Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,089)

Search Parameters:
Keywords = user segmentation

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
19 pages, 1977 KB  
Article
Research on the Evaluation Model for Natural Gas Pipeline Capacity Allocation Under Fair and Open Access Mode
by Xinze Li, Dezhong Wang, Yixun Shi, Jiaojiao Jia and Zixu Wang
Energies 2025, 18(20), 5544; https://doi.org/10.3390/en18205544 - 21 Oct 2025
Abstract
Compared with other fossil energy sources, natural gas is characterized by compressibility, low energy density, high storage costs, and imbalanced usage. Natural gas pipeline supply systems possess unique attributes such as closed transportation and a highly integrated upstream, midstream, and downstream structure. Moreover, [...] Read more.
Compared with other fossil energy sources, natural gas is characterized by compressibility, low energy density, high storage costs, and imbalanced usage. Natural gas pipeline supply systems possess unique attributes such as closed transportation and a highly integrated upstream, midstream, and downstream structure. Moreover, pipelines are almost the only economical means of onshore natural gas transportation. Given that the upstream of the pipeline features multi-entity and multi-channel supply including natural gas, coal-to-gas, and LNG vaporized gas, while the downstream presents a competitive landscape with multi-market and multi-user segments (e.g., urban residents, factories, power plants, and vehicles), there is an urgent social demand for non-discriminatory and fair opening of natural gas pipeline network infrastructure to third-party entities. However, after the fair opening of natural gas pipeline networks, the original “point-to-point” transaction model will be replaced by market-driven behaviors, making the verification and allocation of gas transmission capacity a key operational issue. Currently, neither pipeline operators nor government regulatory authorities have issued corresponding rules, regulations, or evaluation plans. To address this, this paper proposes a multi-dimensional quantitative evaluation model based on the Analytic Hierarchy Process (AHP), integrating both commercial and technical indicators. The model comprehensively considers six indicators: pipeline transportation fees, pipeline gas line pack, maximum gas storage capacity, pipeline pressure drop, energy consumption, and user satisfaction and constructs a quantitative evaluation system. Through the consistency check of the judgment matrix (CR = 0.06213 < 0.1), the weights of the respective indicators are determined as follows: 0.2584, 0.2054, 0.1419, 0.1166, 0.1419, and 0.1357. The specific score of each indicator is determined based on the deviation between each evaluation indicator and the theoretical optimal value under different gas volume allocation schemes. Combined with the weight proportion, the total score of each gas volume allocation scheme is finally calculated, thereby obtaining the recommended gas volume allocation scheme. The evaluation model was applied to a practical pipeline project. The evaluation results show that the AHP-based evaluation model can effectively quantify the advantages and disadvantages of different gas volume allocation schemes. Notably, the gas volume allocation scheme under normal operating conditions is not the optimal one; instead, it ranks last according to the scores, with a score 0.7 points lower than that of the optimal scheme. In addition, to facilitate rapid decision-making for gas volume allocation schemes, this paper designs a program using HTML and develops a gas volume allocation evaluation program with JavaScript based on the established model. This self-developed program has the function of automatically generating scheme scores once the proposed gas volume allocation for each station is input, providing a decision support tool for pipeline operators, shippers, and regulatory authorities. The evaluation model provides a theoretical and methodological basis for the dynamic optimization of natural gas pipeline gas volume allocation schemes under the fair opening model. It is expected to, on the one hand, provide a reference for transactions between pipeline network companies and shippers, and on the other hand, offer insights for regulatory authorities to further formulate detailed and fair gas transmission capacity transaction methods. Full article
(This article belongs to the Special Issue New Advances in Oil, Gas and Geothermal Reservoirs—3rd Edition)
Show Figures

