Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (8,481)

Search Parameters:
Keywords = Internet of Thing (IoT)

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
2010 KB  
Review
Next-Generation Chemical Sensors: The Convergence of Nanomaterials, Advanced Characterization, and Real-World Applications
by Abniel Machín and Francisco Márquez
Chemosensors 2025, 13(9), 345; https://doi.org/10.3390/chemosensors13090345 (registering DOI) - 8 Sep 2025
Abstract
Chemical sensors have undergone transformative advances in recent years, driven by the convergence of nanomaterials, advanced fabrication strategies, and state-of-the-art characterization methods. This review emphasizes recent developments, with particular attention to progress achieved over the past decade, and highlights the role of the [...] Read more.
Chemical sensors have undergone transformative advances in recent years, driven by the convergence of nanomaterials, advanced fabrication strategies, and state-of-the-art characterization methods. This review emphasizes recent developments, with particular attention to progress achieved over the past decade, and highlights the role of the United States as a major driver of global innovation in the field. Nanomaterials such as graphene derivatives, MXenes, carbon nanotubes, metal–organic frameworks (MOFs), and hybrid composites have enabled unprecedented analytical performance. Representative studies report detection limits down to the parts-per-billion (ppb) and even parts-per-trillion (ppt) level, with linear ranges typically spanning 10–500 ppb for volatile organic compounds (VOCs) and 0.1–100 μM for biomolecules. Response and recovery times are often below 10–30 seconds, while reproducibility frequently exceeds 90% across multiple sensing cycles. Stability has been demonstrated in platforms capable of continuous operation for weeks to months without significant drift. In parallel, additive manufacturing, device miniaturization, and flexible electronics have facilitated the integration of sensors into wearable, stretchable, and implantable platforms, extending their applications in healthcare diagnostics, environmental monitoring, food safety, and industrial process control. Advanced characterization techniques, including in situ Raman spectroscopy, X-ray Photoelectron Spectroscopy (XPS, Atomic Force Microscopy (AFM) , and high-resolution electron microscopy, have elucidated interfacial charge-transfer mechanisms, guiding rational material design and improved selectivity. Despite these achievements, challenges remain in terms of scalability, reproducibility of nanomaterial synthesis, long-term stability, and regulatory validation. Data privacy and cybersecurity also emerge as critical issues for IoT-integrated sensing networks. Looking forward, promising future directions include the integration of artificial intelligence and machine learning for real-time data interpretation, the development of biodegradable and eco-friendly materials, and the convergence of multidisciplinary approaches to ensure robust, sustainable, and socially responsible sensing platforms. Overall, nanomaterial-enabled chemical sensors are poised to become indispensable tools for advancing public health, environmental sustainability, and industrial innovation, offering a pathway toward intelligent and adaptive sensing systems. Full article
Show Figures

