Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (7,119)

Search Parameters:
Keywords = service users

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
36 pages, 1010 KiB  
Article
SIBERIA: A Self-Sovereign Identity and Multi-Factor Authentication Framework for Industrial Access
by Daniel Paredes-García, José Álvaro Fernández-Carrasco, Jon Ander Medina López, Juan Camilo Vasquez-Correa, Imanol Jericó Yoldi, Santiago Andrés Moreno-Acevedo, Ander González-Docasal, Haritz Arzelus Irazusta, Aitor Álvarez Muniain and Yeray de Diego Loinaz
Appl. Sci. 2025, 15(15), 8589; https://doi.org/10.3390/app15158589 (registering DOI) - 2 Aug 2025
Abstract
The growing need for secure and privacy-preserving identity management in industrial environments has exposed the limitations of traditional, centralized authentication systems. In this context, SIBERIA was developed as a modular solution that empowers users to control their own digital identities, while ensuring robust [...] Read more.
The growing need for secure and privacy-preserving identity management in industrial environments has exposed the limitations of traditional, centralized authentication systems. In this context, SIBERIA was developed as a modular solution that empowers users to control their own digital identities, while ensuring robust protection of critical services. The system is designed in alignment with European standards and regulations, including EBSI, eIDAS 2.0, and the GDPR. SIBERIA integrates a Self-Sovereign Identity (SSI) framework with a decentralized blockchain-based infrastructure for the issuance and verification of Verifiable Credentials (VCs). It incorporates multi-factor authentication by combining a voice biometric module, enhanced with spoofing-aware techniques to detect synthetic or replayed audio, and a behavioral biometrics module that provides continuous authentication by monitoring user interaction patterns. The system enables secure and user-centric identity management in industrial contexts, ensuring high resistance to impersonation and credential theft while maintaining regulatory compliance. SIBERIA demonstrates that it is possible to achieve both strong security and user autonomy in digital identity systems by leveraging decentralized technologies and advanced biometric verification methods. Full article
(This article belongs to the Special Issue Blockchain and Distributed Systems)
Show Figures

