Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,608)

Search Parameters:
Keywords = transportation security

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
26 pages, 2459 KiB  
Article
Urban Agriculture for Post-Disaster Food Security: Quantifying the Contributions of Community Gardens
by Yanxin Liu, Victoria Chanse and Fabricio Chicca
Urban Sci. 2025, 9(8), 305; https://doi.org/10.3390/urbansci9080305 - 5 Aug 2025
Abstract
Wellington, New Zealand, is highly vulnerable to disaster-induced food security crises due to its geography and geological characteristics, which can disrupt transportation and isolate the city following disasters. Urban agriculture (UA) has been proposed as a potential alternative food source for post-disaster scenarios. [...] Read more.
Wellington, New Zealand, is highly vulnerable to disaster-induced food security crises due to its geography and geological characteristics, which can disrupt transportation and isolate the city following disasters. Urban agriculture (UA) has been proposed as a potential alternative food source for post-disaster scenarios. This study examined the potential of urban agriculture for enhancing post-disaster food security by calculating vegetable self-sufficiency rates. Specifically, it evaluated the capacity of current Wellington’s community gardens to meet post-disaster vegetable demand in terms of both weight and nutrient content. Data collection employed mixed methods with questionnaires, on-site observations and mapping, and collecting high-resolution aerial imagery. Garden yields were estimated using self-reported data supported by literature benchmarks, while cultivated areas were quantified through on-site mapping and aerial imagery analysis. Six post-disaster food demand scenarios were used based on different target populations to develop an understanding of the range of potential produce yields. Weight-based results show that community gardens currently supply only 0.42% of the vegetable demand for residents living within a five-minute walk. This rate increased to 2.07% when specifically targeting only vulnerable populations, and up to 10.41% when focusing on gardeners’ own households. However, at the city-wide level, the current capacity of community gardens to provide enough produce to feed people remained limited. Nutrient-based self-sufficiency was lower than weight-based results; however, nutrient intake is particularly critical for vulnerable populations after disasters, underscoring the greater challenge of ensuring adequate nutrition through current urban food production. Beyond self-sufficiency, this study also addressed the role of UA in promoting food diversity and acceptability, as well as its social and psychological benefits based on the questionnaires and on-site observations. The findings indicate that community gardens contribute meaningfully to post-disaster food security for gardeners and nearby residents, particularly for vulnerable groups with elevated nutritional needs. Despite the current limited capacity of community gardens to provide enough produce to feed residents, findings suggest that Wellington could enhance post-disaster food self-reliance by diversifying UA types and optimizing land-use to increase food production during and after a disaster. Realizing this potential will require strategic interventions, including supportive policies, a conducive social environment, and diversification—such as the including private yards—all aimed at improving food access, availability, and nutritional quality during crises. The primary limitation of this study is the lack of comprehensive data on urban agriculture in Wellington and the wider New Zealand context. Addressing this data gap should be a key focus for future research to enable more robust assessments and evidence-based planning. Full article
Show Figures

Figure 1

32 pages, 1986 KiB  
Article
Machine Learning-Based Blockchain Technology for Secure V2X Communication: Open Challenges and Solutions
by Yonas Teweldemedhin Gebrezgiher, Sekione Reward Jeremiah, Xianjun Deng and Jong Hyuk Park
Sensors 2025, 25(15), 4793; https://doi.org/10.3390/s25154793 - 4 Aug 2025
Abstract
Vehicle-to-everything (V2X) communication is a fundamental technology in the development of intelligent transportation systems, encompassing vehicle-to-vehicle (V2V), infrastructure (V2I), and pedestrian (V2P) communications. This technology enables connected and autonomous vehicles (CAVs) to interact with their surroundings, significantly enhancing road safety, traffic efficiency, and [...] Read more.
Vehicle-to-everything (V2X) communication is a fundamental technology in the development of intelligent transportation systems, encompassing vehicle-to-vehicle (V2V), infrastructure (V2I), and pedestrian (V2P) communications. This technology enables connected and autonomous vehicles (CAVs) to interact with their surroundings, significantly enhancing road safety, traffic efficiency, and driving comfort. However, as V2X communication becomes more widespread, it becomes a prime target for adversarial and persistent cyberattacks, posing significant threats to the security and privacy of CAVs. These challenges are compounded by the dynamic nature of vehicular networks and the stringent requirements for real-time data processing and decision-making. Much research is on using novel technologies such as machine learning, blockchain, and cryptography to secure V2X communications. Our survey highlights the security challenges faced by V2X communications and assesses current ML and blockchain-based solutions, revealing significant gaps and opportunities for improvement. Specifically, our survey focuses on studies integrating ML, blockchain, and multi-access edge computing (MEC) for low latency, robust, and dynamic security in V2X networks. Based on our findings, we outline a conceptual framework that synergizes ML, blockchain, and MEC to address some of the identified security challenges. This integrated framework demonstrates the potential for real-time anomaly detection, decentralized data sharing, and enhanced system scalability. The survey concludes by identifying future research directions and outlining the remaining challenges for securing V2X communications in the face of evolving threats. Full article
(This article belongs to the Section Vehicular Sensing)
Show Figures