Graphical abstract

569 KB  
Article
Trustworthy Adaptive AI for Real-Time Intrusion Detection in Industrial IoT Security
by Mohammad Al Rawajbeh, Amala Jayanthi Maria Soosai, Lakshmana Kumar Ramasamy and Firoz Khan
IoT 2025, 6(3), 53; https://doi.org/10.3390/iot6030053 (registering DOI) - 8 Sep 2025
Abstract
Traditional security methods fail to match the speed of evolving threats because Industrial Internet of Things (IIoT) technologies have become more widely adopted. A lightweight adaptive AI-based intrusion detection system (IDS) for IIoT environments is presented in this paper. The proposed system detects [...] Read more.
Traditional security methods fail to match the speed of evolving threats because Industrial Internet of Things (IIoT) technologies have become more widely adopted. A lightweight adaptive AI-based intrusion detection system (IDS) for IIoT environments is presented in this paper. The proposed system detects cyber threats in real time through an ensemble of online learning models that also adapt to changing network behavior. The system implements SHAP (SHapley Additive exPlanations) for model prediction explanations to allow human operators to verify and understand alert causes while addressing the essential need for trust and transparency. The system validation was performed using the ToN_IoT and Bot-IoT benchmark datasets. The proposed system detects threats with 96.4% accuracy while producing 2.1% false positives and requiring 35 ms on average for detection on edge devices with limited resources. Security analysts can understand model decisions through SHAP analysis because packet size and protocol type and device activity patterns strongly affect model predictions. The system underwent testing on a Raspberry Pi 5-based IIoT testbed to evaluate its deployability in real-world scenarios through emulation of practical edge environments with constrained computational resources. The research unites real-time adaptability with explainability and low-latency performance in an IDS framework specifically designed for industrial IoT security. The solution provides a scalable method to boost cyber resilience in manufacturing, together with energy and critical infrastructure sectors. By enabling fast, interpretable, and low-latency intrusion detection directly on edge devices, this solution enhances cyber resilience in critical sectors such as manufacturing, energy, and infrastructure, where timely and trustworthy threat responses are essential to maintaining operational continuity and safety. Full article
(This article belongs to the Special Issue Cybersecurity in the Age of the Internet of Things)
7195 KB  
Article
An Extension of Input Setup Assistance Service Using Generative AI to Unlearned Sensors for the SEMAR IoT Application Server Platform
by I Nyoman Darma Kotama, Nobuo Funabiki, Yohanes Yohanie Fridelin Panduman, Komang Candra Brata, Anak Agung Surya Pradhana and Noprianto
IoT 2025, 6(3), 52; https://doi.org/10.3390/iot6030052 (registering DOI) - 8 Sep 2025
Abstract
Nowadays, Internet of Things (IoT) application systems are broadly applied to various sectors of society for efficient management by monitoring environments using sensors, analyzing sampled data, and giving proper feedback. For their fast deployment, we have developed Smart Environmental Monitoring and Analysis in [...] Read more.
Nowadays, Internet of Things (IoT) application systems are broadly applied to various sectors of society for efficient management by monitoring environments using sensors, analyzing sampled data, and giving proper feedback. For their fast deployment, we have developed Smart Environmental Monitoring and Analysis in Real Time (SEMAR) as an integrated IoT application server platform and implemented the input setup assistance service using prompt engineering and a generative AI model to assist connecting sensors to SEMAR with step-by-step guidance. However, the current service cannot assist in connections of the sensors not learned by the AI model, such as newly released ones. To address this issue, in this paper, we propose an extension to the service for handling unlearned sensors by utilizing datasheets with four steps: (1) users input a PDF datasheet containing information about the sensor, (2) key specifications are extracted from the datasheet and structured into markdown format using a generative AI, (3) this data is saved to a vector database using chunking and embedding methods, and (4) the data is used in Retrieval-Augmented Generation (RAG) to provide additional context when guiding users through sensor setup. Our evaluation with five generative AI models shows that OpenAI’s GPT-4o achieves the highest accuracy in extracting specifications from PDF datasheets and the best answer relevancy (0.987), while Gemini 2.0 Flash delivers the most balanced results, with the highest overall RAGAs score (0.76). Other models produced competitive but mixed outcomes, averaging 0.74 across metrics. The step-by-step guidance function achieved a task success rate above 80%. In a course evaluation by 48 students, the system improved the student test scores, further confirming the effectiveness of our proposed extension. Full article
2548 KB  
Article
Random Access Preamble Design for 6G Satellite–Terrestrial Integrated Communication Systems
by Min Hua, Zhongqiu Wu, Cong Zhang, Zeyang Xu, Xiaoming Liu and Wen Zhou
Sensors 2025, 25(17), 5602; https://doi.org/10.3390/s25175602 (registering DOI) - 8 Sep 2025
Abstract
Satellite–terrestrial integrated communication systems (STICSs) are envisioned to provide ubiquitous, seamless connectivity in next-generation (6G) wireless communication networks for massive-scale Internet of Things (IoT) deployments. This global coverage extends beyond densely populated areas to remote regions (e.g., polar zones, open oceans, deserts) and [...] Read more.
Satellite–terrestrial integrated communication systems (STICSs) are envisioned to provide ubiquitous, seamless connectivity in next-generation (6G) wireless communication networks for massive-scale Internet of Things (IoT) deployments. This global coverage extends beyond densely populated areas to remote regions (e.g., polar zones, open oceans, deserts) and disaster-prone areas, supporting diverse IoT applications, including remote sensing, smart cities, intelligent agriculture/forestry, environmental monitoring, and emergency reporting. Random access signals, which constitute the initial transmission from access IoT devices to base station for unscheduled transmissions or network entry in terrestrial networks (TNs), encounter significant challenges in STICSs due to inherent satellite characteristics: wide coverage, large-scale access, substantial round-trip delay, and high carrier frequency offset (CFO). Consequently, conventional TN preamble designs based on Zadoff–Chu (ZC) sequences, as used in 4G LTE and 5G NR systems, are unsuitable for direct deployment in 6G STICSs. This paper first analyzes the challenges in adapting terrestrial designs to STICSs. It then proposes a CFO-resistant preamble design specifically tailored for STICSs and details its detection procedure. Furthermore, a dedicated root set selection algorithm for the proposed preambles is presented, generating an expanded pool of random access signals to meet the demands of increasing IoT device access. The developed analytical framework provides a foundation for performance analysis of random access signals in 6G STICSs. Full article
(This article belongs to the Special Issue 5G/6G Networks for Wireless Communication and IoT)
Show Figures

