Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (2,547)

Search Parameters:
Keywords = Internet measurement

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
21 pages, 1584 KB  
Article
Ionospheric Information-Assisted Spoofing Detection Technique and Performance Evaluation for Dual-Frequency GNSS Receiver
by Zhenyang Wu, Haixuan Fu, Xiaoxuan Xu, Yuhao Xiao, Yimin Ma, Ziheng Zhou and Hong Li
Electronics 2025, 14(19), 3865; https://doi.org/10.3390/electronics14193865 - 29 Sep 2025
Abstract
Global Navigation Satellite System (GNSS) spoofing, which manipulates PVT solutions through false measurements, increasingly threatens GNSS reliability and user safety. However, most existing simulator-based spoofers, constrained by their inability to access real-time ionospheric information (e.g., Global Ionosphere Maps, GIMs) from external sources, struggle [...] Read more.
Global Navigation Satellite System (GNSS) spoofing, which manipulates PVT solutions through false measurements, increasingly threatens GNSS reliability and user safety. However, most existing simulator-based spoofers, constrained by their inability to access real-time ionospheric information (e.g., Global Ionosphere Maps, GIMs) from external sources, struggle to replicate authentic total electron content (TEC) along each signal propagation path accurately and in a timely manner. In contrast, widespread dual-frequency (DF) receivers with access to the internet can validate local TEC measurements against external references, establishing a pivotal spoofing detection distinction. Here, we propose an Ionospheric Information-Assisted Spoofing Detection Technique (IIA-SDT), exploiting the inherent consistency between TEC values derived from DF pseudo-range measurements and external references in spoofing-free scenarios. Spoofing probably disrupts this consistency: in simulator-based full-channel spoofing where all channels are spoofed, the inaccuracies of the offline ionospheric model used by the spoofer inevitably cause TEC mismatches; in partial-channel spoofing where the spoofer fails to control all channels, an unintended PVT deviation is induced, which also causes TEC deviations due to the spatial variation of the ionosphere. Basic principles and theoretical analysis of the proposed IIA-SDT are elaborated in the paper. Simulations using ionospheric data collected from 2023 to 2024 at a typical mid-latitude location are conducted to evaluate IIA-SDT performance under various parameter configurations. With a window length of 5 s and satellite number of 8, the annual average detection probability approximates 75% at a false alarm rate of 1×103, with observable temporal variations. Field experiments across multiple scenarios further validate the spoofing detection capability of the proposed method. Full article
Show Figures

Figure 1

19 pages, 2248 KB  
Article
A Platform for Machine Learning Operations for Network Constrained Far-Edge Devices
by Calum McCormack and Imene Mitiche
Appl. Syst. Innov. 2025, 8(5), 141; https://doi.org/10.3390/asi8050141 - 28 Sep 2025
Abstract
Machine Learning (ML) models developed for the Edge have seen a massive uptake in recent years, with many types of predictive analytics, condition monitoring and pre-emptive fault detection developed and in-use on Internet of Things (IoT) systems serving industrial power generators, environmental monitoring [...] Read more.
Machine Learning (ML) models developed for the Edge have seen a massive uptake in recent years, with many types of predictive analytics, condition monitoring and pre-emptive fault detection developed and in-use on Internet of Things (IoT) systems serving industrial power generators, environmental monitoring systems and more. At scale, these systems can be difficult to manage and keep upgraded, especially those devices that are deployed in far-Edge networks with unreliable networking. This paper presents a simple and novel platform architecture for deployment and management of ML at the Edge for increasing model and device reliability by reducing downtime and access to new model versions via the ability to manage models from both Cloud and Edge. This platform provides an Edge ML Operations “Mirror” that replicates and minimises cloud MLOps systems to provide reliable delivery and retraining of models at the network Edge, solving many problems associated with both Cloud-first and Edge networks. The paper explores and explains the architecture and components of the system, offering a prototype system that was evaluated by measuring time to deploy models with regard to differing network instabilities in a simulated environment to highlight the necessity for local management and federated training of models as a secondary function to Cloud model management. This architecture could be utilised by researchers to improve the deployment, recording and management of ML experiments on the Edge. Full article
Show Figures