Figure 1

25 pages, 2961 KB  
Article
Ultrasound and Unsupervised Segmentation-Based Gesture Recognition for Smart Device Unlocking
by Xiaojuan Wang and Mengqiao Li
Sensors 2025, 25(20), 6408; https://doi.org/10.3390/s25206408 - 17 Oct 2025
Viewed by 271
Abstract
A smart device unlocking scheme based on ultrasonic gesture recognition is proposed, allowing users to unlock their devices by customizing the unlock code through gesture movements. This method utilizes ultrasound to detect multiple consecutive gestures, identifying micro-features within these gestures for authentication. To [...] Read more.
A smart device unlocking scheme based on ultrasonic gesture recognition is proposed, allowing users to unlock their devices by customizing the unlock code through gesture movements. This method utilizes ultrasound to detect multiple consecutive gestures, identifying micro-features within these gestures for authentication. To enhance recognition accuracy, an unsupervised segmentation algorithm is employed to accurately segment the gesture feature region and extract the time-frequency domain data of the gestures. Additionally, two-stage data enhancement techniques are applied to generate user-specific data based on a small sample size. Finally, the user-specific model is deployed to mobile devices via transfer learning for on-device, real-time inference. Experimental validation on a commercial smartphone (Redmi K50) demonstrates that the entire authentication pipeline, from signal acquisition to decision, processes 8 types of gestures in a sequence in sequence in approximately 1.2 s, with the core model inference taking less than 50 milliseconds. This ensures that the raw biometric data (ultrasonic echoes) and the recognition results never leave the user’s device during authentication, thereby safeguarding privacy. It is important to note that while model training is performed offline on a server to leverage greater computational resources for personalization, the deployed system operates fully in real time on the edge device. Experimental results demonstrate that our system achieves accurate and robust identity verification, with an average five-fold cross-validation accuracy rate of up to 93.56%, and it shows robustness across different environments. Full article
(This article belongs to the Section Intelligent Sensors)
Show Figures

Figure 1

31 pages, 8374 KB  
Article
Distributed Photovoltaic Short-Term Power Forecasting Based on Seasonal Causal Correlation Analysis
by Zhong Wang, Mao Yang, Jianfeng Che, Wei Xu, Wei He and Kang Wu
Appl. Sci. 2025, 15(20), 11063; https://doi.org/10.3390/app152011063 - 15 Oct 2025
Viewed by 171
Abstract
In recent years, with the development of distributed photovoltaic (PV) systems, their impact on power grids has become increasingly significant. However, the complexity of meteorological variations makes the prediction of distributed PV power challenging and often ineffective. This study proposes a short-term power [...] Read more.
In recent years, with the development of distributed photovoltaic (PV) systems, their impact on power grids has become increasingly significant. However, the complexity of meteorological variations makes the prediction of distributed PV power challenging and often ineffective. This study proposes a short-term power forecasting method for distributed photovoltaics that can identify seasonal characteristics matching weather types, enabling a deeper analysis of complex meteorological changes. First, historical power data is decomposed seasonally using the adaptive noise complete ensemble empirical mode decomposition with adaptive noise (CEEMDAN). Next, each component is reconstructed based on a characteristic similarity approach, and a two-stage feature selection process is applied to identify the most relevant features for reconstruction, addressing the issue of nonlinear variable selection. A CNN-LSTM-KAN model with multi-dimensional spatial representation is then proposed to model different weather types obtained by the K-shape clustering method, enabling the segmentation of weather processes. Finally, the proposed method is applied to a case study of distributed PV users in a certain province for short-term power prediction. The results indicate that, compared to traditional methods, the average RMSE decreases by 8.93%, the average MAE decreases by 4.82%, and the R2 increases by 9.17%, demonstrating the effectiveness of the proposed method. Full article
Show Figures

