Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (335)

Search Parameters:
Keywords = smart home service

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
30 pages, 18616 KiB  
Article
Leveraging Retrieval-Augmented Generation for Automated Smart Home Orchestration
by Negin Jahanbakhsh, Mario Vega-Barbas, Iván Pau, Lucas Elvira-Martín, Hirad Moosavi and Carolina García-Vázquez
Future Internet 2025, 17(5), 198; https://doi.org/10.3390/fi17050198 - 29 Apr 2025
Viewed by 128
Abstract
The rapid growth of smart home technologies, driven by the expansion of the Internet of Things (IoT), has introduced both opportunities and challenges in automating daily routines and orchestrating device interactions. Traditional rule-based automation systems often fall short in adapting to dynamic conditions, [...] Read more.
The rapid growth of smart home technologies, driven by the expansion of the Internet of Things (IoT), has introduced both opportunities and challenges in automating daily routines and orchestrating device interactions. Traditional rule-based automation systems often fall short in adapting to dynamic conditions, integrating heterogeneous devices, and responding to evolving user needs. To address these limitations, this study introduces a novel smart home orchestration framework that combines generative Artificial Intelligence (AI), Retrieval-Augmented Generation (RAG), and the modular OSGi framework. The proposed system allows users to express requirements in natural language, which are then interpreted and transformed into executable service bundles by large language models (LLMs) enhanced with contextual knowledge retrieved from vector databases. These AI-generated service bundles are dynamically deployed via OSGi, enabling real-time service adaptation without system downtime. Manufacturer-provided device capabilities are seamlessly integrated into the orchestration pipeline, ensuring compatibility and extensibility. The framework was validated through multiple use-case scenarios involving dynamic device discovery, on-demand code generation, and adaptive orchestration based on user preferences. Results highlight the system’s ability to enhance automation efficiency, personalization, and resilience. This work demonstrates the feasibility and advantages of AI-driven orchestration in realising intelligent, flexible, and scalable smart home environments. Full article
(This article belongs to the Special Issue Joint Design and Integration in Smart IoT Systems)
Show Figures

Figure 1

19 pages, 5673 KiB  
Article
LoRa Communications Spectrum Sensing Based on Artificial Intelligence: IoT Sensing
by Partemie-Marian Mutescu, Valentin Popa and Alexandru Lavric
Sensors 2025, 25(9), 2748; https://doi.org/10.3390/s25092748 - 26 Apr 2025
Viewed by 215
Abstract
The backbone of the Internet of Things ecosystem relies heavily on wireless sensor networks and low-power wide area network technologies, such as LoRa modulation, to provide the long-range, energy-efficient communications essential for applications as diverse as smart homes, healthcare, agriculture, smart grids, and [...] Read more.
The backbone of the Internet of Things ecosystem relies heavily on wireless sensor networks and low-power wide area network technologies, such as LoRa modulation, to provide the long-range, energy-efficient communications essential for applications as diverse as smart homes, healthcare, agriculture, smart grids, and transportation. With the number of IoT devices expected to reach approximately 41 billion by 2034, managing radio spectrum resources becomes a critical issue. However, as these devices are deployed at an increasing rate, the limited spectral resources will result in increased interference, packet collisions, and degraded quality of service. Current methods for increasing network capacity have limitations and require advanced solutions. This paper proposes a novel hybrid spectrum sensing framework that combines traditional signal processing and artificial intelligence techniques specifically designed for LoRa spreading factor detection and communication channel analytics. Our proposed framework processes wideband signals directly from IQ samples to identify and classify multiple concurrent LoRa transmissions. The results show that the framework is highly effective, achieving a detection accuracy of 96.2%, a precision of 99.16%, and a recall of 95.4%. The proposed framework’s flexible architecture separates the AI processing pipeline from the channel analytics pipeline, ensuring adaptability to various communication protocols beyond LoRa. Full article
(This article belongs to the Special Issue LoRa Communication Technology for IoT Applications)
Show Figures

