Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (22,313)

Search Parameters:
Keywords = state information

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
20 pages, 1164 KB  
Article
Digitalizing Bridge Inspection Processes Using Building Information Modeling (BIM) and Business Intelligence (BI)
by Luke Nichols, Amr Ashmawi and Phuong H. D. Nguyen
Appl. Sci. 2025, 15(20), 10927; https://doi.org/10.3390/app152010927 (registering DOI) - 11 Oct 2025
Abstract
State Departments of Transportation (DOTs) face challenges with traditional bridge inspections that are time-consuming, inconsistent, and paper-based. This study focused on an existing research gap regarding automated methods that streamline the bridge inspection process, prioritize maintenance effectively, and allocate resources efficiently. Thus, this [...] Read more.
State Departments of Transportation (DOTs) face challenges with traditional bridge inspections that are time-consuming, inconsistent, and paper-based. This study focused on an existing research gap regarding automated methods that streamline the bridge inspection process, prioritize maintenance effectively, and allocate resources efficiently. Thus, this paper introduces a digitalized bridge inspection framework by integrating Building Information Modeling (BIM) and Business Intelligence (BI) to enable near-real-time monitoring and digital documentation. This study adopts a Design Science Research (DSR) methodology, a recognized paradigm for developing and evaluating the innovative SmartBridge to address pressing bridge inspection problems. The method involved designing an Autodesk Revit-based plugin for data synchronization, element-specific comments, and interactive dashboards, demonstrated through an illustrative 3D bridge model. An illustrative example of the digitalized bridge inspection with the proposed framework is provided. The results show that SmartBridge streamlines data collection, reduces manual documentation, and enhances decision-making compared to conventional methods. This paper contributes to this body of knowledge by combining BIM and BI for digital visualization and predictive analytics in bridge inspections. The proposed framework has high potential for hybridizing digital technologies into bridge infrastructure engineering and management to assist transportation agencies in establishing a safer and efficient bridge inspection approach. Full article
(This article belongs to the Special Issue Robotics and Automation Systems in Construction: Trends and Prospects)
Show Figures