Figure 1

22 pages, 10625 KiB  
Article
Regenerating Landscape Through Slow Tourism: Insights from a Mediterranean Case Study
by Luca Barbarossa and Viviana Pappalardo
Sustainability 2025, 17(15), 7005; https://doi.org/10.3390/su17157005 (registering DOI) - 1 Aug 2025
Abstract
The implementation of the trans-European tourist cycle route network “EuroVelo” is fostering new strategic importance for non-motorized mobility and the associated practice of cycling tourism. Indeed, slow tourism offers a pathway for the development of inland areas. The infrastructure supporting it, such as [...] Read more.
The implementation of the trans-European tourist cycle route network “EuroVelo” is fostering new strategic importance for non-motorized mobility and the associated practice of cycling tourism. Indeed, slow tourism offers a pathway for the development of inland areas. The infrastructure supporting it, such as long-distance cycling and walking paths, can act as a vital connection, stimulating regeneration in peripheral territories by enhancing environmental and landscape assets, as well as preserving heritage, local identity, and culture. The regeneration of peri-urban landscapes through soft mobility is recognized as the cornerstone for accessibility to material and immaterial resources (including ecosystem services) for multiple categories of users, including the most vulnerable, especially following the restoration of green-area systems and non-urbanized areas with degraded ecosystems. Considering the forthcoming implementation of the Magna Grecia cycling route, the southernmost segment of the “EuroVelo” network traversing three regions in southern Italy, this contribution briefly examines the necessity of defining new development policies to effectively integrate sustainable slow tourism with the enhancement of environmental and landscape values in the coastal areas along the route. Specifically, this case study focuses on a coastal stretch characterized by significant morphological and environmental features and notable landscapes interwoven with densely built environments. In this area, environmental and landscape values face considerable threats from scattered, irregular, low-density settlements, abandoned sites, and other inappropriate constructions along the coastline. Full article
(This article belongs to the Special Issue A Systems Approach to Urban Greenspace System and Climate Change)
12 pages, 732 KiB  
Perspective
Implementing Person-Centered, Clinical, and Research Navigation in Rare Cancers: The Canadian Cholangiocarcinoma Collaborative (C3)
by Samar Attieh, Leonard Angka, Christine Lafontaine, Cynthia Mitchell, Julie Carignan, Carolina Ilkow, Simon Turcotte, Rachel Goodwin, Rebecca C. Auer and Carmen G. Loiselle
Curr. Oncol. 2025, 32(8), 436; https://doi.org/10.3390/curroncol32080436 (registering DOI) - 1 Aug 2025
Abstract
Person-centered navigation (PCN) in healthcare refers to a proactive collaboration among professionals, researchers, patients, and their families to guide individuals toward timely access to screening, treatment, follow-up, and psychosocial support. PCN—which includes professional, peer, and virtual guidance, is particularly crucial for rare cancers, [...] Read more.
Person-centered navigation (PCN) in healthcare refers to a proactive collaboration among professionals, researchers, patients, and their families to guide individuals toward timely access to screening, treatment, follow-up, and psychosocial support. PCN—which includes professional, peer, and virtual guidance, is particularly crucial for rare cancers, where affected individuals face uncertainty, limited support, financial strain, and difficulties accessing relevant information, testing, and other services. The Canadian Cholangiocarcinoma Collaborative (C3) prioritizes PCN implementation to address these challenges in the context of Biliary Tract Cancers (BTCs). C3 uses a virtual PCN model and staffs a “C3 Research Navigator” who provides clinical and research navigation such as personalized guidance and support, facilitating access to molecular testing, clinical trials, and case reviews through national multidisciplinary rounds. C3 also supports a national network of BTC experts, a patient research registry, and advocacy activities. C3’s implementation strategies include co-design, timely delivery of support, and optimal outcomes across its many initiatives. Future priorities include expanding the C3 network, enhancing user engagement, and further integrating its innovative approach into routine care. Full article
(This article belongs to the Special Issue Feature Reviews in Section "Oncology Nursing")
Show Figures

Figure 1

20 pages, 1188 KiB  
Article
Consensus-Based Recommendations for Comprehensive Clinical Assessment in Prosthetic Care: A Delphi Study
by Frédérique Dupuis, Marion Pichette, Bonnie Swaine, Claudine Auger and Diana Zidarov
Prosthesis 2025, 7(4), 92; https://doi.org/10.3390/prosthesis7040092 (registering DOI) - 1 Aug 2025
Abstract
Background/Objective: The most effective strategy for addressing users’ prosthetic needs is a comprehensive clinical assessment that provides a holistic understanding of the individual’s symptoms, health, function, and environmental barriers and facilitators. A standardized evaluation form would provide guidance for a structured approach to [...] Read more.
Background/Objective: The most effective strategy for addressing users’ prosthetic needs is a comprehensive clinical assessment that provides a holistic understanding of the individual’s symptoms, health, function, and environmental barriers and facilitators. A standardized evaluation form would provide guidance for a structured approach to comprehensive clinical assessments of people with LLA. The objective of this study was to determine a list of relevant elements to be included in prosthetic evaluation for adults with lower limb amputation. Methods: Three independent focus group discussions were conducted with prosthetists (n = 15), prosthesis users (n = 11), and decision makers (n = 4) to identify all relevant elements that should be included in the clinical assessment of prosthetic services. The final content was then determined using the Delphi technique, with 35 panelists (18 prosthetists and decision makers, and 17 prosthesis users) voting in each round. Results: A total of 91 elements were identified through the focus group, of which 78 were included through the Delphi process. The identified elements are mostly related to the physical health of the prosthesis user (e.g., mobility, pain, and medical information), while others address personal or psychosocial aspects (e.g., activities of daily living, goals, and motivation) or technical aspects (prosthesis-related). Conclusions: Through a Delphi consensus, a list of relevant elements to be included in a prosthetic evaluation was generated. These results will inform the development of a standardized clinical prosthetic assessment form. This form has the potential to improve the quality of clinical evaluations, guide interventions, and enhance the well-being of prosthetic users. Full article
(This article belongs to the Section Orthopedics and Rehabilitation)
Show Figures

