Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (12,176)

Search Parameters:
Keywords = internet use

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
29 pages, 771 KB  
Article
Exploring an Effectively Established Green Building Evaluation System Through the Grey Clustering Model
by Zhang Chi, Dong Wanqiang, Shen Wei, Gu Shenlong, Liu Yuancheng and Liu Yingze
Buildings 2025, 15(17), 3095; https://doi.org/10.3390/buildings15173095 - 28 Aug 2025
Abstract
The current green building assessment system suffers from issues such as insufficient coverage of smart indicators, significant biases in subjective weighting, and weak dynamic adaptability, which restrict the scientific promotion of green buildings. This study focuses on the gaps in the quantitative assessment [...] Read more.
The current green building assessment system suffers from issues such as insufficient coverage of smart indicators, significant biases in subjective weighting, and weak dynamic adaptability, which restrict the scientific promotion of green buildings. This study focuses on the gaps in the quantitative assessment of smart technologies in China’s green building evaluation standards (such as the current Green Building Evaluation Standard). While domestic standards are relatively well-established in traditional dimensions like energy conservation and environmental protection, there are fragmentation issues in the assessment of smart technologies such as the Internet of Things (IoT) and BIM. Moreover, the coverage of smart indicators in non-civilian building fields is significantly lower than that of international systems such as LEED and BREEAM. This study determined the basic framework of the evaluation indicator system through the Delphi method. Drawing on international experience and contextualized within China’s (GB/T 50378-2019) standards, it systematically integrated secondary indicators including “smart security,” “smart energy,” “smart design,” and “smart services,” and constructed dual-drive evaluation dimensions of “greenization + smartization.” This elevated the proportion of the smartization dimension to 35%, filling the gap in domestic standards regarding the quantitative assessment of smart technologies. In terms of research methods, combined weighting using the Analytic Hierarchy Process (AHP) and entropy weight method was adopted to balance subjective and objective weights and reduce biases (the resource conservation dimension accounted for 39.14% of the combined weights, the highest proportion). By integrating the grey clustering model with the whitening weight function to handle fuzzy information, evaluations were categorized into four grey levels (D/C/B/A), enhancing the dynamic adaptability of the system. Case verification showed that Project A achieved a comprehensive evaluation score of 5.223, with a grade of B. Among its indicators, smart-related ones such as “smart energy” (37.17%) and “smart design” (37.93%) scored significantly higher than traditional indicators, verifying that the system successfully captured the project’s high performance in smart indicators. The research results indicate that the efficient utilization of resources is the core goal of green buildings. Especially under pressures of energy shortages and carbon emissions, energy conservation and resource recycling have become key priorities. The evaluation system constructed in this study can provide theoretical guidance and technical support for the promotion, industrial upgrading, and sustainable development of green buildings (including non-civilian buildings) under the dual-carbon goals. Its characteristic of “dynamic monitoring + smart integration” forms differentiated complementarity with international standards, making it more aligned with the needs of China’s intelligent transformation of buildings. Full article
(This article belongs to the Section Building Materials, and Repair & Renovation)
13 pages, 700 KB  
Article
Between Screens and Self-Perception: The Role of Gender and Digital Media Use in Shaping Body Esteem and Self-Esteem Among Adolescents
by Mateusz Grajek, Tomasz Jurys and Mateusz Rozmiarek
Children 2025, 12(9), 1143; https://doi.org/10.3390/children12091143 - 28 Aug 2025
Abstract
Background/Objectives: Adolescence is a critical period for identity development and self-perception, increasingly shaped by digital media. This study aimed to examine how gender, body mass index (BMI), and Internet use influence body esteem and global self-esteem among adolescents aged 15–18 years old, with [...] Read more.
Background/Objectives: Adolescence is a critical period for identity development and self-perception, increasingly shaped by digital media. This study aimed to examine how gender, body mass index (BMI), and Internet use influence body esteem and global self-esteem among adolescents aged 15–18 years old, with particular focus on the psychological impact of digital exposure. Methods: A three-wave online study was conducted using the Computer-Assisted Web Interview (CAWI) technique. The final sample consisted of 500 Polish adolescents (251 girls, 249 boys). Participants completed the Body Esteem Scale (BES) and Rosenberg Self-Esteem Scale (SES) at three time points. The study explored gender differences, the role of BMI, and the impact of time spent online. Results: Girls reported significantly lower BES and SES scores than boys (p < 0.001), despite no significant gender differences in BMI. Time spent online was negatively associated with both body esteem and self-esteem (p < 0.01), with the most pronounced effects among girls using the Internet for more than 4 h daily. Regression analyses identified gender and Internet use as significant predictors of self-perception, while BMI did not. Conclusions: Digital media use, particularly prolonged exposure, appears to be a stronger predictor of adolescent self-perception than objective body measures such as BMI. Girls are especially vulnerable to its adverse effects on both body esteem and global self-esteem. These findings underscore the need for gender-sensitive interventions focused on media literacy, emotional resilience, and healthy digital habits among adolescents. Full article
(This article belongs to the Section Global Pediatric Health)
Show Figures