Figure 1

28 pages, 1328 KiB  
Review
Security Issues in IoT-Based Wireless Sensor Networks: Classifications and Solutions
by Dung T. Nguyen, Mien L. Trinh, Minh T. Nguyen, Thang C. Vu, Tao V. Nguyen, Long Q. Dinh and Mui D. Nguyen
Future Internet 2025, 17(8), 350; https://doi.org/10.3390/fi17080350 - 1 Aug 2025
Viewed by 205
Abstract
In recent years, the Internet of Things (IoT) has experienced considerable developments and has played an important role in various domains such as industry, agriculture, healthcare, transportation, and environment, especially for smart cities. Along with that, wireless sensor networks (WSNs) are considered to [...] Read more.
In recent years, the Internet of Things (IoT) has experienced considerable developments and has played an important role in various domains such as industry, agriculture, healthcare, transportation, and environment, especially for smart cities. Along with that, wireless sensor networks (WSNs) are considered to be important components of the IoT system (WSN-IoT) to create smart applications and automate processes. As the number of connected IoT devices increases, privacy and security issues become more complicated due to their external working environments and limited resources. Hence, solutions need to be updated to ensure that data and user privacy are protected from threats and attacks. To support the safety and reliability of such systems, in this paper, security issues in the WSN-IoT are addressed and classified as identifying security challenges and requirements for different kinds of attacks in either WSNs or IoT systems. In addition, security solutions corresponding to different types of attacks are provided, analyzed, and evaluated. We provide different comparisons and classifications based on specific goals and applications that hopefully can suggest suitable solutions for specific purposes in practical. We also suggest some research directions to support new security mechanisms. Full article
Show Figures

Figure 1

24 pages, 650 KiB  
Article
Investigating Users’ Acceptance of Autonomous Buses by Examining Their Willingness to Use and Willingness to Pay: The Case of the City of Trikala, Greece
by Spyros Niavis, Nikolaos Gavanas, Konstantina Anastasiadou and Paschalis Arvanitidis
Urban Sci. 2025, 9(8), 298; https://doi.org/10.3390/urbansci9080298 - 1 Aug 2025
Viewed by 283
Abstract
Autonomous vehicles (AVs) have emerged as a promising sustainable urban mobility solution, expected to lead to enhanced road safety, smoother traffic flows, less traffic congestion, improved accessibility, better energy utilization and environmental performance, as well as more efficient passenger and freight transportation, in [...] Read more.
Autonomous vehicles (AVs) have emerged as a promising sustainable urban mobility solution, expected to lead to enhanced road safety, smoother traffic flows, less traffic congestion, improved accessibility, better energy utilization and environmental performance, as well as more efficient passenger and freight transportation, in terms of time and cost, due to better fleet management and platooning. However, challenges also arise, mostly related to data privacy, security and cyber-security, high acquisition and infrastructure costs, accident liability, even possible increased traffic congestion and air pollution due to induced travel demand. This paper presents the results of a survey conducted among 654 residents who experienced an autonomous bus (AB) service in the city of Trikala, Greece, in order to assess their willingness to use (WTU) and willingness to pay (WTP) for ABs, through testing a range of factors based on a literature review. Results useful to policy-makers were extracted, such as that the intention to use ABs was mostly shaped by psychological factors (e.g., users’ perceptions of usefulness and safety, and trust in the service provider), while WTU seemed to be positively affected by previous experience in using ABs. In contrast, sociodemographic factors were found to have very little effect on the intention to use ABs, while apart from personal utility, users’ perceptions of how autonomous driving will improve the overall life standards in the study area also mattered. Full article
Show Figures

