Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,132)

Search Parameters:
Keywords = neighboring environment

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
21 pages, 2222 KB  
Article
Machine Learning-Driven Security and Privacy Analysis of a Dummy-ABAC Model for Cloud Computing
by Baby Marina, Irfana Memon, Fizza Abbas Alvi, Ubaidullah Rajput and Mairaj Nabi
Computers 2025, 14(10), 420; https://doi.org/10.3390/computers14100420 (registering DOI) - 2 Oct 2025
Abstract
The Attribute-Based Access Control (ABAC) model provides access control decisions based on subject, object (resource), and contextual attributes. However, the use of sensitive attributes in access control decisions poses many security and privacy challenges, particularly in cloud environment where third parties are involved. [...] Read more.
The Attribute-Based Access Control (ABAC) model provides access control decisions based on subject, object (resource), and contextual attributes. However, the use of sensitive attributes in access control decisions poses many security and privacy challenges, particularly in cloud environment where third parties are involved. To address this shortcoming, we present a novel privacy-preserving Dummy-ABAC model that obfuscates real attributes with dummy attributes before transmission to the cloud server. In the proposed model, only dummy attributes are stored in the cloud database, whereas real attributes and mapping tokens are stored in a local machine database. Only dummy attributes are used for the access request evaluation in the cloud, and real data are retrieved in the post-decision mechanism using secure tokens. The security of the proposed model was assessed using a simulated threat scenario, including attribute inference, policy injection, and reverse mapping attacks. Experimental evaluation using machine learning classifiers (“DecisionTree” DT, “RandomForest” RF), demonstrated that inference accuracy dropped from ~0.65 on real attributes to ~0.25 on dummy attributes confirming improved resistance to inference attacks. Furthermore, the model rejects malformed and unauthorized policies. Performance analysis of dummy generation, token generation, encoding, and nearest-neighbor search, demonstrated minimal latency in both local and cloud environments. Overall, the proposed model ensures an efficient, secure, and privacy-preserving access control in cloud environments. Full article
Show Figures