Figure 1

15 pages, 603 KB  
Article
A Hybrid CNN–GRU Deep Learning Model for IoT Network Intrusion Detection
by Kuburat Oyeranti Adefemi, Murimo Bethel Mutanga and Oyeniyi Akeem Alimi
J. Sens. Actuator Netw. 2025, 14(5), 96; https://doi.org/10.3390/jsan14050096 - 26 Sep 2025
Abstract
Internet of Things (IoT) networks are constantly exposed to various security challenges and vulnerabilities, including manipulative data injections and cyberattacks. Traditional security measures are often inadequate, overburdened, and unreliable in adapting to the heterogeneous yet diverse nature of IoT networks. This emphasizes the [...] Read more.
Internet of Things (IoT) networks are constantly exposed to various security challenges and vulnerabilities, including manipulative data injections and cyberattacks. Traditional security measures are often inadequate, overburdened, and unreliable in adapting to the heterogeneous yet diverse nature of IoT networks. This emphasizes the need for intelligent and effective methodologies. In recent times, deep learning models have been extensively used to monitor and detect intrusions in complex applications. The models can effectively learn and understand the dynamic characteristics of voluminous IoT datasets to prompt efficient decision-making predictions. This study proposes a hybrid Convolutional Neural Network and Gated Recurrent Unit (CNN-GRU) algorithm to enhance intrusion detection in IoT environments. The proposed CNN-GRU model is validated using two benchmark datasets: the IoTID20 and BoT-IoT intrusion detection datasets. The proposed model incorporates an effective technique to handle the class imbalance issues that are peculiar to voluminous datasets. The results demonstrate superior accuracy, precision, recall, F1-score, and area under the curve, with a reduced false positive rate compared to similar models in the literature. Specifically, the proposed CNN–GRU achieved up to 99.83% and 99.01% accuracy, surpassing baseline models by a margin of 2–3% across both datasets. These findings highlight the model’s potential for real-time cybersecurity applications in IoT networks and general industrial control systems. Full article
Show Figures

Figure 1

42 pages, 2586 KB  
Review
Telehealth as a Sociotechnical System: A Systems Analysis of Adoption and Efficacy Among Older Adults Post-COVID-19
by Md Golam Rabbani, Ashrafe Alam and Victor R. Prybutok
Systems 2025, 13(10), 843; https://doi.org/10.3390/systems13100843 - 25 Sep 2025
Abstract
Framed within the lens of systems theory and sociotechnical systems thinking, this systematic review examines telehealth as a complex adaptive system and dynamic health system shaped by the interactions between interconnected technological, social, and institutional components. Recognizing telehealth as part of a complex [...] Read more.
Framed within the lens of systems theory and sociotechnical systems thinking, this systematic review examines telehealth as a complex adaptive system and dynamic health system shaped by the interactions between interconnected technological, social, and institutional components. Recognizing telehealth as part of a complex adaptive system, the review identifies how interdependent factors, such as digital literacy, connectivity, and policy, evolve and influence access to and the emergent properties of care. A systematic review was conducted following the PRISMA 2020 guidelines and PROSPERO registration (CRD420251103608), analyzing 42 peer-reviewed articles published between January 2020 and June 2025, identified through the MEDLINE, Web of Science, EBSCOhost, ACM Digital Library, PsycINFO, and Scopus databases. Key findings include sustained but reduced telehealth use after the pandemic peak, as well as a small yet statistically significant positive effect of telehealth interventions on cognitive emergent properties, defined here as measurable outcomes like memory, attention, executive function, and processing speed (SMD = 0.29; 95% CI [0.04, 0.54]) with very low heterogeneity (I2 = 0%). Significant system components such as digital illiteracy, poor internet connectivity, and complex technology interfaces disproportionately affected economically disadvantaged, minority, and rural older adults. Practical strategies rooted in systems thinking include digital literacy programs, simplified interfaces, caregiver support, improved broadband infrastructure, hybrid healthcare models, and supportive policies. Future research should focus on evidence-based, system-level interventions across diverse settings to bridge the digital divide and promote equitable access to telehealth for older adults. Full article
Show Figures