Figure 1

24 pages, 8636 KiB  
Article
Oil Film Segmentation Method Using Marine Radar Based on Feature Fusion and Artificial Bee Colony Algorithm
by Jin Xu, Bo Xu, Xiaoguang Mou, Boxi Yao, Zekun Guo, Xiang Wang, Yuanyuan Huang, Sihan Qian, Min Cheng, Peng Liu and Jianning Wu
J. Mar. Sci. Eng. 2025, 13(8), 1453; https://doi.org/10.3390/jmse13081453 - 29 Jul 2025
Viewed by 173
Abstract
In the wake of the continuous development of the international strategic petroleum reserve system, the tonnage and quantity of oil tankers have been increasing. This trend has driven the expansion of offshore oil exploration and transportation, resulting in frequent incidents of ship oil [...] Read more.
In the wake of the continuous development of the international strategic petroleum reserve system, the tonnage and quantity of oil tankers have been increasing. This trend has driven the expansion of offshore oil exploration and transportation, resulting in frequent incidents of ship oil spills. Catastrophic impacts have been exerted on the marine environment by these accidents, posing a serious threat to economic development and ecological security. Therefore, there is an urgent need for efficient and reliable methods to detect oil spills in a timely manner and minimize potential losses as much as possible. In response to this challenge, a marine radar oil film segmentation method based on feature fusion and the artificial bee colony (ABC) algorithm is proposed in this study. Initially, the raw experimental data are preprocessed to obtain denoised radar images. Subsequently, grayscale adjustment and local contrast enhancement operations are carried out on the denoised images. Next, the gray level co-occurrence matrix (GLCM) features and Tamura features are extracted from the locally contrast-enhanced images. Then, the generalized least squares (GLS) method is employed to fuse the extracted texture features, yielding a new feature fusion map. Afterwards, the optimal processing threshold is determined to obtain effective wave regions by using the bimodal graph direct method. Finally, the ABC algorithm is utilized to segment the oil films. This method can provide data support for oil spill detection in marine radar images. Full article
(This article belongs to the Section Ocean Engineering)
Show Figures

Figure 1

25 pages, 19197 KiB  
Article
Empirical Evaluation of TLS-Enhanced MQTT on IoT Devices for V2X Use Cases
by Nikolaos Orestis Gavriilidis, Spyros T. Halkidis and Sophia Petridou
Appl. Sci. 2025, 15(15), 8398; https://doi.org/10.3390/app15158398 - 29 Jul 2025
Viewed by 153
Abstract
The rapid growth of Internet of Things (IoT) deployment has led to an unprecedented volume of interconnected, resource-constrained devices. Securing their communication is essential, especially in vehicular environments, where sensitive data exchange requires robust authentication, integrity, and confidentiality guarantees. In this paper, we [...] Read more.
The rapid growth of Internet of Things (IoT) deployment has led to an unprecedented volume of interconnected, resource-constrained devices. Securing their communication is essential, especially in vehicular environments, where sensitive data exchange requires robust authentication, integrity, and confidentiality guarantees. In this paper, we present an empirical evaluation of TLS (Transport Layer Security)-enhanced MQTT (Message Queuing Telemetry Transport) on low-cost, quad-core Cortex-A72 ARMv8 boards, specifically the Raspberry Pi 4B, commonly used as prototyping platforms for On-Board Units (OBUs) and Road-Side Units (RSUs). Three MQTT entities, namely, the broker, the publisher, and the subscriber, are deployed, utilizing Elliptic Curve Cryptography (ECC) for key exchange and authentication and employing the AES_256_GCM and ChaCha20_Poly1305 ciphers for confidentiality via appropriately selected libraries. We quantify resource consumption in terms of CPU utilization, execution time, energy usage, memory footprint, and goodput across TLS phases, cipher suites, message packaging strategies, and both Ethernet and WiFi interfaces. Our results show that (i) TLS 1.3-enhanced MQTT is feasible on Raspberry Pi 4B devices, though it introduces non-negligible resource overheads; (ii) batching messages into fewer, larger packets reduces transmission cost and latency; and (iii) ChaCha20_Poly1305 outperforms AES_256_GCM, particularly in wireless scenarios, making it the preferred choice for resource- and latency-sensitive V2X applications. These findings provide actionable recommendations for deploying secure MQTT communication on an IoT platform. Full article
(This article belongs to the Special Issue Cryptography in Data Protection and Privacy-Enhancing Technologies)
Show Figures

