Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (231)

Search Parameters:
Keywords = software-defined infrastructures

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
34 pages, 7175 KB  
Article
Hybrid Unsupervised–Supervised Learning Framework for Rainfall Prediction Using Satellite Signal Strength Attenuation
by Popphon Laon, Tanawit Sahavisit, Supavee Pourbunthidkul, Sarut Puangragsa, Pattharin Wichittrakarn, Pattarapong Phasukkit and Nongluck Houngkamhang
Sensors 2026, 26(2), 648; https://doi.org/10.3390/s26020648 - 18 Jan 2026
Viewed by 224
Abstract
Satellite communication systems experience significant signal degradation during rain events, a phenomenon that can be leveraged for meteorological applications. This study introduces a novel hybrid machine learning framework combining unsupervised clustering with cluster-specific supervised deep learning models to transform satellite signal attenuation into [...] Read more.
Satellite communication systems experience significant signal degradation during rain events, a phenomenon that can be leveraged for meteorological applications. This study introduces a novel hybrid machine learning framework combining unsupervised clustering with cluster-specific supervised deep learning models to transform satellite signal attenuation into a predictive tool for rainfall prediction. Unlike conventional single-model approaches treating all atmospheric conditions uniformly, our methodology employs K-Means Clustering with the Elbow Method to identify four distinct atmospheric regimes based on Signal-to-Noise Ratio (SNR) patterns from a 12-m Ku-band satellite ground station at King Mongkut’s Institute of Technology Ladkrabang (KMITL), Bangkok, Thailand, combined with absolute pressure and hourly rainfall measurements. The dataset comprises 98,483 observations collected with 30-s temporal resolutions, providing comprehensive coverage of diverse tropical atmospheric conditions. The experimental platform integrates three subsystems: a receiver chain featuring a Low-Noise Block (LNB) converter and Software-Defined Radio (SDR) platform for real-time data acquisition; a control system with two-axis motorized pointing incorporating dual-encoder feedback; and a preprocessing workflow implementing data cleaning, K-Means Clustering (k = 4), Synthetic Minority Over-Sampling Technique (SMOTE) for balanced representation, and standardization. Specialized Long Short-Term Memory (LSTM) networks trained for each identified cluster enable capture of regime-specific temporal dynamics. Experimental validation demonstrates substantial performance improvements, with cluster-specific LSTM models achieving R2 values exceeding 0.92 across all atmospheric regimes. Comparative analysis confirms LSTM superiority over RNN and GRU. Classification performance evaluation reveals exceptional detection capabilities with Probability of Detection ranging from 0.75 to 0.99 and False Alarm Ratios below 0.23. This work presents a scalable approach to weather radar systems for tropical regions with limited ground-based infrastructure, particularly during rapid meteorological transitions characteristic of tropical climates. Full article
Show Figures

Figure 1

23 pages, 2226 KB  
Article
Dynamic Predictive Feedback Mechanism for Intelligent Bandwidth Control in Future SDN Networks
by Kritsanapong Somsuk, Suchart Khummanee and Panida Songram
Network 2025, 5(4), 54; https://doi.org/10.3390/network5040054 - 12 Dec 2025
Viewed by 456
Abstract
Future programmable networks such as 5G/6G and large-scale IoT deployments demand dynamic and intelligent bandwidth control mechanisms to ensure stable Quality of Service (QoS) under highly variable traffic conditions. Conventional queue-based schedulers and emerging machine learning techniques still struggle with slow reaction to [...] Read more.
Future programmable networks such as 5G/6G and large-scale IoT deployments demand dynamic and intelligent bandwidth control mechanisms to ensure stable Quality of Service (QoS) under highly variable traffic conditions. Conventional queue-based schedulers and emerging machine learning techniques still struggle with slow reaction to congestion, unstable fairness, and high computational costs. To address these challenges, this paper proposes a Dynamic Predictive Feedback (DPF) mechanism that integrates clustered-LSTM based short-term traffic prediction with meta-control driven adaptive bandwidth adjustment in a Software-Defined Networking (SDN) architecture. The prediction module proactively estimates future queue depth and arrival rates using in-band network telemetry (INT), while the feedback controller continuously adjusts scheduling weights based on congestion risk and fairness metrics. Extensive emulation experiments conducted under Static, Bursty IoT, Mixed, and Stress workloads show that DPF consistently outperforms state-of-the-art solutions, including A-WFQ and DRL-based schedulers, achieving up to 32% higher throughput, up to 40% lower latency, and 10–12% lower CPU and memory usage. Moreover, DPF demonstrates strong fairness (Jain’s Index ≥ 0.96), high adaptability, and minimal performance variance across scenarios. These results confirm that DPF is a scalable and resource-efficient solution capable of supporting the demands of future programmable, 5G/6G-ready network infrastructures. Full article
Show Figures