Figure 1

27 pages, 5058 KB  
Article
Detection and Mitigation in IoT Ecosystems Using oneM2M Architecture and Edge-Based Machine Learning
by Yu-Yong Luo, Yu-Hsun Chiu and Chia-Hsin Cheng
Future Internet 2025, 17(9), 411; https://doi.org/10.3390/fi17090411 (registering DOI) - 8 Sep 2025
Abstract
Distributed denial-of-service (DDoS) attacks are a prevalent threat to resource-constrained IoT deployments. We present an edge-based detection and mitigation system integrated with the oneM2M architecture. By using a Raspberry Pi 4 client and five Raspberry Pi 3 attack nodes in a smart-home testbed, [...] Read more.
Distributed denial-of-service (DDoS) attacks are a prevalent threat to resource-constrained IoT deployments. We present an edge-based detection and mitigation system integrated with the oneM2M architecture. By using a Raspberry Pi 4 client and five Raspberry Pi 3 attack nodes in a smart-home testbed, we collected 200,000 packets with 19 features across four traffic states (normal, SYN/UDP/ICMP floods), trained Decision Tree, 2D-CNN, and LSTM models, and deployed the best model on an edge computer for real-time inference. The edge node classifies traffic and triggers per-attack defenses on the device (SYN cookies, UDP/ICMP iptables rules). On a held-out test set, the 2D-CNN achieved 98.45% accuracy, outperforming the LSTM (96.14%) and Decision Tree (93.77%). In end-to-end trials, the system sustained service during SYN floods (time to capture 200 packets increased from 5.05 s to 5.51 s after enabling SYN cookies), mitigated ICMP floods via rate limiting, and flagged UDP floods for administrator intervention due to residual performance degradation. These results show that lightweight, edge-deployed learning with targeted controls can harden oneM2M-based IoT systems against common DDoS vectors. Full article
(This article belongs to the Special Issue DDoS Attack Detection for Cyber–Physical Systems)
49 pages, 670 KB  
Review
Bridging Domains: Advances in Explainable, Automated, and Privacy-Preserving AI for Computer Science and Cybersecurity
by Youssef Harrath, Oswald Adohinzin, Jihene Kaabi and Morgan Saathoff
Computers 2025, 14(9), 374; https://doi.org/10.3390/computers14090374 - 8 Sep 2025
Abstract
Artificial intelligence (AI) is rapidly redefining both computer science and cybersecurity by enabling more intelligent, scalable, and privacy-conscious systems. While most prior surveys treat these fields in isolation, this paper provides a unified review of 256 peer-reviewed publications to bridge that gap. We [...] Read more.
Artificial intelligence (AI) is rapidly redefining both computer science and cybersecurity by enabling more intelligent, scalable, and privacy-conscious systems. While most prior surveys treat these fields in isolation, this paper provides a unified review of 256 peer-reviewed publications to bridge that gap. We examine how emerging AI paradigms, such as explainable AI (XAI), AI-augmented software development, and federated learning, are shaping technological progress across both domains. In computer science, AI is increasingly embedded throughout the software development lifecycle to boost productivity, improve testing reliability, and automate decision making. In cybersecurity, AI drives advances in real-time threat detection and adaptive defense. Our synthesis highlights powerful cross-cutting findings, including shared challenges such as algorithmic bias, interpretability gaps, and high computational costs, as well as empirical evidence that AI-enabled defenses can reduce successful breaches by up to 30%. Explainability is identified as a cornerstone for trust and bias mitigation, while privacy-preserving techniques, including federated learning and local differential privacy, emerge as essential safeguards in decentralized environments such as the Internet of Things (IoT) and healthcare. Despite transformative progress, we emphasize persistent limitations in fairness, adversarial robustness, and the sustainability of large-scale model training. By integrating perspectives from two traditionally siloed disciplines, this review delivers a unified framework that not only maps current advances and limitations but also provides a foundation for building more resilient, ethical, and trustworthy AI systems. Full article
(This article belongs to the Section AI-Driven Innovations)
Show Figures