Figure 1

41 pages, 3023 KiB  
Article
Enhanced Scalability and Security in Blockchain-Based Transportation Systems for Mass Gatherings
by Ahmad Mutahhar, Tariq J. S. Khanzada and Muhammad Farrukh Shahid
Information 2025, 16(8), 641; https://doi.org/10.3390/info16080641 - 28 Jul 2025
Viewed by 409
Abstract
Large-scale events, such as festivals and public gatherings, pose serious problems in terms of traffic congestion, slow transaction processing, and security risks to transportation planning. This study proposes a blockchain-based solution for enhancing the efficiency and security of intelligent transport systems (ITS) by [...] Read more.
Large-scale events, such as festivals and public gatherings, pose serious problems in terms of traffic congestion, slow transaction processing, and security risks to transportation planning. This study proposes a blockchain-based solution for enhancing the efficiency and security of intelligent transport systems (ITS) by utilizing state channels and rollups. Throughput is optimized, enabling transaction speeds of 800 to 3500 transactions per second (TPS) and delays of 5 to 1.5 s. Prevent data tampering, strengthen security, and enhance data integrity from 89% to 99.999%, as well as encryption efficacy from 90% to 98%. Furthermore, our system reduces congestion, optimizes vehicle movement, and shares real-time, secure data with stakeholders. Practical applications include fast and safe road toll payments, faster public transit ticketing, improved emergency response coordination, and enhanced urban mobility. The decentralized blockchain helps maintain trust among users, transportation authorities, and event organizers. Our approach extends beyond large-scale events and proposes a path toward ubiquitous, Artificial Intelligence (AI)-driven decision-making in a broader urban transit network, informing future operations in dynamic traffic optimization. This study demonstrates the potential of blockchain to create more intelligent, more secure, and scalable transportation systems, which will help reduce urban mobility inefficiencies and contribute to the development of resilient smart cities. Full article
Show Figures