Figure 1

36 pages, 4603 KiB  
Article
Different Types of Heat Pump Owners in Austria—Purchase Arguments, User Satisfaction, Operating Habits, and Expectations Regarding Control and Regulation Strategies
by Gabriel Reichert, Sophie Ehrenbrandtner, Robert Fina, Franz Theuretzbacher, Clemens Birklbauer and Christoph Schmidl
Businesses 2025, 5(2), 18; https://doi.org/10.3390/businesses5020018 - 11 Apr 2025
Viewed by 332
Abstract
Heat pumps (HPs) are considered as a key technology in the future energy system. Besides technical and ecological aspects, user acceptance and user friendliness are also essential. The aim of the study was therefore to research which aspects are decisive for the purchase [...] Read more.
Heat pumps (HPs) are considered as a key technology in the future energy system. Besides technical and ecological aspects, user acceptance and user friendliness are also essential. The aim of the study was therefore to research which aspects are decisive for the purchase decision, which different types of HP owners can be distinguished, how their specific user behavior can be characterized in terms of control and operation, and what their respective requirements and wishes are for the functions and operation of their HPs. A mixed-methods approach in an exploratory sequential design was used. Based on nine qualitative interviews and a survey with 510 respondents, both conducted in Austria, it is observed that the most relevant arguments for the purchase decision of HPs are high environmental friendliness and efficiency, as well as resource independence. Respecting certain usage and requirement patterns, four user types could be identified and defined—the minimalist, the functionalist, the tech-savvy tinkerer, and the anxious user. In the future, intelligent control and regulation approaches and the integration of HPs into a holistic energy and building management system (smart home) will become more important. Based on the results, tailor-made system solutions can be developed, user friendliness optimized, and new services developed. Full article
Show Figures

Figure 1

19 pages, 959 KiB  
Article
Is Malware Detection Needed for Android TV?
by Gokhan Ozogur, Zeynep Gurkas-Aydin and Mehmet Ali Erturk
Appl. Sci. 2025, 15(5), 2802; https://doi.org/10.3390/app15052802 - 5 Mar 2025
Viewed by 714
Abstract
The smart TV ecosystem is rapidly expanding, allowing developers to publish their applications on TV markets to provide a wide array of services to TV users. However, this open nature can lead to significant cybersecurity concerns by bringing unauthorized access to home networks [...] Read more.
The smart TV ecosystem is rapidly expanding, allowing developers to publish their applications on TV markets to provide a wide array of services to TV users. However, this open nature can lead to significant cybersecurity concerns by bringing unauthorized access to home networks or leaking sensitive information. In this study, we focus on the security of Android TVs by developing a lightweight malware detection model specifically for these devices. We collected various Android TV applications from different markets and injected malicious payloads into benign applications to create Android TV malware, which is challenging to find on the market. We proposed a machine learning approach to detecting malware and evaluated our model. We compared the performance of nine classifiers and optimized the hyperparameters. Our findings indicated that the model performed well in rare malware cases on Android TVs. The most successful model classified malware with an F1-Score of 0.9789 in 0.1346 milliseconds per application. Full article
Show Figures

Figure 1

9 pages, 377 KiB  
Article
Rebound Effects Caused by Artificial Intelligence and Automation in Private Life and Industry
by Wolfgang Ertel and Christopher Bonenberger
Sustainability 2025, 17(5), 1988; https://doi.org/10.3390/su17051988 - 26 Feb 2025
Viewed by 630
Abstract
Many tasks in a modern household are performed by machines, e.g., a dishwasher or a vacuum cleaner, and in the near future most household tasks will be performed by smart service robots. This will relieve the residents, who in turn can enjoy their [...] Read more.
Many tasks in a modern household are performed by machines, e.g., a dishwasher or a vacuum cleaner, and in the near future most household tasks will be performed by smart service robots. This will relieve the residents, who in turn can enjoy their free time. This newly gained free time will turn out to cause the so-called spare time rebound effect due to more resource consumption. We roughly quantify this rebound effect and propose a CO2-budget model to reduce or even avoid it. In modern industry, automation and AI are taking over work from humans, leading to higher productivity of the company as a whole. This is the main reason for economic growth, which leads to environmental problems due to higher consumption of natural resources. We show that, even though the effects of automation at home and in the industry are different (free time versus higher productivity), in the end they both lead to more resource consumption and environmental pollution. We discuss possible solutions to this problem, such as carbon taxes, emissions trading systems, and a carbon budget. Full article
(This article belongs to the Special Issue AI and Sustainability: Risks and Challenges)
Show Figures