Figure 1

23 pages, 535 KB  
Article
Feasibility Evaluation of Secure Offline Large Language Models with Retrieval-Augmented Generation for CPU-Only Inference
by Erick Tyndall, Torrey Wagner, Colleen Gayheart, Alexandre Some and Brent Langhals
Information 2025, 16(9), 744; https://doi.org/10.3390/info16090744 - 28 Aug 2025
Abstract
Recent advances in large language models and retrieval-augmented generation, a method that enhances language models by integrating retrieved external documents, have created opportunities to deploy AI in secure, offline environments. This study explores the feasibility of using locally hosted, open-weight large language models [...] Read more.
Recent advances in large language models and retrieval-augmented generation, a method that enhances language models by integrating retrieved external documents, have created opportunities to deploy AI in secure, offline environments. This study explores the feasibility of using locally hosted, open-weight large language models with integrated retrieval-augmented generation capabilities on CPU-only hardware for tasks such as question answering and summarization. The evaluation reflects typical constraints in environments like government offices, where internet access and GPU acceleration may be restricted. Four models were tested using LocalGPT, a privacy-focused retrieval-augmented generation framework, on two consumer-grade systems: a laptop and a workstation. A technical project management textbook served as the source material. Performance was assessed using BERTScore and METEOR metrics, along with latency and response timing. All models demonstrated strong performance in direct question answering, providing accurate responses despite limited computational resources. However, summarization tasks showed greater variability, with models sometimes producing vague or incomplete outputs. The analysis also showed that quantization and hardware differences affected response time more than output quality; this is a tradeoff that should be considered in potential use cases. This study does not aim to rank models but instead highlights practical considerations in deploying large language models locally. The findings suggest that secure, CPU-only deployments are viable for structured tasks like factual retrieval, although limitations remain for more generative applications such as summarization. This feasibility-focused evaluation provides guidance for organizations seeking to use local large language models under privacy and resource constraints and lays the groundwork for future research in secure, offline AI systems. Full article
Show Figures

Figure 1

20 pages, 1685 KB  
Article
Small Language Model-Guided Quantile Temporal Difference Learning for Improved IoT Application Placement in Fog Computing
by Bhargavi Krishnamurthy and Sajjan G. Shiva
Mathematics 2025, 13(17), 2768; https://doi.org/10.3390/math13172768 - 28 Aug 2025
Abstract
The global market for fog computing is expected to reach USD 6385 million by 2032. Modern enterprises rely on fog computing since it offers computational resources at edge devices through decentralized computation mechanisms. One of the crucial components of fog computing is the [...] Read more.
The global market for fog computing is expected to reach USD 6385 million by 2032. Modern enterprises rely on fog computing since it offers computational resources at edge devices through decentralized computation mechanisms. One of the crucial components of fog computing is the proper placement of applications on fog nodes (edge devices, Internet of Things (IoT)) for servicing. Large-scale, geographically distributed fog networks and heterogeneity of fog nodes make application placement a challenging task. Quantile Temporal Difference Learning (QTDL) is a promising distributed form of a reinforcement learning algorithm. It is superior compared to traditional reinforcement learning as it learns the act of prediction based on the full distribution of returns. QTDL is enriched by a small language model (SLM), which results in low inference latency, reduced costs of operation, and also enhanced rates of learning. The SLM, being a lightweight model, has policy-shaping capability, which makes it an ideal choice for the resource-constrained environment of edge devices. The data-driven quantiles of temporal difference learning are blended with the informed heuristics of the SLM to prevent quantile loss and over- or underestimation of the policies. In this paper, a novel SLM-guided QTDL framework is proposed to perform task scheduling among fog nodes. The proposed framework is implemented using the iFogSim simulator by considering both certain and uncertain fog computing environments. Further, the results obtained are validated using expected value analysis. The performance of the proposed framework is found to be satisfactory with respect of the following performance metrics: energy consumption, makespan time violations, budget violations, and load imbalance ratio. Full article
(This article belongs to the Special Issue Advanced Reinforcement Learning in Internet of Things Networks)
Show Figures