Figure 1

12 pages, 2823 KB  
Article
Magnetic Interactions in Ferrite Bead-Enhanced Wiegand Wires Evaluated by First-Order Reversal Curves
by Chao Yang, Liansong Guo, Guorong Sha, Liang Jiang, Zenglu Song and Yasushi Takemura
Materials 2025, 18(19), 4477; https://doi.org/10.3390/ma18194477 - 25 Sep 2025
Abstract
Wiegand sensors are essential components in self-powered Internet of Things (IoT) nodes, as they can output pulse voltages without an external power supply. Previous research has established that the attachment of ferrite beads to Wiegand wire terminals substantially enhances the sensor’s pulse voltage [...] Read more.
Wiegand sensors are essential components in self-powered Internet of Things (IoT) nodes, as they can output pulse voltages without an external power supply. Previous research has established that the attachment of ferrite beads to Wiegand wire terminals substantially enhances the sensor’s pulse voltage output. However, the fundamental mechanism responsible for this enhancement remains unclear at the microscopic magnetic level. This investigation systematically examines how ferrite bead attachments alter magnetization reversal processes, Barkhausen jump characteristics, and the energy output in Wiegand wires. Experimental results reveal that ferrite beads enhance irreversible magnetization, modify interaction distributions, and transform the magnetic structure of Wiegand wires. These modifications collectively result in a 1.5–2.0 times higher pulse voltage amplitude and 30–40% greater output energy, establishing a theoretical framework for Wiegand sensor optimization. The research methodology combines vibrating sample magnetometer (VSM) measurements with first-order reversal curve (FORC) analysis to elucidate the underlying micromagnetic mechanisms. Full article
(This article belongs to the Section Advanced Materials Characterization)
Show Figures

Figure 1

34 pages, 16346 KB  
Review
A Review on Vibration Sensor: Key Parameters, Fundamental Principles, and Recent Progress on Industrial Monitoring Applications
by Limin Ma, Zhangpeng Li, Shengrong Yang and Jinqing Wang
Vibration 2025, 8(4), 56; https://doi.org/10.3390/vibration8040056 - 25 Sep 2025
Abstract
This paper presents a systematic review of vibration sensors and their application in industrial-monitoring systems, aiming to provide a comprehensive reference for both academic research and practical applications in this field. Through the classification of measured parameters and sensing principles, this work endeavors [...] Read more.
This paper presents a systematic review of vibration sensors and their application in industrial-monitoring systems, aiming to provide a comprehensive reference for both academic research and practical applications in this field. Through the classification of measured parameters and sensing principles, this work endeavors to establish a structured understanding of vibration sensor’s working mechanism and deliver an in-depth analysis of their recent research achievements. By integrating practical cases from typical domains, this manuscript comprehensively demonstrates the practical value and application potential of vibration sensors in equipment-monitoring systems, illustrating how these sensors are utilized to detect mechanical failures and enhance the performance and safety of industrial systems, such as wind turbine, tunnel boring machine, and aerospace engine. Looking forward, with the rapid advancement of the Internet of Things (IoT) and artificial intelligence (AI) technologies, vibration sensors are anticipated to evolve towards multifunctionalization, miniaturization and intelligentization, thereby forming a comprehensive monitoring network that improves overall efficiency and reliability of the mechanical systems. Full article
Show Figures

Figure 1

18 pages, 537 KB  
Article
Internet Skills Scale (ISS) in University Students from Chile: Factorial Structure, Reliability, Validity and Measurement Invariance of the Chilean Version
by Miguel Galván-Cabello, Julio Tereucan-Angulo, Gustavo Troncoso-Tejada, David Arellano-Silva, Víctor Sánchez-Gallegos and Isidora Nogués-Solano
Sustainability 2025, 17(19), 8597; https://doi.org/10.3390/su17198597 - 25 Sep 2025
Viewed by 60
Abstract
Within the framework of the 2030 Agenda, universities are key institutions in promoting digital competencies aligned with Sustainable Development Goals (SDGs), particularly SDG 4 (Quality Education) and SDG 10 (Reduced Inequalities). This study evaluates the psychometric properties of the Internet Skills Scale (ISS), [...] Read more.
Within the framework of the 2030 Agenda, universities are key institutions in promoting digital competencies aligned with Sustainable Development Goals (SDGs), particularly SDG 4 (Quality Education) and SDG 10 (Reduced Inequalities). This study evaluates the psychometric properties of the Internet Skills Scale (ISS), adapted for Chilean university students, as a tool to assess how effectively higher education fosters digital skills that enable critical participation and social inclusion. Using a sample of 906 students from nine public universities across Chile, the ISS was linguistically and culturally adapted, and its factorial structure, reliability, validity, and measurement invariance were tested. The results support a four-factor model—operational, navigation, social, and creative skills—under a second-order structure, with strong fit indices (CFI = 0.987; RMSEA = 0.055) and high internal consistency (α > 0.83). The ISS also demonstrated gender-based measurement invariance and convergent validity with digital citizenship. These findings underscore the ISS as a valid instrument for monitoring the effectiveness and equity of digital education policies in universities. Its application contributes to diagnosing institutional performance regarding the integration of digital competencies into curricula, thus guiding improvements in educational strategies toward socially just, inclusive, and sustainable digital participation. Full article
Show Figures