Figure 1

62 pages, 2365 KB  
Review
Securing the SDN Data Plane in Emerging Technology Domains: A Review
by Travis Quinn, Faycal Bouhafs and Frank den Hartog
Future Internet 2025, 17(11), 503; https://doi.org/10.3390/fi17110503 - 3 Nov 2025
Viewed by 2104
Abstract
Over the last decade, Software-Defined Networking (SDN) has garnered increasing research interest for networking and security. This interest stems from the programmability and dynamicity offered by SDN, as well as the growing importance of SDN as a foundational technology of future telecommunications networks [...] Read more.
Over the last decade, Software-Defined Networking (SDN) has garnered increasing research interest for networking and security. This interest stems from the programmability and dynamicity offered by SDN, as well as the growing importance of SDN as a foundational technology of future telecommunications networks and the greater Internet. However, research into SDN security has focused disproportionately on the security of the control plane, resulting in the relative trivialization of data plane security methods and a corresponding lack of appreciation of the data plane in SDN security discourse. To remedy this, this paper provides a comprehensive review of SDN data plane security research, classified into three primary research domains and several sub-domains. The three primary research domains are as follows: security capabilities within the data plane, security of the SDN infrastructure, and dynamic routing within the data plane. Our work resulted in the identification of specific strengths and weaknesses in existing research, as well as promising future directions, based on novelty and overlap with emerging technology domains. The most striking future directions are the use of hybrid SDN architectures leveraging a programmable data plane, SDN for heterogeneous network security, and the development of trust-based methods for SDN management and security, including trust-based routing. Full article
Show Figures

Figure 1

33 pages, 1134 KB  
Review
A Comprehensive Review of DDoS Detection and Mitigation in SDN Environments: Machine Learning, Deep Learning, and Federated Learning Perspectives
by Sidra Batool, Muhammad Aslam, Edore Akpokodje and Syeda Fizzah Jilani
Electronics 2025, 14(21), 4222; https://doi.org/10.3390/electronics14214222 - 29 Oct 2025
Viewed by 4559
Abstract
Software-defined networking (SDN) has reformed the traditional approach to managing and configuring networks by isolating the data plane from control plane. This isolation helps enable centralized control over network resources, enhanced programmability, and the ability to dynamically apply and enforce security and traffic [...] Read more.
Software-defined networking (SDN) has reformed the traditional approach to managing and configuring networks by isolating the data plane from control plane. This isolation helps enable centralized control over network resources, enhanced programmability, and the ability to dynamically apply and enforce security and traffic policies. The shift in architecture offers numerous advantages such as increased flexibility, scalability, and improved network management but also introduces new and notable security challenges such as Distributed Denial-of-Service (DDoS) attacks. Such attacks focus on affecting the target with malicious traffic and even short-lived DDoS incidents can drastically impact the entire network’s stability, performance and availability. This comprehensive review paper provides a detailed investigation of SDN principles, the nature of DDoS threats in such environments and the strategies used to detect/mitigate these attacks. It provides novelty by offering an in-depth categorization of state-of-the-art detection techniques, utilizing machine learning, deep learning, and federated learning in domain-specific and general-purpose SDN scenarios. Each method is analyzed for its effectiveness. The paper further evaluates the strengths and weaknesses of these techniques, highlighting their applicability in different SDN contexts. In addition, the paper outlines the key performance metrics used in evaluating these detection mechanisms. Moreover, the novelty of the study is classifying the datasets commonly used for training and validating DDoS detection models into two major categories: legacy-compatible datasets that are adapted from traditional network environments, and SDN-contextual datasets that are specifically generated to reflect the characteristics of modern SDN systems. Finally, the paper suggests a few directions for future research. These include enhancing the robustness of detection models, integrating privacy-preserving techniques in collaborative learning, and developing more comprehensive and realistic SDN-specific datasets to improve the strength of SDN infrastructures against DDoS threats. Full article
Show Figures