Figure 1

7 pages, 572 KB  
Proceeding Paper
The Effect of UV Light in Accelerating IoT-Based Hydroponic Plant Growth
by Riyan, Isep Teddy Kurniawan, Muhammad Irsyad Fauzan and Trisiani Dewi Hendrawati
Eng. Proc. 2025, 107(1), 29; https://doi.org/10.3390/engproc2025107029 - 27 Aug 2025
Abstract
Hydroponic agriculture based on the Internet of Things (IoT) is an innovative solution to face the challenges of land limitations and climate uncertainty. This study aims to analyze the role of IoT in accelerating the growth of hydroponic plants through monitoring and automation [...] Read more.
Hydroponic agriculture based on the Internet of Things (IoT) is an innovative solution to face the challenges of land limitations and climate uncertainty. This study aims to analyze the role of IoT in accelerating the growth of hydroponic plants through monitoring and automation of the planting environment, as well as evaluating its impact on productivity, especially for the planting process in land with minimal sunlight. The system integrates sensors to monitor environmental parameters such as pH, temperature, and humidity, which are then processed in real-time to optimize nutrient delivery and irrigation. The results show that the use of IoT in hydroponic systems is able to significantly improve the quality and quantity of crop yields compared to conventional methods. However, there are several challenges in implementation, such as high initial costs, limited infrastructure in certain areas, and potential cybersecurity threats. Nonetheless, innovation and collaboration opportunities between the public and private sectors can accelerate the adoption of these technologies in sustainable agriculture. Full article
Show Figures

Figure 1

10 pages, 399 KB  
Proceeding Paper
A Systematic Literature Study on IoT-Based Water Turbidity Monitoring: Innovation in Waste Management
by Fawwaz Muhammad, Wildan Nasrullah, Rio Alfatih and Trisiani Dewi Hendrawati
Eng. Proc. 2025, 107(1), 30; https://doi.org/10.3390/engproc2025107030 - 27 Aug 2025
Abstract
Water quality monitoring is an important step in maintaining environmental sustainability and public health. Water turbidity is one of the main parameters in assessing water quality, because a high level of turbidity can indicate pollution that is harmful to aquatic ecosystems and humans. [...] Read more.
Water quality monitoring is an important step in maintaining environmental sustainability and public health. Water turbidity is one of the main parameters in assessing water quality, because a high level of turbidity can indicate pollution that is harmful to aquatic ecosystems and humans. In the digital era, Internet of Things (IoT) technology has been applied to improve the effectiveness of real-time monitoring of water turbidity. This study aims to examine IoT-based water turbidity monitoring strategies and technologies using the Systematic Literature Review (SLR) method with the PRISMA protocol. In the process of searching for literature, this study identified 222 articles from the Scopus database, which, after going through the screening stage based on relevance, document type, and accessibility, resulted in seven main articles for further analysis. The results of the review show that the utilization of IoT sensors and wireless communication enables real-time monitoring of water turbidity, improves early detection of pollution, and improves effectiveness in water monitoring. However, challenges such as data security, sensor reliability, and communication network stability still need to be overcome to ensure the system works optimally. This study confirms that IoT can be a more efficient and sustainable solution in monitoring water turbidity. Full article
Show Figures