Figure 1

17 pages, 1322 KB  
Article
Robust 3D Object Detection in Complex Traffic via Unified Feature Alignment in Bird’s Eye View
by Ajian Liu, Yandi Zhang, Huichao Shi and Juan Chen
World Electr. Veh. J. 2025, 16(10), 567; https://doi.org/10.3390/wevj16100567 (registering DOI) - 2 Oct 2025
Abstract
Reliable three-dimensional (3D) object detection is critical for intelligent vehicles to ensure safety in complex traffic environments, and recent progress in multi-modal sensor fusion, particularly between LiDAR and camera, has advanced environment perception in urban driving. However, existing approaches remain vulnerable to occlusions [...] Read more.
Reliable three-dimensional (3D) object detection is critical for intelligent vehicles to ensure safety in complex traffic environments, and recent progress in multi-modal sensor fusion, particularly between LiDAR and camera, has advanced environment perception in urban driving. However, existing approaches remain vulnerable to occlusions and dense traffic, where depth estimation errors, calibration deviations, and cross-modal misalignment are often exacerbated. To overcome these limitations, we propose BEVAlign, a local–global feature alignment framework designed to generate unified BEV representations from heterogeneous sensor modalities. The framework incorporates a Local Alignment (LA) module that enhances camera-to-BEV view transformation through graph-based neighbor modeling and dual-depth encoding, mitigating local misalignment from depth estimation errors. To further address global misalignment in BEV representations, we present the Global Alignment (GA) module comprising a bidirectional deformable cross-attention (BDCA) mechanism and CBR blocks. BDCA employs dual queries from LiDAR and camera to jointly predict spatial sampling offsets and aggregate features, enabling bidirectional alignment within the BEV domain. The stacked CBR blocks then refine and integrate the aligned features into unified BEV representations. Experiment on the nuScenes benchmark highlights the effectiveness of BEVAlign, which achieves 71.7% mAP, outperforming BEVFusion by 1.5%. Notably, it achieves strong performance on small and occluded objects, particularly in dense traffic scenarios. These findings provide a basis for advancing cooperative environment perception in next-generation intelligent vehicle systems. Full article
(This article belongs to the Special Issue Recent Advances in Intelligent Vehicle)
31 pages, 12366 KB  
Article
Gateway-Free LoRa Mesh on ESP32: Design, Self-Healing Mechanisms, and Empirical Performance
by Danilo Arregui Almeida, Juan Chafla Altamirano, Milton Román Cañizares, Pablo Palacios Játiva, Javier Guaña-Moya and Iván Sánchez
Sensors 2025, 25(19), 6036; https://doi.org/10.3390/s25196036 - 1 Oct 2025
Abstract
LoRa is a long-range, low-power wireless communication technology widely used in Internet of Things (IoT) applications. However, its conventional implementation through Long Range Wide Area Network (LoRaWAN) presents operational constraints due to its centralized topology and reliance on gateways. To overcome these limitations, [...] Read more.
LoRa is a long-range, low-power wireless communication technology widely used in Internet of Things (IoT) applications. However, its conventional implementation through Long Range Wide Area Network (LoRaWAN) presents operational constraints due to its centralized topology and reliance on gateways. To overcome these limitations, this work designs and validates a gateway-free mesh communication system that operates directly on commercially available commodity microcontrollers, implementing lightweight self-healing mechanisms suitable for resource-constrained devices. The system, based on ESP32 microcontrollers and LoRa modulation, adopts a mesh topology with custom mechanisms including neighbor-based routing, hop-by-hop acknowledgments (ACKs), and controlled retransmissions. Reliability is achieved through hop-by-hop acknowledgments, listen-before-talk (LBT) channel access, and duplicate suppression using alternate link triggering (ALT). A modular prototype was developed and tested under three scenarios such as ideal conditions, intermediate node failure, and extended urban deployment. Results showed robust performance, achieving a Packet Delivery Ratio (PDR), the percentage of successfully delivered DATA packets over those sent, of up to 95% in controlled environments and 75% under urban conditions. In the failure scenario, an average Packet Recovery Ratio (PRR), the proportion of lost packets successfully recovered through retransmissions, of 88.33% was achieved, validating the system’s self-healing capabilities. Each scenario was executed in five independent runs, with values calculated for both traffic directions and averaged. These findings confirm that a compact and fault-tolerant LoRa mesh network, operating without gateways, can be effectively implemented on commodity ESP32-S3 + SX1262 hardware. Full article
16 pages, 4472 KB  
Article
Robustness of Machine Learning and Deep Learning Models for Power Quality Disturbance Classification: A Cross-Platform Analysis
by José Carlos Palomares-Salas, Sergio Aguado-González and José María Sierra-Fernández
Appl. Sci. 2025, 15(19), 10602; https://doi.org/10.3390/app151910602 - 30 Sep 2025
Abstract
Accurate and robust power quality disturbance (PQD) classification is critical for modern electrical grids, particularly in noisy environments. This study presents a comprehensive comparative evaluation of machine learning (ML) and deep learning (DL) models for automatic PQD identification. The models evaluated include Support [...] Read more.
Accurate and robust power quality disturbance (PQD) classification is critical for modern electrical grids, particularly in noisy environments. This study presents a comprehensive comparative evaluation of machine learning (ML) and deep learning (DL) models for automatic PQD identification. The models evaluated include Support Vector Machines (SVM), Decision Trees (DT), Random Forest (RF), k-Nearest Neighbors (kNN), Gradient Boosting (GB), and Dense Neural Networks (DNN). For experimentation, a hybrid dataset, comprising both synthetic and real signals, was used to assess model performance. The robustness of the models was evaluated by systematically introducing Gaussian noise across a wide range of Signal-to-Noise Ratios (SNRs). A central objective was to directly benchmark the practical implementation and performance of these models across two widely used platforms: MATLAB R2024a and Python 3.11. Results show that ML models achieve high accuracies, exceeding 95% at an SNR of 10 dB. DL models exhibited remarkable stability, maintaining 97% accuracy for SNRs above 10 dB. However, their performance degraded significantly at lower SNRs, revealing specific confusion patterns. The analysis underscores the importance of multi-domain feature extraction and adaptive preprocessing for achieving resilient PQD classification. This research provides valuable insights and a practical guide for implementing and optimizing robust PQD classification systems in real-world, noisy scenarios. Full article
Show Figures