Figure 1

40 pages, 11569 KB  
Review
MEC and SDN Enabling Technologies, Design Challenges, and Future Directions of Tactile Internet and Immersive Communications
by Shahd Thabet, Abdelhamied A. Ateya, Mohammed ElAffendi and Mohammed Abo-Zahhad
Future Internet 2025, 17(11), 494; https://doi.org/10.3390/fi17110494 - 28 Oct 2025
Viewed by 1414
Abstract
Tactile Internet (TI) is an innovative paradigm for emerging generations of communication systems that support ultra-low latency and highly robust transmission of haptics, actuation, and immersive communication in real time. It is considered a critical facilitator for remote surgery, industrial automation, and extended [...] Read more.
Tactile Internet (TI) is an innovative paradigm for emerging generations of communication systems that support ultra-low latency and highly robust transmission of haptics, actuation, and immersive communication in real time. It is considered a critical facilitator for remote surgery, industrial automation, and extended reality (XR). Originally intended as a flagship application for the fifth-generation (5G) networks, their strict constraints, especially the one-millisecond end-to-end latency, ultra-high reliability, and seamless adaptation, present formidable challenges. These challenges are the bottleneck for evolution to sixth-generation (6G) networks; thus, new architects and technologies are urgently required. This survey systematically discusses the most important underlying technologies for TI and immersive communications. It especially highlights using software-defined networking (SDN) and edge intelligence (EI) as enabling technologies. SDN improves the programmability, adaptability, and dynamic control of network infrastructures. In contrast, EI exploits intelligence-based artificial intelligence (AI)-driven decision-making at the network edge for latency optimization, resource usage, and service offering. Moreover, this work describes other enabling technologies, including network function virtualization (NFV), digital twin, quantum computing, and blockchain. Furthermore, the work investigates the recent achievements and studies in which SDN and EI are combined in TI and presents their effect on latency reduction, optimum network utilization, and service stability. A comparison of several State-of-the-Art methods is performed to determine present limitations and gaps. Finally, the work provides open research problems and future trends, focusing on the importance of intelligent, autonomous, and scalable network topologies for defining the paradigm of TI and immersive communication systems. Full article
Show Figures

Figure 1

24 pages, 468 KB  
Article
Mining User Perspectives: Multi Case Study Analysis of Data Quality Characteristics
by Minnu Malieckal and Anjula Gurtoo
Information 2025, 16(10), 920; https://doi.org/10.3390/info16100920 - 21 Oct 2025
Viewed by 937
Abstract
With the growth of digital economies, data quality forms a key factor in enabling use and delivering value. Existing research defines quality through technical benchmarks or provider-led frameworks. Our study shifts the focus to actual users. Thirty-seven distinct data quality dimensions identified through [...] Read more.
With the growth of digital economies, data quality forms a key factor in enabling use and delivering value. Existing research defines quality through technical benchmarks or provider-led frameworks. Our study shifts the focus to actual users. Thirty-seven distinct data quality dimensions identified through a comprehensive review of the literature provide limited applicability for practitioners seeking actionable guidance. To address the gap, in-depth interviews of senior professionals from 25 organizations were conducted, representing sectors like computer science and technology, finance, environmental, social, and governance, and urban infrastructure. Data are analysed using content analysis methodology, with 2 level coding, supported by NVivo R1 software. Several newer perspectives emerged. Firstly, data quality is not simply about accuracy or completeness, rather it depends on suitability for real-world tasks. Secondly, trust grows with data transparency. Knowing where the data comes from and the nature of data processing matters as much as the data per se. Thirdly, users are open to paying for data, provided the data is clean, reliable, and ready to use. These and other results suggest data users focus on a narrower, more practical set of priorities, considered essential in actual workflows. Rethinking quality from a consumer’s perspective offers a practical path to building credible and accessible data ecosystems. This study is particularly useful for data platform designers, policymakers, and organisations aiming to strengthen data quality and trust in data exchange ecosystems. Full article
Show Figures