Figure 1

24 pages, 1597 KB  
Article
A Comparative Study of Electricity Sales Forecasting Models Based on Different Feature Decomposition Methods
by Shichong Chen, Yushu Zhang, Xiaoteng Ma, Xu Yang, Junyi Shi and Haoyang Ji
Energies 2025, 18(20), 5352; https://doi.org/10.3390/en18205352 (registering DOI) - 11 Oct 2025
Abstract
Accurate forecasting of electricity sales holds significant practical importance. On the one hand, it helps to implement and achieve the annual goals of power companies, and on the other hand, it helps to control the balance of enterprise profits. This study was conducted [...] Read more.
Accurate forecasting of electricity sales holds significant practical importance. On the one hand, it helps to implement and achieve the annual goals of power companies, and on the other hand, it helps to control the balance of enterprise profits. This study was conducted in China using data from the State Grid Corporation (Henan, Fujian, and national data) from the Wind database. Based on collected data such as electricity sales, this study addresses the limitations of the existing literature, which mostly employs a single feature decomposition method for forecasting. We simultaneously apply three decomposition techniques—seasonal adjustment decomposition (X13), empirical mode decomposition (EMD), and discrete wavelet transform (DWT)—to decompose electricity sales into multiple components. Subsequently, we model each component using the ADL, SARIMAX, and LSTM models, synthesize the component-level forecasts, and realize the comparison of electricity sales forecasting models based on different feature decomposition methods. The findings reveal (1) forecasting performance based on feature decomposition generally outperforms direct forecasting without decomposition; (2) different regions may benefit from different decomposition methods—EMD is more suitable for regions with high sales volatility, while DWT is preferable for more stable regions; and (3) among the forecasting models, ADL performs better than SARIMAX, while LSTM yields the least accurate results when combined with decomposition methods. Full article
(This article belongs to the Section C: Energy Economics and Policy)
22 pages, 5120 KB  
Article
Adapting Gated Axial Attention for Microscopic Hyperspectral Cholangiocarcinoma Image Segmentation
by Jianxia Xue, Xiaojing Chen and Soo-Hyung Kim
Electronics 2025, 14(20), 3979; https://doi.org/10.3390/electronics14203979 (registering DOI) - 11 Oct 2025
Abstract
Accurate segmentation of medical images is essential for clinical diagnosis and treatment planning. Hyperspectral imaging (HSI), with its rich spectral information, enables improved tissue characterization and structural localization compared with traditional grayscale or RGB imaging. However, the effective modeling of both spatial and [...] Read more.
Accurate segmentation of medical images is essential for clinical diagnosis and treatment planning. Hyperspectral imaging (HSI), with its rich spectral information, enables improved tissue characterization and structural localization compared with traditional grayscale or RGB imaging. However, the effective modeling of both spatial and spectral dependencies remains a significant challenge, particularly in small-scale medical datasets. In this study, we propose GSA-Net, a 3D segmentation framework that integrates Gated Spectral-Axial Attention (GSA) to capture long-range interband dependencies and enhance spectral feature discrimination. The GSA module incorporates multilayer perceptrons (MLPs) and adaptive LayerScale mechanisms to enable the fine-grained modulation of spectral attention across feature channels. We evaluated GSA-Net on a hyperspectral cholangiocarcinoma (CCA) dataset, achieving an average Intersection over Union (IoU) of 60.64 ± 14.48%, Dice coefficient of 74.44 ± 11.83%, and Hausdorff Distance of 76.82 ± 42.77 px. It outperformed state-of-the-art baselines. Further spectral analysis revealed that informative spectral bands are widely distributed rather than concentrated, and full-spectrum input consistently outperforms aggressive band selection, underscoring the importance of adaptive spectral attention for robust hyperspectral medical image segmentation. Full article
(This article belongs to the Special Issue Image Segmentation, 2nd Edition)
23 pages, 3409 KB  
Article
Regionalization of Input–Output Matrices with Limited Information: Application to the State of Rio Grande do Sul, Brazil
by Eduardo Rodrigues Sanguinet, Adelar Fochezatto and Cristian Gonzalez Santander
Reg. Sci. Environ. Econ. 2025, 2(4), 31; https://doi.org/10.3390/rsee2040031 (registering DOI) - 11 Oct 2025
Abstract
The regionalization of input–output tables enables a granular understanding of economic systems, allowing for interregional and interindustry analysis for goods and services in a local economy. This paper details the construction of an intermunicipal IO matrix for the state of Rio Grande do [...] Read more.
The regionalization of input–output tables enables a granular understanding of economic systems, allowing for interregional and interindustry analysis for goods and services in a local economy. This paper details the construction of an intermunicipal IO matrix for the state of Rio Grande do Sul (Brazil), a region marked by both economic diversification and significant territorial disparities. Using the 16-sector state IO matrix (base year 2019) provided by the state-level treasury (SEFAZ-RS) as a starting point, we adapt the Interregional Input–Output Adjustment System (IIOAS), integrating gravity-based trade modelling and RAS balancing, to produce a disaggregated structure for 497 municipalities. The regionalization follows three main steps: (i) generation of an initial matrix assuming proportional municipal shares in sectoral supply and demand; (ii) iterative RAS-based adjustments to align with municipal and state-level constraints; and (iii) incorporation of complementary municipal data—including employment, GDP, household consumption, and exports—to refine final demand and value-added allocations. The results demonstrate the feasibility of deriving spatially intermunicipal IO structures from limited data. The results show that, while industrial and service activities are concentrated around the Porto Alegre metropolitan area, rural subregions remain specialized in low value-added primary sectors. Full article
Show Figures