Figure 1

38 pages, 7252 KB  
Review
Advancements in Wearable Antenna Design: A Comprehensive Review of Materials, Fabrication Techniques, and Future Trends in Wireless Communication
by Zhikai Cao and Mai Lu
Micromachines 2025, 16(9), 1028; https://doi.org/10.3390/mi16091028 - 8 Sep 2025
Abstract
With the continuous development of wireless communication technology, the demand for wearable communication devices has rapidly increased. The antenna is one of the key components in communication devices, directly affecting the performance of wearable communication devices. As a result, wearable antenna design has [...] Read more.
With the continuous development of wireless communication technology, the demand for wearable communication devices has rapidly increased. The antenna is one of the key components in communication devices, directly affecting the performance of wearable communication devices. As a result, wearable antenna design has become a research hotspot in recent years. Wearable antennas are widely used in various fields of daily life, including healthcare, sports and entertainment, the internet of things (IoT), and military positioning. In the last decade, related researchers have studied wearable antennas from various perspectives, and this paper summarizes the design and fabrication of wearable antennas more comprehensively and systematically. This review covers material selection, manufacturing techniques, miniaturization technologies, and performance metrics, while addressing key design considerations. It also highlights recent research, applications in critical fields, and future development trends, offering valuable insights for the design and study of wearable antennas. Full article
(This article belongs to the Section E:Engineering and Technology)
Show Figures

Figure 1

23 pages, 4487 KB  
Article
Lightweight Anonymous Authentication for IoT: A Taxonomy and Survey of Security Frameworks
by Jian Zhong, Sheng He, Zhicai Liu and Ling Xiong
Sensors 2025, 25(17), 5594; https://doi.org/10.3390/s25175594 - 8 Sep 2025
Abstract
The resource-constrained nature of Internet of Things (IoT) devices necessitates authentication mechanisms built upon lightweight cryptographic primitives, such as symmetric key algorithms and hash functions. In response to demands for user anonymity and forward secrecy, numerous innovative authentication schemes have emerged. This work [...] Read more.
The resource-constrained nature of Internet of Things (IoT) devices necessitates authentication mechanisms built upon lightweight cryptographic primitives, such as symmetric key algorithms and hash functions. In response to demands for user anonymity and forward secrecy, numerous innovative authentication schemes have emerged. This work presents a systematic review of these state-of-the-art approaches. We introduce a structured classification by synthesizing the field into nine distinct sub-frameworks, each focused on either user anonymity or forward secrecy. These are then integrated into two general frameworks that provide both properties. Our analysis illuminates the design principles, security guarantees, and performance trade-offs inherent to each framework. Building on this classification, we comparatively evaluate the security features and performance metrics of 45 representative schemes. Ultimately, this work seeks to enhance the understanding of current challenges and foster further advancement in IoT security. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

