network (STGCN) and Improved Multi-Objective Particle Swarm Optimization–Power System Department Software (IMOPSO-PSD) method. First, a Unit Operation Mode Optimization (UOMO) model is established, which aims to maximize the DC transmission capacity and renewable energy accommodation capacity while minimizing the voltage support imbalance degree. Second, an STGCN optimization framework integrated with system operation security constraints and loss feedback of optimization objectives is designed, transforming the solution of UOMO model into the prediction of the optimal unit operation mode. Finally, a fast optimization process for unit operation modes based on STGCN and IMOPSO-PSD is presented, where the simplified IMOPSO-PSD is used to rapidly refine and verify the prediction results of the STGCN. Simulation results based on the modified IEEE 39-bus system show that the proposed method effectively integrates fast spatiotemporal feature extraction and prediction of STGCN with precise constraint verification of IMOPSO-PSD, thus ensuring the rationality and applicability of the optimization results for unit operation modes. Full article
(This article belongs to the Section F1: Electrical Power System)
Show Figures

Figure 1

26 pages, 6997 KB  
Article
A Low-Cost Smart Helmet with Accident Detection and Emergency Response for Bike Riders
by Muhammad Irfan Minhas, Imran Shah, Yasir Ali and Fawaz Nashmi M Alhusayni
J. Sens. Actuator Netw. 2026, 15(1), 20; https://doi.org/10.3390/jsan15010020 - 13 Feb 2026
Viewed by 1374
Abstract
The high rate of bike commuting around the globe has greatly transformed the mode of transportation in cities, but the high speeds of motorized cycling have contributed to a high rate of serious road trauma. Although conventional helmets offer necessary passive structural protection, [...] Read more.
The high rate of bike commuting around the globe has greatly transformed the mode of transportation in cities, but the high speeds of motorized cycling have contributed to a high rate of serious road trauma. Although conventional helmets offer necessary passive structural protection, they do not consider the most important aspect of the emergency response, which is the Golden Hour the time frame during which medical intervention can have the most significant impact. This paper is a development and validation of an autonomous, low-cost smart helmet architecture that is programmed to operate in real-time to detect accidents and autonomously inform the operator of accidents. The system is built up of an ESP32 microcontroller with a multi-modal sensor package, which comprises an inertial measurement unit (IMU), force-impact sensors, and MQ-3 alcohol sensors to conduct proactive safety screening. To overcome the single threshold limitation of unreliable systems, a time-windowed sensor-fusion algorithm was applied in order to distinguish between normal riding dynamics and bona fide collisions. This reasoning involves concurrent cues of high-G inertial rotations and physical impacting features over a time window of 500 ms to reduce spurious activations. The architecture of the system is completely self-sufficient and employs an in-built GPS-GSM module to send the geographical location through SMS without the need to have a smartphone connection. The prototype was also put through 150 experimental tests, with some conducted in laboratories, and real-world running tests in diverse terrains. The findings reveal an accuracy in detection of 93.7, a false positive rate (FPR) of 2.6 and a mean emergency alert latency of 2.8 s. In addition, it was found that structural integrity was confirmed at ECE 22.05 impact conditions using Finite Element Analysis (FEA), with a safety factor of 1.38. These quantitative results mean that the proposed system is an effective way to address a cultural shift between passive structural protection and active rescue intervention as a statistical and computationally efficient safety measure of modern micro-mobility. Full article
Show Figures

Figure 1

27 pages, 7302 KB  
Article
Telecoupling Perspective on the Evolution and Driving Factors of Virtual Cropland Networks in Global Wheat Trade
by Shan Pan, Enpu Ma, Liuwen Liao, Man Wu and Fan Xu
Land 2026, 15(2), 313; https://doi.org/10.3390/land15020313 - 12 Feb 2026
Viewed by 338
Abstract
The international wheat trade serves as a vital pathway for balancing the global food supply and demand while facilitating the cross-regional allocation of cropland resources. Based on the telecoupling framework, this study constructed a global virtual-cropland-flow network using wheat trade data from eight [...] Read more.
The international wheat trade serves as a vital pathway for balancing the global food supply and demand while facilitating the cross-regional allocation of cropland resources. Based on the telecoupling framework, this study constructed a global virtual-cropland-flow network using wheat trade data from eight time points between 1995 and 2023. Social network analysis and quadratic assignment procedure regression were applied to examine its structural evolution and driving factors. The findings reveal that (1) while growing in connectivity, the virtual cropland network exhibits structural vulnerability and evolutionary complexity. (2) The network demonstrated a clear telecoupled structure, with the sending system shifting from U.S.–Canada dominance towards multipolarity, and the receiving system centered in Asia, Africa, and Latin America, with China at its core. The United States and France are major spillover systems. (3) Economic development and foreign demand significantly promote the establishment and intensification of trade relationships between countries. Geographical distance has a dual effect: it strongly negatively influences trade initiation but can be overcome by high complementarity between countries during trade deepening. (4) International wheat trade contributes to global cropland savings but also introduces systemic risks and environmental spillovers in some countries. The results provide theoretical support for building sustainable food trade and agricultural resource governance systems and offer important insights for advancing SDG 2 (Zero Hunger), SDG 12 (Responsible Consumption and Production), sustainable land systems, and the optimization of global land governance. Full article
(This article belongs to the Section Land Socio-Economic and Political Issues)
Show Figures

