Other Sites:
Robert J. Robbins is a biologist, an educator, a science administrator, a publisher, an information technologist, and an IT leader and manager who specializes in advancing biomedical knowledge and supporting education through the application of information technology. More About: RJR | OUR TEAM | OUR SERVICES | THIS WEBSITE
ESP: PubMed Auto Bibliography 21 May 2026 at 01:42 Created:
Cloud Computing
Wikipedia: Cloud Computing Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. Cloud computing relies on sharing of resources to achieve coherence and economies of scale. Advocates of public and hybrid clouds note that cloud computing allows companies to avoid or minimize up-front IT infrastructure costs. Proponents also claim that cloud computing allows enterprises to get their applications up and running faster, with improved manageability and less maintenance, and that it enables IT teams to more rapidly adjust resources to meet fluctuating and unpredictable demand, providing the burst computing capability: high computing power at certain periods of peak demand. Cloud providers typically use a "pay-as-you-go" model, which can lead to unexpected operating expenses if administrators are not familiarized with cloud-pricing models. The possibility of unexpected operating expenses is especially problematic in a grant-funded research institution, where funds may not be readily available to cover significant cost overruns.
Created with PubMed® Query: ( cloud[TIAB] AND (computing[TIAB] OR "amazon web services"[TIAB] OR google[TIAB] OR "microsoft azure"[TIAB]) ) NOT pmcbook NOT ispreviousversion
Citations The Papers (from PubMed®)
RevDate: 2026-05-19
Towards Edge Holography via Implicit Neural Representation and Compression.
IEEE transactions on visualization and computer graphics, 32(5):3325-3334.
Holographic displays offer the promise of realistic 3D visualization for virtual and augmented wearable solutions. Nevertheless, existing computer-generated holography (CGH) methods often struggle with either a high computational burden or limited display realism. While the emerging cloud-edge computing mechanism can enable the real-time streaming of holograms, classic image compression techniques struggle to efficiently encode and decode the substantial high-frequency information inherent in hologram data. In light of these challenges, we present a display-aware and lightweight CGH framework, leveraging implicit neural representations (INRs) and camera-calibrated wave propagation, to generate and compress high-fidelity phase-only holograms. Specifically, our approach interprets hologram generation as a continuous function approximation problem, enabling the network, with reduced parameters, to effectively learn the inherent periodicity and high-frequency components of 2D and 3D hologram data. To enable efficient deployment, we further incorporate quantization-aware training, followed by entropy coding. Experimental results evaluated on an unfiltered holographic display prototype demonstrate that the proposed INR-CGH retains image quality comparable to that of existing optimization-based methods in both 2D and 3D scenarios. In addition, our compact INR representation achieves up to 11× compression rate with minimal quality degradation and can be further reduced via quantization-aware training. The resulting model enables ≥250 fps in decoding speed, paving the way towards edge holography.
Additional Links: PMID-42154737
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42154737,
year = {2026},
author = {Ban, H and Zhou, W and Peng, Y},
title = {Towards Edge Holography via Implicit Neural Representation and Compression.},
journal = {IEEE transactions on visualization and computer graphics},
volume = {32},
number = {5},
pages = {3325-3334},
doi = {10.1109/TVCG.2026.3679061},
pmid = {42154737},
issn = {1941-0506},
abstract = {Holographic displays offer the promise of realistic 3D visualization for virtual and augmented wearable solutions. Nevertheless, existing computer-generated holography (CGH) methods often struggle with either a high computational burden or limited display realism. While the emerging cloud-edge computing mechanism can enable the real-time streaming of holograms, classic image compression techniques struggle to efficiently encode and decode the substantial high-frequency information inherent in hologram data. In light of these challenges, we present a display-aware and lightweight CGH framework, leveraging implicit neural representations (INRs) and camera-calibrated wave propagation, to generate and compress high-fidelity phase-only holograms. Specifically, our approach interprets hologram generation as a continuous function approximation problem, enabling the network, with reduced parameters, to effectively learn the inherent periodicity and high-frequency components of 2D and 3D hologram data. To enable efficient deployment, we further incorporate quantization-aware training, followed by entropy coding. Experimental results evaluated on an unfiltered holographic display prototype demonstrate that the proposed INR-CGH retains image quality comparable to that of existing optimization-based methods in both 2D and 3D scenarios. In addition, our compact INR representation achieves up to 11× compression rate with minimal quality degradation and can be further reduced via quantization-aware training. The resulting model enables ≥250 fps in decoding speed, paving the way towards edge holography.},
}
RevDate: 2026-05-18
CmpDate: 2026-05-18
AI-driven optimization in cloud computing: a systematic review of cost, resource management, and security.