31 pages, 2138 KB  
Article
A Sustainability Assessment of a Blockchain-Secured Solar Energy Logger for Edge IoT Environments
by Javad Vasheghani Farahani and Horst Treiblmaier
Sustainability 2025, 17(17), 8063; https://doi.org/10.3390/su17178063 (registering DOI) - 7 Sep 2025
Abstract
In this paper, we design, implement, and empirically evaluate a tamper-evident, blockchain-secured solar energy logging system for resource-constrained edge Internet of Things (IoT) devices. Using a Merkle tree batching approach in conjunction with threshold-triggered blockchain anchoring, the system combines high-frequency local logging with [...] Read more.
In this paper, we design, implement, and empirically evaluate a tamper-evident, blockchain-secured solar energy logging system for resource-constrained edge Internet of Things (IoT) devices. Using a Merkle tree batching approach in conjunction with threshold-triggered blockchain anchoring, the system combines high-frequency local logging with energy-efficient, cryptographically verifiable submissions to the Ethereum Sepolia testnet, a public Proof-of-Stake (PoS) blockchain. The logger captured and hashed cryptographic chains on a minute-by-minute basis during a continuous 135 h deployment on a Raspberry Pi equipped with an INA219 sensor. Thanks to effective retrial and daily rollover mechanisms, it committed 130 verified Merkle batches to the blockchain without any data loss or unverifiable records, even during internet outages. The system offers robust end-to-end auditability and tamper resistance with low operational and carbon overhead, which was tested with comparative benchmarking against other blockchain logging models and conventional local and cloud-based loggers. The findings illustrate the technical and sustainability feasibility of digital audit trails based on blockchain technology for distributed solar energy systems. These audit trails facilitate scalable environmental, social, and governance (ESG) reporting, automated renewable energy certification, and transparent carbon accounting. Full article
Show Figures

Figure 1

33 pages, 16564 KB  
Article
Design and Implementation of an Off-Grid Smart Street Lighting System Using LoRaWAN and Hybrid Renewable Energy for Energy-Efficient Urban Infrastructure
by Seyfettin Vadi
Sensors 2025, 25(17), 5579; https://doi.org/10.3390/s25175579 - 6 Sep 2025
Abstract
The growing demand for electricity and the urgent need to reduce environmental impact have made sustainable energy utilization a global priority. Street lighting, as a significant consumer of urban electricity, requires innovative solutions to enhance efficiency and reliability. This study presents an off-grid [...] Read more.
The growing demand for electricity and the urgent need to reduce environmental impact have made sustainable energy utilization a global priority. Street lighting, as a significant consumer of urban electricity, requires innovative solutions to enhance efficiency and reliability. This study presents an off-grid smart street lighting system that combines solar photovoltaic generation with battery storage and Internet of Things (IoT)-based control to ensure continuous and efficient operation. The system integrates Long Range Wide Area Network (LoRaWAN) communication technology for remote monitoring and control without internet connectivity and employs the Perturb and Observe (P&O) maximum power point tracking (MPPT) algorithm to maximize energy extraction from solar sources. Data transmission from the LoRaWAN gateway to the cloud is facilitated through the Message Queuing Telemetry Transport (MQTT) protocol, enabling real-time access and management via a graphical user interface. Experimental results demonstrate that the proposed system achieves a maximum MPPT efficiency of 97.96%, supports reliable communication over distances of up to 10 km, and successfully operates four LED streetlights, each spaced 400 m apart, across an open area of approximately 1.2 km—delivering a practical, energy-efficient, and internet-independent solution for smart urban infrastructure. Full article
Show Figures

Figure 1

45 pages, 990 KB  
Review
Large Language Models in Cybersecurity: A Survey of Applications, Vulnerabilities, and Defense Techniques
by Niveen O. Jaffal, Mohammed Alkhanafseh and David Mohaisen
AI 2025, 6(9), 216; https://doi.org/10.3390/ai6090216 - 5 Sep 2025
Viewed by 379
Abstract
Large Language Models (LLMs) are transforming cybersecurity by enabling intelligent, adaptive, and automated approaches to threat detection, vulnerability assessment, and incident response. With their advanced language understanding and contextual reasoning, LLMs surpass traditional methods in tackling challenges across domains such as the Internet [...] Read more.
Large Language Models (LLMs) are transforming cybersecurity by enabling intelligent, adaptive, and automated approaches to threat detection, vulnerability assessment, and incident response. With their advanced language understanding and contextual reasoning, LLMs surpass traditional methods in tackling challenges across domains such as the Internet of Things (IoT), blockchain, and hardware security. This survey provides a comprehensive overview of LLM applications in cybersecurity, focusing on two core areas: (1) the integration of LLMs into key cybersecurity domains, and (2) the vulnerabilities of LLMs themselves, along with mitigation strategies. By synthesizing recent advancements and identifying key limitations, this work offers practical insights and strategic recommendations for leveraging LLMs to build secure, scalable, and future-ready cyber defense systems. Full article
Show Figures