Graphical abstract

10 pages, 710 KB  
Article
Connected Embedded System for Drowsiness Detection Based on a Reconfigurable Set of Features
by Ibtissam Belakhdhar
Sensors 2026, 26(4), 1195; https://doi.org/10.3390/s26041195 - 12 Feb 2026
Viewed by 240
Abstract
In this study, we present a new EEG-based drowsiness-detection system using a single EEG channel and IoT technology. The aim of this work is to develop a person-dependent system capable of overcoming interpersonal variability due to aging while sending alert signals to the [...] Read more.
In this study, we present a new EEG-based drowsiness-detection system using a single EEG channel and IoT technology. The aim of this work is to develop a person-dependent system capable of overcoming interpersonal variability due to aging while sending alert signals to the cloud. We used a set of five features computed from the power spectral density, based on variations in power spectral energy during the transition from wakefulness to drowsiness (stage one of sleep) for each individual. The results demonstrate that the proposed system can accurately detect driver drowsiness, achieving an accuracy of 95% using a reduced set of features and a single differential EEG channel. The main advantage of the proposed system lies in its ability to overcome interpersonal variability while maintaining high detection accuracy. The system was validated using the MIT-BIH Polysomnography dataset, comprising ten subjects. Full article
(This article belongs to the Section Intelligent Sensors)
Show Figures

Figure 1

21 pages, 4405 KB  
Article
Performance Benchmarking of 5G SA and NSA Networks for Wireless Data Transfer
by Miha Pipan, Marko Šimic and Niko Herakovič
J. Sens. Actuator Netw. 2026, 15(1), 18; https://doi.org/10.3390/jsan15010018 - 2 Feb 2026
Viewed by 1092
Abstract
This paper presents test results of the performance comparison of 5G standalone (SA) and non-standalone (NSA) networks in the context of gathering data of remote sensors and machines. The study evaluates key network characteristics such as latency, throughput, jitter and packet loss (for [...] Read more.
This paper presents test results of the performance comparison of 5G standalone (SA) and non-standalone (NSA) networks in the context of gathering data of remote sensors and machines. The study evaluates key network characteristics such as latency, throughput, jitter and packet loss (for UDP protocol only) using standardized tests to gain insights into the impact of these factors on real-time and data-intensive communication. In addition, a range of communication protocols including OPC UA, Modbus, MQTT, AMQP, CoAP, EtherCAT and gRPC were tested to assess their efficiency, scalability and suitability with different send data sizes. By conducting experiments in a controlled hardware environment, we have analyzed the impact of the 5G architecture on protocol behavior and measured the transmission performance at different data sizes and connection configurations. Particular attention is paid to protocol overhead, data transfer rates and responsiveness, which are crucial for industrial automation and IoT deployments. The results show that SA networks consistently offer lower latency and more stable performance, where robust and low-latency data transfer is essential. In contrast, lightweight IoT protocols such as MQTT and CoAP demonstrate reliable operation in both SA and NSA environments due to their low overhead and adaptability. These insights are equally important for time-critical industrial protocols such as EtherCAT and OPC UA, where stability and responsiveness are crucial for automation and control. The study highlights current limitations of 5G networks in supporting both remote sensing and industrial use cases, while providing guidance for selecting the most suitable communication protocols depending on network infrastructure and application requirements. Moreover, the results indicate directions for configuring and optimizing future 5G networks to better meet the demands of remote sensing systems and Industry 4.0 environments. Full article
(This article belongs to the Section Communications and Networking)
Show Figures