Figure 1

24 pages, 10272 KB  
Article
Information Geometry-Based Two-Stage Track-Before-Detect Algorithm for Multi-Target Detection in Sea Clutter
by Jinguo Liu, Hao Wu, Zheng Yang, Xiaoqiang Hua and Yongqiang Cheng
Entropy 2025, 27(10), 1017; https://doi.org/10.3390/e27101017 - 27 Sep 2025
Abstract
To address the challenges of radar multi-target detection in marine environments, this paper proposes an information geometry (IG)-based, two-stage track-before-detect (TBD) framework. Specifically, multi-target measurements are first modeled on the manifold, leveraging its geometric properties for enhanced detection. The designed scoring function incorporates [...] Read more.
To address the challenges of radar multi-target detection in marine environments, this paper proposes an information geometry (IG)-based, two-stage track-before-detect (TBD) framework. Specifically, multi-target measurements are first modeled on the manifold, leveraging its geometric properties for enhanced detection. The designed scoring function incorporates both the feature dissimilarity between targets and clutter, as well as the precise inter-target path associations. Consequently, a novel merit function combining feature dissimilarity and transition cost is derived to mitigate the mutual interference between adjacent targets. Subsequently, to overcome the integrated merit function expansion phenomenon, a two-stage integration strategy combining dynamic programming (DP) and greedy integration (GI) algorithms was adopted. To tackle the challenges of unknown target numbers and computationally infeasible multi-hypothesis testing, a target cancellation detection scheme is proposed. Furthermore, by exploiting the independence of multi-target motions, an efficient implementation method for the detector is developed. Experimental results demonstrate that the proposed algorithm inherits the superior clutter discrimination capability of IG detectors in sea clutter environments while effectively resolving track mismatches between neighboring targets. Finally, the effectiveness of the proposed method was validated using real-recorded sea clutter data, showing significant improvements over conventional approaches, and the signal-to-clutter ratio was improved by at least 2 dB. Full article
(This article belongs to the Section Information Theory, Probability and Statistics)
Show Figures

Figure 1

25 pages, 1426 KB  
Article
Advanced Probabilistic Roadmap Path Planning with Adaptive Sampling and Smoothing
by Mateusz Ambrożkiewicz, Bartłomiej Bonar, Tomasz Buratowski and Piotr Małka
Electronics 2025, 14(19), 3804; https://doi.org/10.3390/electronics14193804 - 25 Sep 2025
Abstract
Probabilistic roadmap (PRM) methods are widely used for robot navigation in both 2D and 3D environments; however, a major drawback is that the raw paths tend to be jagged. Executing a trajectory along such paths can lead to significant overshoots and tight turns, [...] Read more.
Probabilistic roadmap (PRM) methods are widely used for robot navigation in both 2D and 3D environments; however, a major drawback is that the raw paths tend to be jagged. Executing a trajectory along such paths can lead to significant overshoots and tight turns, making it difficult to achieve a near-optimal solution under motion constraints. This paper presents an enhanced PRM-based path planning approach designed to improve path quality and computational efficiency. The method integrates advanced sampling strategies, adaptive neighbor selection with spatial data structures, and multi-stage path post-processing. In particular, shortcut smoothing and polynomial fitting are used to generate smoother trajectories suitable for motion-constrained robots. The proposed hybrid sampling scheme biases sample generation toward critical regions—near obstacles, in narrow passages, and between the start and goal—to improve graph connectivity in challenging areas. An adaptive k-d tree-based connection strategy then efficiently builds a roadmap using variable connection radii guided by PRM* theory. Once a path is found using an any-angle graph search, post-processing is applied to refine it. Unnecessary waypoints are removed via line-of-sight shortcuts, and the final trajectory is smoothed using a fitted polynomial curve. The resulting paths are shorter and exhibit gentler turns, making them more feasible for execution. In simulated complex scenarios, including narrow corridors and cluttered environments, the advanced PRM achieved a 100% success rate where standard PRM frequently failed. It also reduced calculation time to 30% and peak turning angle by up to 50% compared to conventional methods. The approach supports dynamic re-planning: when the environment changes, the roadmap is efficiently updated rather than rebuilt from scratch. Furthermore, the use of an adaptive k-d tree structure and incremental roadmap updates leads to an order-of-magnitude speedup in the connection phase. These improvements significantly increase the planner’s path quality, runtime performance, and reliability. Quantitative results are provided to substantiate the performance gains of the proposed method. Full article
(This article belongs to the Special Issue Artificial Intelligence in Vision Modelling)
Show Figures