Figure 1

20 pages, 3555 KB  
Article
Model of an Open-Source MicroPython Library for GSM NB-IoT
by Antonii Lupandin, Volodymyr Kopieikin, Maksym Khruslov, Iryna Artyshchuk and Ruslan Shevchuk
Sensors 2025, 25(17), 5322; https://doi.org/10.3390/s25175322 - 27 Aug 2025
Abstract
The growing adoption of the Internet of Things (IoT) demands scalable, energy-efficient communication for autonomous devices. Narrowband IoT (NB-IoT), as a low-power wide-area technology, offers reliable connectivity but remains difficult to integrate in MicroPython systems due to the absence of high-level GSM libraries. [...] Read more.
The growing adoption of the Internet of Things (IoT) demands scalable, energy-efficient communication for autonomous devices. Narrowband IoT (NB-IoT), as a low-power wide-area technology, offers reliable connectivity but remains difficult to integrate in MicroPython systems due to the absence of high-level GSM libraries. This paper introduces a modular, object-oriented MicroPython library that abstracts AT command handling, automates network configuration, and supports protocols such as MQTT and Blynk. The architecture features a layered, hardware-agnostic core and device-specific adapters, enhancing portability and extensibility. The library includes structured exception handling and automated retries to improve system reliability. Empirical validation using a Raspberry Pi Pico and SIM7020E module in a typical IoT scenario demonstrated an up to 81% reduction in implementation time. By providing a reusable and extensible framework, this work improves developer productivity, enhances error resilience, and establishes a solid foundation for rapid NB-IoT application development. Future directions include cross-hardware validation and AI-assisted code and test generation. Full article
(This article belongs to the Special Issue Feature Papers in the Internet of Things Section 2025)
Show Figures

Figure 1

14 pages, 469 KB  
Article
Performance Analysis of Non-Orthogonal Multiple Access-Enhanced Autonomous Aerial Vehicle-Assisted Internet of Vehicles over Rician Fading Channels
by Zheming Zhang, Yixin He, Yifan Lei, Zehui Cai, Fanghui Huang, Xingchen Zhao, Dawei Wang and Lujuan Li
Entropy 2025, 27(9), 907; https://doi.org/10.3390/e27090907 - 27 Aug 2025
Abstract
The increasing number of intelligent connected vehicles (ICVs) is leading to a growing scarcity of spectrum resources for the Internet of Vehicles (IoV), which has created an urgent need for the use of full-duplex non-orthogonal multiple access (FD-NOMA) techniques in vehicle-to-everything (V2X) communications. [...] Read more.
The increasing number of intelligent connected vehicles (ICVs) is leading to a growing scarcity of spectrum resources for the Internet of Vehicles (IoV), which has created an urgent need for the use of full-duplex non-orthogonal multiple access (FD-NOMA) techniques in vehicle-to-everything (V2X) communications. Meanwhile, for the flexibility of autonomous aerial vehicles (AAVs), V2X communications assisted by AAVs are regarded as a potential solution to achieve reliable communication between ICVs. However, if the integration of FD-NOMA and AAVs can satisfy the requirements of V2X communications, then quickly and accurately analyzing the total achievable rate becomes a challenge. Motivated by the above, an accurate analytical expression for the total achievable rate over Rician fading channels is proposed to evaluate the transmission performance of NOMA-enhanced AAV-assisted IoV with imperfect channel state information (CSI). Then, we derive an approximate expression with the truncated error, based on which the closed-form expression for the approximate error is theoretically provided. Finally, the simulation results demonstrate the accuracy of the obtained approximate results, where the maximum approximate error does not exceed 0.5%. Moreover, the use of the FD-NOMA technique in AAV-assisted IoV can significantly improve the total achievable rate compared to existing work. Furthermore, the influence of key network parameters (e.g., the speed and Rician factor) on achievable rate is thoroughly discussed. Full article
(This article belongs to the Special Issue Space-Air-Ground-Sea Integrated Communication Networks)
Show Figures

