Skip to main content

Posts

Showing posts from December, 2025

Internet Technologies

The Potential of Satellite Internet Technologies for Crisis Management During Urban Evacuation This study examines the potential of satellite internet technologies to enhance crisis management in urban evacuation scenarios in Italy, with a specific focus on the Starlink system as a case study. In emergency situations, traditional mobile and WiFi networks often become inaccessible, significantly impairing timely communication and coordination. Reliable connectivity is therefore imperative for effective rescue operations and public safety. This research analyzes how satellite-based internet can provide robust, uninterrupted connectivity even when conventional infrastructures fail. The study discusses operational advantages such as rapid deployment, broad coverage, and scalability during disasters, as well as key constraints including line-of-sight requirements, environmental sensitivity, and regulatory challenges. Empirical findings from the deployment of Starlink during an actual urban...

Neural Network Based Malicious Node Detection

An Iterative Convolutional Neural Network Based Malicious Node Detection (ICNNMND) Protocol For Internet of Things At present Internet of Things is widely used in various products and parts in our daily life. In the future, its uses and requirements will increase. However, there are several issues with the IoT network, one of which is secure data transmission. Also, malicious nodes in the IoT network are very difficult to identify accurately and quickly, whereas it is very important to do so. In the current context, several solutions are being proposed as there is a need to focus on setting up secure IoT frameworks, and as well as the protocols that runs on them. This research proposes a secure protocol called iterative Convolutional Neural Network based Malicious Node Detection protocol that uses the erroneous assumption learning problematic technique. This protocol will make changes in the application layer, the network layer and the physical layer in order to achieve secure data tr...

Internet of Things

Internet of Things and Big Data Analytics for Risk Management in Digital Tourism Ecosystems Participation and inclusion in the business ecosystem have emerged as a growing trend for company collaboration in areas such as innovation, product development, and research. Collaborations can take many forms, ranging from the traditional value chain to strategic alliances, corporate networks, and digital ecosystems. The Internet of Things (IoT) and Big Data Analytics (BDA) play key roles in developing smart tourism destinations by delivering efficient management solutions, increased public safety, and improved operational efficiency while managing different risks and challenges, while also being a source of such risks and challenges. The objective of this article was to investigate the potential of IoT and BDA to properly control the risks associated with participants in a tourism destination’s digital ecosystem. The authors used the systematic literature review (SLR) method to examine scient...

Digiever network

Updated CISA KEV list includes Digiever network video recorder RCE Ongoing attacks involving the high-severity missing authorization bug impacting Digiever DS-2105 Pro network video recorders, tracked as CVE-2025-52163, have prompted the issue's inclusion in the Cybersecurity and Infrastructure Security Agency's Known Exploited Vulnerabilities catalog , with federal civilian executive branch agencies urged to mitigate the weakness or retire impacted instances by Jan. 12, reports The Hacker News . Abuse of the flaw, which was reported by Akamai and Fortinet researchers to have allowed Mirai and ShadowV2 botnet deployment, could allow command injection, according to CISA.  Such a vulnerability and another medium-severity arbitrary read issue, tracked as CVE-2023-52164, have remained unfixed after the Digiever NVRs reached end-of-life, said TXOne Research's Ta-Lun Yen. Exploitation requires an attacker to be logged in and send a specially crafted request. Users are advised to ...

Network and Security skills

7 SASE certifications to validate converged network and security skills For IT professionals, SASE certifications can demonstrate hands-on experience with cloud-based network and security-as-a-service platforms. As cyberattacks grow more sophisticated and AI-powered threats escalate, enterprises are under pressure to evolve beyond traditional perimeter-based network security. Many are turning to Secure Access Service Edge (SASE), a cloud-native framework that converges network and security functions to protect distributed workforces, optimize network performance, and simplify management across multiple tools. SASE platforms typically include SD-WAN, secure web gateway (SWG), firewall as a service (FWaaS), cloud access security broker (CASB), and zero-trust network access (ZTNA). They can also encompass a growing list of additional features such as browser isolation, sandboxing and data loss prevention (DLP). The overall SASE market is projected to climb from $15 billion in 2025 t...