Figure 1

11 pages, 279 KiB  
Article
Cloudy with a Chance of Apostles: Cloud Travel in Acts of Andrew and Matthias
by Acacia Chan
Religions 2025, 16(8), 976; https://doi.org/10.3390/rel16080976 - 28 Jul 2025
Viewed by 301
Abstract
Clouds appear as a cross-culturally useful literary device in Greco-Roman, Jewish, and Christian sources. This paper argues that the cloud travel in the apocryphal Acts of Andrew and Matthias functions in three ways: as a transformative callback to Jesus’s ascension and coming return, [...] Read more.
Clouds appear as a cross-culturally useful literary device in Greco-Roman, Jewish, and Christian sources. This paper argues that the cloud travel in the apocryphal Acts of Andrew and Matthias functions in three ways: as a transformative callback to Jesus’s ascension and coming return, as a demonstration of Andrew’s power over natural elements, and as a secure form of transportation away from the difficulties of other travel methods. The author of the text combines the divine protection found in clouds in Greco-Roman literature with the theophanies found in the Septuagint and the New Testament to create this cloud-travel motif that later reappears in the apocryphal sequel Acts of Peter and Andrew. Full article
(This article belongs to the Special Issue Travel and Religion in the Ancient Mediterranean)
17 pages, 274 KiB  
Article
“I Shouldn’t Have to Drive to the Suburbs”: Grocery Store Access, Transportation, and Food Security in Detroit During the COVID-19 Pandemic
by Aeneas O. Koosis, Alex B. Hill, Megan Whaley and Alyssa W. Beavers
Nutrients 2025, 17(15), 2441; https://doi.org/10.3390/nu17152441 - 26 Jul 2025
Viewed by 300
Abstract
Objective: To explore the relationship between type of grocery store used (chain vs. independent), transportation access, food insecurity, and fruit and vegetable intake in Detroit, Michigan, USA, during the COVID-19 pandemic. Design: A cross-sectional online survey was conducted from December 2021 to May [...] Read more.
Objective: To explore the relationship between type of grocery store used (chain vs. independent), transportation access, food insecurity, and fruit and vegetable intake in Detroit, Michigan, USA, during the COVID-19 pandemic. Design: A cross-sectional online survey was conducted from December 2021 to May 2022. Setting: Detroit, Michigan. Participants: 656 Detroit residents aged 18 and older. Results: Bivariate analyses showed that chain grocery store shoppers reported significantly greater fruit and vegetable intake (2.42 vs. 2.14 times/day for independent grocery store shoppers, p < 0.001) and lower rates of food insecurity compared to independent store shoppers (45.9% vs. 65.3% for independent grocery store shoppers, p < 0.001). Fewer independent store shoppers used their own vehicle (52.9% vs. 76.2% for chain store shoppers, p < 0.001). After adjusting for socioeconomic and demographic variables transportation access was strongly associated with increased odds of shopping at chain stores (OR = 1.89, 95% CI [1.21,2.95], p = 0.005) but food insecurity was no longer associated with grocery store type. Shopping at chain grocery stores was associated with higher fruit and vegetable intake after adjusting for covariates (1.18 times more per day, p = 0.042). Qualitative responses highlighted systemic barriers, including poor food quality, high costs, and limited transportation options, exacerbating food access inequities. Conclusions: These disparities underscore the need for targeted interventions to improve transportation options and support food security in vulnerable populations, particularly in urban areas like Detroit. Addressing these structural challenges is essential for reducing food insecurity and promoting equitable access to nutritious foods. Full article
(This article belongs to the Section Nutrition and Public Health)
15 pages, 1181 KiB  
Article
Smart City Concept: Implementation Features in Various Territories
by Magomed Mintsaev, Sayd-Alvi Murtazaev, Magomed Saydumov, Salambek Aliev, Adam Abumuslimov and Ismail Murtazaev
Urban Sci. 2025, 9(8), 290; https://doi.org/10.3390/urbansci9080290 - 25 Jul 2025
Viewed by 355
Abstract
Modern software solutions have a multiplicative effect on enhancing quality of life across various urban sectors, including the environment, education, public health, security, transportation, time efficiency, employment, and other key aspects of city living. This article addresses a specific issue concerning the organisation [...] Read more.
Modern software solutions have a multiplicative effect on enhancing quality of life across various urban sectors, including the environment, education, public health, security, transportation, time efficiency, employment, and other key aspects of city living. This article addresses a specific issue concerning the organisation of leisure activities for both local residents and tourists, using the Chechen Republic as a case study. In response, the study aimed to develop a digital solution to address this challenge, with potential for integration into the Republic’s unified digital ecosystem. By employing system analysis methods, the authors identified the key objects and stakeholders involved in the problem domain. They also defined the software product’s functionality and classified user categories. Using Unified Modelling Language methods, a use case diagram was developed to illustrate the conceptual operation of the system. Furthermore, object-oriented design methods were applied to create a user interface prototype for the software product. As a result, a digital service was developed that enables users to create personalised leisure routes, taking into account individual goals, time constraints, traffic conditions, and the real-time status of urban infrastructure. The resulting software solution is both customisable and scalable. The article also presents selected examples of project development. Full article
Show Figures

Figure 1

19 pages, 2452 KiB  
Article
Women’s Right to the City: The Case of Quito, Ecuador
by Maria Carolina Baca Calderón, Gloria Quattrone, Eufemia Sánchez Borja and Daniele Rocchio
Soc. Sci. 2025, 14(8), 448; https://doi.org/10.3390/socsci14080448 - 23 Jul 2025
Viewed by 251
Abstract
Henri Lefebvre’s “right to the city” has rarely been examined through an intersectional feminist lens, leaving unnoticed the uneven burdens that urban design and policy place on women. This article bridges that gap by combining constitutional analysis, survey data (n = 736), [...] Read more.
Henri Lefebvre’s “right to the city” has rarely been examined through an intersectional feminist lens, leaving unnoticed the uneven burdens that urban design and policy place on women. This article bridges that gap by combining constitutional analysis, survey data (n = 736), in-depth interviews, and participatory observation to assess how Quito’s public spaces affect women’s safety and mobility. Quantitative results show that 81% of respondents endured sexual or offensive remarks, 69.8% endured obscene gestures, and 38% endured severe harassment in the month before the survey; 43% of these incidents occurred only days or weeks beforehand, underscoring their routine nature. Qualitative narratives reveal behavioral adaptations—altered routes, self-policing dress codes, and distrust of authorities—and identify poorly lit corridors and weak institutional presence as spatial amplifiers of violence. Analysis of Quito’s “Safe City” program exposes a gulf between its ambitious rhetoric and its narrow, transport-centered implementation. We conclude that constitutional guarantees of participation, appropriation, and urban life will remain aspirational until urban planning mainstreams gender-sensitive design, secures intersectoral resources, and embeds women’s substantive participation throughout policy cycles. A feminist reimagining of Quito’s public realm is therefore indispensable to transform the right to the city from legal principle into lived reality. Full article
(This article belongs to the Section Gender Studies)
Show Figures