Figure 1

16 pages, 828 KB  
Article
Predictors of Problematic Internet Use Among Romanian High School Students
by Brigitte Osser, Csongor Toth, Carmen Delia Nistor-Cseppento, Mariana Cevei, Cristina Aur, Maria Orodan, Roland Fazakas and Laura Ioana Bondar
Children 2025, 12(10), 1292; https://doi.org/10.3390/children12101292 - 24 Sep 2025
Viewed by 32
Abstract
Background: Problematic internet use among adolescents is linked to poorer mental health, academic performance, and social functioning, yet evidence from Eastern Europe remains limited. Methods: We conducted a school-based cross-sectional study at a Romanian high school (Arad County) including 308 students aged 15–18 [...] Read more.
Background: Problematic internet use among adolescents is linked to poorer mental health, academic performance, and social functioning, yet evidence from Eastern Europe remains limited. Methods: We conducted a school-based cross-sectional study at a Romanian high school (Arad County) including 308 students aged 15–18 years (154 males, 154 females). Students completed a demographic/behavioral questionnaire and the 20-item Internet Addiction Test (IAT), a widely used measure of problematic internet use. The prespecified primary analysis was a multivariable linear regression of IAT score on sex, age group, residence, daily screen time, prior attempts to reduce use, and main internet purpose; supporting analyses included t-tests, ANOVA, and Pearson correlation (α = 0.05). Results: In bivariable comparisons, males, older adolescents (17–18 years), and urban residents reported higher IAT scores; screen time correlated with IAT (r = 0.460, p < 0.001), and prior reduction attempts were associated with higher scores (Cohen’s d = 0.80). In the adjusted model, male sex (β = 4.97), older age (β = 5.36), greater daily screen time (β = 1.67 per hour), prior attempts to reduce use (β = 4.13), and primarily using the internet for gaming (β = 5.71) remained significant predictors (all p ≤ 0.045); urban residence was not retained (p = 0.218). The model explained 43% of IAT variance (R2 = 0.43). Conclusions: Demographic and behavioral factors independently predict adolescent problematic internet use, highlighting high-risk profiles (older males, heavy screen time, gaming focus, prior reduction attempts). These findings support school-based screening and targeted digital-health interventions in underrepresented contexts. Full article
(This article belongs to the Section Pediatric Mental Health)
Show Figures

Graphical abstract

14 pages, 1486 KB  
Article
Optically Controlled Bias-Free Frequency Reconfigurable Antenna
by Karam Mudhafar Younus, Khalil Sayidmarie, Kamel Sultan and Amin Abbosh
Sensors 2025, 25(19), 5951; https://doi.org/10.3390/s25195951 - 24 Sep 2025
Viewed by 75
Abstract
A bias-free antenna tuning technique that eliminates conventional DC biasing networks is presented. The tuning mechanism is based on a Light-Dependent Resistor (LDR) embedded within the antenna structure. Optical illumination is used to modulate the LDR’s resistance, thereby altering the antenna’s effective electrical [...] Read more.
A bias-free antenna tuning technique that eliminates conventional DC biasing networks is presented. The tuning mechanism is based on a Light-Dependent Resistor (LDR) embedded within the antenna structure. Optical illumination is used to modulate the LDR’s resistance, thereby altering the antenna’s effective electrical length and enabling tuning of its resonant frequency and operating bands. By removing the need for bias lines, RF chokes, blocking capacitors, and control circuitry, the proposed approach minimizes parasitic effects, losses, biasing energy, and routing complexity. This makes it particularly suitable for compact and energy-constrained platforms, such as Internet of Things (IoT) devices. As proof of concept, an LDR is integrated into a ring monopole antenna, achieving tri-band operation in both high and low resistance states. In the high-resistance (OFF) state, the fabricated prototype operates across 2.1–3.1 GHz, 3.5–4 GHz, and 5–7 GHz. In the low-resistance (ON) state, the LDR bridges the two arcs of the monopole, extending the current path and shifting the lowest band to 1.36–2.35 GHz, with only minor changes to the mid and upper bands. The antenna maintains linear polarization across all bands and switching states, with measured gains reaching up to 5.3 dBi. Owing to its compact, bias-free, and low-cost architecture, the proposed design is well-suited for integration into portable wireless devices, low-power IoT nodes, and rapidly deployable communications systems where electrical biasing is impractical. Full article
(This article belongs to the Special Issue Microwave Components in Sensing Design and Signal Processing)
Show Figures