Figure 1

20 pages, 7575 KB  
Article
A Two-Step Filtering Approach for Indoor LiDAR Point Clouds: Efficient Removal of Jump Points and Misdetected Points
by Yibo Cao, Yonghao Huang and Junheng Ni
Sensors 2025, 25(19), 5937; https://doi.org/10.3390/s25195937 - 23 Sep 2025
Viewed by 141
Abstract
In the simultaneous localization and mapping (SLAM) process of indoor mobile robots, accurate and stable point cloud data are crucial for localization and environment perception. However, in practical applications indoor mobile robots may encounter glass, smooth floors, edge objects, etc. Point cloud data [...] Read more.
In the simultaneous localization and mapping (SLAM) process of indoor mobile robots, accurate and stable point cloud data are crucial for localization and environment perception. However, in practical applications indoor mobile robots may encounter glass, smooth floors, edge objects, etc. Point cloud data are often misdetected in such environments, especially at the intersection of flat surfaces and edges of obstacles, which are prone to generating jump points. Smooth planes may also lead to the emergence of misdetected points due to reflective properties or sensor errors. To solve these problems, a two-step filtering method is proposed in this paper. In the first step, a clustering filtering algorithm based on radial distance and tangential span is used for effective filtering against jump points. The algorithm ensures accurate data by analyzing the spatial relationship between each point in the point cloud and the neighboring points, which allows it to identify and filter out the jump points. In the second step, a filtering algorithm based on the grid penetration model is used to further filter out misdetected points on the smooth plane. The model eliminates unrealistic point cloud data and improves the overall quality of the point cloud by simulating the characteristics of the beam penetrating the object. Experimental results in indoor environments show that this two-step filtering method significantly reduces jump points and misdetected points in the point cloud, leading to improved navigational accuracy and stability of indoor mobile robots. Full article
(This article belongs to the Section Radar Sensors)
Show Figures

Figure 1

17 pages, 1039 KB  
Article
A Federated Intrusion Detection System for Edge Environments Using Multi-Index Hashing and Attention-Based KNN
by Ying Liu, Xing Liu, Hao Yu, Bowen Guo and Xiao Liu
Symmetry 2025, 17(9), 1580; https://doi.org/10.3390/sym17091580 - 22 Sep 2025
Viewed by 402
Abstract
Edge computing offers low-latency and distributed processing for IoT applications but poses new security challenges, due to limited resources and decentralized data. Intrusion detection systems (IDSs) are essential for real-time threat monitoring, yet traditional IDS frameworks often struggle in edge environments, failing to [...] Read more.
Edge computing offers low-latency and distributed processing for IoT applications but poses new security challenges, due to limited resources and decentralized data. Intrusion detection systems (IDSs) are essential for real-time threat monitoring, yet traditional IDS frameworks often struggle in edge environments, failing to meet efficiency requirements. This paper presents an efficient intrusion detection framework that integrates spatiotemporal hashing, federated learning, and fast K-nearest neighbor (KNN) retrieval. A hashing neural network encodes network traffic into compact binary codes, enabling low-overhead similarity comparison via Hamming distance. To support scalable retrieval, multi-index hashing is applied for sublinear KNN searching. Additionally, we propose an attention-guided federated aggregation strategy that dynamically adjusts client contributions, reducing communication costs. Our experiments on benchmark datasets demonstrate that our method achieves competitive detection accuracy with significantly lower computational, memory, and communication overhead, making it well-suited for edge-based deployment. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