Figure 1

28 pages, 4254 KB  
Article
An Integrated Isochrone-Based Geospatial Analysis of Mobility Policies and Vulnerability Hotspots in the Lazio Region, Italy
by Alessio D’Auria, Irina Di Ruocco and Antonio Gioia
ISPRS Int. J. Geo-Inf. 2025, 14(10), 395; https://doi.org/10.3390/ijgi14100395 (registering DOI) - 10 Oct 2025
Abstract
Areas characterised by high ecological and cultural value are increasingly exposed to overtourism and intensifying land-use pressures, often exacerbated by mobility policies aimed at enhancing regional accessibility and promoting tourism. These dynamics create spatial tensions, particularly in environmentally sensitive areas such as those [...] Read more.
Areas characterised by high ecological and cultural value are increasingly exposed to overtourism and intensifying land-use pressures, often exacerbated by mobility policies aimed at enhancing regional accessibility and promoting tourism. These dynamics create spatial tensions, particularly in environmentally sensitive areas such as those within the Natura 2000 network and Sites of Community Importance (SCIs), where intensified visitor flows, and infrastructure expansion can disrupt the balance between conservation and development. This study offers a geospatial analysis of the current state (2024) of such dynamics in the Lazio Region (Italy), evaluating the effects of mobility strategies on ecological vulnerability and tourism pressure. By applying isochrone-based accessibility modelling, GIS buffer analysis, and spatial overlays, the research maps the intersection of accessibility, heritage value, and environmental sensitivity. The methodology enables the identification of critical zones where accessibility improvements coincide with heightened ecological risk and tourism-related stress. The original contribution of this work lies in its integrated spatial framework, which combines accessibility metrics with indicators of ecological and heritage significance to visualise and assess emerging risk areas. The Lazio Region, distinguished by its heterogeneous landscapes and ambitious mobility planning initiatives, constitutes a significant case study for examining how policy-driven improvements in transport infrastructure may inadvertently exacerbate spatial disparities and intensify ecological vulnerabilities in peripheral and sensitive territorial contexts. The findings support the formulation of adaptive, place-based policy recommendations aimed at mitigating the unintended consequences of accessibility-led tourism strategies. These include prioritising soft mobility, enhancing regulatory protection in high-risk zones, and fostering coordinated governance across sectors. Ultimately, the study advances a replicable methodology to inform sustainable territorial governance and balance tourism development with environmental preservation. Full article
Show Figures

Figure 1

23 pages, 559 KB  
Article
Towards the Establishment of Protocols for Defining the Requirements of Different Mining Site Contexts Within the European Project Mine.io
by Cristina Sáez Blázquez, Vasileios Protonotarios, Max Friedemann, Ignacio Martín Nieto, Katerina Margariti and Diego González-Aguilera
Resources 2025, 14(10), 163; https://doi.org/10.3390/resources14100163 - 10 Oct 2025
Abstract
Mining activity has been and is one of the most important and indispensable industries for the development of society. Given its role in the provision of raw materials, advancing the development of environmentally friendly mining practices is essential for meeting the globally established [...] Read more.
Mining activity has been and is one of the most important and indispensable industries for the development of society. Given its role in the provision of raw materials, advancing the development of environmentally friendly mining practices is essential for meeting the globally established goals of sustainable development. In this regard, actions and incentives are being promoted by the European Union, such as the Mine.io project presented in this research. In response to the needs identified within the mining sector, this research seeks to explore the functional and non-functional requirements across several mining contexts. The objective is to establish effective patterns that positively influence the sector activities. This effort is envisioned as a critical foundation for developing a digital architecture that addresses sector limitations and fosters the integration of Industry 4.0 principles into the mining domain. The results provide a solid basis for understanding the needs of the different mining sectors analyzed, while also demonstrating the potential advancements achievable through the project’s technological developments. They enable a comprehensive evaluation of the current technological state in relation to the broader context of global legacy practices, establishing informed guidelines for effective sector responses based on digitalization and the application of sustainable tools. Full article
27 pages, 5599 KB  
Article
Feature Selection and Model Fusion for Lithium-Ion Battery Pack SOC Prediction
by Wenqiang Yang, Chong Li, Qinglin Miao, Yonggang Chen and Fuquan Nie
Energies 2025, 18(20), 5340; https://doi.org/10.3390/en18205340 - 10 Oct 2025
Abstract
Accurate prediction of the state of charge (SOC) of a battery pack is essential to improve the operational efficiency and safety of energy storage systems. In this paper, we propose a novel lithium-ion battery (Lib) pack SOC prediction framework that combines redundant control [...] Read more.
Accurate prediction of the state of charge (SOC) of a battery pack is essential to improve the operational efficiency and safety of energy storage systems. In this paper, we propose a novel lithium-ion battery (Lib) pack SOC prediction framework that combines redundant control correlation downscaling with Adaptive Error Variation Weighting Mechanism (AVM) fusion mechanisms. By integrating redundancy feature selection based on correlation analysis with global sensitivity analysis, the dimensionality of the input features was reduced by 81.25%. The AVM merges BiGRU’s ability to model short-term dynamics with Informer’s ability to capture long-term dependencies. This approach allows for complementary information exchange between multiple models. Experimental results indicate that on both monthly and quarterly slice datasets, the RMSE and MAE of the fusion model are significantly lower than those of the single model. In particular, the proposed model shows higher robustness and generalization ability in seasonal generalization tests. Its performance is significantly better than the traditional linear and classical filtering methods. The method provides reliable technical support for accurate estimation of SOC in battery management systems under complex environmental conditions. Full article
Show Figures