Figure 1

22 pages, 4304 KB  
Article
Intelligent Early Warning System for Supplier Delays Using Dynamic IoT-Calibrated Probabilistic Modeling in Smart Engineer-to-Order Supply Chains
by Aicha Alaoua and Mohammed Karim
Appl. Syst. Innov. 2025, 8(5), 124; https://doi.org/10.3390/asi8050124 - 27 Aug 2025
Abstract
In increasingly complex Engineer-to-Order (EtO) supply chains, accurately predicting supplier delivery delays is essential for ensuring operational resilience. This study proposes an intelligent Internet of Things (IoT)-enhanced probabilistic framework for early warning and dynamic prediction of supplier lead times in smart manufacturing contexts. [...] Read more.
In increasingly complex Engineer-to-Order (EtO) supply chains, accurately predicting supplier delivery delays is essential for ensuring operational resilience. This study proposes an intelligent Internet of Things (IoT)-enhanced probabilistic framework for early warning and dynamic prediction of supplier lead times in smart manufacturing contexts. Within this framework, three novel Early Warning Systems (EWS) are introduced: the Baseline Probabilistic Alert System (BPAS) based on fixed thresholds, the Smart IoT-Calibrated Alert System (SIoT-CAS) leveraging IoT-driven calibration, and the Adaptive IoT-Driven Risk Alert System (AID-RAS) featuring real-time threshold adaptation. Supplier lead times are modeled using statistical distributions and dynamically adjusted with IoT data to capture evolving disruptions. A comprehensive Monte Carlo simulation was conducted across varying levels of lead time uncertainty (σ), alert sensitivity (Pthreshold), and delivery constraints (Lmax), generating over 1000 synthetic scenarios per configuration. The results highlight distinct trade-offs between predictive accuracy, sensitivity, and robustness: BPAS minimizes false alarms in stable environments, SIoT-CAS improves forecasting precision through IoT calibration, and AID-RAS maximizes detection capability and resilience under high-risk conditions. Overall, the findings advance theoretical understanding of adaptive, data-driven risk modeling in EtO supply chains and provide practical guidance for selecting appropriate EWS mechanisms based on operational priorities. Furthermore, they offer actionable insights for integrating predictive EWS into MES (Manufacturing Execution System) and digital control tower platforms, thereby contributing to both academic research and industrial best practices. Full article
Show Figures

Figure 1

27 pages, 1684 KB  
Systematic Review
Exploring the Impact of Information and Communication Technology on Educational Administration: A Systematic Scoping Review
by Ting Liu, Yiming Taclis Luo, Patrick Cheong-Iao Pang and Ho Yin Kan
Educ. Sci. 2025, 15(9), 1114; https://doi.org/10.3390/educsci15091114 - 27 Aug 2025
Abstract
In the era of educational digital transformation, integrating information and communication technology (ICT) into school administration aligns with the goals of promoting personalized learning, equity, and teaching quality. This study examines how ICT reshapes management practices, addresses challenges, and achieves educational objectives. To [...] Read more.
In the era of educational digital transformation, integrating information and communication technology (ICT) into school administration aligns with the goals of promoting personalized learning, equity, and teaching quality. This study examines how ICT reshapes management practices, addresses challenges, and achieves educational objectives. To explore ICT’s impact on school administration (2009–2024), we conducted a systematic scoping review of four databases (Web of Science, Scopus, ScienceDirect, and IEEE Xplore) following the PRISMA-ScR guidelines. Retrieved studies were screened, analyzed, and synthesized to identify key trends and challenges. The results show that ICT significantly improves administrative efficiency. Automated systems streamline routine tasks, allowing administrators to allocate more time to strategic planning. It enables data-driven decision-making. By analyzing large datasets, ICT helps identify trends in student performance and resource utilization, facilitating accurate forecasting and better resource allocation. Moreover, ICT strengthens stakeholder communication. Online platforms enable instant interaction among teachers, students, and parents, increasing the transparency and responsiveness of school administration. However, there are challenges. Data privacy concerns can erode trust, as student and staff data collection and use may lead to breaches. Infrastructure deficiencies, such as unreliable internet and outdated equipment, impede implementation. The digital divide exacerbates inequality, with under-resourced schools struggling to utilize ICT fully. ICT is vital in educational administration. Its integration requires a strategic approach. This study offers insights for optimizing educational management via ICT and highlights the need for equitable technological advancement to create an inclusive, high-quality educational system. Full article
(This article belongs to the Special Issue ICTs in Managing Education Environments)
Show Figures