Figure 1

25 pages, 3069 KB  
Article
DrSVision: A Machine Learning Tool for Cortical Region-Specific fNIRS Calibration Based on Cadaveric Head MRI
by Serhat Ilgaz Yöner, Mehmet Emin Aksoy, Hayrettin Can Südor, Kurtuluş İzzetoğlu, Baran Bozkurt and Alp Dinçer
Sensors 2025, 25(20), 6340; https://doi.org/10.3390/s25206340 - 14 Oct 2025
Viewed by 288
Abstract
Functional Near-Infrared Spectroscopy is (fNIRS) a non-invasive neuroimaging technique that monitors cerebral hemodynamic responses by measuring near-infrared (NIR) light absorption caused by changes in oxygenated and deoxygenated hemoglobin concentrations. While fNIRS has been widely used in cognitive and clinical neuroscience, a key challenge [...] Read more.
Functional Near-Infrared Spectroscopy is (fNIRS) a non-invasive neuroimaging technique that monitors cerebral hemodynamic responses by measuring near-infrared (NIR) light absorption caused by changes in oxygenated and deoxygenated hemoglobin concentrations. While fNIRS has been widely used in cognitive and clinical neuroscience, a key challenge persists: the lack of practical tools required for calibrating source-detector separation (SDS) to maximize sensitivity at depth (SAD) for monitoring specific cortical regions of interest to neuroscience and neuroimaging studies. This study presents DrSVision version 1.0, a standalone software developed to address this limitation. Monte Carlo (MC) simulations were performed using segmented magnetic resonance imaging (MRI) data from eight cadaveric heads to realistically model light attenuation across anatomical layers. SAD of 10–20 mm with SDS of 19–39 mm was computed. The dataset was used to train a Gaussian Process Regression (GPR)-based machine learning (ML) model that recommends optimal SDS for achieving maximal sensitivity at targeted depths. The software operates independently of any third-party platforms and provides users with region-specific calibration outputs tailored for experimental goals, supporting more precise application of fNIRS. Future developments aim to incorporate subject-specific calibration using anatomical data and broaden support for diverse and personalized experimental setups. DrSVision represents a step forward in fNIRS experimentation. Full article
(This article belongs to the Special Issue Recent Innovations in Computational Imaging and Sensing)
Show Figures

Graphical abstract

29 pages, 2868 KB  
Article
224-CPSK–CSS–WCDMA FPGA-Based Reconfigurable Chaotic Modulation for Multiuser Communications in the 2.45 GHz Band
by Jose-Cruz Nuñez-Perez, Miguel-Angel Estudillo-Valdez, José-Ricardo Cárdenas-Valdez, Gabriela-Elizabeth Martinez-Mendivil and Yuma Sandoval-Ibarra
Electronics 2025, 14(20), 3995; https://doi.org/10.3390/electronics14203995 - 12 Oct 2025
Viewed by 186
Abstract
This article presents an innovative chaotic communication scheme that integrates the multiuser access technique known as Wideband Code Division Multiple Access (W-CDMA) with the chaos-based selective strategy Chaos-Based Selective Symbol (CSS) and the unconventional modulation Chaos Parameter Shift Keying (CPSK). The system is [...] Read more.
This article presents an innovative chaotic communication scheme that integrates the multiuser access technique known as Wideband Code Division Multiple Access (W-CDMA) with the chaos-based selective strategy Chaos-Based Selective Symbol (CSS) and the unconventional modulation Chaos Parameter Shift Keying (CPSK). The system is designed to operate in the 2.45 GHz band and provides a robust and efficient alternative to conventional schemes such as Quadrature Amplitude Modulation (QAM). The proposed CPSK modulation enables the encoding of information for multiple users by regulating the 36 parameters of a Reconfigurable Chaotic Oscillator (RCO), theoretically allowing the simultaneous transmission of up to 224 independent users over the same channel. The CSS technique encodes each user’s information using a unique chaotic segment configuration generated by the RCO; this serves as a reference for binary symbol encoding. W-CDMA further supports the concurrent transmission of data from multiple users through orthogonal sequences, minimizing inter-user interference. The system was digitally implemented on the Artix-7 AC701 FPGA (XC7A200TFBG676-2) to evaluate logic-resource requirements, while RF validation was carried out using a ZedBoard FPGA equipped with an AD9361 transceiver. Experimental results demonstrate optimal performance in the 2.45 GHz band, confirming the effectiveness of the chaos-based W-CDMA approach as a multiuser access technique for high-spectral-density environments and its potential for use in 5G applications. Full article
Show Figures