Figure 1

21 pages, 2372 KB  
Article
IDG-ViolenceNet: A Video Violence Detection Model Integrating Identity-Aware Graphs and 3D-CNN
by Hong Huang and Qingping Jiang
Sensors 2025, 25(20), 6272; https://doi.org/10.3390/s25206272 - 10 Oct 2025
Abstract
Video violence detection plays a crucial role in intelligent surveillance and public safety, yet existing methods still face challenges in modeling complex multi-person interactions. To address this, we propose IDG-ViolenceNet, a dual-stream video violence detection model that integrates identity-aware spatiotemporal graphs with three-dimensional [...] Read more.
Video violence detection plays a crucial role in intelligent surveillance and public safety, yet existing methods still face challenges in modeling complex multi-person interactions. To address this, we propose IDG-ViolenceNet, a dual-stream video violence detection model that integrates identity-aware spatiotemporal graphs with three-dimensional convolutional neural networks (3D-CNN). Specifically, the model utilizes YOLOv11 for high-precision person detection and cross-frame identity tracking, constructing a dynamic spatiotemporal graph that encodes spatial proximity, temporal continuity, and individual identity information. On this basis, a GINEConv branch extracts structured interaction features, while an R3D-18 branch models local spatiotemporal patterns. The two representations are fused in a dedicated module for cross-modal feature integration. Experimental results show that IDG-ViolenceNet achieves accuracies of 97.5%, 99.5%, and 89.4% on the Hockey Fight, Movies Fight, and RWF-2000 datasets, respectively, significantly outperforming state-of-the-art methods. Additionally, ablation studies validate the contributions of key components in improving detection accuracy and robustness. Full article
(This article belongs to the Section Sensing and Imaging)
Show Figures

Figure 1

18 pages, 5377 KB  
Article
M3ENet: A Multi-Modal Fusion Network for Efficient Micro-Expression Recognition
by Ke Zhao, Xuanyu Liu and Guangqian Yang
Sensors 2025, 25(20), 6276; https://doi.org/10.3390/s25206276 (registering DOI) - 10 Oct 2025
Abstract
Micro-expression recognition (MER) aims to detect brief and subtle facial movements that reveal suppressed emotions, discerning authentic emotional responses in scenarios such as visitor experience analysis in museum settings. However, it remains a highly challenging task due to the fleeting duration, low intensity, [...] Read more.
Micro-expression recognition (MER) aims to detect brief and subtle facial movements that reveal suppressed emotions, discerning authentic emotional responses in scenarios such as visitor experience analysis in museum settings. However, it remains a highly challenging task due to the fleeting duration, low intensity, and limited availability of annotated data. Most existing approaches rely solely on either appearance or motion cues, thereby restricting their ability to capture expressive information fully. To overcome these limitations, we propose a lightweight multi-modal fusion network, termed M3ENet, which integrates both motion and appearance cues through early-stage feature fusion. Specifically, our model extracts horizontal, vertical, and strain-based optical flow between the onset and apex frames, alongside RGB images from the onset, apex, and offset frames. These inputs are processed by two modality-specific subnetworks, whose features are fused to exploit complementary information for robust classification. To improve generalization in low data regimes, we employ targeted data augmentation and adopt focal loss to mitigate class imbalance. Extensive experiments on five benchmark datasets, including CASME I, CASME II, CAS(ME)2, SAMM, and MMEW, demonstrate that M3ENet achieves state-of-the-art performance with high efficiency. Ablation studies and Grad-CAM visualizations further confirm the effectiveness and interpretability of the proposed architecture. Full article
(This article belongs to the Special Issue AI-Based Computer Vision Sensors & Systems—2nd Edition)
Show Figures