Frontiers in artificial intelligence, 9:1750992.
Cloud computing environments face persistent structural challenges in cost control, dynamic resource allocation, and security risk management, which traditional infrastructure approaches fail to address adequately. This systematic literature review aimed to synthesize empirical evidence on the application of artificial intelligence (AI) and machine learning (ML) models for cost optimisation, resource management, and security enhancement in cloud computing environments. Following the PRISMA 2020 guidelines and the Kitchenham-Charters methodology, a structured search was conducted across IEEE Xplore, Web of Science, ScienceDirect, and the ACM Digital Library, covering the period 2020-2025. From an initial pool of 216 records, 18 primary studies were selected after applying the PICOC framework, predefined inclusion and exclusion criteria, and a dual-reviewer quality assessment process yielding substantial inter-rater agreement (Cohen's κ = 0.86). The synthesized evidence demonstrates that predictive provisioning systems and intelligent load-balancing mechanisms reduce operational costs by up to 85%, metaheuristic algorithms such as the Whale Optimization Algorithm and Particle Swarm Optimization improve energy efficiency by 30%-40% and increase resource utilization by up to 80%, and deep learning-based intrusion detection systems achieve accuracy levels exceeding 92%. These findings confirm that AI constitutes a structural mechanism for strengthening economic efficiency, operational resilience, and the sustainability of cloud infrastructures. However, heterogeneity in simulation environments, limited validation in production-scale deployments, and insufficient coverage of virtual machine migration dynamics represent critical gaps requiring standardized benchmarking frameworks and empirical validation in hybrid and multicloud architectures. A quantitative synthesis (Table 1) reveals that metaheuristic algorithms achieve 30%-40% cost and energy efficiency improvements, while ensemble deep learning approaches attain >97% security threat detection rates.
Additional Links: PMID-42147039
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42147039,
year = {2026},
author = {López, RSI and Oscata, RG and Condori-Coaquira, ÁR and Medina, RIG and López-Gonzales, JL and Tocto-Cano, E},
title = {AI-driven optimization in cloud computing: a systematic review of cost, resource management, and security.},
journal = {Frontiers in artificial intelligence},
volume = {9},
number = {},
pages = {1750992},
pmid = {42147039},
issn = {2624-8212},
abstract = {Cloud computing environments face persistent structural challenges in cost control, dynamic resource allocation, and security risk management, which traditional infrastructure approaches fail to address adequately. This systematic literature review aimed to synthesize empirical evidence on the application of artificial intelligence (AI) and machine learning (ML) models for cost optimisation, resource management, and security enhancement in cloud computing environments. Following the PRISMA 2020 guidelines and the Kitchenham-Charters methodology, a structured search was conducted across IEEE Xplore, Web of Science, ScienceDirect, and the ACM Digital Library, covering the period 2020-2025. From an initial pool of 216 records, 18 primary studies were selected after applying the PICOC framework, predefined inclusion and exclusion criteria, and a dual-reviewer quality assessment process yielding substantial inter-rater agreement (Cohen's κ = 0.86). The synthesized evidence demonstrates that predictive provisioning systems and intelligent load-balancing mechanisms reduce operational costs by up to 85%, metaheuristic algorithms such as the Whale Optimization Algorithm and Particle Swarm Optimization improve energy efficiency by 30%-40% and increase resource utilization by up to 80%, and deep learning-based intrusion detection systems achieve accuracy levels exceeding 92%. These findings confirm that AI constitutes a structural mechanism for strengthening economic efficiency, operational resilience, and the sustainability of cloud infrastructures. However, heterogeneity in simulation environments, limited validation in production-scale deployments, and insufficient coverage of virtual machine migration dynamics represent critical gaps requiring standardized benchmarking frameworks and empirical validation in hybrid and multicloud architectures. A quantitative synthesis (Table 1) reveals that metaheuristic algorithms achieve 30%-40% cost and energy efficiency improvements, while ensemble deep learning approaches attain >97% security threat detection rates.},
}
RevDate: 2026-05-18
RCInvestigator: towards Better Investigation of Anomaly Root Causes in Cloud Computing Systems.
IEEE transactions on visualization and computer graphics, PP: [Epub ahead of print].