Figure 1

40 pages, 2153 KB  
Review
DeepChainIoT: Exploring the Mutual Enhancement of Blockchain and Deep Neural Networks (DNNs) in the Internet of Things (IoT)
by Sabina Sapkota, Yining Hu, Asif Gill and Farookh Khadeer Hussain
Electronics 2025, 14(17), 3395; https://doi.org/10.3390/electronics14173395 - 26 Aug 2025
Abstract
The Internet of Things (IoT) is widely used across domains such as smart homes, healthcare, and grids. As billions of devices become connected, strong privacy and security measures are essential to protect sensitive information and prevent cyber-attacks. However, IoT devices often have limited [...] Read more.
The Internet of Things (IoT) is widely used across domains such as smart homes, healthcare, and grids. As billions of devices become connected, strong privacy and security measures are essential to protect sensitive information and prevent cyber-attacks. However, IoT devices often have limited computing power and storage, making it difficult to implement robust security and manage large volumes of data. Existing studies have explored integrating blockchain and Deep Neural Networks (DNNs) to address security, storage, and data dissemination in IoT networks, but they often fail to fully leverage the mutual enhancement between them. This paper proposes DeepChainIoT, a blockchain–DNN integrated framework designed to address centralization, latency, throughput, storage, and privacy challenges in generic IoT networks. It integrates smart contracts with a Long Short-Term Memory (LSTM) autoencoder for anomaly detection and secure transaction encoding, along with an optimized Practical Byzantine Fault Tolerance (PBFT) consensus mechanism featuring transaction prioritization and node rating. On a public pump sensor dataset, our LSTM autoencoder achieved 99.6% accuracy, 100% recall, 97.95% precision, and a 98.97% F1-score, demonstrating balanced performance, along with a 23.9× compression ratio. Overall, DeepChainIoT enhances IoT security, reduces latency, improves throughput, and optimizes storage while opening new directions for research in trustworthy computing. Full article
(This article belongs to the Special Issue Emerging IoT Sensor Network Technologies and Applications)
Show Figures

Figure 1

12 pages, 452 KB  
Proceeding Paper
Integrating Serious Games in Primary Education: A Comprehensive Analysis
by Argyro Sachinidou, Ioannis Antoniadis and George F. Fragulis
Eng. Proc. 2025, 107(1), 22; https://doi.org/10.3390/engproc2025107022 - 26 Aug 2025
Viewed by 166
Abstract
The significant development of technology has greatly influenced crucial sectors of society, including health, economy, public health, and business. Technological tools have become essential in daily life, impacting the educational process across all age groups. Previous research has demonstrated the pervasive integration of [...] Read more.
The significant development of technology has greatly influenced crucial sectors of society, including health, economy, public health, and business. Technological tools have become essential in daily life, impacting the educational process across all age groups. Previous research has demonstrated the pervasive integration of technology into everyday activities, emphasizing the compelling attraction that screens and mobile devices provide, particularly among younger generations. However, earlier studies have often overlooked the detailed impact and practical applications of these technologies within the educational sector, particularly through computer games. This study employs a comprehensive analysis of scientific articles available on the internet, examining global research on the use of computer games in education. The research methods include a systematic review of publications, focusing on primary education while also considering other educational levels to provide a holistic view. The analytical approach highlights the practices employed during the implementation of educational computer games and their effects on the learning process. The major findings reveal that educational computer games have become a highly popular pedagogical method, effectively capturing the interest of both students and educators. The study underscores the growing demand for these educational tools and the promise of continuous improvements and additions to this type of teaching. The results suggest that integrating computer games into education not only enhances engagement but also signifies a progressive shift in teaching methodologies, paving the way for innovative educational practices. Full article
Show Figures

Figure 1

11 pages, 1129 KB  
Article
Shielding Effectiveness Evaluation of Wall-Integrated Energy Storage Devices
by Leonardo Sandrolini and Mattia Simonazzi
Electronics 2025, 14(17), 3385; https://doi.org/10.3390/electronics14173385 - 26 Aug 2025
Viewed by 108
Abstract
A homogenisation procedure for energy-buffering structural layers with integrated electrical energy storage systems (capacitors) is described with the aim of calculating their shielding effectiveness to the electromagnetic waves when they are installed inside building walls. In fact, these storage systems may attenuate electromagnetic [...] Read more.
A homogenisation procedure for energy-buffering structural layers with integrated electrical energy storage systems (capacitors) is described with the aim of calculating their shielding effectiveness to the electromagnetic waves when they are installed inside building walls. In fact, these storage systems may attenuate electromagnetic fields in the frequency ranges employed by mobile telephony, radio broadcasting, and wireless data transmission, thus impairing the operation of Internet of Things infrastructures. The capacitors inside the individual energy-buffering modules have a multilayered structure, in which the layers have very small thicknesses, making an analytical solution of the electromagnetic field for this kind of object practically impossible. Similarly, numerical solutions may not be practical due to the very small thickness of the layers compared to the overall object size. Therefore, this paper presents a simple and effective analytical method to model multilayered structures consisting of homogenising the whole capacitor, which can then be treated as a unique block of material with fictitious (but effective) electric and magnetic parameters. The method is based on multi-section transmission lines, and a quick and reliable analytical methodology is proposed to evaluate the shielding capabilities using the homogenised capacitor’s effective parameters. Moreover, experimental measurements on a real prototype have also been carried out to validate the methodology. Results show that the trend of the simulated and measured SE is the same, proving that the method can be employed to obtain a conservative estimation of the SE from numerical simulations. Full article
Show Figures

