Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (335)

Search Parameters:
Keywords = usable security

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
25 pages, 3204 KiB  
Article
Assessing Spatial Digital Twins for Oil and Gas Projects: An Informed Argument Approach Using ISO/IEC 25010 Model
by Sijan Bhandari and Dev Raj Paudyal
ISPRS Int. J. Geo-Inf. 2025, 14(8), 294; https://doi.org/10.3390/ijgi14080294 - 28 Jul 2025
Viewed by 145
Abstract
With the emergence of Survey 4.0, the oil and gas (O & G) industry is now considering spatial digital twins during their field design to enhance visualization, efficiency, and safety. O & G companies have already initiated investments in the research and development [...] Read more.
With the emergence of Survey 4.0, the oil and gas (O & G) industry is now considering spatial digital twins during their field design to enhance visualization, efficiency, and safety. O & G companies have already initiated investments in the research and development of spatial digital twins to build digital mining models. Existing studies commonly adopt surveys and case studies as their evaluation approach to validate the feasibility of spatial digital twins and related technologies. However, this approach requires high costs and resources. To address this gap, this study explores the feasibility of the informed argument method within the design science framework. A land survey data model (LSDM)-based digital twin prototype for O & G field design, along with 3D spatial datasets located in Lot 2 on RP108045 at petroleum lease 229 under the Department of Resources, Queensland Government, Australia, was selected as a case for this study. The ISO/IEC 25010 model was adopted as a methodology for this study to evaluate the prototype and Digital Twin Victoria (DTV). It encompasses eight metrics, such as functional suitability, performance efficiency, compatibility, usability, security, reliability, maintainability, and portability. The results generated from this study indicate that the prototype encompasses a standard level of all parameters in the ISO/IEC 25010 model. The key significance of the study is its methodological contribution to evaluating the spatial digital twin models through cost-effective means, particularly under circumstances with strict regulatory requirements and low information accessibility. Full article
Show Figures

Figure 1

19 pages, 794 KiB  
Article
Implementation and Adherence of a Custom Mobile Application for Anonymous Bidirectional Communication Among Nearly 4000 Participants: Insights from the Longitudinal RisCoin Study
by Ana Zhelyazkova, Sibylle Koletzko, Kristina Adorjan, Anna Schrimf, Stefanie Völk, Leandra Koletzko, Alexandra Fabry-Said, Andreas Osterman, Irina Badell, Marc Eden, Alexander Choukér, Marina Tuschen, Berthold Koletzko, Yuntao Hao, Luke Tu, Helga P. Török, Sven P. Wichert and Thu Giang Le Thi
Infect. Dis. Rep. 2025, 17(4), 88; https://doi.org/10.3390/idr17040088 - 24 Jul 2025
Viewed by 187
Abstract
Background: The longitudinal RisCoin study investigated risk factors for COVID-19 vaccination failure among healthcare workers (HCWs) and patients with inflammatory bowel disease (IBD) at a University Hospital in Germany. Since the hospital served as the study sponsor and employer of the HCW, [...] Read more.
Background: The longitudinal RisCoin study investigated risk factors for COVID-19 vaccination failure among healthcare workers (HCWs) and patients with inflammatory bowel disease (IBD) at a University Hospital in Germany. Since the hospital served as the study sponsor and employer of the HCW, we implemented a custom mobile application. We aimed to evaluate the implementation, adherence, benefits, and limitations of this study’s app. Methods: The app allowed secure data collection through questionnaires, disseminated serological results, and managed bidirectional communication. Access was double-pseudonymized and irreversibly anonymized six months after enrollment. Download frequency, login events, and questionnaire submissions between October 2021 and December 2022 were analyzed. Multivariable logistic regression identified factors associated with app adherence. Results: Of the 3979 participants with app access, 3622 (91%) used the app; out of these, 1016 (28%) were “adherent users” (≥12 submitted questionnaires). App adherence significantly increased with age. Among HCW, adherent users were more likely to be non-smokers (p < 0.001), working as administrators or nursing staff vs. physicians (p < 0.001), vaccinated against influenza (p < 0.001), and had not travelled abroad in the past year (p < 0.001). IBD patients exposed to SARS-CoV-2 (p = 0.0133) and those with adverse events following the second COVID-19 vaccination (p = 0.0171) were more likely adherent app users. Despite technical issues causing dropout or non-adherence, the app served as a secure solution for cohort management and longitudinal data collection. Discussion: App-based cohort management enabled continuous data acquisition and individualized care while providing flexibility and anonymity for the study team and participants. App usability, technical issues, and cohort characteristics need to be thoroughly considered prior to implementation to optimize usage and adherence in clinical research. Full article
Show Figures