Figure 1

20 pages, 5472 KB  
Article
Research on Indoor 3D Semantic Mapping Based on ORB-SLAM2 and Multi-Object Tracking
by Wei Wang, Ruoxi Wu, Yan Dong and Huilin Jiang
Appl. Sci. 2025, 15(20), 10881; https://doi.org/10.3390/app152010881 - 10 Oct 2025
Abstract
The integration of semantic simultaneous localization and mapping (SLAM) with 3D object detection in indoor scenes is a significant challenge in the field of robot perception. Existing methods typically rely on expensive sensors and lack robustness and accuracy in complex environments. To address [...] Read more.
The integration of semantic simultaneous localization and mapping (SLAM) with 3D object detection in indoor scenes is a significant challenge in the field of robot perception. Existing methods typically rely on expensive sensors and lack robustness and accuracy in complex environments. To address this, this paper proposes a novel 3D semantic SLAM framework that integrates Oriented FAST and Rotated BRIEF-SLAM2 (ORB-SLAM2), 3D object detection, and multi-object tracking (MOT) techniques to achieve efficient and robust semantic environment modeling. Specifically, we employ an improved 3D object detection network to extract semantic information and enhance detection accuracy through category balancing strategies and optimized loss functions. Additionally, we introduce MOT algorithms to filter and track 3D bounding boxes, enhancing stability in dynamic scenes. Finally, we deeply integrate 3D semantic information into the SLAM system, achieving high-precision 3D semantic map construction. Experiments were conducted on the public dataset SUNRGBD and two self-collected datasets (robot navigation and XR glasses scenes). The results show that, compared with the current state-of-the-art methods, our method demonstrates significant advantages in detection accuracy, localization accuracy, and system robustness, providing an effective solution for low-cost, high-precision indoor semantic SLAM. Full article
Show Figures

Figure 1

41 pages, 3075 KB  
Review
Securing the Internet of Things: Systematic Insights into Architectures, Threats, and Defenses
by Kim Son Lim, Shih Yin Ooi, Md Shohel Sayeed, Yee Jian Chew and Nazrul Muhaimin Ahmad
Electronics 2025, 14(20), 3972; https://doi.org/10.3390/electronics14203972 - 10 Oct 2025
Abstract
The Internet of Things (IoT) is a transformative technology with significant potential across various applications. IoT enables everyday devices to become smarter, processes to become more intelligent, and communication to be more informative. As the fastest-growing field in Information Technology, IoT integrates objects [...] Read more.
The Internet of Things (IoT) is a transformative technology with significant potential across various applications. IoT enables everyday devices to become smarter, processes to become more intelligent, and communication to be more informative. As the fastest-growing field in Information Technology, IoT integrates objects into a virtual infrastructure that keeps us informed about their states. IoT devices include IT appliances such as PCs, mobile phones, laptops, smartwatches, and other wearable devices, which communicate through sensor-based embedded systems that transmit data. However, as the number of connected devices increases, so do the risks of connectivity and security breaches. These systems are often used in machine-to-machine communication, sharing vast amounts of data, which heightens the risk of intrusions. This survey systematically reviewed and analyzed 82 peer-reviewed studies published between 2010 and 2024, covering IoT security architecture, threats, and defense mechanisms. The review identifies key trends, common challenges, and security threats specific to IoT-based architecture across different domains. Additionally, it proposes solutions to enhance IoT security. The findings contribute to a deeper understanding of the current state of IoT security and offer insights into future research and the practical implementation of protective measures. Full article
Show Figures