Figure 1

32 pages, 781 KB  
Article
Navigating Emotional Barriers and Cognitive Drivers in Mobile Learning Adoption Among Greek University Students
by Stefanos Balaskas, Vassilios Tsiantos, Sevaste Chatzifotiou, Dionysia Filiopoulou, Kyriakos Komis and George Androulakis
Knowledge 2025, 5(4), 23; https://doi.org/10.3390/knowledge5040023 - 11 Oct 2025
Viewed by 244
Abstract
Mobile learning (m-learning) technologies are gaining popularity in universities but not uniformly across institutions because of cognitive, affective, and behavior obstacles. This research tested and applied an expansion of the Technology Acceptance Model (TAM) with technostress (TECH) and resistance to change (RTC) as [...] Read more.
Mobile learning (m-learning) technologies are gaining popularity in universities but not uniformly across institutions because of cognitive, affective, and behavior obstacles. This research tested and applied an expansion of the Technology Acceptance Model (TAM) with technostress (TECH) and resistance to change (RTC) as affective obstacles, as well as the core predictors of perceived usefulness (PU), perceived ease of use (PE), and perceived risk (PR). By employing a cross-sectional survey of Greek university students (N = 608) and partial least squares structural equation modeling (PLS-SEM), we tested direct and indirect impacts on behavioral intention (BI) to apply m-learning applications. The results affirm that PU and PE are direct predictors of BI, while PR has no direct impact on BI but acts indirectly through TECH and RTC. Mediation is partial in terms of PE and PU and indirect-only (complete) in terms of PR with respect to the impact of affective states on adoption. Multi-group comparisons found differences in terms of gender, age, confidence, and years of use but not frequency of use, implying that psychological and experiential characteristics have a greater impact on intention than habitual patterns. These results offer theory-driven and segment-specific guidelines for psychologically aware, user-focused m-learning adoption in higher education. Full article
(This article belongs to the Special Issue Knowledge Management in Learning and Education)
Show Figures

Figure 1

18 pages, 2947 KB  
Article
Guidelines for Sport Compressive Garments Design: Finite Element Simulations Approach
by Alessandro Cudicio, Marta Cogliati and Gianluca Rizzi
Muscles 2025, 4(4), 42; https://doi.org/10.3390/muscles4040042 - 9 Oct 2025
Viewed by 210
Abstract
Purpose: Despite significant attention being paid to compression garments (CG) in the sports field, there remains ongoing debate regarding their actual effectiveness in enhancing athletic performance and expediting post-exercise recovery. This article examines their various aspects, with a focus on CG design and [...] Read more.
Purpose: Despite significant attention being paid to compression garments (CG) in the sports field, there remains ongoing debate regarding their actual effectiveness in enhancing athletic performance and expediting post-exercise recovery. This article examines their various aspects, with a focus on CG design and the materials they are made of, aiming to analyze the importance of personalized compression strategies based on individual anthropometric measurements and non-linear compression designs. Methods: Using anthropometric analysis of 40 healthy participants, this study examines the morphological characteristics of the lower limb and their implications for CG design. Results: Measurements of limb length and circumferences revealed complex interactions among anatomical variables, emphasizing the need for customized and adaptable device design. Finite element simulations clarified the challenges in achieving uniform pressure gradients along the lower limb, highlighting the limitations of one-piece devices and suggesting tailored segmented designs for individual limb segments. Conclusion: The results demonstrate that one-piece devices often fail to provide optimal compression due to non-linear variations in limb dimensions. Conversely, segmented devices, particularly those with bilinear progression, exhibited superior performance in applying targeted compression across different limb segments. This more detailed approach to customization could significantly contribute to optimizing outcomes and user comfort. Full article
Show Figures