Figure 1

31 pages, 2498 KiB  
Article
The Impact of Service Convenience in Online Food Delivery Apps on Consumer Behavior in the Chinese Market: The Moderating Roles of Coupon Proneness and Online Reviews
by Mingjun Wang, Lele Zhou and Woojong Suh
Systems 2025, 13(8), 647; https://doi.org/10.3390/systems13080647 (registering DOI) - 1 Aug 2025
Abstract
To enhance the performance of online food delivery (OFD) services, it is essential to strengthen consumers’ intentions to use OFD apps, which are the core interface of this business. Accordingly, this study aims to identify the cognitive mechanisms that shape consumers’ intentions to [...] Read more.
To enhance the performance of online food delivery (OFD) services, it is essential to strengthen consumers’ intentions to use OFD apps, which are the core interface of this business. Accordingly, this study aims to identify the cognitive mechanisms that shape consumers’ intentions to use OFD apps and explore strategies to encourage their adoption. To achieve this, the study develops a research model that incorporates segmented dimensions of service convenience as key motivational factors, along with variables from the Technology Acceptance Model (TAM). A survey was conducted among OFD consumers in China, and the proposed research model was empirically tested using data from 478 valid responses. The analysis revealed that all six dimensions of service convenience serve as significant motivational drivers of OFD app usage. Furthermore, the study demonstrates that consumers’ coupon proneness and user-generated online reviews have significant moderating effects that reinforce the mechanism by which consumers adopt and use OFD apps. The findings and implications discussed in this study are expected to provide valuable insights and practical guidance for formulating effective strategies to promote more active consumer engagement with OFD apps in the future. Full article
(This article belongs to the Special Issue Sustainable Business Model Innovation in the Era of Industry 4.0)
Show Figures

Figure 1

15 pages, 3267 KiB  
Article
Monitoring and Analyzing Aquatic Vegetation Using Sentinel-2 Imagery Time Series: A Case Study in Chimaditida Shallow Lake in Greece
by Maria Kofidou and Vasilios Ampas
Limnol. Rev. 2025, 25(3), 35; https://doi.org/10.3390/limnolrev25030035 (registering DOI) - 1 Aug 2025
Abstract
Aquatic vegetation plays a crucial role in freshwater ecosystems by providing habitats, regulating water quality, and supporting biodiversity. This study aims to monitor and analyze the dynamics of aquatic vegetation in Chimaditida Shallow Lake, Greece, using Sentinel-2 satellite imagery, with validation from field [...] Read more.
Aquatic vegetation plays a crucial role in freshwater ecosystems by providing habitats, regulating water quality, and supporting biodiversity. This study aims to monitor and analyze the dynamics of aquatic vegetation in Chimaditida Shallow Lake, Greece, using Sentinel-2 satellite imagery, with validation from field measurements. Data processing was performed using Google Earth Engine and QGIS. The study focuses on discriminating and mapping two classes of aquatic surface conditions: areas covered with Floating and Emergent Aquatic Vegetation and open water, covering all seasons from 1 March 2024, to 28 February 2025. Spectral bands such as B04 (red), B08 (near infrared), B03 (green), and B11 (shortwave infrared) were used, along with indices like the Modified Normalized Difference Water Index and Normalized Difference Vegetation Index. The classification was enhanced using Otsu’s thresholding technique to distinguish accurately between Floating and Emergent Aquatic Vegetation and open water. Seasonal fluctuations were observed, with significant peaks in vegetation growth during the summer and autumn months, including a peak coverage of 2.08 km2 on 9 September 2024 and a low of 0.00068 km2 on 28 December 2024. These variations correspond to the seasonal growth patterns of Floating and Emergent Aquatic Vegetation, driven by temperature and nutrient availability. The study achieved a high overall classification accuracy of 89.31%, with producer accuracy for Floating and Emergent Aquatic Vegetation at 97.42% and user accuracy at 95.38%. Validation with Unmanned Aerial Vehicle-based aerial surveys showed a strong correlation (R2 = 0.88) between satellite-derived and field data, underscoring the reliability of Sentinel-2 for aquatic vegetation monitoring. Findings highlight the potential of satellite-based remote sensing to monitor vegetation health and dynamics, offering valuable insights for the management and conservation of freshwater ecosystems. The results are particularly useful for governmental authorities and natural park administrations, enabling near-real-time monitoring to mitigate the impacts of overgrowth on water quality, biodiversity, and ecosystem services. This methodology provides a cost-effective alternative for long-term environmental monitoring, especially in regions where traditional methods are impractical or costly. Full article
Show Figures