Figure 1

20 pages, 1272 KB  
Article
Attitudes and Beliefs of Wild Boar Hunters in Croatia Towards Preventing and Controlling African Swine Fever
by Lucija Pečurlić, Tihomir Florijančić, Neška Vukšić Končevski, Denis Deže and Sanja Jelić Milković
Animals 2025, 15(19), 2782; https://doi.org/10.3390/ani15192782 - 24 Sep 2025
Viewed by 143
Abstract
African swine fever (ASF) is a highly contagious and fatal disease of domestic pigs and wild boars, with severe economic and ecological consequences. Wild boar hunters play a critical role in the early detection and control of ASF due to their direct interaction [...] Read more.
African swine fever (ASF) is a highly contagious and fatal disease of domestic pigs and wild boars, with severe economic and ecological consequences. Wild boar hunters play a critical role in the early detection and control of ASF due to their direct interaction with wild boar populations. This study examined the attitudes, knowledge, and behaviour of wild boar hunters in Croatia regarding ASF prevention and control, with a focus on the influence of sociodemographic factors, hunting experience, and participation in training programmes. An online survey of 276 wild boar hunters from an ASF-affected county in Croatia was conducted between October and December 2024. Results indicate that 93.5% of wild boar hunters are aware of ASF and its risks, relying primarily on internet sources for information. Experienced and higher-educated wild boar hunters demonstrated greater confidence in recognising ASF symptoms and stronger support for preventive measures, education, and institutional cooperation. Factor analysis revealed three main dimensions shaping attitudes: communication and awareness, institutional capacity, and regulatory policies. The results emphasise the importance of continuous education, transparent communication and participatory approaches to strengthen cooperation with hunters and improve ASF control. They also emphasise the need for targeted, evidence-based communication strategies that actively involve hunters in surveillance and reporting. Tailored educational materials and digital communication could increase carcass reporting, improve early detection and increase the overall effectiveness of ASF control programmes. Full article
Show Figures

Figure 1

21 pages, 491 KB  
Article
Minimal Overhead Modelling of Slow DoS Attack Detection for Resource-Constrained IoT Networks
by Andy Reed, Laurence S. Dooley and Soraya Kouadri Mostefaoui
Future Internet 2025, 17(10), 432; https://doi.org/10.3390/fi17100432 - 23 Sep 2025
Viewed by 84
Abstract
The increasing deployment of internet of things(IoT) systems across critical domains has broadened the threat landscape, and being the catalyst for a variety of security concerns, including very stealthy slow denial of service (slow DoS) attacks. These exploit the hypertext transfer protocol’s (HTTP) [...] Read more.
The increasing deployment of internet of things(IoT) systems across critical domains has broadened the threat landscape, and being the catalyst for a variety of security concerns, including very stealthy slow denial of service (slow DoS) attacks. These exploit the hypertext transfer protocol’s (HTTP) application-layer protocol to either close down service requests or degrade responsiveness while closely mimicking legitimate traffic. Current available datasets fail to capture the more stealthy operational profiles of slow DoS attacks or account for the presence of genuine slow nodes (SN), which are devices experiencing high latency. These can significantly degrade detection accuracy since slow DoS attacks closely emulate SN. This paper addresses these problems by synthesising a realistic HTTP slow DoS dataset derived from a live IoT network, that incorporates both stealth-tuned slow DoS traffic and legitimate SN traffic, with the three main slow DoS variants of slow GET, slow Read, and slow POST being critically evaluated under these network conditions. A limited packet capture (LPC) strategy is adopted which focuses on just two metadata attributes, namely packet length (lp) and packet inter-arrival time (Δt). Using a resource lightweight decision tree classifier, the proposed model achieves over 96% accuracy while incurring minimal computational overheads. Experimental results in a live IoT network reveal the negative classification impact of including SN traffic, thereby underscoring the importance of modelling stealthy attacks and SN latency in any slow DoS detection framework. Finally, a MPerf (Modelling Performance) is presented which quantifies and balances detection accuracy against processing costs to facilitate scalable deployment of low-cost detection models in resource-constrained IoT networks. This represents a practical solution to improving IoT resilience against stealthy slow DoS attacks whilst pragmatically balancing the resource-constraints of IoT nodes. By analysing the impact of SN on detection performance, a robust reliable model has been developed which can both measure and fine tune the accuracy-efficiency nexus. Full article
Show Figures