Figure 1

19 pages, 3806 KiB  
Article
Farmdee-Mesook: An Intuitive GHG Awareness Smart Agriculture Platform
by Mongkol Raksapatcharawong and Watcharee Veerakachen
Agronomy 2025, 15(8), 1772; https://doi.org/10.3390/agronomy15081772 - 24 Jul 2025
Viewed by 309
Abstract
Climate change presents urgent and complex challenges to agricultural sustainability and food security, particularly in regions reliant on resource-intensive staple crops. Smart agriculture—through the integration of crop modeling, satellite remote sensing, and artificial intelligence (AI)—offers data-driven strategies to enhance productivity, optimize input use, [...] Read more.
Climate change presents urgent and complex challenges to agricultural sustainability and food security, particularly in regions reliant on resource-intensive staple crops. Smart agriculture—through the integration of crop modeling, satellite remote sensing, and artificial intelligence (AI)—offers data-driven strategies to enhance productivity, optimize input use, and mitigate greenhouse gas (GHG) emissions. This study introduces Farmdee-Mesook, a mobile-first smart agriculture platform designed specifically for Thai rice farmers. The platform leverages AquaCrop simulation, open-access satellite data, and localized agronomic models to deliver real-time, field-specific recommendations. Usability-focused design and no-cost access facilitate its widespread adoption, particularly among smallholders. Empirical results show that platform users achieved yield increases of up to 37%, reduced agrochemical costs by 59%, and improved water productivity by 44% under alternate wetting and drying (AWD) irrigation schemes. These outcomes underscore the platform’s role as a scalable, cost-effective solution for operationalizing climate-smart agriculture. Farmdee-Mesook demonstrates that digital technologies, when contextually tailored and institutionally supported, can serve as critical enablers of climate adaptation and sustainable agricultural transformation. Full article
(This article belongs to the Special Issue Smart Farming Technologies for Sustainable Agriculture—2nd Edition)
Show Figures

Figure 1

12 pages, 1809 KiB  
Article
Integrating 3D Digital Technology Advancements in the Fabrication of Orthodontic Aligner Attachments: An In Vitro Study
by Riham Nagib, Andrei Chircu and Camelia Szuhanek
J. Clin. Med. 2025, 14(14), 5093; https://doi.org/10.3390/jcm14145093 - 17 Jul 2025
Viewed by 309
Abstract
Background/Objectives: The introduction of composite attachments has greatly improved orthodontic aligner therapy, through better force delivery, more predictable movements, and enhanced retention. This in vitro study aims to present and investigate an innovative digital protocol for aligner attachment fabrication incorporating the latest [...] Read more.
Background/Objectives: The introduction of composite attachments has greatly improved orthodontic aligner therapy, through better force delivery, more predictable movements, and enhanced retention. This in vitro study aims to present and investigate an innovative digital protocol for aligner attachment fabrication incorporating the latest 3D technology used in dentistry. Methods: A virtual attachment measuring 2.5 × 2 × 2 mm was designed using computer-aided design (CAD) software (Meshmixer, Autodesk Inc., San Francisco, CA, USA) and exported as an individual STL file. The attachments were fabricated using a digital light processing (DLP) 3D printer (model: Elegoo 4 DLP, Shenzhen, China) and a dental-grade biocompatible resin. A custom 3D-printed placement guide was used to ensure precise positioning of the attachments on the printed maxillary dental models. A flowable resin was applied to secure the attachments in place. Following attachment placement, the models were scanned using a laboratory desktop scanner (Optical 3D Smart Big, Open Technologies, Milano, Italy) and three intraoral scanners: iTero Element (Align Technology, Tempe, AZ, USA), Aoral 2, and Aoral 3 (Shining 3D, Hangzhou, China). Results: Upon comparison, the scans revealed that the iTero Element exhibited the highest precision, particularly in the attachment, with an RMSE of 0.022 mm and 95.04% of measurements falling within a ±100 µm tolerance. The Aoral 2 scanner showed greater variability, with the highest RMSE (0.041 mm) in the incisor area and wider deviation margins. Despite this, all scanners produced results within clinically acceptable limits. Conclusions: In the future, custom attachments made by 3D printing could be a valid alternative to the traditional composite attachments when it comes to improving aligner attachment production. While these preliminary findings support the potential applicability of such workflows, further in vivo research is necessary to confirm clinical usability. Full article
(This article belongs to the Special Issue Orthodontics: State of the Art and Perspectives)
Show Figures