Root cause analysis (RCA) is critical for maintaining the availability and efficiency of cloud computing systems. However, identifying root causes from the large-scale, high-dimensional monitoring data generated by these complex environments is a significant challenge. Current approaches often rely on time-consuming manual analysis to ensure flexibility and reliability, while recent automated methods lack the crucial insights provided by domain experts. To bridge this gap, we propose RCInvestigator, a visual analytics system that facilitates interactive root cause investigation by establishing a tight collaboration between human experts and machine analysis. Our approach addresses three key challenges: a) modeling databases for the root cause investigation, b) inferring root causes from large-scale time series, and c) building comprehensible investigation results. We demonstrate the effectiveness and utility of RCInvestigator through two real-world case studies, which received positive feedback from domain experts.
Additional Links: PMID-42149770
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42149770,
year = {2026},
author = {Liu, S and Zhou, Y and Zhang, J and Zhou, S and Cui, W and Lin, Q and Moscibroda, T and Zhang, H and Weng, D and Wu, Y},
title = {RCInvestigator: towards Better Investigation of Anomaly Root Causes in Cloud Computing Systems.},
journal = {IEEE transactions on visualization and computer graphics},
volume = {PP},
number = {},
pages = {},
doi = {10.1109/TVCG.2026.3694461},
pmid = {42149770},
issn = {1941-0506},
abstract = {Root cause analysis (RCA) is critical for maintaining the availability and efficiency of cloud computing systems. However, identifying root causes from the large-scale, high-dimensional monitoring data generated by these complex environments is a significant challenge. Current approaches often rely on time-consuming manual analysis to ensure flexibility and reliability, while recent automated methods lack the crucial insights provided by domain experts. To bridge this gap, we propose RCInvestigator, a visual analytics system that facilitates interactive root cause investigation by establishing a tight collaboration between human experts and machine analysis. Our approach addresses three key challenges: a) modeling databases for the root cause investigation, b) inferring root causes from large-scale time series, and c) building comprehensible investigation results. We demonstrate the effectiveness and utility of RCInvestigator through two real-world case studies, which received positive feedback from domain experts.},
}
RevDate: 2026-05-15
Smart mobility infrastructure: improving campus parking efficiency in real time.
Scientific reports, 16(1):.
The issue of parking management in university campuses has continued to face challenges owing to space constraints and the absence of real-time information. This problem is addressed by the proposed solution in this study, which is robust and intelligent and specifically designed for university campuses. This paper advances real-time campus parking through three innovations based on established You Only Look Once, Version 8 (YOLOv8) and Raspberry Pi tools: (1) campus-specific YOLOv8n fine-tuning (94.2% mean Average Precision (mAP), 450ms on Pi 4B); (2) adaptive Message Queuing Telemetry Transport (MQTT). Quality of Service (QoS) reducing 20% packet loss; and (3) S3-integrated forecasting producing 45% simulated efficiency gains. A user-friendly, web-based dashboard offers live parking updates to students, faculty, and visitors. This allows users to check space availability before arriving and reduces search time. The modular architecture supports decentralized deployment, with each Raspberry Pi independently managing a designated parking zone. The design is inherently scalable, enabling additional sensors and cameras to be added as needed to cover larger or more complex parking areas. To ensure privacy and reduce bandwidth use, live video and image access are restricted to management, maintaining data security and network efficiency. By combining edge computing, sensor fusion, and cloud services, the proposed solution enhances automation, improves user experience, and advances smart campus initiatives. This framework provides a scalable, adaptable model for modernizing parking infrastructure in educational institutions and beyond.
Additional Links: PMID-42140997
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42140997,
year = {2026},
author = {Jefflin Deno, JS and Karthi Sree, S and Maheswari, S and Sasikumar, P},
title = {Smart mobility infrastructure: improving campus parking efficiency in real time.},
journal = {Scientific reports},
volume = {16},
number = {1},
pages = {},
pmid = {42140997},
issn = {2045-2322},
abstract = {The issue of parking management in university campuses has continued to face challenges owing to space constraints and the absence of real-time information. This problem is addressed by the proposed solution in this study, which is robust and intelligent and specifically designed for university campuses. This paper advances real-time campus parking through three innovations based on established You Only Look Once, Version 8 (YOLOv8) and Raspberry Pi tools: (1) campus-specific YOLOv8n fine-tuning (94.2% mean Average Precision (mAP), 450ms on Pi 4B); (2) adaptive Message Queuing Telemetry Transport (MQTT). Quality of Service (QoS) reducing 20% packet loss; and (3) S3-integrated forecasting producing 45% simulated efficiency gains. A user-friendly, web-based dashboard offers live parking updates to students, faculty, and visitors. This allows users to check space availability before arriving and reduces search time. The modular architecture supports decentralized deployment, with each Raspberry Pi independently managing a designated parking zone. The design is inherently scalable, enabling additional sensors and cameras to be added as needed to cover larger or more complex parking areas. To ensure privacy and reduce bandwidth use, live video and image access are restricted to management, maintaining data security and network efficiency. By combining edge computing, sensor fusion, and cloud services, the proposed solution enhances automation, improves user experience, and advances smart campus initiatives. This framework provides a scalable, adaptable model for modernizing parking infrastructure in educational institutions and beyond.},
}
RevDate: 2026-05-15
CmpDate: 2026-05-15
Mapping pathogen genomics training provision: a structured analysis within a global consortium network.