Figure 1

40 pages, 1548 KiB  
Article
Real-Time Service Migration in Edge Networks: A Survey
by Yutong Zhang, Ke Zhao, Yihong Yang and Zhangbing Zhou
J. Sens. Actuator Netw. 2025, 14(4), 79; https://doi.org/10.3390/jsan14040079 (registering DOI) - 1 Aug 2025
Abstract
With the rapid proliferation of Internet of Things (IoT) devices and mobile applications and the growing demand for low-latency services, edge computing has emerged as a transformative paradigm that brings computation and storage closer to end users. However, [...] Read more.
With the rapid proliferation of Internet of Things (IoT) devices and mobile applications and the growing demand for low-latency services, edge computing has emerged as a transformative paradigm that brings computation and storage closer to end users. However, the dynamic nature and limited resources of edge networks bring challenges such as load imbalance and high latency while satisfying user requests. Service migration, the dynamic redeployment of service instances across distributed edge nodes, has become a key enabler for solving these challenges and optimizing edge network characteristics. Moreover, the low-latency nature of edge computing requires that service migration strategies must be in real time in order to ensure latency requirements. Thus, this paper presents a systematic survey of real-time service migration in edge networks. Specifically, we first introduce four network architectures and four basic models for real-time service migration. We then summarize four research motivations for real-time service migration and the real-time guarantee introduced during the implementation of migration strategies. To support these motivations, we present key techniques for solving the task of real-time service migration and how these algorithms and models facilitate the real-time performance of migration. We also explore latency-sensitive application scenarios, such as smart cities, smart homes, and smart manufacturing, where real-time service migration plays a critical role in sustaining performance and adaptability under dynamic conditions. Finally, we summarize the key challenges and outline promising future research directions for real-time service migration. This survey aims to provide a structured and in-depth theoretical foundation to guide future research on real-time service migration in edge networks. Full article
Show Figures

Figure 1

27 pages, 1832 KiB  
Review
Breaking the Traffic Code: How MaaS Is Shaping Sustainable Mobility Ecosystems
by Tanweer Alam
Future Transp. 2025, 5(3), 94; https://doi.org/10.3390/futuretransp5030094 (registering DOI) - 1 Aug 2025
Abstract
Urban areas are facing increasing traffic congestion, pollution, and infrastructure strain. Traditional urban transportation systems are often fragmented. They require users to plan, pay, and travel across multiple disconnected services. Mobility-as-a-Service (MaaS) integrates these services into a single digital platform, simplifying access and [...] Read more.
Urban areas are facing increasing traffic congestion, pollution, and infrastructure strain. Traditional urban transportation systems are often fragmented. They require users to plan, pay, and travel across multiple disconnected services. Mobility-as-a-Service (MaaS) integrates these services into a single digital platform, simplifying access and improving the user experience. This review critically examines the role of MaaS in fostering sustainable mobility ecosystems. MaaS aims to enhance user-friendliness, service variety, and sustainability by adopting a customer-centric approach to transportation. The findings reveal that successful MaaS systems consistently align with multimodal transport infrastructure, equitable access policies, and strong public-private partnerships. MaaS enhances the management of routes and traffic, effectively mitigating delays and congestion while concurrently reducing energy consumption and fuel usage. In this study, the authors examine MaaS as a new mobility paradigm for a sustainable transportation system in smart cities, observing the challenges and opportunities associated with its implementation. To assess the environmental impact, a sustainability index is calculated based on the use of different modes of transportation. Significant findings indicate that MaaS systems are proliferating in both quantity and complexity, increasingly integrating capabilities such as real-time multimodal planning, dynamic pricing, and personalized user profiles. Full article
Show Figures