Figure 1

19 pages, 5202 KiB  
Article
Optimizing Energy/Current Fluctuation of RF-Powered Secure Adiabatic Logic for IoT Devices
by Bendito Freitas Ribeiro and Yasuhiro Takahashi
Sensors 2025, 25(14), 4419; https://doi.org/10.3390/s25144419 - 16 Jul 2025
Viewed by 382
Abstract
The advancement of Internet of Things (IoT) technology has enabled battery-powered devices to be deployed across a wide range of applications; however, it also introduces challenges such as high energy consumption and security vulnerabilities. To address these issues, adiabatic logic circuits offer a [...] Read more.
The advancement of Internet of Things (IoT) technology has enabled battery-powered devices to be deployed across a wide range of applications; however, it also introduces challenges such as high energy consumption and security vulnerabilities. To address these issues, adiabatic logic circuits offer a promising solution for achieving energy efficiency and enhancing the security of IoT devices. Adiabatic logic circuits are well suited for energy harvesting systems, especially in applications such as sensor nodes, RFID tags, and other IoT implementations. In these systems, the harvested bipolar sinusoidal RF power is directly used as the power supply for the adiabatic logic circuit. However, adiabatic circuits require a peak detector to provide bulk biasing for pMOS transistors. To meet this requirement, a diode-connected MOS transistor-based voltage doubler circuit is used to convert the sinusoidal input into a usable DC signal. In this paper, we propose a novel adiabatic logic design that maintains low power consumption while optimizing energy and current fluctuations across various input transitions. By ensuring uniform and complementary current flow in each transition within the logic circuit’s functional blocks, the design reduces energy variation and enhances resistance against power analysis attacks. Evaluation under different clock frequencies and load capacitances demonstrates that the proposed adiabatic logic circuit exhibits lower fluctuation and improved security, particularly at load capacitances of 50 fF and 100 fF. The results show that the proposed circuit achieves lower power dissipation compared to conventional designs. As an application example, we implemented an ultrasonic transmitter circuit within a LoRaWAN network at the end-node sensor level, which serves as both a communication protocol and system architecture for long-range communication systems. Full article
(This article belongs to the Special Issue Feature Papers in Electronic Sensors 2025)
Show Figures

Figure 1

40 pages, 5045 KiB  
Review
RF Energy-Harvesting Techniques: Applications, Recent Developments, Challenges, and Future Opportunities
by Stella N. Arinze, Emenike Raymond Obi, Solomon H. Ebenuwa and Augustine O. Nwajana
Telecom 2025, 6(3), 45; https://doi.org/10.3390/telecom6030045 - 1 Jul 2025
Viewed by 970
Abstract
The increasing demand for sustainable and renewable energy solutions has made radio frequency energy harvesting (RFEH) a promising technique for powering low-power electronic devices. RFEH captures ambient RF signals from wireless communication systems, such as mobile networks, Wi-Fi, and broadcasting stations, and converts [...] Read more.
The increasing demand for sustainable and renewable energy solutions has made radio frequency energy harvesting (RFEH) a promising technique for powering low-power electronic devices. RFEH captures ambient RF signals from wireless communication systems, such as mobile networks, Wi-Fi, and broadcasting stations, and converts them into usable electrical energy. This approach offers a viable alternative for battery-dependent and hard-to-recharge applications, including streetlights, outdoor night/security lighting, wireless sensor networks, and biomedical body sensor networks. This article provides a comprehensive review of the RFEH techniques, including state-of-the-art rectenna designs, energy conversion efficiency improvements, and multi-band harvesting systems. We present a detailed analysis of recent advancements in RFEH circuits, impedance matching techniques, and integration with emerging technologies such as the Internet of Things (IoT), 5G, and wireless power transfer (WPT). Additionally, this review identifies existing challenges, including low conversion efficiency, unpredictable energy availability, and design limitations for small-scale and embedded systems. A critical assessment of current research gaps is provided, highlighting areas where further development is required to enhance performance and scalability. Finally, constructive recommendations for future opportunities in RFEH are discussed, focusing on advanced materials, AI-driven adaptive harvesting systems, hybrid energy-harvesting techniques, and novel antenna–rectifier architectures. The insights from this study will serve as a valuable resource for researchers and engineers working towards the realization of self-sustaining, battery-free electronic systems. Full article
(This article belongs to the Special Issue Advances in Wireless Communication: Applications and Developments)
Show Figures