Figure 1

15 pages, 1385 KiB  
Article
Comparative Analysis of Smart Building Solutions in Europe: Technological Advancements and Market Strategies
by Negar Mohtashami, Nils Sauer, Rita Streblow and Dirk Müller
Energies 2025, 18(3), 682; https://doi.org/10.3390/en18030682 - 1 Feb 2025
Viewed by 1090
Abstract
This paper provides a comprehensive comparative analysis of smart building solution providers within Europe, emphasizing the technological advancements and market strategies employed by companies selected for the study. As energy efficiency becomes a critical focus due to rising global energy demands and climate [...] Read more.
This paper provides a comprehensive comparative analysis of smart building solution providers within Europe, emphasizing the technological advancements and market strategies employed by companies selected for the study. As energy efficiency becomes a critical focus due to rising global energy demands and climate change concerns, smart building technologies have emerged as pivotal in optimizing energy use and enhancing occupant comfort. This study examines 19 products from 15 prominent manufacturers, categorized into six product categories: smart thermostats, smart valves, HVAC control, data acquisition and energy management software, smart home ecosystems, and home energy management systems. Using a comparative assessment matrix and SWOT analysis, the paper evaluates these products across five key areas: service impacts, market penetration, investment topics, business models, and value propositions. Findings highlight a strong focus of manufacturers in energy efficiency and comfort services, while identifying opportunities for improvement in energy flexibility and health integration. This analysis aims to guide stakeholders in strategic planning and decision-making, offering insights into the current and future landscape of the smart building solutions market. Full article
Show Figures

Figure 1

30 pages, 1713 KiB  
Article
Long-Range Wide Area Network Intrusion Detection at the Edge
by Gonçalo Esteves, Filipe Fidalgo, Nuno Cruz and José Simão
IoT 2024, 5(4), 871-900; https://doi.org/10.3390/iot5040040 - 4 Dec 2024
Cited by 1 | Viewed by 1332
Abstract
Internet of Things (IoT) devices are ubiquitous in various applications, such as smart homes, asset and people tracking, and city management systems. However, their deployment in adverse conditions, including unstable internet connectivity and power sources, present new cybersecurity challenges through new attack vectors. [...] Read more.
Internet of Things (IoT) devices are ubiquitous in various applications, such as smart homes, asset and people tracking, and city management systems. However, their deployment in adverse conditions, including unstable internet connectivity and power sources, present new cybersecurity challenges through new attack vectors. The LoRaWAN protocol, with its open and distributed network architecture, has gained prominence as a leading LPWAN solution, presenting novel security challenges. This paper proposes the implementation of machine learning algorithms, specifically the K-Nearest Neighbours (KNN) algorithm, within an Intrusion Detection System (IDS) for LoRaWAN networks. Through behavioural analysis based on previously observed packet patterns, the system can detect potential intrusions that may disrupt critical tracking services. Initial simulated packet classification attained over 90% accuracy. By integrating the Suricata IDS and extending it through a custom toolset, sophisticated rule sets are incorporated to generate confidence metrics to classify packets as either presenting an abnormal or normal behaviour. The current work uses third-party multi-vendor sensor data obtained in the city of Lisbon for training and validating the models. The results show the efficacy of the proposed technique in evaluating received packets, logging relevant parameters in the database, and accurately identifying intrusions or expected device behaviours. We considered two use cases for evaluating our work: one with a more traditional approach where the devices and network are static, and another where we assume that both the devices and the network are mobile; for example, when we need to report data back from sensors on a rail infrastructure to a mobile LoRaWAN gateway onboard a train. Full article
Show Figures