Frontiers in public health, 14:1768827.
BACKGROUND: Pathogen genomics plays a central role in infectious disease surveillance and outbreak response. However, information about available training initiatives remains fragmented, limiting visibility into how programmes are structured, delivered, and assessed.
METHODS: We conducted a structured survey to characterise pathogen genomics training initiatives identified through the PHA4GE Training and Workforce Development Working Group and affiliated professional networks.
RESULTS: Eighty-one courses were analysed representing pathogen genomics training initiatives from 17 countries. Over half (52%) targeted academic or research audiences and 46% targeted public health professionals. Majority of courses were delivered as short, limited-duration standalone courses. Beginner-level courses accounted for 58% of offerings, whereas only 6% were classified as advanced. Bioinformatics or genomic data analysis was widely represented (72%), while specialised areas such as biostatistics and systems administration were less frequently included. Nearly half (48%) of courses focused on broadly applicable genomic methods rather than being restricted to a single pathogen. Among courses centred on specific organisms, viral pathogen themes were most commonly represented. Over one-third of courses (38%) did not include structured assessments, with only 7% incorporating quizzes or exams. Most courses relied on local computing resources such as laptops or desktops during delivery (93%). Use of high-performance computing (HPC) and cloud platforms was limited during training but was higher after training, with 37% and 39% of courses indicating use, respectively.
CONCLUSION: This landscape analysis identifies structural patterns, including geographic concentration of providers, predominance of introductory formats, variability in assessment practices and in the use of advanced computing infrastructure across training phases. The findings provide empirical insight into characteristics of pathogen genomics training that may inform efforts to strengthen coordinated and sustainable workforce development strategies.
Additional Links: PMID-42136599
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42136599,
year = {2026},
author = {Matimba, A and Garson, KL and Trovão, NS and George, S and Li, YT and Evans, D and Batista da Rocha, J and Otieno, J and Mokaya, J and Calvert-Joshua, T and Blankenship, HM and Mulder, N},
title = {Mapping pathogen genomics training provision: a structured analysis within a global consortium network.},
journal = {Frontiers in public health},
volume = {14},
number = {},
pages = {1768827},
pmid = {42136599},
issn = {2296-2565},
mesh = {*Genomics/education ; Humans ; Surveys and Questionnaires ; Curriculum ; *Public Health/education ; Global Health ; },
abstract = {BACKGROUND: Pathogen genomics plays a central role in infectious disease surveillance and outbreak response. However, information about available training initiatives remains fragmented, limiting visibility into how programmes are structured, delivered, and assessed.
METHODS: We conducted a structured survey to characterise pathogen genomics training initiatives identified through the PHA4GE Training and Workforce Development Working Group and affiliated professional networks.
RESULTS: Eighty-one courses were analysed representing pathogen genomics training initiatives from 17 countries. Over half (52%) targeted academic or research audiences and 46% targeted public health professionals. Majority of courses were delivered as short, limited-duration standalone courses. Beginner-level courses accounted for 58% of offerings, whereas only 6% were classified as advanced. Bioinformatics or genomic data analysis was widely represented (72%), while specialised areas such as biostatistics and systems administration were less frequently included. Nearly half (48%) of courses focused on broadly applicable genomic methods rather than being restricted to a single pathogen. Among courses centred on specific organisms, viral pathogen themes were most commonly represented. Over one-third of courses (38%) did not include structured assessments, with only 7% incorporating quizzes or exams. Most courses relied on local computing resources such as laptops or desktops during delivery (93%). Use of high-performance computing (HPC) and cloud platforms was limited during training but was higher after training, with 37% and 39% of courses indicating use, respectively.