Figure 1

30 pages, 6824 KB  
Article
Audiovisual Gun Detection with Automated Lockdown and PA Announcing IoT System for Schools
by Tareq Khan
IoT 2026, 7(1), 15; https://doi.org/10.3390/iot7010015 - 31 Jan 2026
Viewed by 835
Abstract
Gun violence in U.S. schools not only causes loss of life and physical injury but also leaves enduring psychological trauma, damages property, and results in significant economic losses. One way to reduce this loss is to detect the gun early, notify the police [...] Read more.
Gun violence in U.S. schools not only causes loss of life and physical injury but also leaves enduring psychological trauma, damages property, and results in significant economic losses. One way to reduce this loss is to detect the gun early, notify the police as soon as possible, and implement lockdown procedures immediately. In this project, a novel gun detector Internet of Things (IoT) system is developed that automatically detects the presence of a gun either from images or from gunshot sounds, and sends notifications with exact location information to the first responder’s smartphones using the Internet within a second. The device also sends wireless commands using Message Queuing Telemetry Transport (MQTT) protocol to close the smart door locks in classrooms and announce to act using public address (PA) system automatically. The proposed system will remove the burden of manually calling the police and implementing the lockdown procedure during such traumatic situations. Police will arrive sooner, and thus it will help to stop the shooter early, the injured people can be taken to the hospital quickly, and more lives can be saved. Two custom deep learning AI models are used: (a) to detect guns from image data having an accuracy of 94.6%, and (b) the gunshot sounds from audio data having an accuracy of 99%. No single gun detector device is available in the literature that can detect guns from both image and audio data, implement lockdown and make PA announcement automatically. A prototype of the proposed gunshot detector IoT system, and a smartphone app is developed, and tested with gun replicas and blank guns in real-time. Full article
Show Figures

Figure 1

17 pages, 4618 KB  
Article
A Method for Identification and Adjustment of Key Variables for Power Flow Convergence in Bulk Power Systems Based on Unbalanced Power Characteristics of Intermediate Power Flow
by Yuxi Fan and Yibo Zhou
Energies 2026, 19(3), 628; https://doi.org/10.3390/en19030628 - 25 Jan 2026
Viewed by 314
Abstract
In the operation mode arrangement of bulk power systems, unreasonable reactive power injection data at nodes tend to result in power flow calculation non-convergence. Owing to the extremely high dimension of the variable space and the heterogeneous impacts of different variables on power [...] Read more.
In the operation mode arrangement of bulk power systems, unreasonable reactive power injection data at nodes tend to result in power flow calculation non-convergence. Owing to the extremely high dimension of the variable space and the heterogeneous impacts of different variables on power flow convergence, it is imperative to accurately identify the key variables inducing non-convergence and provide physical justifications. For this purpose, this paper proposes a data-driven key variable identification and adjustment method: firstly, based on the blocking cut-set theory and the characteristic that the active unbalanced power ΔP of intermediate power flow exhibits opposite signs at the sending and receiving ends of the cut-set, a blocking cut-set identification method leveraging the characteristics of the active unbalanced power of intermediate power flow is developed; secondly, relying on the feature that the reactive unbalanced power ΔQ of intermediate power flow is less than zero, a key variable identification method based on the characteristics of the reactive unbalanced power of intermediate power flow is presented; finally, a key variable adjustment method grounded in the numerical value of ΔQ is proposed. The validity of the proposed approach was validated via simulated computations using both the IEEE 39 bus system and a practical bulk power system. Full article
(This article belongs to the Section F1: Electrical Power System)
Show Figures

Figure 1

12 pages, 893 KB  
Proceeding Paper
Real-Time Pollutant Forecasting Using Edge–AI Fusion in Wastewater Treatment Facilities
by Siva Shankar Ramasamy, Vijayalakshmi Subramanian, Leelambika Varadarajan and Alwin Joseph
Eng. Proc. 2025, 117(1), 31; https://doi.org/10.3390/engproc2025117031 - 22 Jan 2026
Viewed by 433
Abstract
Wastewater treatment is one of the major challenges in the reuse of water as a natural resource. Cleaning of water depends on analyzing and treating the water for the pollutants that have a significant impact on the quality of the water. Detecting and [...] Read more.
Wastewater treatment is one of the major challenges in the reuse of water as a natural resource. Cleaning of water depends on analyzing and treating the water for the pollutants that have a significant impact on the quality of the water. Detecting and analyzing the surges of these pollutants well before the recycling process is needed to make intelligent decisions for water cleaning. The dynamic changes in pollutants need constant monitoring and effective planning with appropriate treatment strategies. We propose an edge-computing-based smart framework that captures data from sensors, including ultraviolet, electrochemical, and microfluidic, along with other significant sensor streams. The edge devices send the data from the cluster of sensors to a centralized server that segments anomalies, analyzes the data and suggests the treatment plan that is required, which includes aeration, dosing adjustments, and other treatment plans. A logic layer is designed at the server level to process the real-time data from the sensor clusters and identify the discharge of nutrients, metals, and emerging contaminants in the water that affect the quality. The platform can make decisions on water treatments using its monitoring, prediction, diagnosis, and mitigation measures in a feedback loop. A rule-based Large Language Model (LLM) agent is attached to the server to evaluate data and trigger required actions. A streamlined data pipeline is used to harmonize sensor intervals, flag calibration drift, and store curated features in a local time-series database to run ad hoc analyses even during critical conditions. A user dashboard has also been designed as part of the system to show the recommendations and actions taken. The proposed system acts as an AI-enabled system that makes smart decisions on water treatment, providing an effective cleaning process to improve sustainability. Full article
(This article belongs to the Proceedings of The 4th International Electronic Conference on Processes)
Show Figures