Figure 1

22 pages, 3279 KiB  
Article
Peer-to-Peer Transactive Energy Trading of Smart Homes/Buildings Contributed by A Cloud Energy Storage System
by Shalau Farhad Hussein, Sajjad Golshannavaz and Zhiyi Li
Smart Cities 2024, 7(6), 3489-3510; https://doi.org/10.3390/smartcities7060136 - 18 Nov 2024
Viewed by 1164
Abstract
This paper presents a model for transactive energy management within microgrids (MGs) that include smart homes and buildings. The model focuses on peer-to-peer (P2P) transactive energy management among these homes, establishing a collaborative use of a cloud energy storage system (CESS) to reduce [...] Read more.
This paper presents a model for transactive energy management within microgrids (MGs) that include smart homes and buildings. The model focuses on peer-to-peer (P2P) transactive energy management among these homes, establishing a collaborative use of a cloud energy storage system (CESS) to reduce daily energy costs for both smart homes and MGs. This research assesses how smart homes and buildings can effectively utilize CESS while implementing P2P transactive energy management. Additionally, it explores the potential of a solar rooftop parking lot facility that offers charging and discharging services for plug-in electric vehicles (PEVs) within the MG. Controllable and non-controllable appliances, along with air conditioning (AC) systems, are managed by a home energy management (HEM) system to optimize energy interactions within daily scheduling. A linear mathematical framework is developed across three scenarios and solved using General Algebraic Modeling System (GAMS 24.1.2) software for optimization. The developed model investigates the operational impacts and optimization opportunities of CESS within smart homes and MGs. It also develops a transactive energy framework in a P2P energy trading market embedded with CESS and analyzes the cost-effectiveness and arbitrage driven by CESS integration. The results of the comparative analysis reveal that integrating CESS within the P2P transactive framework not only opens up further technical opportunities but also significantly reduces MG energy costs from $55.01 to $48.64, achieving an 11.57% improvement. Results are further discussed. Full article
(This article belongs to the Section Smart Grids)
Show Figures

Figure 1

15 pages, 941 KiB  
Article
Embedding Tree-Based Intrusion Detection System in Smart Thermostats for Enhanced IoT Security
by Abbas Javed, Muhammad Naeem Awais, Ayyaz-ul-Haq Qureshi, Muhammad Jawad, Jehangir Arshad and Hadi Larijani
Sensors 2024, 24(22), 7320; https://doi.org/10.3390/s24227320 - 16 Nov 2024
Cited by 1 | Viewed by 1257
Abstract
IoT devices with limited resources, and in the absence of gateways, become vulnerable to various attacks, such as denial of service (DoS) and man-in-the-middle (MITM) attacks. Intrusion detection systems (IDS) are designed to detect and respond to these threats in IoT environments. While [...] Read more.
IoT devices with limited resources, and in the absence of gateways, become vulnerable to various attacks, such as denial of service (DoS) and man-in-the-middle (MITM) attacks. Intrusion detection systems (IDS) are designed to detect and respond to these threats in IoT environments. While machine learning-based IDS have typically been deployed at the edge (gateways) or in the cloud, in the absence of gateways, the IDS must be embedded within the sensor nodes themselves. Available datasets mainly contain features extracted from network traffic at the edge (e.g., Raspberry Pi/computer) or cloud servers. We developed a unique dataset, named as Intrusion Detection in the Smart Homes (IDSH) dataset, which is based on features retrievable from microcontroller-based IoT devices. In this work, a Tree-based IDS is embedded into a smart thermostat for real-time intrusion detection. The results demonstrated that the IDS achieved an accuracy of 98.71% for binary classification with an inference time of 276 microseconds, and an accuracy of 97.51% for multi-classification with an inference time of 273 microseconds. Real-time testing showed that the smart thermostat is capable of detecting DoS and MITM attacks without relying on a gateway or cloud. Full article
(This article belongs to the Special Issue Sensor Data Privacy and Intrusion Detection for IoT Networks)
Show Figures