Figure 1

24 pages, 650 KiB  
Article
Investigating Users’ Acceptance of Autonomous Buses by Examining Their Willingness to Use and Willingness to Pay: The Case of the City of Trikala, Greece
by Spyros Niavis, Nikolaos Gavanas, Konstantina Anastasiadou and Paschalis Arvanitidis
Urban Sci. 2025, 9(8), 298; https://doi.org/10.3390/urbansci9080298 (registering DOI) - 1 Aug 2025
Abstract
Autonomous vehicles (AVs) have emerged as a promising sustainable urban mobility solution, expected to lead to enhanced road safety, smoother traffic flows, less traffic congestion, improved accessibility, better energy utilization and environmental performance, as well as more efficient passenger and freight transportation, in [...] Read more.
Autonomous vehicles (AVs) have emerged as a promising sustainable urban mobility solution, expected to lead to enhanced road safety, smoother traffic flows, less traffic congestion, improved accessibility, better energy utilization and environmental performance, as well as more efficient passenger and freight transportation, in terms of time and cost, due to better fleet management and platooning. However, challenges also arise, mostly related to data privacy, security and cyber-security, high acquisition and infrastructure costs, accident liability, even possible increased traffic congestion and air pollution due to induced travel demand. This paper presents the results of a survey conducted among 654 residents who experienced an autonomous bus (AB) service in the city of Trikala, Greece, in order to assess their willingness to use (WTU) and willingness to pay (WTP) for ABs, through testing a range of factors based on a literature review. Results useful to policy-makers were extracted, such as that the intention to use ABs was mostly shaped by psychological factors (e.g., users’ perceptions of usefulness and safety, and trust in the service provider), while WTU seemed to be positively affected by previous experience in using ABs. In contrast, sociodemographic factors were found to have very little effect on the intention to use ABs, while apart from personal utility, users’ perceptions of how autonomous driving will improve the overall life standards in the study area also mattered. Full article
Show Figures

Figure 1

32 pages, 10052 KiB  
Article
A Study on Large Electric Vehicle Fires in a Tunnel: Use of a Fire Dynamics Simulator (FDS)
by Roberto Dessì, Daniel Fruhwirt and Davide Papurello
Processes 2025, 13(8), 2435; https://doi.org/10.3390/pr13082435 - 31 Jul 2025
Abstract
Internal combustion engine vehicles damage the environment and public health by emitting toxic fumes, such as CO2 or CO and other trace compounds. The use of electric cars helps to reduce the emission of pollutants into the environment due to the use [...] Read more.
Internal combustion engine vehicles damage the environment and public health by emitting toxic fumes, such as CO2 or CO and other trace compounds. The use of electric cars helps to reduce the emission of pollutants into the environment due to the use of batteries with no direct and local emissions. However, accidents of battery electric vehicles pose new challenges, such as thermal runaway. Such accidents can be serious and, in some cases, may result in uncontrolled overheating that causes the battery pack to spontaneously ignite. In particular, the most dangerous vehicles are heavy goods vehicles (HGVs), as they release a large amount of energy that generate high temperatures, poor visibility, and respiratory damage. This study aims to determine the potential consequences of large BEV fires in road tunnels using computational fluid dynamics (CFD). Furthermore, a comparison between a BEV and an ICEV fire shows the differences related to the thermal and the toxic impact. Furthermore, the adoption of a longitudinal ventilation system in the tunnel helped to mitigate the BEV fire risk, keeping a safer environment for tunnel users and rescue services through adequate smoke control. Full article
Show Figures