Figure 1

23 pages, 1292 KB  
Article
Hardware Validation for Semi-Coherent Transmission Security
by Michael Fletcher, Jason McGinthy and Alan J. Michaels
Information 2025, 16(9), 773; https://doi.org/10.3390/info16090773 - 5 Sep 2025
Viewed by 188
Abstract
The rapid growth of Internet-connected devices integrating into our everyday lives has no end in sight. As more devices and sensor networks are manufactured, security tends to be a low priority. However, the security of these devices is critical, and many current research [...] Read more.
The rapid growth of Internet-connected devices integrating into our everyday lives has no end in sight. As more devices and sensor networks are manufactured, security tends to be a low priority. However, the security of these devices is critical, and many current research topics are looking at the composition of simpler techniques to increase overall security in these low-power commercial devices. Transmission security (TRANSEC) methods are one option for physical-layer security and are a critical area of research with the increasing reliance on the Internet of Things (IoT); most such devices use standard low-power Time-division multiple access (TDMA) or frequency-division multiple access (FDMA) protocols susceptible to reverse engineering. This paper provides a hardware validation of previously proposed techniques for the intentional injection of noise into the phase mapping process of a spread spectrum signal used within a receiver-assigned code division multiple access (RA-CDMA) framework, which decreases an eavesdropper’s ability to directly observe the true phase and reverse engineer the associated PRNG output or key and thus the spreading sequence, even at high SNRs. This technique trades a conscious reduction in signal correlation processing for enhanced obfuscation, with a slight hardware resource utilization increase of less than 2% of Adaptive Logic Modules (ALMs), solidifying this work as a low-power technique. This paper presents the candidate method, quantifies the expected performance impact, and incorporates a hardware-based validation on field-programmable gate array (FPGA) platforms using arbitrary-phase phase-shift keying (PSK)-based spread spectrum signals. Full article
(This article belongs to the Special Issue Hardware Security and Trust, 2nd Edition)
Show Figures