Figure 1

16 pages, 4556 KiB  
Article
I-DINO: High-Quality Object Detection for Indoor Scenes
by Zhipeng Fan, Wanglong Mei, Wei Liu, Ming Chen and Zeguo Qiu
Electronics 2024, 13(22), 4419; https://doi.org/10.3390/electronics13224419 - 11 Nov 2024
Viewed by 1539
Abstract
Object Detection in Complex Indoor Scenes is designed to identify and categorize objects in indoor settings, with applications in areas such as smart homes, security surveillance, and home service robots. It forms the basis for advanced visual tasks including visual question answering, video [...] Read more.
Object Detection in Complex Indoor Scenes is designed to identify and categorize objects in indoor settings, with applications in areas such as smart homes, security surveillance, and home service robots. It forms the basis for advanced visual tasks including visual question answering, video description generation, and instance segmentation. Nonetheless, the task faces substantial hurdles due to background clutter, overlapping objects, and significant size differences. To tackle these challenges, this study introduces an indoor object detection approach utilizing an enhanced DINO framework. To cater to the needs of indoor object detection, an Indoor-COCO dataset was developed from the COCO object detection dataset. The model incorporates an advanced Res2net as the backbone feature extraction network, complemented by a deformable attention mechanism to better capture detailed object features. An upgraded Bi-FPN module is employed to replace the conventional feature fusion module, and SIoU loss is utilized to expedite convergence. The experimental outcomes indicate that the refined model attains an mAP of 62.3%, marking a 5.2% improvement over the baseline model. These findings illustrate that the DINO-based indoor object detection model exhibits robust generalization abilities and practical utility for multi-scale object detection in complex environments. Full article
Show Figures

Figure 1

34 pages, 9855 KiB  
Article
Cost-Effective Power Management for Smart Homes: Innovative Scheduling Techniques and Integrating Battery Optimization in 6G Networks
by Rana Riad Al-Taie and Xavier Hesselbach
Electronics 2024, 13(21), 4231; https://doi.org/10.3390/electronics13214231 - 29 Oct 2024
Viewed by 1321
Abstract
This paper presents an Optimal Power Management System (OPMS) for smart homes in 6G environments, which are designed to enhance the sustainability of Green Internet of Everything (GIoT) applications. The system employs a brute-force search using an exact solution to identify the optimal [...] Read more.
This paper presents an Optimal Power Management System (OPMS) for smart homes in 6G environments, which are designed to enhance the sustainability of Green Internet of Everything (GIoT) applications. The system employs a brute-force search using an exact solution to identify the optimal decision for adapting power consumption to renewable power availability. Key techniques, including priority-based allocation, time-shifting, quality degradation, battery utilization and service rejection, will be adopted. Given the NP-hard nature of this problem, the brute-force approach is feasible for smaller scenarios but sets the stage for future heuristic methods in large-scale applications like smart cities. The OPMS, deployed on Multi-Access Edge Computing (MEC) nodes, integrates a novel demand response (DR) strategy to manage real-time power use effectively. Synthetic data tests achieved a 100% acceptance rate with zero reliance on non-renewable power, while real-world tests reduced non-renewable power consumption by over 90%, demonstrating the system’s flexibility. These results provide a foundation for further AI-based heuristics optimization techniques to improve scalability and power efficiency in broader smart city deployments. Full article
(This article belongs to the Special Issue Energy Storage, Analysis and Battery Usage)
Show Figures