Figure 1

20 pages, 8725 KiB  
Article
Formal Analysis of Rational Exchange Protocols Based on the Improved Buttyan Model
by Meihua Xiao, Lina Chen, Ke Yang and Zehuan Li
Symmetry 2025, 17(7), 1033; https://doi.org/10.3390/sym17071033 - 1 Jul 2025
Viewed by 232
Abstract
A rational exchange protocol is a type of e-commerce protocol that aims to maximize the participants’ own interests. The Buttyan model is commonly used to analyze the security of such protocols. However, this model has limitations in dealing with uncertainties and false messages [...] Read more.
A rational exchange protocol is a type of e-commerce protocol that aims to maximize the participants’ own interests. The Buttyan model is commonly used to analyze the security of such protocols. However, this model has limitations in dealing with uncertainties and false messages in rational exchanges. To address these shortcomings, this paper proposes a formal analysis method based on Bayesian games. By incorporating participants’ types and beliefs, the Buttyan model is extended to enhance its ability to express uncertainties. Additionally, attack messages are introduced to simulate the potential fraudulent behaviors that participants may exploit through the security vulnerabilities in the protocol. Finally, the improved model is applied to conduct a formal analysis of a rational electronic contract signing protocol, and it is found that the protocol meets the usability requirements. The results show that this method can be effectively applied to the security analysis of rational exchange protocols, thereby enhancing the security of the e-commerce transaction process. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

24 pages, 589 KiB  
Article
FaceCloseup: Enhancing Mobile Facial Authentication with Perspective Distortion-Based Liveness Detection
by Yingjiu Li, Yan Li and Zilong Wang
Computers 2025, 14(7), 254; https://doi.org/10.3390/computers14070254 - 27 Jun 2025
Viewed by 612
Abstract
Facial authentication has gained widespread adoption as a biometric authentication method, offering a convenient alternative to traditional password-based systems, particularly on mobile devices equipped with front-facing cameras. While this technology enhances usability and security by eliminating password management, it remains highly susceptible to [...] Read more.
Facial authentication has gained widespread adoption as a biometric authentication method, offering a convenient alternative to traditional password-based systems, particularly on mobile devices equipped with front-facing cameras. While this technology enhances usability and security by eliminating password management, it remains highly susceptible to spoofing attacks. Adversaries can exploit facial recognition systems using pre-recorded photos, videos, or even sophisticated 3D models of victims’ faces to bypass authentication mechanisms. The increasing availability of personal images on social media further amplifies this risk, making robust anti-spoofing mechanisms essential for secure facial authentication. To address these challenges, we introduce FaceCloseup, a novel liveness detection technique that strengthens facial authentication by leveraging perspective distortion inherent in close-up shots of real, 3D faces. Instead of relying on additional sensors or user-interactive gestures, FaceCloseup passively analyzes facial distortions in video frames captured by a mobile device’s camera, improving security without compromising user experience. FaceCloseup effectively distinguishes live faces from spoofed attacks by identifying perspective-based distortions across different facial regions. The system achieves a 99.48% accuracy in detecting common spoofing methods—including photo, video, and 3D model-based attacks—and demonstrates 98.44% accuracy in differentiating between individual users. By operating entirely on-device, FaceCloseup eliminates the need for cloud-based processing, reducing privacy concerns and potential latency in authentication. Its reliance on natural device movement ensures a seamless authentication experience while maintaining robust security. Full article
(This article belongs to the Special Issue Cyber Security and Privacy in IoT Era)
Show Figures