Figure 1

19 pages, 4365 KB  
Article
Enhancing Load Stratification in Power Distribution Systems Through Clustering Algorithms: A Practical Study
by Williams Mendoza-Vitonera, Xavier Serrano-Guerrero, María-Fernanda Cabrera, John Enriquez-Loja and Antonio Barragán-Escandón
Energies 2025, 18(19), 5314; https://doi.org/10.3390/en18195314 - 9 Oct 2025
Viewed by 337
Abstract
Accurate load profile identification is crucial for effective and sustainable power system planning. This study proposes a characterization methodology based on clustering techniques applied to consumption data from medium- and low-voltage users, as well as distribution transformers from an electric utility. Three algorithms—K-means, [...] Read more.
Accurate load profile identification is crucial for effective and sustainable power system planning. This study proposes a characterization methodology based on clustering techniques applied to consumption data from medium- and low-voltage users, as well as distribution transformers from an electric utility. Three algorithms—K-means, DBSCAN (Density-Based Spatial Clustering of Applications with Noise), and Gaussian Mixture Models (GMM)—were implemented and compared in terms of their ability to form representative strata using variables such as observation count, projected energy, load factor (LF), and characteristic power levels. The methodology includes data cleaning, normalization, dimensionality reduction, and quality metric analysis to ensure cluster consistency. Results were benchmarked against a prior study conducted by Empresa Eléctrica Regional Centro Sur C.A. (EERCS). Among the evaluated algorithms, GMM demonstrated superior performance in modeling irregular consumption patterns and probabilistically assigning observations, resulting in more coherent and representative segmentations. The resulting clusters exhibited an average LF of 58.82%, indicating balanced demand distribution and operational consistency across the groups. Compared to alternative clustering techniques, GMM demonstrated advantages in capturing heterogeneous consumption patterns, adapting to irregular load behaviors, and identifying emerging user segments such as induction-cooking households. These characteristics arise from its probabilistic nature, which provides greater flexibility in cluster formation and robustness in the presence of variability. Therefore, the findings highlight the suitability of GMM for real-world applications where representativeness, efficiency, and cluster stability are essential. The proposed methodology supports improved transformer sizing, more precise technical loss assessments, and better demand forecasting. Periodic application and integration with predictive models and smart grid technologies are recommended to enhance strategic and operational decision-making, ultimately supporting the transition toward smarter and more resilient power distribution systems. Full article
Show Figures

Figure 1

20 pages, 633 KB  
Article
Drivers of Kiosk Adoption: An Extended TAM Perspective on Digital Readiness, Trust, and Barrier Reduction
by Jin Young Jun, Rob Kim Marjerison and Jong Min Kim
J. Theor. Appl. Electron. Commer. Res. 2025, 20(4), 261; https://doi.org/10.3390/jtaer20040261 - 1 Oct 2025
Viewed by 571
Abstract
As self-service technologies (SSTs) such as kiosks become embedded in service infrastructure, understanding the socio-cognitive drivers of adoption has grown in importance. This study extends the Technology Acceptance Model (TAM) by integrating Digital Readiness (DR), Trust in Technology (TT), Perceived Usefulness (PU), and [...] Read more.
As self-service technologies (SSTs) such as kiosks become embedded in service infrastructure, understanding the socio-cognitive drivers of adoption has grown in importance. This study extends the Technology Acceptance Model (TAM) by integrating Digital Readiness (DR), Trust in Technology (TT), Perceived Usefulness (PU), and Perceived Barriers (PB) into a single framework, and tests it using structural equation modeling (SEM) with survey data from 750 kiosk users in China. TT emerges as the strongest direct predictor of intention to use (IU) and also increases PU while reducing PB. The deterrent effect of PB exceeds the positive effect of PU. DR promotes adoption indirectly by raising TT and PU and lowering PB, whereas its direct path to IU is negative, suggesting a tension between readiness and heightened expectations. Multi-group analyses show that non-digital natives and low-frequency users are more sensitive to trust-related factors, whereas digital natives and high-frequency users respond more to barrier reduction. These findings integrate trust and barrier perspectives into TAM and reconceptualize DR as an ambivalent antecedent. Practically, a segment- and journey-oriented design frame centered on trust and friction provides a common reference for aligning kiosk design, KPIs, and investment decisions across industries. Full article
(This article belongs to the Section Digital Marketing and the Connected Consumer)
Show Figures