Graphical abstract

33 pages, 936 KB  
Review
Analysis of SD-WAN Architectures and Techniques for Efficient Traffic Control Under Transmission Constraints—Overview of Solutions
by Janusz Dudczyk, Mateusz Sergiel and Jaroslaw Krygier
Sensors 2025, 25(20), 6317; https://doi.org/10.3390/s25206317 - 13 Oct 2025
Viewed by 3203
Abstract
Software-Defined Wide Area Networks (SD-WAN) have emerged as a rapidly evolving technology designed to meet the growing demand for flexible, secure, and scalable network infrastructures. This paper provides a review of SD-WAN techniques, focusing on their principles of operation, mechanisms, and evolution, with [...] Read more.
Software-Defined Wide Area Networks (SD-WAN) have emerged as a rapidly evolving technology designed to meet the growing demand for flexible, secure, and scalable network infrastructures. This paper provides a review of SD-WAN techniques, focusing on their principles of operation, mechanisms, and evolution, with particular attention to applications in resource-constrained environments such as mobile, satellite, and radio networks. The analysis highlights key architectural elements, including security mechanisms, monitoring methods and metrics, and management protocols. A classification of both commercial (e.g., Cisco SD-WAN, Fortinet Secure SD-WAN, VMware SD-WAN, Palo Alto Prisma SD-WAN, HPE Aruba EdgeConnect) and research-based solutions is presented. The overview covers overlay protocols such as Overlay Management Protocol (OMP), Dynamic Multipath Optimization (DMPO), App-ID, OpenFlow, and NETCONF, as well as tunneling mechanisms such as IPsec and WireGuard. The discussion further covers control plane architectures (centralized, distributed, and hybrid) and network monitoring methods, including latency, jitter, and packet loss measurement. The growing importance of Artificial Intelligence (AI) in optimizing path selection and improving threat detection in SD-WAN environments, especially in resource-constrained networks, is emphasized. Analysis of solutions indicates that SD-WAN improves performance, reduces latency, and lowers operating costs compared to traditional WAN architectures. The paper concludes with guidelines and recommendations for using SD-WAN in resource-constrained environments. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

28 pages, 6310 KB  
Article
UAV Equipped with SDR-Based Doppler Localization Sensor for Positioning Tactical Radios
by Kacper Bednarz, Jarosław Wojtuń, Rafał Szczepanik and Jan M. Kelner
Drones 2025, 9(10), 698; https://doi.org/10.3390/drones9100698 - 11 Oct 2025
Viewed by 1328
Abstract
The accurate localization of radio frequency (RF) emitters plays a critical role in spectrum monitoring, public safety, and defense applications, particularly in environments where global navigation satellite systems are limited. This study investigates the feasibility of a single unmanned aerial vehicle (UAV) equipped [...] Read more.
The accurate localization of radio frequency (RF) emitters plays a critical role in spectrum monitoring, public safety, and defense applications, particularly in environments where global navigation satellite systems are limited. This study investigates the feasibility of a single unmanned aerial vehicle (UAV) equipped with a Doppler-based software-defined radio sensor to localize modern RF sources without the need for external infrastructure or multiple UAVs. A custom-designed localization system was developed and tested using the L3Harris AN/PRC-152A tactical radio, which represents a class of real-world, dual-use emitters with lower frequency stability than laboratory signal generators. The approach was validated through both emulation studies and extensive field experiments under realistic conditions. The results show that the proposed system can localize RF emitters with an average error below 50 m in 80% of cases even when the transmitter is more than 600 m away. Performance was evaluated across different carrier frequencies and acquisition times, demonstrating the influence of signal parameters on localization accuracy. These findings confirm the practical applicability of Doppler-based single-UAV localization methods and provide a foundation for further development of lightweight, autonomous RF emitter tracking systems for critical infrastructure protection, spectrum analysis, and tactical operations. Full article
Show Figures