Figure 1

18 pages, 256 KiB  
Article
Temperate Blind Signature Scheme for Particular Subspaces
by Oana-Adriana Ticleanu, Ioan Daniel Hunyadi and Nicolae Constantinescu
Appl. Sci. 2025, 15(13), 7180; https://doi.org/10.3390/app15137180 - 26 Jun 2025
Viewed by 196
Abstract
The development of information security mechanisms follows a cyclic refinement model: new cryptographic solutions are proposed, their limitations are studied, and improvements are introduced to overcome those limitations. This paper contributes to this process by proposing a blind signature scheme with tunable anonymity, [...] Read more.
The development of information security mechanisms follows a cyclic refinement model: new cryptographic solutions are proposed, their limitations are studied, and improvements are introduced to overcome those limitations. This paper contributes to this process by proposing a blind signature scheme with tunable anonymity, adapted to application-specific requirements. The core of the model is a parameter T that allows the user to balance confidentiality with transparency from the settings and adapt the signature behavior to the particular requirements of a beneficiary. Compared to the models currently used in blind signature protocols, this approach offers improved resistance to brute force attacks and improves security against adaptive and man-in-the-middle threats. Due to the reduced computational power requirements needed to calculate cryptographic primitives, it is usable for devices with power constraints. Being able to be integrated into a blockchain infrastructure, the process supports both persistent and verifiable data records, which gives it flexibility to adapt to different types of decentralized platforms. Full article
12 pages, 228 KiB  
Article
When Access Is Not Enough: The Role of Utilization Barriers in Nutrition Security and Cardiometabolic Risk
by Maha Almohamad, Ruosha Li, Natalia I. Heredia, Jayna M. Dave, Eric E. Calloway, Anjail Z. Sharrief and Shreela V. Sharma
Nutrients 2025, 17(12), 2031; https://doi.org/10.3390/nu17122031 - 18 Jun 2025
Viewed by 428
Abstract
Background: Food and nutrition security are key social determinants of cardiometabolic health. While food security reflects access to sufficient food, nutrition security incorporates the quality, consistency, and usability of food that supports long-term health. However, few studies have examined how household-level barriers to [...] Read more.
Background: Food and nutrition security are key social determinants of cardiometabolic health. While food security reflects access to sufficient food, nutrition security incorporates the quality, consistency, and usability of food that supports long-term health. However, few studies have examined how household-level barriers to food utilization shape these relationships. Objective: This study assessed whether tangible (e.g., equipment, storage) and intangible (e.g., time, knowledge) food utilization barriers modify the associations between food and nutrition security and cardiometabolic outcomes in low-income adults. Methods: A cross-sectional survey was conducted among 486 low-income adults across five U.S. states. Participants reported household food security (USDA 18-item module), nutrition security (four-item scale), and utilization barriers (eight-item scale, categorized into tangible and intangible subscales). Self-reported diagnoses of hypertension, hyperlipidemia, and diabetes were combined into a cardiometabolic outcome. Mixed-effects logistic regression models, adjusted for sociodemographic and program participation factors, were used to assess associations and effect modification. Results: Higher nutrition security was associated with lower odds of cardiometabolic conditions (AOR = 0.59; 95% CI: 0.41–0.83). Tangible barriers significantly modified the relationship between nutrition security and hypertension (p-interaction = 0.04), with stronger protective effects observed in households without such barriers. No significant moderation effects were found for intangible barriers or for food security. Conclusions: Tangible household barriers influence the protective association between nutrition security and cardiometabolic outcomes. Public health strategies should address not only food access but also the practical resources required to store, prepare, and consume healthy foods effectively. Full article
(This article belongs to the Special Issue Diet, Obesity and Type 2 Diabetes in Cardiovascular Disease)
49 pages, 552 KiB  
Systematic Review
Ethereum Smart Contracts Under Scrutiny: A Survey of Security Verification Tools, Techniques, and Challenges
by Mounira Kezadri Hamiaz and Maha Driss
Computers 2025, 14(6), 226; https://doi.org/10.3390/computers14060226 - 9 Jun 2025
Viewed by 1079
Abstract
Smart contracts are self-executing programs that facilitate trustless transactions between multiple parties, most commonly deployed on the Ethereum blockchain. They have become integral to decentralized applications in areas such as voting, digital agreements, and financial systems. However, the immutable and transparent nature of [...] Read more.
Smart contracts are self-executing programs that facilitate trustless transactions between multiple parties, most commonly deployed on the Ethereum blockchain. They have become integral to decentralized applications in areas such as voting, digital agreements, and financial systems. However, the immutable and transparent nature of smart contracts makes security vulnerabilities especially critical, as deployed contracts cannot be modified. Security flaws have led to substantial financial losses, underscoring the need for robust verification before deployment. This survey presents a comprehensive review of the state of the art in smart contract security verification, with a focus on Ethereum. We analyze a wide range of verification methods, including static and dynamic analysis, formal verification, and machine learning, and evaluate 62 open-source tools across their detection accuracy, efficiency, and usability. In addition, we highlight emerging trends, challenges, and the need for cross-methodological integration and benchmarking. Our findings aim to guide researchers, developers, and security auditors in selecting and advancing effective verification approaches for building secure and reliable smart contracts. Full article
Show Figures