24 pages, 2570 KB  
Article
Spatiotemporal Evolution and Influencing Factors of A-Level Garden-Type Scenic Areas in Jiangsu Province, China
by Lin Zhou, Yingyuqing Yin, Xue Liu, Xianjing Xiao and Peiling He
Land 2025, 14(9), 1915; https://doi.org/10.3390/land14091915 - 19 Sep 2025
Viewed by 250
Abstract
Garden-type scenic areas, as integrated carriers of cultural and natural resources, not only reflect the regional socio-economic development level but also embody the historical process of interaction between human cultural activities and the natural environment. As a major economic and cultural province in [...] Read more.
Garden-type scenic areas, as integrated carriers of cultural and natural resources, not only reflect the regional socio-economic development level but also embody the historical process of interaction between human cultural activities and the natural environment. As a major economic and cultural province in eastern China, Jiangsu features A-level garden-type scenic areas that are representative in terms of quantity, quality, and typology. This study constructs an analytical indicator system for assessing the spatial distribution patterns of garden-type scenic areas. Using GIS-based methods such as kernel density estimation, nearest neighbor index, and the geographic detector model, it systematically investigates the spatial characteristics of A-level garden-type scenic areas in Jiangsu Province. The results show a significant spatial clustering pattern, with high-density clusters mainly located in southern Jiangsu and around economically developed cities. Further exploration of influencing factors reveals that natural resource endowments, economic development levels, transportation accessibility, historical and cultural heritage, and policy support are the main determinants shaping the distribution patterns. The findings offer theoretical insights and practical guidance for optimizing garden-type scenic areas planning and promoting coordinated regional tourism development in Jiangsu. Full article
Show Figures

Figure 1

36 pages, 1933 KB  
Article
Unraveling the Spatial Effects of Fintech on Urban Energy Efficiency in China
by Di Wang, Tianqi Wang and Rong Zhao
Systems 2025, 13(9), 815; https://doi.org/10.3390/systems13090815 - 17 Sep 2025
Viewed by 366
Abstract
Improving urban energy efficiency is essential for addressing energy shortages and environmental pollution, thereby facilitating a win–win outcome for both the economy and the environment. As an emerging financial force, fintech is essential for facilitating energy saving, reducing emissions, and advancing modernization. Using [...] Read more.
Improving urban energy efficiency is essential for addressing energy shortages and environmental pollution, thereby facilitating a win–win outcome for both the economy and the environment. As an emerging financial force, fintech is essential for facilitating energy saving, reducing emissions, and advancing modernization. Using panel data of 278 cities in China from 2011 to 2022 to construct a spatial Durbin model for investigating how fintech affects energy efficiency, the following results were found: (1) Energy efficiency shows positive spatial dependence features, and the enhancement of energy efficiency in this location positively influences the energy efficiency of spatially connected regions. (2) Fintech improves local energy efficiency and has notable positive geographical spillover effects on surrounding regions’ energy efficiency. (3) Three mediating pathways are identified: upgrading industrial structure, promoting green innovation, and driving green finance evolution. (4) The regulatory mechanism suggests that environmental regulations can help strengthen fintech’s geographical spillover benefits for the energy efficiency of neighboring areas. The impact of fintech on energy efficiency exhibits heterogeneity due to differences in urban resources and digital infrastructure. These insights offer important theoretical contributions and practical significance for policy-makers in advancing fintech development and urban energy efficiency. Full article
(This article belongs to the Special Issue Technological Innovation Systems and Energy Transitions)
Show Figures