Figure 1

16 pages, 567 KiB  
Article
ACGAN for Addressing the Security Challenges in IoT-Based Healthcare System
by Babu Kaji Baniya
Sensors 2024, 24(20), 6601; https://doi.org/10.3390/s24206601 - 13 Oct 2024
Viewed by 2362
Abstract
The continuous evolution of the IoT paradigm has been extensively applied across various application domains, including air traffic control, education, healthcare, agriculture, transportation, smart home appliances, and others. Our primary focus revolves around exploring the applications of IoT, particularly within healthcare, where it [...] Read more.
The continuous evolution of the IoT paradigm has been extensively applied across various application domains, including air traffic control, education, healthcare, agriculture, transportation, smart home appliances, and others. Our primary focus revolves around exploring the applications of IoT, particularly within healthcare, where it assumes a pivotal role in facilitating secure and real-time remote patient-monitoring systems. This innovation aims to enhance the quality of service and ultimately improve people’s lives. A key component in this ecosystem is the Healthcare Monitoring System (HMS), a technology-based framework designed to continuously monitor and manage patient and healthcare provider data in real time. This system integrates various components, such as software, medical devices, and processes, aimed at improvi1g patient care and supporting healthcare providers in making well-informed decisions. This fosters proactive healthcare management and enables timely interventions when needed. However, data transmission in these systems poses significant security threats during the transfer process, as malicious actors may attempt to breach security protocols.This jeopardizes the integrity of the Internet of Medical Things (IoMT) and ultimately endangers patient safety. Two feature sets—biometric and network flow metric—have been incorporated to enhance detection in healthcare systems. Another major challenge lies in the scarcity of publicly available balanced datasets for analyzing diverse IoMT attack patterns. To address this, the Auxiliary Classifier Generative Adversarial Network (ACGAN) was employed to generate synthetic samples that resemble minority class samples. ACGAN operates with two objectives: the discriminator differentiates between real and synthetic samples while also predicting the correct class labels. This dual functionality ensures that the discriminator learns detailed features for both tasks. Meanwhile, the generator produces high-quality samples that are classified as real by the discriminator and correctly labeled by the auxiliary classifier. The performance of this approach, evaluated using the IoMT dataset, consistently outperforms the existing baseline model across key metrics, including accuracy, precision, recall, F1-score, area under curve (AUC), and confusion matrix results. Full article
(This article belongs to the Special Issue Advances in IoMT for Healthcare Systems–2nd Edition)
Show Figures

Figure 1

17 pages, 2218 KiB  
Review
Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection Techniques and Recommended Prevention Approach
by Omar Alshamsi, Khaled Shaalan and Usman Butt
Information 2024, 15(10), 631; https://doi.org/10.3390/info15100631 - 13 Oct 2024
Cited by 6 | Viewed by 4643
Abstract
The exponential growth of the Internet of Things (IoT) sector has resulted in a surge of interconnected gadgets in smart households, thus exposing them to new cyber-attack susceptibilities. This systematic literature review investigates machine learning methodologies for detecting malware in smart homes, with [...] Read more.
The exponential growth of the Internet of Things (IoT) sector has resulted in a surge of interconnected gadgets in smart households, thus exposing them to new cyber-attack susceptibilities. This systematic literature review investigates machine learning methodologies for detecting malware in smart homes, with a specific emphasis on identifying common threats such as denial-of-service attacks, phishing efforts, and zero-day vulnerabilities. By examining 56 publications published from 2019 to 2023, this analysis uncovers that users are the weakest link and that there is a possibility of attackers disrupting home automation systems, stealing confidential information, or causing physical harm. Machine learning approaches, namely, deep learning and ensemble approaches, are emerging as effective tools for detecting malware. In addition, this analysis highlights prevention techniques, such as early threat detection systems, intrusion detection systems, and robust authentication procedures, as crucial measures for improving smart home security. This study offers significant insights for academics and practitioners aiming to protect smart home settings from growing cybersecurity threats by summarizing the existing knowledge. Full article
Show Figures