Figure 1

17 pages, 440 KiB  
Communication
Democratizing Digital Transformation: A Multisector Study of Low-Code Adoption Patterns, Limitations, and Emerging Paradigms
by Zhengwu Shi, Junyu Dong and Yanhai Gan
Appl. Sci. 2025, 15(12), 6481; https://doi.org/10.3390/app15126481 - 9 Jun 2025
Viewed by 899
Abstract
Low-code development platforms (LCDPs) have emerged as transformative tools for accelerating digital transformation across industries by enabling rapid application development with minimal hand-coding. This paper synthesizes existing research and industry practices to explore the adoption, benefits, challenges, and future directions of low-code technologies [...] Read more.
Low-code development platforms (LCDPs) have emerged as transformative tools for accelerating digital transformation across industries by enabling rapid application development with minimal hand-coding. This paper synthesizes existing research and industry practices to explore the adoption, benefits, challenges, and future directions of low-code technologies in key sectors: automotive, equipment manufacturing, aerospace, electronics, and energy. Drawing on academic literature, industry reports, and case studies, this review highlights how low-code bridges the gap between IT and domain experts while addressing sector-specific demands. The study emphasizes the significant impact of LCDPs on operational efficiency, innovation acceleration, and the democratization of software development. However, it also identifies critical challenges related to customization, interoperability, security, and usability. The paper concludes with a discussion of emerging trends, including enhanced AI/ML integration, edge computing, open-source ecosystems, and sector-specific platform evolution, which are poised to shape the future of low-code development. Ultimately, this research underscores the potential of low-code platforms to drive sustainable digital transformation while addressing the complex needs of modern industries. Full article
Show Figures

Figure 1

24 pages, 6881 KiB  
Article
Sign Language Anonymization: Face Swapping Versus Avatars
by Marina Perea-Trigo, Manuel Vázquez-Enríquez, Jose C. Benjumea-Bellot, Jose L. Alba-Castro and Juan A. Álvarez-García
Electronics 2025, 14(12), 2360; https://doi.org/10.3390/electronics14122360 - 9 Jun 2025
Viewed by 524
Abstract
The visual nature of Sign Language datasets raises privacy concerns that hinder data sharing, which is essential for advancing deep learning (DL) models in Sign Language recognition and translation. This study evaluated two anonymization techniques, realistic avatar synthesis and face swapping (FS), designed [...] Read more.
The visual nature of Sign Language datasets raises privacy concerns that hinder data sharing, which is essential for advancing deep learning (DL) models in Sign Language recognition and translation. This study evaluated two anonymization techniques, realistic avatar synthesis and face swapping (FS), designed to anonymize the identities of signers, while preserving the semantic integrity of signed content. A novel metric, Identity Anonymization with Expressivity Preservation (IAEP), is introduced to assess the balance between effective anonymization and the preservation of facial expressivity crucial for Sign Language communication. In addition, the quality evaluation included the LPIPS and FID metrics, which measure perceptual similarity and visual quality. A survey with deaf participants further complemented the analysis, providing valuable insight into the practical usability and comprehension of anonymized videos. The results show that while face swapping achieved acceptable anonymization and preserved semantic clarity, avatar-based anonymization struggled with comprehension. These findings highlight the need for further research efforts on securing privacy while preserving Sign Language understandability, both for dataset accessibility and the anonymous participation of deaf people in digital content. Full article
(This article belongs to the Special Issue Application of Machine Learning in Graphics and Images, 2nd Edition)
Show Figures