Theory in Teaching Effectiveness

The role of project-based learning with activity theory in teaching effectiveness: Evidence from the internet of things course Higher education is beginning to focus on how to effectively cultivate IoT engineers who possess both hard skills and soft skills. Therefore, from the perspective of activity theory and combining it with project-based learning, this study constructed a project-based learning framework based on activity theory and applied this framework to an IoT course at a university in central China. The first half of the course adopted a traditional lecture-based teaching method, while the second half of the course was carried out based on the proposed framework, thus constituting a control group and an experimental group. To further explore the effectiveness of the proposed framework on IoT courses, the data of this study consisted of two aspects: on the one hand, questionnaires on students’ learning engagement and satisfaction with the IoT course were collected; on the ot...

Erasing for Art Authentication

Weakly Supervised Object Localization with Background Suppression Erasing for Art Authentication and Copyright Protection The problem of art forgery and infringement is becoming increasingly prominent, since diverse self-media contents with all kinds of art pieces are released on the Internet every day. For art paintings, object detection and localization provide an efficient and effective means of art authentication and copyright protection. However, the acquisition of a precise detector requires large amounts of expensive pixel-level annotations. To alleviate this, we propose a novel weakly supervised object localization (WSOL) with background superposition erasing (BSE), which recognizes objects with inexpensive image-level labels. First, integrated adversarial erasing (IAE) for vanilla convolutional neural network (CNN) dropouts the most discriminative region by leveraging high-level semantic information. Second, a background suppression module (BSM) limits the activation area of ...

Analysing the Quality of Risk

Analysing the Quality of Risk-Focused Socio-Scientific Arguments on Nuclear Power Using a Risk-Benefit Oriented Model Literature has emphasised the need for SSI education to systematically address the risks produced by modern society. This study examines the quality of risk-focused, socio-scientific arguments generated by 22 elementary students in South Korea, concerning nuclear power. Participants read two articles with opposing views on the nuclear phase-out policy and constructed written arguments to justify their positions on this policy. To analyse the quality of arguments, a risk-benefit oriented model encompassing both positivist and constructivist perspectives on risk was developed and applied. The model comprises knowledge components and comparison components. The research results showed that participants generally tended to justify their claims without incorporating comparison components. Some included risk-benefit comparison components, justifying their claims by presenting ...

Language Network

Long arcuate fascicle in wild and captive chimpanzees as a potential structural precursor of the language network The arcuate fascicle (AF) is the main fibre tract in the brain for human language. It connects frontal and temporal language areas in the superior and middle temporal gyrus (MTG). The AF’s connection to the MTG was considered unique to humans and has influenced theories of the evolution of language. Here, using high-resolution diffusion MRI of post-mortem brains, we demonstrate that both wild and captive chimpanzees have a direct AF connection into the MTG, albeit weaker than in humans. This finding challenges the notion of a strictly human-specific AF morphology and suggests that language-related neural specialisation in humans likely evolved through gradual evolutionary strengthening of a pre-existing connection, rather than arising de novo. It is likely that this neural architecture supporting complex communication was already present in the last common ancestor of homin...

Inference Techniques

Combining type inference techniques for semi-automatic UML generation from Pharo code This paper explores how to reconstruct  UML  diagrams from dynamically typed languages such as Smalltalk, which do not use explicit type information. This lack of information makes traditional methods for extracting associations difficult. It addresses the need for automated techniques, particularly in legacy software systems, to facilitate their transformation into modern technologies, focusing on Smalltalk as a  case study  due to its extensive industrial legacy and modern adaptations like Pharo.  We propose a way to create  UML  diagrams from Smalltalk code, focusing on using type inference to determine UML associations. For optimal outcomes for large-scale software systems, we recommend combining different type inference methods in an automatic or semi-automatic way. We addressed the challenge of generating UML models from Pharo, a dynamically typed Smalltalk-bas...

Boundary Dataset

An open retail boundary dataset for South Korea using open data and computer vision technique Although delineating retail boundaries is important to explore and comprehend the dynamics of the retail sector, it is hard to find studies specifically addressing it in the South Korean context. This study fills this gap by proposing new retail boundaries across South Korea. To achieve this goal, we employed a variety of retailers and building datasets and proposed a unique computer vision-based framework with a deep ensemble voting technique. As a result, we delineated 6,636 distinct retail boundaries that were validated against existing reference retail boundaries. These newly delineated retail boundaries provide valuable insights for researchers, governments, and other relevant stakeholders by enhancing their understanding of retail geography. This dataset can be used as a foundational resource for analyses on topics such as pandemic recovery, retail gentrification, and the resilience of ...