Figure 1

16 pages, 725 KB  
Article
A Study on the Factors Influencing Residents’ Intention of Continuous Residence in Innovation Cities: The Case of South Korea
by Kyung-Young Lee
Systems 2025, 13(9), 814; https://doi.org/10.3390/systems13090814 - 17 Sep 2025
Viewed by 300
Abstract
This study examined the relationship between residential environment satisfaction, neighbor relations, and the intention of continuous residence. Previous research has not comprehensively analyzed the combined effects of these factors. Accordingly, this study investigated the influence of residential environment satisfaction on the intention of [...] Read more.
This study examined the relationship between residential environment satisfaction, neighbor relations, and the intention of continuous residence. Previous research has not comprehensively analyzed the combined effects of these factors. Accordingly, this study investigated the influence of residential environment satisfaction on the intention of continuous residence and analyzed the mediating role of neighbor relations. Residential environments were categorized into commercial facilities, medical facilities, childcare/educational facilities, and cultural facilities. Respondents aged 20 years and above were selected from Innovation Cities where public institution relocation had been completed. Data were collected from 1606 participants through an online survey. Hypotheses were tested using mediation analysis. The results showed that residential environment satisfaction positively influenced the intention of continuous residence, with satisfaction with medical facilities having the strongest effect. In addition, neighbor relations had both direct and indirect positive effects on the intention of continuous residence, underscoring their importance in encouraging residents to remain. In many developing countries where the private market is less developed, state-owned enterprises play a crucial role in the national economy, and development is often concentrated around their locations. In the long term, relocating public institutions could serve as a strategy to address regional disparities. The findings of this study thus offer important policy implications. Full article
Show Figures

Figure 1

29 pages, 886 KB  
Article
Parallel Approaches for SNN-Based Nearest Neighbor Search in High-Dimensional Embedding Spaces: Application to Face Recognition
by Lesia Mochurad and Roman Kapustiak
Appl. Sci. 2025, 15(18), 10139; https://doi.org/10.3390/app151810139 - 17 Sep 2025
Viewed by 286
Abstract
The rapid growth of high-dimensional biometric data requires fast and accurate similarity search methods for real-time applications. This study proposes, for the first time, two efficient parallel implementations of the exact Sorting-based Nearest Neighbor (SNN) algorithm using OpenMP for CPUs and CUDA for [...] Read more.
The rapid growth of high-dimensional biometric data requires fast and accurate similarity search methods for real-time applications. This study proposes, for the first time, two efficient parallel implementations of the exact Sorting-based Nearest Neighbor (SNN) algorithm using OpenMP for CPUs and CUDA for GPUs. Comparative evaluation against conventional exact search methods—k-d tree and ball tree—on LFW embeddings, including FaceNet512 and VGG-Face, demonstrates an up to 58× speedup on GPUs while maintaining full accuracy. Analysis of the full recognition pipeline shows that parallelization reduces search times to about 27% of total processing, highlighting the method’s stability and efficiency for modern embeddings. These results confirm the applicability of the proposed approaches for real-time biometric identification, with potential extensions to streaming data, hybrid computing environments, and other high-dimensional representations. Full article
Show Figures

Figure 1

16 pages, 3076 KB  
Article
A Q-Learning Based Scheme for Neighbor Discovery and Power Control in Marine Opportunistic Networks
by Jiahui Zhang, Shengming Jiang and Jinyu Duan
Sensors 2025, 25(18), 5720; https://doi.org/10.3390/s25185720 - 13 Sep 2025
Viewed by 348
Abstract
Opportunistic networks, as an emerging ad hoc networking technology, the sparse distribution of nodes poses significant challenges to data transmission. Additionally, unlike static nodes in traditional ad hoc networks that can replenish energy on demand, the inherent mobility of nodes further complicates energy [...] Read more.
Opportunistic networks, as an emerging ad hoc networking technology, the sparse distribution of nodes poses significant challenges to data transmission. Additionally, unlike static nodes in traditional ad hoc networks that can replenish energy on demand, the inherent mobility of nodes further complicates energy management. Thus, selecting an energy-efficient neighbor discovery algorithm is critical. Passive listening conserves energy by continuously monitoring channel activity, but it fails to detect inactive neighboring nodes. Conversely, active probing discovers neighbors by broadcasting probe packets, which increases energy consumption and may lead to network congestion due to excessive probe traffic. As the primary communication nodes in the maritime environment, vessels exhibit high mobility, and networks in oceanic regions often operate as opportunistic networks. To address the challenge of limited energy in maritime opportunistic networks, this paper proposes a hybrid neighbor discovery method that combines both passive and active discovery mechanisms. The method optimizes passive listening duration and employs Q-learning for adaptive power control. Furthermore, a more suitable wireless communication model has been adopted. Simulation results demonstrate its effectiveness in enhancing neighbor discovery performance. Notably, the proposed scheme improves network throughput while achieving up to 29% energy savings at most during neighbor discovery. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