Figure 1

37 pages, 2048 KB  
Article
TrackRISC: An Implicit Attack Flow Model and Hardware Microarchitectural Mitigation for Speculative Cache-Based Covert Channels
by Zhewen Zhang, Abdurrashid Ibrahim Sanka, Yuhan She, Jinfa Hong, Patrick S. Y. Hung and Ray C. C. Cheung
Electronics 2025, 14(20), 3973; https://doi.org/10.3390/electronics14203973 - 10 Oct 2025
Abstract
Speculative execution attacks significantly compromise the security of modern processors by enabling information leakage. These well-known attacks exploit speculative cache-based covert channels to effectively exfiltrate secret data by altering cache states. Existing hardware defenses specifically designed to prevent cache-based covert channels are effective [...] Read more.
Speculative execution attacks significantly compromise the security of modern processors by enabling information leakage. These well-known attacks exploit speculative cache-based covert channels to effectively exfiltrate secret data by altering cache states. Existing hardware defenses specifically designed to prevent cache-based covert channels are effective at blocking explicit channels. However, their protection against implicit attack variants remains limited, since these hardware defenses do not fully eliminate secret-dependent microarchitectural changes in caches. In this paper, we propose TrackRISC, a framework which comprises (i) a refined implicit attack flow model specifically for the exploration and analysis of implicit cache-based speculative execution attacks which severely compromise the security of existing hardware defenses, and (ii) a security-enhanced tracking and mitigation microarchitecture, termed TrackRISC-Defense, designed to mitigate both implicit and explicit attack variants that use speculative cache-based covert channels. To obtain realistic hardware evaluation results, we implement and evaluate both TrackRISC-Defense and a representative existing defense on top of the Berkeley’s out-of-order RISC-V processor core (SonicBOOM) using the VCU118 FPGA platform running Linux. Compared to the representative existing defense which incurs a performance overhead of 13.8%, TrackRISC-Defense ensures stronger security guarantees with a performance overhead of 19.4%. In addition, TrackRISC-Defense can mitigate both explicit and implicit speculative cache-based covert channels with a register-based hardware resource overhead of 0.4%. Full article
(This article belongs to the Special Issue Secure Hardware Architecture and Attack Resilience)
Show Figures

Figure 1

20 pages, 11319 KB  
Article
Enhancing Feature Integrity and Transmission Stealth: A Multi-Channel Imaging Hiding Method for Network Abnormal Traffic
by Zhenghao Qian, Fengzheng Liu, Mingdong He and Denghui Zhang
Buildings 2025, 15(20), 3638; https://doi.org/10.3390/buildings15203638 - 10 Oct 2025
Abstract
In open-network environments of smart buildings and urban infrastructure, abnormal traffic from security and energy monitoring systems is critical for operational safety and decision reliability. We can develop malware that exploits building automation protocols to simulate attacks involving the falsification or modification of [...] Read more.
In open-network environments of smart buildings and urban infrastructure, abnormal traffic from security and energy monitoring systems is critical for operational safety and decision reliability. We can develop malware that exploits building automation protocols to simulate attacks involving the falsification or modification of chiller controller commands, thereby endangering the entire network infrastructure. Intrusion detection systems rely on abundant labeled abnormal traffic data to detect attack patterns, improving network system reliability. However, transmitting such data faces two major challenges: single-feature representations fail to capture comprehensive traffic features, limiting the information representation for artificial intelligence (AI)-based detection models, and unconcealed abnormal traffic is easily intercepted by firewalls or intrusion detection systems, hindering cross-departmental sharing. Existing methods struggle to balance feature integrity and transmission stealth, often sacrificing one for the other or relying on easily detectable spatial-domain steganography. To address these gaps, we propose a multi-channel imaging hiding method that reconstructs abnormal traffic into multi-channel images by combining three mappings to generate grayscale images that depict traffic state transitions, dynamic trends, and internal similarity, respectively. These images are combined to enhance feature representation and embedded into frequency-domain adversarial examples, enabling evasion of security devices while preserving traffic integrity. Experimental results demonstrate that our method captures richer information than single-representation approaches, achieving a PSNR of 44.5 dB (a 6.0 dB improvement over existing methods) and an SSIM of 0.97. The high-fidelity reconstructions enabled by these gains facilitate the secure and efficient sharing of abnormal traffic data, thereby enhancing AI-driven security in smart buildings. Full article
Show Figures