Figure 1

26 pages, 6191 KB  
Article
A Personalized 3D-Printed Smart Splint with Integrated Sensors and IoT-Based Control: A Proof-of-Concept Study for Distal Radius Fracture Management
by Yufeng Ma, Haoran Tang, Baojian Wang, Jiashuo Luo and Xiliang Liu
Electronics 2025, 14(17), 3542; https://doi.org/10.3390/electronics14173542 - 5 Sep 2025
Viewed by 108
Abstract
Conventional static fixation for distal radius fractures (DRF) is clinically challenging, with methods often leading to complications such as malunion and pressure-related injuries. These issues stem from uncontrolled pressure and a lack of real-time biomechanical feedback, resulting in suboptimal functional recovery. To overcome [...] Read more.
Conventional static fixation for distal radius fractures (DRF) is clinically challenging, with methods often leading to complications such as malunion and pressure-related injuries. These issues stem from uncontrolled pressure and a lack of real-time biomechanical feedback, resulting in suboptimal functional recovery. To overcome these limitations, we engineered an intelligent, adaptive orthopedic device. The system is built on a patient-specific, 3D-printed architecture for a lightweight, personalized fit. It embeds an array of thin-film pressure sensors at critical anatomical sites to continuously quantify biomechanical forces. This data is transmitted via an Internet of Things (IoT) module to a cloud platform, enabling real-time remote monitoring by clinicians. The core innovation is a closed-loop feedback controller governed by a robust Interval Type-2 Fuzzy Logic (IT2-FLC) algorithm. This system autonomously adjusts servo-driven straps to dynamically regulate fixation pressure, adapting to changes in limb swelling. In a preliminary clinical evaluation, the group receiving the integrated treatment protocol, which included the smart splint and TCM herbal therapy, demonstrated superior anatomical restoration and functional recovery, evidenced by higher Cooney scores (91.65 vs. 83.15) and lower VAS pain scores. This proof-of-concept study validates a new paradigm for adaptive orthopedic devices, showing high potential for clinical translation. Full article
37 pages, 1403 KB  
Review
The Role of Geographic Information Systems in Environmental Management and the Development of Renewable Energy Sources—A Review Approach
by Anna Kochanek, Agnieszka Generowicz and Tomasz Zacłona
Energies 2025, 18(17), 4740; https://doi.org/10.3390/en18174740 (registering DOI) - 5 Sep 2025
Viewed by 213
Abstract
The article examines the role of Geographic Information Systems (GIS) as a tool for environmental management and for the planning and development of renewable energy sources (RES). Based on a review of the literature, it is demonstrated that GIS support key managerial functions, [...] Read more.
The article examines the role of Geographic Information Systems (GIS) as a tool for environmental management and for the planning and development of renewable energy sources (RES). Based on a review of the literature, it is demonstrated that GIS support key managerial functions, including planning, monitoring, decision-making, and communication, by enabling comprehensive spatial analysis and the integration of environmental data. The study emphasizes the importance of GIS in facilitating a systemic and interdisciplinary approach to environmental governance. The paper examines how GIS can help with environmental management, specifically in locating high-risk areas and strategically placing energy investments. Examining GIS’s organizational, technological, and legal facets, it emphasizes how it is increasingly collaborating with cutting-edge decision-support technologies like artificial intelligence (AI), the Internet of Things (IoT), remote sensing, and big data. The analysis emphasizes how GIS help achieve sustainable development’s objectives and tasks. Full article
(This article belongs to the Collection Review Papers in Energy and Environment)
Show Figures

Figure 1

28 pages, 8417 KB  
Article
Democratizing IoT for Smart Irrigation: A Cost-Effective DIY Solution Proposal Evaluated in an Actinidia Orchard
by David Pascoal, Telmo Adão, Agnieszka Chojka, Nuno Silva, Sandra Rodrigues, Emanuel Peres and Raul Morais
Algorithms 2025, 18(9), 563; https://doi.org/10.3390/a18090563 - 5 Sep 2025
Viewed by 189
Abstract
Proper management of water resources in agriculture is of utmost importance for sustainable productivity, especially under the current context of climate change. However, many smart agriculture systems, including for managing irrigation, involve costly, complex tools for most farmers, especially small/medium-scale producers, despite the [...] Read more.
Proper management of water resources in agriculture is of utmost importance for sustainable productivity, especially under the current context of climate change. However, many smart agriculture systems, including for managing irrigation, involve costly, complex tools for most farmers, especially small/medium-scale producers, despite the availability of user-friendly and community-accessible tools supported by well-established providers (e.g., Google). Hence, this paper proposes an irrigation management system integrating low-cost Internet of Things (IoT) sensors with community-accessible cloud-based data management tools. Specifically, it resorts to sensors managed by an ESP32 development board to monitor several agroclimatic parameters and employs Google Sheets for data handling, visualization, and decision support, assisting operators in carrying out proper irrigation procedures. To ensure reproducibility for both digital experts but mainly non-technical professionals, a comprehensive set of guidelines is provided for the assembly and configuration of the proposed irrigation management system, aiming to promote a democratized dissemination of key technical knowledge within a do-it-yourself (DIY) paradigm. As part of this contribution, a market survey identified numerous e-commerce platforms that offer the required components at competitive prices, enabling the system to be affordably replicated. Furthermore, an irrigation management prototype was tested in a real production environment, consisting of a 2.4-hectare yellow kiwi orchard managed by an association of producers from July to September 2021. Significant resource reductions were achieved by using low-cost IoT devices for data acquisition and the capabilities of accessible online tools like Google Sheets. Specifically, for this study, irrigation periods were reduced by 62.50% without causing water deficits detrimental to the crops’ development. Full article
Show Figures

Figure 1

Back to TopTop