22 pages, 1579 KB  
Article
Stance Detection in Arabic Tweets: A Machine Learning Framework for Identifying Extremist Discourse
by Arwa K. Alkhraiji and Aqil M. Azmi
Mathematics 2025, 13(18), 2965; https://doi.org/10.3390/math13182965 - 13 Sep 2025
Viewed by 481
Abstract
Terrorism remains a critical global challenge, and the proliferation of social media has created new avenues for monitoring extremist discourse. This study investigates stance detection as a method to identify Arabic tweets expressing support for or opposition to specific organizations associated with extremist [...] Read more.
Terrorism remains a critical global challenge, and the proliferation of social media has created new avenues for monitoring extremist discourse. This study investigates stance detection as a method to identify Arabic tweets expressing support for or opposition to specific organizations associated with extremist activities, using Hezbollah as a case study. Thousands of relevant Arabic tweets were collected and manually annotated by expert annotators. After extensive preprocessing and feature extraction using term frequency–inverse document frequency (tf-idf), we implemented traditional machine learning (ML) classifiers—Support Vector Machines (SVMs) with multiple kernels, Multinomial Naïve Bayes, and Weighted K-Nearest Neighbors. ML models were selected over deep learning (DL) approaches due to (1) limited annotated Arabic data availability for effective DL training; (2) computational efficiency for resource-constrained environments; and (3) the critical need for interpretability in counterterrorism applications. While interpretability is not a core focus of this work, the use of traditional ML models (rather than DL) makes the system inherently more transparent and readily adaptable for future integration of interpretability techniques. Comparative experiments using FastText word embeddings and tf-idf with supervised classifiers revealed superior performance with the latter approach. Our best result achieved a macro F-score of 78.62% using SVMs with the RBF kernel, demonstrating that interpretable ML frameworks offer a viable and resource-efficient approach for monitoring extremist discourse in Arabic social media. These findings highlight the potential of such frameworks to support scalable and explainable counterterrorism tools in low-resource linguistic settings. Full article
(This article belongs to the Special Issue Machine Learning Theory and Applications)
Show Figures

Figure 1

30 pages, 5772 KB  
Article
Texts, Architecture, and Ritual in the Iron II Levant
by Timothy Hogue
Religions 2025, 16(9), 1178; https://doi.org/10.3390/rel16091178 - 12 Sep 2025
Viewed by 373
Abstract
Studies of ancient Israelite religion have long assumed that texts played some role in its public expression. This role is often reconstructed using depictions in the Hebrew Bible and ritual texts from neighboring regions or the Bronze Age Levant. However, no such ritual [...] Read more.
Studies of ancient Israelite religion have long assumed that texts played some role in its public expression. This role is often reconstructed using depictions in the Hebrew Bible and ritual texts from neighboring regions or the Bronze Age Levant. However, no such ritual texts have been uncovered in the Iron Age Levant. Nevertheless, an analysis of architecturally embedded texts alongside their associated assemblages makes it possible to reconstruct ancient Levantine ritual practices and the roles of texts within them. As components of built environments, texts drew attention to particular areas, directing traffic along particular routes and halting it at waypoints. Texts of various genres occasionally prescribe specific ritual actions to carry out at these waypoints. Even texts lacking prescriptions were often accompanied by iconography depicting ritual practices or functional artifacts implying them. Analyzing architectural, textual, iconographic, and artifactual evidence together allows us to reconstruct ritual sequences performed in ancient built environments. This article demonstrates this method using case studies derived from four Iron Age Levantine sites: Karatepe, Karkemish, Kuntillet ʿAjrud, and Deir ʿAlla. Full article
Show Figures

Figure 1

Back to TopTop