Figure 1

32 pages, 8611 KB  
Article
Softwarized Edge Intelligence for Advanced IIoT Ecosystems: A Data-Driven Architecture Across the Cloud/Edge Continuum
by David Carrascal, Javier Díaz-Fuentes, Nicolas Manso, Diego Lopez-Pajares, Elisa Rojas, Marco Savi and Jose M. Arco
Appl. Sci. 2025, 15(19), 10829; https://doi.org/10.3390/app151910829 - 9 Oct 2025
Viewed by 1223
Abstract
The evolution of Industrial Internet of Things (IIoT) systems demands flexible and intelligent architectures capable of addressing low-latency requirements, real-time analytics, and adaptive resource management. In this context, softwarized edge computing emerges as a key enabler, supporting advanced IoT deployments through programmable infrastructures, [...] Read more.
The evolution of Industrial Internet of Things (IIoT) systems demands flexible and intelligent architectures capable of addressing low-latency requirements, real-time analytics, and adaptive resource management. In this context, softwarized edge computing emerges as a key enabler, supporting advanced IoT deployments through programmable infrastructures, distributed intelligence, and seamless integration with cloud environments. This paper presents an extended and publicly available proof of concept (PoC) for a softwarized, data-driven architecture designed to operate across the cloud/edge/IoT continuum. The proposed architecture incorporates containerized microservices, open standards, and ML-based inference services to enable runtime decision-making and on-the-fly network reconfiguration based on real-time telemetry from IIoT nodes. Unlike traditional solutions, our approach leverages a modular control plane capable of triggering dynamic adaptations in the system through RESTful communication with a cloud-hosted inference engine, thus enhancing responsiveness and autonomy. We evaluate the system in representative IIoT scenarios involving multi-agent collaboration, showcasing its ability to process data at the edge, minimize latency, and support real-time decision-making. This work contributes to the ongoing efforts toward building advanced IoT ecosystems by bridging conceptual designs and practical implementations, offering a robust foundation for future research and deployment in intelligent, software-defined industrial environments. Full article
Show Figures

Figure 1

13 pages, 3043 KB  
Article
Secure Virtual Network Provisioning over Key Programmable Optical Networks
by Xiaoyu Wang, Hao Jiang, Jianwei Li and Zhonghua Liang
Entropy 2025, 27(10), 1042; https://doi.org/10.3390/e27101042 - 7 Oct 2025
Viewed by 416
Abstract
Virtual networks have emerged as a promising solution for enabling diverse users to efficiently share bandwidth resources over optical network infrastructures. Despite the invention of various schemes aimed at ensuring secure isolation among virtual networks, the security of data transfer in virtual networks [...] Read more.
Virtual networks have emerged as a promising solution for enabling diverse users to efficiently share bandwidth resources over optical network infrastructures. Despite the invention of various schemes aimed at ensuring secure isolation among virtual networks, the security of data transfer in virtual networks remains a challenging problem. To address this challenge, the concept of evolving traditional optical networks into key programmable optical networks (KPONs) has been proposed. Inspired by this, this paper delves into the establishment of secure virtual networks over KPONs, in which the information-theoretically secure keys can be supplied for ensuring the information-theoretic security of data transfer within virtual networks. A layered architecture for secure virtual network provisioning over KPONs is proposed, which leverages software-defined networking to realize the programmable control of optical-layer resources. With this architecture, a heuristic algorithm, i.e., the key adaptation-based secure virtual network provisioning (KA-SVNP) algorithm, is designed to dynamically allocate key resources based on the adaption between the key supply and key demand. To evaluate the proposed solutions, an emulation testbed is established, achieving millisecond latencies for secure virtual network establishment and deletion. Moreover, numerical simulations indicate that the designed KA-SVNP algorithm performs superior to the benchmark algorithm in terms of the success probability of secure virtual network requests. Full article
(This article belongs to the Special Issue Secure Network Ecosystems in the Quantum Era)
Show Figures