Figure 1

26 pages, 1579 KiB  
Article
Forecasting Infrastructure Needs, Environmental Impacts, and Dynamic Pricing for Electric Vehicle Charging
by Osama Jabr, Ferheen Ayaz, Maziar Nekovee and Nagham Saeed
World Electr. Veh. J. 2025, 16(8), 410; https://doi.org/10.3390/wevj16080410 - 22 Jul 2025
Viewed by 279
Abstract
In recent years, carbon dioxide (CO2) emissions have increased at the fastest rates ever recorded. This is a trend that contradicts global efforts to stabilise greenhouse gas (GHG) concentrations and prevent long-term climate change. Over 90% of global transport relies on [...] Read more.
In recent years, carbon dioxide (CO2) emissions have increased at the fastest rates ever recorded. This is a trend that contradicts global efforts to stabilise greenhouse gas (GHG) concentrations and prevent long-term climate change. Over 90% of global transport relies on oil-based fuels. The continued use of diesel and petrol raises concerns related to oil costs, supply security, GHG emissions, and the release of air pollutants and volatile organic compounds. This study explored electric vehicle (EV) charging networks by assessing environmental impacts through GHG and petroleum savings, developing dynamic pricing strategies, and forecasting infrastructure needs. A substantial dataset of over 259,000 EV charging records from Palo Alto, California, was statistically analysed. Machine learning models were applied to generate insights that support sustainable and economically viable electric transport planning for policymakers, urban planners, and other stakeholders. Findings indicate that GHG and gasoline savings are directly proportional to energy consumed, with conversion rates of 0.42 kg CO2 and 0.125 gallons per kilowatt-hour (kWh), respectively. Additionally, dynamic pricing strategies such as a 20% discount on underutilised days and a 15% surcharge during peak hours are proposed to optimise charging behaviour and improve station efficiency. Full article
Show Figures

Figure 1

7 pages, 1190 KiB  
Proceeding Paper
Influence of Selective Security Check on Heterogeneous Passengers at Metro Stations
by Zhou Mo, Maricar Zafir and Gueta Lounell Bahoy
Eng. Proc. 2025, 102(1), 3; https://doi.org/10.3390/engproc2025102003 - 22 Jul 2025
Viewed by 247
Abstract
Security checks (SCs) at metro stations are regarded as an effective measure to address the heightened security risks associated with high ridership. Introducing SCs without exacerbating congestion requires a thorough understanding of their impact on passenger flow. Most existing studies were conducted where [...] Read more.
Security checks (SCs) at metro stations are regarded as an effective measure to address the heightened security risks associated with high ridership. Introducing SCs without exacerbating congestion requires a thorough understanding of their impact on passenger flow. Most existing studies were conducted where SCs are mandatory and fixed at certain locations. This study presents a method for advising the scale and placement for SCs under a more relaxed security setting. Using agent-based simulation with heterogeneous profiles for both inbound and outbound passenger flow, existing bottlenecks are first identified. By varying different percentages of passengers for SCs and locations to deploy SCs, we observe the influence on existing bottlenecks and suggest a suitable configuration. In our experiments, key bottlenecks are identified before tap-in fare gantries. When deploying SCs near tap-in fare gantries as seen in current practices, a screening percentage of beyond 10% could exacerbate existing bottlenecks and also create new bottlenecks at SC waiting areas. Relocating the SC to a point beyond the fare gantries helps alleviate congestion. This method provides a reference for station managers and transport authorities for balancing security and congestion. Full article
Show Figures