Advancements in Transportation

Technological Advancements in Transportation and Logistics: Exploring Circular Economy Principles through Bibliometric Insights Transportation and logistics sectors face increasing challenges due to resource depletion, population growth, and socio-environmental crises, requiring sustainable solutions. Circular economy (CE) principles offer a framework for enhancing resource efficiency and reducing waste. This study employs a systematic literature review and bibliometric analysis to explore CE-related challenges in transportation and logistics. A total of 350 scholarly articles (2000 – February 2025) from the Scopus® database were analyzed using citation, co-citation, and keyword co-occurrence analyses. Findings reveal a significant rise in research over the past 24 years, with a surge from 2017 to 2024. China, the United States, Saudi Arabia, the United Kingdom, and India emerged as leading contributors to scientific literature in this domain. Key technologies, including the internet ...

Effects of Internet

Effects of internet-based digital health interventions on the physical activity and quality of life of colorectal cancer survivors: a systematic review and meta-analysis Purpose The recent trend of Internet-based digital health interventions has driven researchers to implement them to promote physical activity (PA) and improve patients’ health outcomes. This systematic review and meta-analysis aim to evaluate the effects of Internet-based digital health interventions on PA and quality of life (QoL) in colorectal cancer (CRC) survivors. Methods We searched for relevant studies investigating the effects of internet-based digital health interventions published until Dec. 2022 in electronic databases (PubMed, CINAHL, EMBASE, Cochrane Central Register of Controlled Trials, and CEPS) according to PRISMA guidelines. The Joanna Briggs Institute critical appraisal checklist was used to examine the quality of the included studies. We performed the fixed and random effects model for meta-analysi...

Role of Robots

Robots, trade and production networks: the role of robots in shaping trade competitiveness in East Asia This study examines how the rise of industrial robots affects trade and production networks in East Asia. Declining robot costs have led to increased adoption across countries, particularly in those with high labor costs or where production is capital-intensive. This includes not only developed economies but also several emerging ones experiencing rising labor costs. A Ricardian-based gravity model reveals convergence in absolute advantage: developing countries have upgraded their industrial technologies, thereby narrowing the technological gap with advanced economies. In contrast, under comparative advantage, developing countries are losing traditional labor cost advantages. The study suggests that robotization has become a strategic response to rising costs. Despite the growth of automation, there is limited evidence of reshoring. Trade in both final goods and intermediate inputs ...

Satellite Signature

Satellite signature-based evidence in exploring sub-districts susceptible to hyperthermia Identifying administrative sub-districts vulnerable to hyperthermia is critical in formulating transparent policies based on comprehensive, area-wide data. However, previous studies have yet to use satellite imagery to explore administrative sub-districts susceptible to hyperthermia in a local-specific community setting. Therefore, this study aims to evaluate whether the area-wide land surface temperature retrieved from thermal satellite imagery can be an indirect indicator to explore administrative sub-districts susceptible to hyperthermia. Landsat 8 satellite data were used to retrieve the area-wide land surface temperature. Daegu metropolitan city considered the representative heatwave city in South Korea, was examined to explore the sub-districts susceptible to hyperthermia. Administrative sub-districts with a high concentration of low-income residents who cannot operate air conditioning duri...

Digital Health Interventions

Effects of internet-based digital health interventions on the physical activity and quality of life of colorectal cancer survivors: a systematic review and meta-analysis Purpose The recent trend of Internet-based digital health interventions has driven researchers to implement them to promote physical activity (PA) and improve patients’ health outcomes. This systematic review and meta-analysis aim to evaluate the effects of Internet-based digital health interventions on PA and quality of life (QoL) in colorectal cancer (CRC) survivors. Methods We searched for relevant studies investigating the effects of internet-based digital health interventions published until Dec. 2022 in electronic databases (PubMed, CINAHL, EMBASE, Cochrane Central Register of Controlled Trials, and CEPS) according to PRISMA guidelines. The Joanna Briggs Institute critical appraisal checklist was used to examine the quality of the included studies. We performed the fixed and random effects model for meta-analysi...