Figure 1

19 pages, 2205 KB  
Article
Final Implementation and Performance of the Cheia Space Object Tracking Radar
by Călin Bîră, Liviu Ionescu and Radu Hobincu
Remote Sens. 2025, 17(19), 3322; https://doi.org/10.3390/rs17193322 - 28 Sep 2025
Viewed by 785
Abstract
This paper presents the final implemented design and performance evaluation of the ground-based C-band Cheia radar system, developed to enhance Romania’s contribution to the EU Space Surveillance and Tracking (EU SST) network. All data used for performance analysis are real-time, real-life measurements of [...] Read more.
This paper presents the final implemented design and performance evaluation of the ground-based C-band Cheia radar system, developed to enhance Romania’s contribution to the EU Space Surveillance and Tracking (EU SST) network. All data used for performance analysis are real-time, real-life measurements of true spatial test objects orbiting Earth. The radar is based on two decommissioned 32 m satellite communication antennas already present at the Cheia Satellite Communication Center, that were retrofitted for radar operation in a quasi-monostatic architecture. A Linear Frequency Modulated Continuous Wave (LFMCW) Radar design was implemented, using low transmitted power (2.5 kW) and advanced software-defined signal processing for detection and tracking of Low Earth Orbit (LEO) targets. System validation involved dry-run acceptance tests and calibration campaigns with known reference satellites. The radar demonstrated accurate measurements of range, Doppler velocity, and angular coordinates, with the capability to detect objects with radar cross-sections as low as 0.03 m2 at slant ranges up to 1200 km. Tracking of medium and large Radar Cross Section (RCS) targets remained robust under both fair and adverse weather conditions. This work highlights the feasibility of re-purposing legacy satellite infrastructure for SST applications. The Cheia radar provides a cost-effective, EUSST-compliant performance solution using primarily commercial off-the-shelf components. The system strengthens the EU SST network while demonstrating the advantages of LFMCW radar architectures in electromagnetically congested environments. Full article
Show Figures

Figure 1

20 pages, 3944 KB  
Article
Performance Analysis and Security Preservation of DSRC in V2X Networks
by Muhammad Saad Sohail, Giancarlo Portomauro, Giovanni Battista Gaggero, Fabio Patrone and Mario Marchese
Electronics 2025, 14(19), 3786; https://doi.org/10.3390/electronics14193786 - 24 Sep 2025
Cited by 1 | Viewed by 1526
Abstract
Protecting communications within vehicular networks is of paramount importance, particularly when data are transmitted using wireless ad-hoc technologies such as Dedicated Short-Range Communications (DSRC). Vulnerabilities in Vehicle-to-Everything (V2X) communications, especially along highways, pose significant risks, such as unauthorized interception or alteration of vehicle [...] Read more.
Protecting communications within vehicular networks is of paramount importance, particularly when data are transmitted using wireless ad-hoc technologies such as Dedicated Short-Range Communications (DSRC). Vulnerabilities in Vehicle-to-Everything (V2X) communications, especially along highways, pose significant risks, such as unauthorized interception or alteration of vehicle data. This study proposes a Software-Defined Radio (SDR)-based tool designed to assess the protection level of V2X communication systems against cyber attacks. The proposed tool can emulate both reception and transmission of IEEE 802.11p packets while testing DSRC implementation and robustness. The results of this investigation offer valuable contributions toward shaping cybersecurity strategies and frameworks designed to protect the integrity of Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communications. Full article
(This article belongs to the Special Issue Computer Networking Security and Privacy)
Show Figures

Figure 1

28 pages, 3252 KB  
Article
Toward Secure SDN Infrastructure in Smart Cities: Kafka-Enabled Machine Learning Framework for Anomaly Detection
by Gayathri Karthick, Glenford Mapp and Jon Crowcroft
Future Internet 2025, 17(9), 415; https://doi.org/10.3390/fi17090415 - 11 Sep 2025
Viewed by 943
Abstract
As smart cities evolve, the demand for real-time, secure, and adaptive network monitoring, continues to grow. Software-Defined Networking (SDN) offers a centralized approach to managing network flows; However, anomaly detection within SDN environments remains a significant challenge, particularly at the intelligent edge. This [...] Read more.
As smart cities evolve, the demand for real-time, secure, and adaptive network monitoring, continues to grow. Software-Defined Networking (SDN) offers a centralized approach to managing network flows; However, anomaly detection within SDN environments remains a significant challenge, particularly at the intelligent edge. This paper presents a conceptual Kafka-enabled ML framework for scalable, real-time analytics in SDN environments, supported by offline evaluation and a prototype streaming demonstration. A range of supervised ML models covering traditional methods and ensemble approaches (Random Forest, Linear Regression & XGBoost) were trained and validated using the InSDN intrusion detection dataset. These models were tested against multiple cyber threats, including botnets, dos, ddos, network reconnaissance, brute force, and web attacks, achieving up to 99% accuracy for ensemble classifiers under offline conditions. A Dockerized prototype demonstrates Kafka’s role in offline data ingestion, processing, and visualization through PostgreSQL and Grafana. While full ML pipeline integration into Kafka remains part of future work, the proposed architecture establishes a foundation for secure and intelligent Software-Defined Vehicular Networking (SDVN) infrastructure in smart cities. Full article
Show Figures