Figure 1

20 pages, 18992 KB  
Article
Application of LMM-Derived Prompt-Based AIGC in Low-Altitude Drone-Based Concrete Crack Monitoring
by Shijun Pan, Zhun Fan, Keisuke Yoshida, Shujia Qin, Takashi Kojima and Satoshi Nishiyama
Drones 2025, 9(9), 660; https://doi.org/10.3390/drones9090660 - 21 Sep 2025
Viewed by 469
Abstract
In recent years, large multimodal models (LMMs), such as ChatGPT 4o and DeepSeek R1—artificial intelligence systems capable of multimodal (e.g., image and text) human–computer interaction—have gained traction in industrial and civil engineering applications. Concurrently, insufficient real-world drone-view data (specifically close-distance, high-resolution imagery) for [...] Read more.
In recent years, large multimodal models (LMMs), such as ChatGPT 4o and DeepSeek R1—artificial intelligence systems capable of multimodal (e.g., image and text) human–computer interaction—have gained traction in industrial and civil engineering applications. Concurrently, insufficient real-world drone-view data (specifically close-distance, high-resolution imagery) for civil engineering scenarios has heightened the importance of artificially generated content (AIGC) or synthetic data as supplementary inputs. AIGC is typically produced via text-to-image generative models (e.g., Stable Diffusion, DALL-E) guided by user-defined prompts. This study leverages LMMs to interpret key parameters for drone-based image generation (e.g., color, texture, scene composition, photographic style) and applies prompt engineering to systematize these parameters. The resulting LMM-generated prompts were used to synthesize training data for a You Only Look Once version 8 segmentation model (YOLOv8-seg). To address the need for detailed crack-distribution mapping in low-altitude drone-based monitoring, the trained YOLOv8-seg model was evaluated on close-distance crack benchmark datasets. The experimental results confirm that LMM-prompted AIGC is a viable supplement for low-altitude drone crack monitoring, achieving >80% classification accuracy (images with/without cracks) at a confidence threshold of 0.5. Full article
Show Figures

Figure 1

23 pages, 619 KB  
Article
TisLLM: Temporal Integration-Enhanced Fine-Tuning of Large Language Models for Sequential Recommendation
by Xiaosong Zhu, Wenzheng Li, Bingqiang Zhang and Liqing Geng
Information 2025, 16(9), 818; https://doi.org/10.3390/info16090818 - 21 Sep 2025
Viewed by 428
Abstract
In recent years, the remarkable versatility of large language models (LLMs) has spurred considerable interest in leveraging their capabilities for recommendation systems. Critically, we argue that the intrinsic aptitude of LLMs for modeling sequential patterns and temporal dynamics renders them uniquely suited for [...] Read more.
In recent years, the remarkable versatility of large language models (LLMs) has spurred considerable interest in leveraging their capabilities for recommendation systems. Critically, we argue that the intrinsic aptitude of LLMs for modeling sequential patterns and temporal dynamics renders them uniquely suited for sequential recommendation tasks—a foundational premise explored in depth later in this work. This potential, however, is tempered by significant hurdles: a discernible gap exists between the general competencies of conventional LLMs and the specialized needs of recommendation tasks, and their capacity to uncover complex, latent data interrelationships often proves inadequate, potentially undermining recommendation efficacy. To bridge this gap, our approach centers on adapting LLMs through fine-tuning on dedicated recommendation datasets, enhancing task-specific alignment. Further, we present the temporal Integration Enhanced Fine-Tuning of Large Language Models for Sequential Recommendation (TisLLM) framework. TisLLM specifically targets the deeper excavation of implicit associations within recommendation data streams. Its core mechanism involves partitioning sequential user interaction data using temporally defined sliding windows. These chronologically segmented slices are then aggregated to form enriched contextual representations, which subsequently drive the LLM fine-tuning process. This methodology explicitly strengthens the model’s compatibility with the inherently sequential nature of recommendation scenarios. Rigorous evaluation on benchmark datasets provides robust empirical validation, confirming the effectiveness of the TisLLM framework. Full article
Show Figures