Figure 1

22 pages, 2809 KB  
Article
Radiation Pattern Recovery from Tilted Orbital Sampling Measurements via Sparse Spherical Harmonic Expansion
by Miguel Labodía and Arturo Mediano
Electronics 2025, 14(19), 3755; https://doi.org/10.3390/electronics14193755 - 23 Sep 2025
Viewed by 73
Abstract
This paper proposes a reconstruction framework for estimating the far-field (FF) radiation patterns of large, heavy, or non-rotatable wireless-enabled systems. The method combines a tilted orbital sampling (ToS) strategy with sparse spherical harmonic (SH) expansion, compressed sensing (CS), and convex optimization (CO), thereby [...] Read more.
This paper proposes a reconstruction framework for estimating the far-field (FF) radiation patterns of large, heavy, or non-rotatable wireless-enabled systems. The method combines a tilted orbital sampling (ToS) strategy with sparse spherical harmonic (SH) expansion, compressed sensing (CS), and convex optimization (CO), thereby linking a mechanically constrained acquisition scheme with a mathematically efficient recovery process. The purpose of this integration is not only to reduce the number of measurements but also to retrieve the radiation information most relevant to Internet of Things (IoT) devices and bulky equipment that cannot be easily rotated within anechoic chambers. The framework is validated on two representative cases: a canonical half-wave dipole and a commercial Wi-Fi-enabled device. In the latter and more challenging case, accurate reconstruction is achieved with fewer than 30 SH coefficients and using less than 20% of the measurements required by a conventional full-sphere scan, with the normalized root-mean-square error remaining below 5%. Although inaccessible angular regions may be partially uncharacterized, such directions are of minor relevance for the intended operational coverage. The resulting SH-based representation can be seamlessly integrated into ray-tracing propagation simulators and electromagnetic optimization workflows, enabling efficient and application-oriented OTA characterization under realistic chamber constraints. Full article
(This article belongs to the Section Microwave and Wireless Communications)
Show Figures

Figure 1

22 pages, 938 KB  
Article
Associations of Place-Based Factors with Service Use and Consumer-Reported Unmet Service Needs Among Older Adults Using Publicly Funded Home- and Community-Based Services in the United States
by Tetyana P. Shippee, Romil R. Parikh, Nicholas Musinguzi, Benjamin W. Langworthy, Jack M. Wolf, Stephanie Giordano and Eric Jutkowitz
Int. J. Environ. Res. Public Health 2025, 22(9), 1461; https://doi.org/10.3390/ijerph22091461 - 22 Sep 2025
Viewed by 212
Abstract
Access to home- and community-based services (HCBS) is critical for aging in place; yet many older adults continue to experience unmet needs. While individual-level factors are better-studied, less is known about how neighborhood-level place-based factors (PBFs, e.g., poverty, housing conditions, transportation, and internet [...] Read more.
Access to home- and community-based services (HCBS) is critical for aging in place; yet many older adults continue to experience unmet needs. While individual-level factors are better-studied, less is known about how neighborhood-level place-based factors (PBFs, e.g., poverty, housing conditions, transportation, and internet access) shape access to and adequacy of HCBS. This study addresses that gap by examining the added explanatory value of PBFs in predicting HCBS use and unmet needs. We analyzed data from 6558 community-dwelling adults aged ≥ 65 years using the 2022–2023 National Core Indicators–Aging & Disability Adult Consumer Survey. Outcomes included use of six HCBS types, consumer-reported unmet needs for each type, and overall unmet HCBS needs. PBFs were measured at the ZIP code level using the 2016–2020 American Community Survey. Nested logistic regression models estimated incremental variance (McFadden’s R2) explained by PBFs, adjusting for individual demographics, health status, state, and proxy response. Adding PBFs increased explained variance by 7.98–22.70% for HCBS use, 35.92–48.00% for unmet needs by service type, and 51.85% for overall unmet HCBS needs. PBFs meaningfully influence both access to and adequacy of HCBS. Using PBFs to guide resource allocation and targeting modifiable PBFs could improve HCBS access and efficiency. Full article
Show Figures