Figure 1

25 pages, 828 KB  
Article
Multi-Criteria Evaluation of Transportation Management System (TMS) Software: A Bayesian Best–Worst and TOPSIS Approach
by Cengiz Kerem Kütahya, Bükra Doğaner Duman and Gültekin Altuntaş
Sustainability 2025, 17(17), 7691; https://doi.org/10.3390/su17177691 - 26 Aug 2025
Viewed by 2907
Abstract
Transportation Management Systems (TMSs) play a pivotal role in streamlining logistics operations, yet selecting the most suitable TMS software remains a complex, multi-criteria decision-making problem. This study introduces a hybrid evaluation framework combining the Bayesian Best–Worst Method (BBWM) and TOPSIS to identify, weigh, [...] Read more.
Transportation Management Systems (TMSs) play a pivotal role in streamlining logistics operations, yet selecting the most suitable TMS software remains a complex, multi-criteria decision-making problem. This study introduces a hybrid evaluation framework combining the Bayesian Best–Worst Method (BBWM) and TOPSIS to identify, weigh, and rank software selection criteria tailored to the logistics business. Drawing on insights from 13 logistics experts, five main criteria—technological competence, service, functionality, cost, and software developer (vendor)—and 16 detailed sub-criteria are defined to reflect business-specific needs. The core novelty of this research lies in its systematic weighting of TMS software criteria using the BBWM, offering robust and expert-driven priority insights for decision makers. Results show that functionality (26.6%), particularly load tracking (35.8%) and cost (22.7%), mainly software license cost (39.8%), are the dominant decision factors. Beyond operational optimization, this study positions TMS software selection as a strategic entry point for sustainable digital transformation in logistics. The proposed framework empowers business to align digital infrastructure choices with sustainability goals such as emissions reduction, energy efficiency, and intelligent resource planning. Applying TOPSIS to a real-world case in Türkiye, this study ranks software alternatives, with “ABC” emerging as the most favorable solution (57.2%). This paper contributes a replicable and adaptable model for TMS software evaluation, grounded in business practice and advanced decision science. Full article
Show Figures

Figure 1

25 pages, 1757 KB  
Article
System Model for Spatial Data Collection in Post-War Transport Infrastructure Planning
by Anatoliy Tryhuba, Szymon Glowacki, Oleg Zachko, Inna Tryhuba, Sergii Slobodian, Vasyl Demchyna, Iryna Horetska and Taras Hutsol
Sustainability 2025, 17(17), 7676; https://doi.org/10.3390/su17177676 - 26 Aug 2025
Viewed by 1200
Abstract
This study presents a system model developed for collecting and analyzing spatial data on the project environment of transport infrastructure development in the post-war context, with a focus on supporting sustainable management and recovery planning. The model utilizes the OpenStreetMap Overpass Application Programming [...] Read more.
This study presents a system model developed for collecting and analyzing spatial data on the project environment of transport infrastructure development in the post-war context, with a focus on supporting sustainable management and recovery planning. The model utilizes the OpenStreetMap Overpass Application Programming Interface (Overpass API) to extract structured geospatial information from OpenStreetMap (OSM), enabling efficient and accurate assessments of settlements affected by armed conflict. Python 3.11-based software modules were created to process OSM data, evaluate 17 relevant attributes of transport infrastructure objects, and visualize key characteristics for decision-makers. A case study was conducted on 23 Ukrainian settlements with partially damaged infrastructure, demonstrating how the proposed model facilitates timely and informed decisions for infrastructure redevelopment. By improving the accessibility and quality of spatial data, the model enhances the capacity for sustainable management of post-war transport infrastructure projects. To ensure the quality of spatial data obtained from OSM, a verification procedure was carried out by cross-checking with satellite images and official national geospatial data. The results showed an average deviation of ±4.4% in the length of road sections, confirming the reliability and accuracy of spatial objects obtained from OSM for use in transport infrastructure planning. The findings offer valuable insights for regional planners, public administrators, and policymakers involved in sustainable reconstruction and digital governance. Future research will focus on developing a comprehensive information system for identifying and prioritizing infrastructure development projects within defined administrative units such as municipalities and local communities. Full article
Show Figures

Figure 1

Back to TopTop