Figure 1

22 pages, 4399 KiB  
Article
Deep Learning-Based Fingerprint–Vein Biometric Fusion: A Systematic Review with Empirical Evaluation
by Sarah Almuwayziri, Abeer Al-Nafjan, Hessah Aljumah and Mashael Aldayel
Appl. Sci. 2025, 15(15), 8502; https://doi.org/10.3390/app15158502 (registering DOI) - 31 Jul 2025
Abstract
User authentication is crucial for safeguarding access to digital systems and services. Biometric authentication serves as a strong and user-friendly alternative to conventional security methods such as passwords and PINs, which are often susceptible to breaches. This study proposes a deep learning-based multimodal [...] Read more.
User authentication is crucial for safeguarding access to digital systems and services. Biometric authentication serves as a strong and user-friendly alternative to conventional security methods such as passwords and PINs, which are often susceptible to breaches. This study proposes a deep learning-based multimodal biometric system that combines fingerprint (FP) and finger vein (FV) modalities to improve accuracy and security. The system explores three fusion strategies: feature-level fusion (combining feature vectors from each modality), score-level fusion (integrating prediction scores from each modality), and a hybrid approach that leverages both feature and score information. The implementation involved five pretrained convolutional neural network (CNN) models: two unimodal (FP-only and FV-only) and three multimodal models corresponding to each fusion strategy. The models were assessed using the NUPT-FPV dataset, which consists of 33,600 images collected from 140 subjects with a dual-mode acquisition device in varied environmental conditions. The results indicate that the hybrid-level fusion with a dominant score weight (0.7 score, 0.3 feature) achieved the highest accuracy (99.79%) and the lowest equal error rate (EER = 0.0018), demonstrating superior robustness. Overall, the results demonstrate that integrating deep learning with multimodal fusion is highly effective for advancing scalable and accurate biometric authentication solutions suitable for real-world deployments. Full article
Show Figures

Figure 1

15 pages, 675 KiB  
Article
A Trusted Multi-Cloud Brokerage System for Validating Cloud Services Using Ranking Heuristics
by Rajganesh Nagarajan, Vinothiyalakshmi Palanichamy, Ramkumar Thirunavukarasu and J. Arun Pandian
Future Internet 2025, 17(8), 348; https://doi.org/10.3390/fi17080348 (registering DOI) - 31 Jul 2025
Viewed by 13
Abstract
Cloud computing offers a broad spectrum of services to users, particularly in multi-cloud environments where service-centric features are introduced to support users from multiple endpoints. To improve service availability and optimize the utilization of required services, cloud brokerage has been integrated into multi-cloud [...] Read more.
Cloud computing offers a broad spectrum of services to users, particularly in multi-cloud environments where service-centric features are introduced to support users from multiple endpoints. To improve service availability and optimize the utilization of required services, cloud brokerage has been integrated into multi-cloud systems. The primary objective of a cloud broker is to ensure the quality and outcomes of services offered to customers. However, traditional cloud brokers face limitations in measuring service trust, ensuring validity, and anticipating future enhancements of services across different cloud platforms. To address these challenges, the proposed intelligent cloud broker integrates an intelligence mechanism that enhances decision-making within a multi-cloud environment. This broker performs a comprehensive validation and verification of service trustworthiness by analyzing various trust factors, including service response time, sustainability, suitability, accuracy, transparency, interoperability, availability, reliability, stability, cost, throughput, efficiency, and scalability. Customer feedback is also incorporated to assess these trust factors prior to service recommendation. The proposed model calculates service ranking (SR) values for available cloud services and dynamically includes newly introduced services during the validation process by mapping them with existing entries in the Service Collection Repository (SCR). Performance evaluation using the Google cluster-usage traces dataset demonstrates that the ICB outperforms existing approaches such as the Clustering-Based Trust Degree Computation (CBTDC) algorithm and the Service Context-Aware QoS Prediction and Recommendation (SCAQPR) model. Results confirm that the ICB significantly enhances the effectiveness and reliability of cloud service recommendations for users. Full article
Show Figures