Figure 1

17 pages, 1731 KB  
Article
Comparative Performance Analysis of Lightweight Cryptographic Algorithms on Resource-Constrained IoT Platforms
by Tiberius-George Sorescu, Vlad-Mihai Chiriac, Mario-Alexandru Stoica, Ciprian-Romeo Comsa, Iustin-Gabriel Soroaga and Alexandru Contac
Sensors 2025, 25(18), 5887; https://doi.org/10.3390/s25185887 - 20 Sep 2025
Viewed by 230
Abstract
The increase in Internet of Things (IoT) devices has introduced significant security challenges, primarily due to their inherent constraints in computational power, memory, and energy. This study provides a comparative performance analysis of selected modern cryptographic algorithms on a resource-constrained IoT platform, the [...] Read more.
The increase in Internet of Things (IoT) devices has introduced significant security challenges, primarily due to their inherent constraints in computational power, memory, and energy. This study provides a comparative performance analysis of selected modern cryptographic algorithms on a resource-constrained IoT platform, the Nordic Thingy:53. We evaluated a set of ciphers including the NIST lightweight standard ASCON, eSTREAM finalists Salsa20, Rabbit, Sosemanuk, HC-256, and the extended-nonce variant XChaCha20. Using a dual test-bench methodology, we measured energy consumption and performance under two distinct scenarios: a low-data-rate Bluetooth mesh network and a high-throughput bulk data transfer. The results reveal significant performance variations among the algorithms. In high-throughput tests, ciphers like XChaCha20, Salsa20, and ASCON32 demonstrated superior speed, while HC-256 proved impractically slow for large payloads. The Bluetooth mesh experiments quantified the direct relationship between network activity and power draw, underscoring the critical impact of cryptographic choice on battery life. These findings offer an empirical basis for selecting appropriate cryptographic solutions that balance security, energy efficiency, and performance requirements for real-world IoT applications. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

29 pages, 3242 KB  
Article
A Platform-Agnostic Publish–Subscribe Architecture with Dynamic Optimization
by Ahmed Twabi, Yepeng Ding and Tohru Kondo
Future Internet 2025, 17(9), 426; https://doi.org/10.3390/fi17090426 - 19 Sep 2025
Viewed by 185
Abstract
Real-time media streaming over publish–subscribe platforms is increasingly vital in scenarios that demand the scalability of event-driven architectures while ensuring timely media delivery. This is especially true in multi-modal and resource-constrained environments, such as IoT, Physical Activity Recognition and Measure (PARM), and Internet [...] Read more.
Real-time media streaming over publish–subscribe platforms is increasingly vital in scenarios that demand the scalability of event-driven architectures while ensuring timely media delivery. This is especially true in multi-modal and resource-constrained environments, such as IoT, Physical Activity Recognition and Measure (PARM), and Internet of Video Things (IoVT), where integrating sensor data with media streams often leads to complex hybrid setups that compromise consistency and maintainability. Publish–subscribe (pub/sub) platforms like Kafka and MQTT offer scalability and decoupled communication but fall short in supporting real-time video streaming due to platform-dependent design, rigid optimization, and poor sub-second media handling. This paper presents FrameMQ, a layered, platform-agnostic architecture designed to overcome these limitations by decoupling application logic from platform-specific configurations and enabling dynamic real-time optimization. FrameMQ exposes tunable parameters such as compression and segmentation, allowing integration with external optimizers. Using Particle Swarm Optimization (PSO) as an exemplary optimizer, FrameMQ reduces total latency from over 2300 ms to below 400ms under stable conditions (over an 80% improvement) and maintains up to a 52% reduction under adverse network conditions. These results demonstrate FrameMQ’s ability to meet the demands of latency-sensitive applications, such as real-time streaming, IoT, and surveillance, while offering portability, extensibility, and platform independence without modifying the core application logic. Full article
Show Figures

Figure 1

Back to TopTop