Figure 1

18 pages, 977 KB  
Article
BI-GBDT: A Graph-Free Behavioral Interaction-Aware Gradient Boosting Framework for Fraud Detection in Large-Scale Payment Systems
by Mustafa Berk Keles and Mehmet Gokturk
Appl. Sci. 2026, 16(2), 876; https://doi.org/10.3390/app16020876 - 14 Jan 2026
Viewed by 343
Abstract
Detecting fraudulent and anomalous transactions in large-scale digital payment systems is significantly challenging due to severe class imbalance and the fact that transactional risk is tightly coupled to the historical interactions and behaviors of transacting parties. In this study, a scalable Behavioral Interaction-Aware [...] Read more.
Detecting fraudulent and anomalous transactions in large-scale digital payment systems is significantly challenging due to severe class imbalance and the fact that transactional risk is tightly coupled to the historical interactions and behaviors of transacting parties. In this study, a scalable Behavioral Interaction-Aware Gradient Boosting (BI-GBDT) framework is proposed for anomaly detection in tabular transaction data to overcome these challenges. The methodology models sending and receiving behaviors separately through direction-specific clustering based on transaction frequency and amount. Each transaction is characterized by cluster-pair prevalence ratios, which capture the population-level prevalence of sender–receiver interaction patterns. To handle extreme class imbalance, all transactions are clustered, and a cluster-level risk score is computed as the ratio of anomalous transactions to the total number of transactions within each cluster. This score is incorporated as a feature, serving as a behavioral risk prior highlighting concentrated anomaly. These interaction-aware features are integrated into a GBDT in a big data environment. Experiments were conducted on a large masked real-world payment dataset spanning six months and containing more than 456 million transactions, with the prediction task defined as binary classification between fraudulent and non-fraudulent transactions. Unlike standard GBDT models trained only on transactional attributes and graph-based approaches, BI-GBDT captures sender–receiver interaction patterns in a graph-free manner and outperforms a baseline GBDT, reducing the false positive rate from 37.0% to 4.3%, increasing recall from 52.3% to 72.0%, and improving accuracy from 63.0% to 95.7%. Full article
(This article belongs to the Special Issue Machine Learning and Its Application for Anomaly Detection)
Show Figures

Figure 1

15 pages, 635 KB  
Article
Experimental Evaluation of NB-IoT Power Consumption and Energy Source Feasibility for Long-Term IoT Deployments
by Valters Skrastins, Vladislavs Medvedevs, Dmitrijs Orlovs, Juris Ormanis and Janis Judvaitis
IoT 2026, 7(1), 7; https://doi.org/10.3390/iot7010007 - 13 Jan 2026
Cited by 1 | Viewed by 1039
Abstract
Narrowband Internet of Things (NB-IoT) is widely used for connecting low-power devices that must operate for years without maintenance. To design reliable systems, it is essential to understand how much energy these devices consume under different conditions and which power sources can support [...] Read more.
Narrowband Internet of Things (NB-IoT) is widely used for connecting low-power devices that must operate for years without maintenance. To design reliable systems, it is essential to understand how much energy these devices consume under different conditions and which power sources can support long lifetimes. This study presents a detailed experimental evaluation of NB-IoT power consumption using a commercial System-on-Module (LMT-SoM). We measured various transmissions across different payload sizes, signal strengths, and temperatures. The results show that sending larger packets is far more efficient: a 1280-byte message requires about 7 times less energy per bit than an 80-byte message. However, standby currents varied widely between devices, from 6.7 µA to 23 µA, which has a major impact on battery life. Alongside these experiments, we compared different power sources for a 5-year deployment. Alkaline and lithium-thionyl chloride batteries were the most cost-effective solutions for indoor use, while solar panels combined with supercapacitors provided a sustainable option for outdoor applications. These findings offer practical guidance for engineers and researchers to design NB-IoT devices that balance energy efficiency, cost, and sustainability. Full article
Show Figures

Figure 1

Back to TopTop