Figure 1

11 pages, 1375 KB  
Proceeding Paper
Unveiling Cyber Threats: An In-Depth Study on Data Mining Techniques for Exploit Attack Detection
by Abdallah S. Hyassat, Raneem E. Abu Zayed, Eman A. Al Khateeb, Ahmad Shalaldeh, Mahmoud M. Abdelhamied and Iyas Qaddara
Eng. Proc. 2025, 104(1), 28; https://doi.org/10.3390/engproc2025104028 - 25 Aug 2025
Abstract
The number of people and applications using the internet has increased substantially in recent years. The increased use of the internet has also resulted in various security issues. As the volume of data increases, cyber-attacks become increasingly sophisticated, exploiting vulnerabilities in network structures. [...] Read more.
The number of people and applications using the internet has increased substantially in recent years. The increased use of the internet has also resulted in various security issues. As the volume of data increases, cyber-attacks become increasingly sophisticated, exploiting vulnerabilities in network structures. The incorporation of modern technologies, particularly data mining, emerges as an essential method for analyzing huge amounts of data in real time, enabling the proactive detection of anomalies and potential security breaches. This research seeks to identify the most robust machine learning model for exploit detection. It applies five feature selection techniques and eight classification models to the UNSW-NB15 dataset. A comprehensive evaluation is conducted based on classification accuracy, computational efficiency, and execution time. The results demonstrate the efficiency of the Decision Tree model using Random Forest for feature selection in the real-time detection of exploit attacks, exhibiting an accuracy of 87.9%, along with a very short training (0.96 s) and testing time (0.29 ms/record). Full article
Show Figures

Figure 1

30 pages, 960 KB  
Article
How Does Digital Financial Inclusion Affect Rural Land Transfer? Evidence from China
by Chunyan He, Lu Zhou, Fang Qu and Peng Xue
Land 2025, 14(9), 1723; https://doi.org/10.3390/land14091723 - 25 Aug 2025
Viewed by 762
Abstract
Farmers’ land transfer practices optimize the allocation of agricultural resources by transferring them to more efficient operators. This enhances agricultural productivity and advances rural revitalization. However, due to the lack of financial institution outlets in rural areas, the availability of financial services in [...] Read more.
Farmers’ land transfer practices optimize the allocation of agricultural resources by transferring them to more efficient operators. This enhances agricultural productivity and advances rural revitalization. However, due to the lack of financial institution outlets in rural areas, the availability of financial services in rural areas is limited, which in turn hinders the transfer of rural land. This study examines the impact of digital financial inclusion, characterized by the deep integration of internet technology and financial services, on farmers’ land transfer behavior in China. The study uses data from the China Family Panel Studies (2012–2022) and provincial digital financial inclusion data. The results show that digital financial inclusion significantly promotes rural land transfer-out. The mechanisms reveal two pathways: (1) digital financial inclusion expands non-agricultural entrepreneurship by easing credit constraints and reducing reliance on land livelihoods; (2) it increases participation in commercial insurance, mitigating risks of land abandonment. Heterogeneity analysis reveals stronger effects in eastern China and among educated households. Theoretically, the study identifies the dual role of financial technology in reshaping rural land markets through credit access and risk management. Practically, it reveals how DFI influences land transfer behavior, providing a basis for the government to formulate policies that combine the two, ultimately enhancing the production capacity, operational efficiency, and market competitiveness of smallholder farmers. The findings offer global insights for developing countries that are leveraging digital finance to activate rural land markets and achieve digital financial inclusion. Full article
(This article belongs to the Special Issue Land Use Policy and Food Security: 2nd Edition)
Show Figures

Figure 1

Back to TopTop