Emotional Intelligence

Emotional Intelligence and Gaming Disorder Symptomatology: A Systematic Review and Meta-Analysis The increasing prevalence of the Internet gaming disorder has created an interest in identifying the factors associated with its development, including emotional intelligence, which has been negatively associated with many addictions. This work aimed to provide a narrative and quantitative synthesis of the association between emotional intelligence and Internet gaming disorder symptomatology. An online search of four electronic databases and an additional manual search identified 49 studies that met the inclusion criteria provided 54 independent samples (N = 43,289) and a total of 166 correlation coefficients. The selected studies used different definitions of emotional intelligence (i.e., emotional regulation, social-emotional competence, ability and trait). Random-effect models were used to estimate the pooled correlation coefficient between emotional intelligence and Internet gaming dis...

Intelligent Technologies

Intelligent technologies in smart education: a comprehensive review of transformative pillars and their impact on teaching and learning methods In the domain of smart education, the integration of intelligent technology has undergone extensive exploration, yet a comprehensive investigation into its transformative potential for teaching and learning remains elusive. To address this research gap, our study employs a literature review methodology, analyzing 55 studies to offer empirical insights into the application of intelligent technologies in reshaping educational paradigms. The key findings encompass: (a) the identification of five crucial pillars of smart education, namely intelligent technology, smart pedagogy, smart learning environments, smart learning, and smart learners; (b) the acknowledgment that smart education relies on diverse intelligent technologies, such as the Internet of Things, artificial intelligence, virtual/augmented reality, big data, cloud computing, and smart ...

Wireless Broadcasts

On Vector Random Linear Network Coding in Wireless Broadcasts Compared with scalar linear network coding (LNC) formulated over the finite field GF(2𝐿), vector LNC offers enhanced flexibility in the code design by enabling linear operations over the vector space GF(2)𝐿 and demonstrates a number of advantages over scalar LNC. While random LNC (RLNC) has shown significant potential to improve the completion delay performance in wireless broadcasts, most prior studies focus on scalar RLNC. In particular, it is well known that, with increasing L, primitive scalar RLNC over GF(2𝐿) asymptotically achieves the optimal completion delay. However, the completion delay performance of primitive vector RLNC remains unexplored. This work aims to fill in this blank. We derive closed-form expressions for the probability distribution and the expected value of both the completion delay at a single receiver and the system completion delay. We further unveil a fundamental limitation that is different f...

Connectivity Analysis

Enhancing functional connectivity analysis in task-based fMRI using the BOLD-filter method: Greater network and activation voxel sensitivities Task-based functional MRI (tb-fMRI) has gained prominence for investigating brain connectivity by engaging specific functional networks during cognitive or behavioral tasks. Compared to resting-state fMRI (rs-fMRI), tb-fMRI provides greater specificity and interpretability, making it a valuable tool for examining task-relevant networks and individual differences in brain function. In this study, we evaluated the utility of the BOLD-filter-a method originally developed to extract reliable BOLD (blood oxygenation level-dependent) components from rs-fMRI-by applying it to tb-fMRI data as a preprocessing step for functional connectivity (FC) analysis. The goal was to enhance the sensitivity and specificity of detecting task-induced functional activity. Compared to the conventional preprocessing method, the BOLD-filter substantially improved the isol...

Visual Analysis using CiteSpace

Knowledge mapping of impulsive buying behavior research: a visual analysis using CiteSpace Adolescence is marked by a unique blend of factors, including adolescents’ exploration of their emerging sexuality and growing engagement with digital media. As adolescents increasingly navigate online spaces, cybergrooming victimization has emerged as a significant concern for the development and protection of young people. Yet, there is a lack of systematic analyses of the current state of research. To this end, the present systematic review aimed to integrate existing quantitative research on prevalence rates, risk factors, and outcomes of cybergrooming victimization, informed by an adaptation of the General Aggression Model. Studies providing self-reported data on cybergrooming victimization of people between the ages of 5 and 21 were included. A total of 34 studies met all inclusion criteria, with most focusing on adolescence. Reported prevalence rates were characterized by strong heterogene...