Figure 1

23 pages, 2454 KiB  
Article
CO-TSM: A Flexible Model for Secure Embedded Device Ownership and Management
by Konstantinos Markantonakis, Ghada Arfaoui, Sarah Abu Ghazalah, Carlton Shepherd, Raja Naeem Akram and Damien Sauveron
Smart Cities 2024, 7(5), 2887-2909; https://doi.org/10.3390/smartcities7050112 - 8 Oct 2024
Viewed by 1762
Abstract
The Consumer-Oriented Trusted Service Manager (CO-TSM) model has been recognised as a significant advancement in managing applications on Near Field Communication (NFC)-enabled mobile devices and multi-application smart cards. Traditional Trusted Service Manager (TSM) models, while useful, often result in market fragmentation and limit [...] Read more.
The Consumer-Oriented Trusted Service Manager (CO-TSM) model has been recognised as a significant advancement in managing applications on Near Field Communication (NFC)-enabled mobile devices and multi-application smart cards. Traditional Trusted Service Manager (TSM) models, while useful, often result in market fragmentation and limit widespread adoption due to their centralised control mechanisms. The CO-TSM model addresses these issues by decentralising management and offering greater flexibility and scalability, making it more adaptable to the evolving needs of embedded systems, particularly in the context of the Internet of Things (IoT) and Radio Frequency Identification (RFID) technologies. This paper provides a comprehensive analysis of the CO-TSM model, highlighting its application in various technological domains such as smart cards, HCE-based NFC mobile phones, TEE-enabled smart home IoT devices, and RFID-based smart supply chains. By evaluating the CO-TSM model’s architecture, implementation challenges, and practical deployment scenarios, this paper demonstrates how CO-TSM can overcome the limitations of traditional TSM approaches. The case studies presented offer practical insights into the model’s adaptability and effectiveness in real-world scenarios. Through this examination, the paper aims to underscore the CO-TSM model’s role in enhancing scalability, flexibility, and user autonomy in secure embedded device management, while also identifying areas for future research and development. Full article
Show Figures

Figure 1

18 pages, 667 KiB  
Review
A Comparison among Score Systems for Discharging Patients from Recovery Rooms: A Narrative Review
by Khadija El Aoufy, Carolina Forciniti, Yari Longobucco, Alberto Lucchini, Ilaria Mangli, Camilla Elena Magi, Enrico Bulleri, Cristian Fusi, Paolo Iovino, Pasquale Iozzo, Nicoletta Rizzato, Laura Rasero and Stefano Bambi
Nurs. Rep. 2024, 14(4), 2777-2794; https://doi.org/10.3390/nursrep14040205 - 6 Oct 2024
Cited by 2 | Viewed by 3182
Abstract
Introduction: The recovery room (RR) is a hospital area where patients are monitored in the early postoperative period before being transferred to the surgical ward or other specialized units. The utilization of scores in the RR context facilitates the assignment of patients to [...] Read more.
Introduction: The recovery room (RR) is a hospital area where patients are monitored in the early postoperative period before being transferred to the surgical ward or other specialized units. The utilization of scores in the RR context facilitates the assignment of patients to the appropriate ward and directs necessary monitoring. Some scoring systems allow nurses to select patients who can be discharged directly to their homes. Aim and methods: The aim of this narrative review was to describe and compare the scoring systems employed to discharge postoperative patients from RR, with a focus on item characteristics. Results: Nine scoring systems were identified and discussed: the “Aldrete Score System” and its modified version, the “Respiration, Energy, Alertness, Circulation, Temperature Score”, the “Post Anesthetic Discharge Scoring System”, the “White and Song Score”, the “Readiness for Discharge Assessment Tool”, the “Anesthesia and Perioperative Medicine Service Checklist”, the “Post-Anesthetic Care Tool”, the “Post-operative Quality Recovery Scale”, and the “Discerning Post Anesthesia Readiness for Transition” instrument. Discussion and conclusions: To obtain a comprehensive overview, the items included in the scoring systems were compared. Despite the availability of guidelines for patients’ discharge readiness from the RR, there is no universally recommended scoring system. Next-generation scores must be improved to ease their use, minimize errors, and increase safety. The main goals of the scores included in this narrative review were to be simple to use, feasible, intuitive, comprehensive, and flexible. However, these goals frequently conflict because patient assessment takes time, and a smart and comprehensive score may not consider some clinical parameters that may be crucial for the discharge decision. Therefore, further research should be conducted on this topic. Full article
(This article belongs to the Special Issue Nursing Care and Clinical Management in the Post-Pandemic Era)
Show Figures

Figure 1

Back to TopTop