Graphical abstract

18 pages, 1356 KB  
Article
A Behavior-Aware Caching Architecture for Web Applications Using Static, Dynamic, and Burst Segmentation
by Carlos Gómez-Pantoja, Daniela Baeza-Rocha and Alonso Inostrosa-Psijas
Future Internet 2025, 17(9), 429; https://doi.org/10.3390/fi17090429 - 20 Sep 2025
Viewed by 360
Abstract
This work proposes a behavior-aware caching architecture that improves cache hit rates by up to 10.8% over LRU and 36% over LFU in large-scale web applications, reducing redundant traffic and alleviating backend server load. The architecture partitions the cache into three sections—static, dynamic, [...] Read more.
This work proposes a behavior-aware caching architecture that improves cache hit rates by up to 10.8% over LRU and 36% over LFU in large-scale web applications, reducing redundant traffic and alleviating backend server load. The architecture partitions the cache into three sections—static, dynamic, and burst—according to query reuse patterns derived from user behavior. Static queries remain permanently stored, dynamic queries have time-bound validity, and burst queries are detected in real time using a statistical monitoring mechanism to prioritize sudden, high-demand requests. The proposed architecture was evaluated through simulation experiments using real-world query logs (a one-month trace of 1.5 billion queries from a commercial search engine) under multiple cache capacity configurations ranging from 1000 to 100,000 entries and in combination with the Least Recently Used (LRU) and Least Frequently Used (LFU) replacement policies. The results show that the proposed architecture consistently achieves higher performance than the baselines, with the largest relative gains in smaller cache configurations and applicability to distributed and hybrid caching environments without fundamental design changes. The integration of user-behavior modeling and burst-aware segmentation delivers a practical and reproducible framework that optimizes cache allocation policies in high-traffic and distributed environments. Full article
Show Figures

Figure 1

13 pages, 4455 KB  
Proceeding Paper
Fortifying Linux Server and Implementing a Zero Trust Network Access (ZTNA) for Enhanced Security
by Syed Hasnat Ansar, Arslan Sadiq, Uswa Ihsan, Humaira Ashraf and Somantri
Eng. Proc. 2025, 107(1), 99; https://doi.org/10.3390/engproc2025107099 - 19 Sep 2025
Viewed by 380
Abstract
For organizations, protecting computer networks has always been a very tough and demanding task. In the current technological era digital resources can now be protected without the need for outdated traditional perimeter-based security techniques. Organizations can use the Zero Trust Network Access (ZTNA) [...] Read more.
For organizations, protecting computer networks has always been a very tough and demanding task. In the current technological era digital resources can now be protected without the need for outdated traditional perimeter-based security techniques. Organizations can use the Zero Trust Network Access (ZTNA) approach to safeguard and filter their vital digital assets for the company’s benefit. This platform uses sophisticated logical authentication to test the system’s ability to authenticate users, and network monitoring is used to look for possible security flaws and system vulnerabilities. By evaluating users’ interactions with the system and their handling of assigned digital resources, multi-factor authentication filters out unwanted access attempts. Three fundamental access control styles are provided by network segmentation, giving administrators the option to manage access in a democratic, strict, or flexible manner (least privilege approach). Full article
Show Figures