Figure 1

19 pages, 2081 KB  
Article
Digital Twins and Augmented Reality for Humanitarian Logistics in Urban Disasters: Framework Development
by Sepehr Abrishami and Reshma Jayaram
Logistics 2025, 9(4), 143; https://doi.org/10.3390/logistics9040143 - 10 Oct 2025
Abstract
Background: Urban disasters expose persistent gaps in the operational picture and timely decision-making for response teams, which require user-centred systems that connect analysis to action. This study proposes and formatively validates an integrated framework that couples digital twins and augmented reality for [...] Read more.
Background: Urban disasters expose persistent gaps in the operational picture and timely decision-making for response teams, which require user-centred systems that connect analysis to action. This study proposes and formatively validates an integrated framework that couples digital twins and augmented reality for humanitarian logistics. Methods: A mixed methods design combined a structured literature synthesis with a practitioner survey across architecture, engineering, planning, BIM, and construction to assess perceived value and adoption conditions. Results: Findings indicate that practitioners prioritised digital twins for enhancing situational awareness (71.4%) and augmented reality for providing real-time information overlays (64.3%). A majority judged that integrating these technologies would yield substantial improvements in disaster response (67.9%), despite implementation challenges. Conclusions: The framework links live state estimation and short-horizon simulation to role-specific, in-scene AR cues, with the aim of reducing decision latency and improving coordination. Adoption depends primarily on human and organisational factors, including user accessibility, preparation needs, and clear governance. These results suggest a viable pathway to operationalise the bridge between analysis and field action and outline priorities for pilot evaluation. Full article
(This article belongs to the Section Humanitarian and Healthcare Logistics)
Show Figures

Figure 1

21 pages, 14964 KB  
Article
An Automated Framework for Abnormal Target Segmentation in Levee Scenarios Using Fusion of UAV-Based Infrared and Visible Imagery
by Jiyuan Zhang, Zhonggen Wang, Jing Chen, Fei Wang and Lyuzhou Gao
Remote Sens. 2025, 17(20), 3398; https://doi.org/10.3390/rs17203398 - 10 Oct 2025
Abstract
Levees are critical for flood defence, but their integrity is threatened by hazards such as piping and seepage, especially during high-water-level periods. Traditional manual inspections for these hazards and associated emergency response elements, such as personnel and assets, are inefficient and often impractical. [...] Read more.
Levees are critical for flood defence, but their integrity is threatened by hazards such as piping and seepage, especially during high-water-level periods. Traditional manual inspections for these hazards and associated emergency response elements, such as personnel and assets, are inefficient and often impractical. While UAV-based remote sensing offers a promising alternative, the effective fusion of multi-modal data and the scarcity of labelled data for supervised model training remain significant challenges. To overcome these limitations, this paper reframes levee monitoring as an unsupervised anomaly detection task. We propose a novel, fully automated framework that unifies geophysical hazards and emergency response elements into a single analytical category of “abnormal targets” for comprehensive situational awareness. The framework consists of three key modules: (1) a state-of-the-art registration algorithm to precisely align infrared and visible images; (2) a generative adversarial network to fuse the thermal information from IR images with the textural details from visible images; and (3) an adaptive, unsupervised segmentation module where a mean-shift clustering algorithm, with its hyperparameters automatically tuned by Bayesian optimization, delineates the targets. We validated our framework on a real-world dataset collected from a levee on the Pajiang River, China. The proposed method demonstrates superior performance over all baselines, achieving an Intersection over Union of 0.348 and a macro F1-Score of 0.479. This work provides a practical, training-free solution for comprehensive levee monitoring and demonstrates the synergistic potential of multi-modal fusion and automated machine learning for disaster management. Full article
Show Figures

Figure 1

Back to TopTop