Figure 1

15 pages, 608 KiB  
Article
A Personal Privacy-Ensured User Authentication Scheme
by Ya-Fen Chang, Wei-Liang Tai and Ting-Yu Chang
Electronics 2025, 14(15), 3072; https://doi.org/10.3390/electronics14153072 (registering DOI) - 31 Jul 2025
Viewed by 15
Abstract
User authentication verifies the legitimacy of users and prevents service providers from offering services to unauthorized parties. The concept is widely applied in various scenarios, including everyday access control systems and IoT applications. With growing concerns about personal privacy, ensuring user anonymity has [...] Read more.
User authentication verifies the legitimacy of users and prevents service providers from offering services to unauthorized parties. The concept is widely applied in various scenarios, including everyday access control systems and IoT applications. With growing concerns about personal privacy, ensuring user anonymity has become increasingly important. In addition to privacy, user convenience is also a key factor influencing the willingness to adopt a system. To address these concerns, we propose a user authentication scheme that ensures personal privacy. The system consists of a backend server, multiple users, and multiple control units. Each user is issued or equipped with an authentication unit. An authorized user can be authenticated by a control unit, with assistance from the backend server, without revealing their identity to the control unit. The scheme is suitable for applications requiring privacy-preserving authentication. Furthermore, to enhance generality, the proposed design ensures computational efficiency and allows the authentication unit to adapt to specific application requirements. Full article
26 pages, 3844 KiB  
Article
A No-Code Educational Platform for Introducing Internet of Things and Its Application to Agricultural Education
by George Lagogiannis and Avraam Chatzopoulos
IoT 2025, 6(3), 42; https://doi.org/10.3390/iot6030042 (registering DOI) - 31 Jul 2025
Viewed by 134
Abstract
This study introduces a no-code educational platform created to introduce Internet of Things (IoT) to university students who lack programming experience. The platform allows users to set IoT sensor nodes, and create a wireless sensor network through a simple graphical interface. Sensors’ data [...] Read more.
This study introduces a no-code educational platform created to introduce Internet of Things (IoT) to university students who lack programming experience. The platform allows users to set IoT sensor nodes, and create a wireless sensor network through a simple graphical interface. Sensors’ data can be sent to cloud services but they can also be stored locally, which makes our platform particularly realistic in fieldwork settings where internet access may be limited. The platform was tested in a pilot activity within a university course that previously covered IoT only in theory and was evaluated using the Technology Acceptance Model (TAM). Results showed strong student engagement and high ratings for ease of use, usefulness, and future use intent. These findings suggest that a no-code approach can effectively bridge the gap between IoT technologies and learners in non-engineering fields. Full article
Show Figures

Figure 1

19 pages, 4397 KiB  
Article
Thermal History-Dependent Deformation of Polycarbonate: Experimental and Modeling Insights
by Maoyuan Li, Haitao Wang, Guancheng Shen, Tianlun Huang and Yun Zhang
Polymers 2025, 17(15), 2096; https://doi.org/10.3390/polym17152096 - 30 Jul 2025
Viewed by 178
Abstract
The deformation behavior of polymers is influenced not only by service conditions such as temperature and the strain rate but also significantly by the formation process. However, existing simulation frameworks typically treat injection molding and the in-service mechanical response separately, making it difficult [...] Read more.
The deformation behavior of polymers is influenced not only by service conditions such as temperature and the strain rate but also significantly by the formation process. However, existing simulation frameworks typically treat injection molding and the in-service mechanical response separately, making it difficult to capture the impact of the thermal history on large deformation behavior. In this study, the deformation behavior of injection-molded polycarbonate (PC) was investigated by accounting for its thermal history during formation, achieved through combined experimental characterization and constitutive modeling. PC specimens were prepared via injection molding followed by annealing at different molding/annealing temperatures and durations. Uniaxial tensile tests were conducted using a Zwick universal testing machine at strain rates of 10−3–10−1 s−1 and temperatures ranging from 293 K to 353 K to obtain stress–strain curves. The effects of the strain rate, testing temperature, and annealing conditions were thoroughly examined. Building upon a previously proposed phenomenological model, a new constitutive framework incorporating thermal history effects during formation was developed to characterize the large deformation behavior of PC. This model was implemented in ABAQUS/Explicit using a user-defined material subroutine. Predicted stress–strain curves exhibit excellent agreement with the experimental data, accurately reproducing elastic behavior, yield phenomena, and strain-softening and strain-hardening stages. Full article
Show Figures

Figure 1

Back to TopTop