Figure 1

28 pages, 1213 KiB  
Review
Digital by Default? A Critical Review of Age-Driven Inequalities in Payment Innovation
by Ida Claudia Panetta, Elaheh Anjomrouz, Paola Paiardini and Sabrina Leo
J. Risk Financial Manag. 2025, 18(6), 313; https://doi.org/10.3390/jrfm18060313 - 7 Jun 2025
Viewed by 1871
Abstract
This paper offers a systematic literature review of age-related disparities in the adoption of digital payment systems, a phenomenon that is becoming increasingly relevant as financial transactions become predominantly digital. Using the SPAR-4-SLR protocol, 66 scholarly contributions published between 2014 and 2024 are [...] Read more.
This paper offers a systematic literature review of age-related disparities in the adoption of digital payment systems, a phenomenon that is becoming increasingly relevant as financial transactions become predominantly digital. Using the SPAR-4-SLR protocol, 66 scholarly contributions published between 2014 and 2024 are examined and categorised into four thematic clusters: demographic determinants, behavioural drivers, structural barriers linked to the grey digital divide, and emerging insights from neurofinance. The review highlights a multifactorial set of barriers that limit older adults’ engagement with digital payments, including usability challenges, cognitive and physical limitations, digital skill gaps, and perceived security risks. These obstacles are further amplified by structural inequalities such as socio-economic status, geographic location, and infrastructural constraints. While digital payments are often presented as tools of inclusion, the findings underscore the risk of exclusion for ageing populations without tailored design and policy interventions. The review also identifies areas for further research, particularly at the intersection of ageing, cognitive function, and human–technology interaction, proposing a research agenda that supports more inclusive and age-responsive financial innovation. Full article
(This article belongs to the Special Issue Fintech, Business, and Development)
Show Figures

Figure 1

21 pages, 1368 KiB  
Review
Why Are Seed Dispersal Models Rarely Used? Limitations of Scalability and Improvement Measures
by Sle-gee Lee and Tae Kyung Yoon
Forests 2025, 16(5), 851; https://doi.org/10.3390/f16050851 - 20 May 2025
Viewed by 454
Abstract
Seed dispersal studies have primarily relied on prediction model methods, which limit clarity regarding how variables affect movement direction. Suggestions for improvement are limited to specific domains due to the lack of quantitative evaluation of the comprehensive scope of the basic steps, from [...] Read more.
Seed dispersal studies have primarily relied on prediction model methods, which limit clarity regarding how variables affect movement direction. Suggestions for improvement are limited to specific domains due to the lack of quantitative evaluation of the comprehensive scope of the basic steps, from explaining seed dispersal to its application in related fields. This study aimed to reconsider the classification of seed movement mechanisms, identify research trends from an integrated perspective, and discuss the current implications and improvement measures. The data included 240 studies related to seed dispersal across the observation, generalization, and application phases. By classifying the mechanisms based on the direction of movement, the main variables affecting movement due to gravity or wind can be clearly distinguished. Although seed dispersal models assume gravity as the core principle, only 12.91% of the studies addressed terminal velocity, and a mere 1.25% measured the diaspore area, both of which are essential for accurate prediction. In addition, attempts to utilize seed dispersal for natural regeneration were relatively frequent (14.58%), but they remained at the empirical model stage, relying on data collected in the field, and thus lacked connection with models developed in previous studies. The requirements for enhancing the field usability of seed dispersal based on the current review include (1) improving the data collection system for securing primary data, (2) collecting sufficient field data, and (3) developing a unified model that can be applied to various conditions and species. Full article
(This article belongs to the Special Issue Topicalities in Forest Ecology of Seeds, 2nd Edition)
Show Figures

Figure 1

Back to TopTop