Figure 1

40 pages, 1540 KiB  
Review
A Survey on Video Big Data Analytics: Architecture, Technologies, and Open Research Challenges
by Thi-Thu-Trang Do, Quyet-Thang Huynh, Kyungbaek Kim and Van-Quyet Nguyen
Appl. Sci. 2025, 15(14), 8089; https://doi.org/10.3390/app15148089 - 21 Jul 2025
Viewed by 589
Abstract
The exponential growth of video data across domains such as surveillance, transportation, and healthcare has raised critical challenges in scalability, real-time processing, and privacy preservation. While existing studies have addressed individual aspects of Video Big Data Analytics (VBDA), an integrated, up-to-date perspective remains [...] Read more.
The exponential growth of video data across domains such as surveillance, transportation, and healthcare has raised critical challenges in scalability, real-time processing, and privacy preservation. While existing studies have addressed individual aspects of Video Big Data Analytics (VBDA), an integrated, up-to-date perspective remains limited. This paper presents a comprehensive survey of system architectures and enabling technologies in VBDA. It categorizes system architectures into four primary types as follows: centralized, cloud-based infrastructures, edge computing, and hybrid cloud–edge. It also analyzes key enabling technologies, including real-time streaming, scalable distributed processing, intelligent AI models, and advanced storage for managing large-scale multimodal video data. In addition, the study provides a functional taxonomy of core video processing tasks, including object detection, anomaly recognition, and semantic retrieval, and maps these tasks to real-world applications. Based on the survey findings, the paper proposes ViMindXAI, a hybrid AI-driven platform that combines edge and cloud orchestration, adaptive storage, and privacy-aware learning to support scalable and trustworthy video analytics. Our analysis in this survey highlights emerging trends such as the shift toward hybrid cloud–edge architectures, the growing importance of explainable AI and federated learning, and the urgent need for secure and efficient video data management. These findings highlight key directions for designing next-generation VBDA platforms that enhance real-time, data-driven decision-making in domains such as public safety, transportation, and healthcare. These platforms facilitate timely insights, rapid response, and regulatory alignment through scalable and explainable analytics. This work provides a robust conceptual foundation for future research on adaptive and efficient decision-support systems in video-intensive environments. Full article
Show Figures

Figure 1

36 pages, 8047 KiB  
Article
Fed-DTB: A Dynamic Trust-Based Framework for Secure and Efficient Federated Learning in IoV Networks: Securing V2V/V2I Communication
by Ahmed Alruwaili, Sardar Islam and Iqbal Gondal
J. Cybersecur. Priv. 2025, 5(3), 48; https://doi.org/10.3390/jcp5030048 - 19 Jul 2025
Viewed by 475
Abstract
The Internet of Vehicles (IoV) presents a vast opportunity for optimised traffic flow, road safety, and enhanced usage experience with the influence of Federated Learning (FL). However, the distributed nature of IoV networks creates certain inherent problems regarding data privacy, security from adversarial [...] Read more.
The Internet of Vehicles (IoV) presents a vast opportunity for optimised traffic flow, road safety, and enhanced usage experience with the influence of Federated Learning (FL). However, the distributed nature of IoV networks creates certain inherent problems regarding data privacy, security from adversarial attacks, and the handling of available resources. This paper introduces Fed-DTB, a new dynamic trust-based framework for FL that aims to overcome these challenges in the context of IoV. Fed-DTB integrates the adaptive trust evaluation that is capable of quickly identifying and excluding malicious clients to maintain the authenticity of the learning process. A performance comparison with previous approaches is shown, where the Fed-DTB method improves accuracy in the first two training rounds and decreases the per-round training time. The Fed-DTB is robust to non-IID data distributions and outperforms all other state-of-the-art approaches regarding the final accuracy (87–88%), convergence rate, and adversary detection (99.86% accuracy). The key contributions include (1) a multi-factor trust evaluation mechanism with seven contextual factors, (2) correlation-based adaptive weighting that dynamically prioritises trust factors based on vehicular conditions, and (3) an optimisation-based client selection strategy that maximises collaborative reliability. This work opens up opportunities for more accurate, secure, and private collaborative learning in future intelligent transportation systems with the help of federated learning while overcoming the conventional trade-off of security vs. efficiency. Full article
Show Figures

Figure 1

Back to TopTop