Figure 1

25 pages, 12760 KB  
Article
Intelligent Face Recognition: Comprehensive Feature Extraction Methods for Holistic Face Analysis and Modalities
by Thoalfeqar G. Jarullah, Ahmad Saeed Mohammad, Musab T. S. Al-Kaltakchi and Jabir Alshehabi Al-Ani
Signals 2025, 6(3), 49; https://doi.org/10.3390/signals6030049 - 19 Sep 2025
Viewed by 939
Abstract
Face recognition technology utilizes unique facial features to analyze and compare individuals for identification and verification purposes. This technology is crucial for several reasons, such as improving security and authentication, effectively verifying identities, providing personalized user experiences, and automating various operations, including attendance [...] Read more.
Face recognition technology utilizes unique facial features to analyze and compare individuals for identification and verification purposes. This technology is crucial for several reasons, such as improving security and authentication, effectively verifying identities, providing personalized user experiences, and automating various operations, including attendance monitoring, access management, and law enforcement activities. In this paper, comprehensive evaluations are conducted using different face detection and modality segmentation methods, feature extraction methods, and classifiers to improve system performance. As for face detection, four methods are proposed: OpenCV’s Haar Cascade classifier, Dlib’s HOG + SVM frontal face detector, Dlib’s CNN face detector, and Mediapipe’s face detector. Additionally, two types of feature extraction techniques are proposed: hand-crafted features (traditional methods: global local features) and deep learning features. Three global features were extracted, Scale-Invariant Feature Transform (SIFT), Speeded Robust Features (SURF), and Global Image Structure (GIST). Likewise, the following local feature methods are utilized: Local Binary Pattern (LBP), Weber local descriptor (WLD), and Histogram of Oriented Gradients (HOG). On the other hand, the deep learning-based features fall into two categories: convolutional neural networks (CNNs), including VGG16, VGG19, and VGG-Face, and Siamese neural networks (SNNs), which generate face embeddings. For classification, three methods are employed: Support Vector Machine (SVM), a one-class SVM variant, and Multilayer Perceptron (MLP). The system is evaluated on three datasets: in-house, Labelled Faces in the Wild (LFW), and the Pins dataset (sourced from Pinterest) providing comprehensive benchmark comparisons for facial recognition research. The best performance accuracy for the proposed ten-feature extraction methods applied to the in-house database in the context of the facial recognition task achieved 99.8% accuracy by using the VGG16 model combined with the SVM classifier. Full article
Show Figures

Figure 1

18 pages, 434 KB  
Article
Social-Sciences- and Humanities-Based Profiling of Energy Consumers Towards Increasing Demand Response Engagement
by Panagiotis Skaloumpakas, Aikaterini Sianni, Vasilis Michalakopoulos, Paul Tobin, Bonnie Murphy, Elissaios Sarmas and Vangelis Marinakis
Electronics 2025, 14(18), 3700; https://doi.org/10.3390/electronics14183700 - 18 Sep 2025
Viewed by 349
Abstract
This paper investigates the effectiveness of demand response (DR) programs across various European residential contexts by examining the propensity of households to participate in energy management strategies. Utilizing a comprehensive, literature-driven questionnaire, this research collected 284 data entries from six European countries, including [...] Read more.
This paper investigates the effectiveness of demand response (DR) programs across various European residential contexts by examining the propensity of households to participate in energy management strategies. Utilizing a comprehensive, literature-driven questionnaire, this research collected 284 data entries from six European countries, including Denmark, Italy, Greece, Spain, Austria, and Romania. Through a multidimensional segmentation methodology, residential users were categorized based on their responses, revealing varied potential for adaptive DR programs. Key findings show a strong positive correlation between energy literacy and DR willingness—suggesting that informed consumers are more likely to participate in flexibility programs. Notable barriers included technological concerns, financial limitations, and a lack of awareness. Motivational factors ranged from financial incentives to environmental and social considerations. Segment-specific insights enabled the identification of tailored outreach strategies, recommending different engagement pathways for high-potential versus low-readiness groups. The results emphasize the importance of tailored DR strategies informed by distinct consumer profiles. Policy recommendations underscore localized, personified approaches to enhancing DR participation and supporting a sustainable energy transition. Full article
Show Figures

Figure 1

Back to TopTop