CONCLUSION: This landscape analysis identifies structural patterns, including geographic concentration of providers, predominance of introductory formats, variability in assessment practices and in the use of advanced computing infrastructure across training phases. The findings provide empirical insight into characteristics of pathogen genomics training that may inform efforts to strengthen coordinated and sustainable workforce development strategies.},
}
MeSH Terms:
show MeSH Terms
hide MeSH Terms
*Genomics/education
Humans
Surveys and Questionnaires
Curriculum
*Public Health/education
Global Health
RevDate: 2026-05-15
CmpDate: 2026-05-15
Navigating AI deployment in precision livestock farming: current trends and future prospects.
Animal frontiers : the review magazine of animal agriculture, 16(2):14-25.
Additional Links: PMID-42137895
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42137895,
year = {2026},
author = {Guo, C and He, Z and Niu, M and Liu, K},
title = {Navigating AI deployment in precision livestock farming: current trends and future prospects.},
journal = {Animal frontiers : the review magazine of animal agriculture},
volume = {16},
number = {2},
pages = {14-25},
pmid = {42137895},
issn = {2160-6064},
}
RevDate: 2026-05-13
CmpDate: 2026-05-13
Accurate Identification of Ilex (Aquifoliaceae) Taxa Based on Leaf Morphology Using Deep Learning.
Plants (Basel, Switzerland), 15(9): pii:plants15091365.
Holly (Ilex L.) is a genus of woody dioecious plants with substantial ecological and economic value. However, its high species diversity and morphological similarity make accurate identification challenging. To address this, we constructed a multi-taxon Ilex leaf image dataset. We then trained six deep learning models-GoogLeNet, ResNet50, ResNet101, DenseNet121, DenseNet169, and EfficientNet-B3-using a unified PyTorch framework on cloud computing resources. Leaf images were preprocessed by background removal, resizing, cropping, and normalization. Model performance was evaluated using accuracy, F1-score, and Grad-CAM visualizations. Under an image-level data split that may overestimate generalization, all six models achieved over 99% classification accuracy on preprocessed leaf images under controlled laboratory conditions. DenseNet121 and DenseNet169 performed best, reaching 99.65% accuracy. Because images of the same leaf or same plant could appear in both training and test sets under this split, plant-level cross-validation is required to assess real-world generalizability. The reported accuracies represent an upper-bound estimate under image-level splitting. The framework offers a rapid and accurate tool for preliminary screening under controlled conditions, but its performance on raw field photographs and across different collection sites remains to be validated.
Additional Links: PMID-42122857
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42122857,
year = {2026},
author = {Yang, L and Zhao, Y and Jin, C and Wu, S and Lu, Z and Hao, M and Bi, C and Xu, K},
title = {Accurate Identification of Ilex (Aquifoliaceae) Taxa Based on Leaf Morphology Using Deep Learning.},
journal = {Plants (Basel, Switzerland)},
volume = {15},
number = {9},
pages = {},
doi = {10.3390/plants15091365},
pmid = {42122857},
issn = {2223-7747},
abstract = {Holly (Ilex L.) is a genus of woody dioecious plants with substantial ecological and economic value. However, its high species diversity and morphological similarity make accurate identification challenging. To address this, we constructed a multi-taxon Ilex leaf image dataset. We then trained six deep learning models-GoogLeNet, ResNet50, ResNet101, DenseNet121, DenseNet169, and EfficientNet-B3-using a unified PyTorch framework on cloud computing resources. Leaf images were preprocessed by background removal, resizing, cropping, and normalization. Model performance was evaluated using accuracy, F1-score, and Grad-CAM visualizations. Under an image-level data split that may overestimate generalization, all six models achieved over 99% classification accuracy on preprocessed leaf images under controlled laboratory conditions. DenseNet121 and DenseNet169 performed best, reaching 99.65% accuracy. Because images of the same leaf or same plant could appear in both training and test sets under this split, plant-level cross-validation is required to assess real-world generalizability. The reported accuracies represent an upper-bound estimate under image-level splitting. The framework offers a rapid and accurate tool for preliminary screening under controlled conditions, but its performance on raw field photographs and across different collection sites remains to be validated.},
}
RevDate: 2026-05-13
A fuzzy logic and blockchain-enhanced framework for secure, explainable eHealth in Society 5.0.
Scientific reports pii:10.1038/s41598-026-52222-2 [Epub ahead of print].
The constraints of current intelligent healthcare systems are extensively addressed in this study, which offers a thorough framework for expanding eHealth within the human-centered paradigm of Society 5.0. Reliance on centralised cloud systems, which have delay for real-time IoMT data, single points of failure, and serious data privacy/security threats, are some of the disadvantages of current approaches. Traditional healthcare AI models are often black-boxes, lacking explainability and transparency (XAI), which are necessary for patient acceptance and physician trust. To overcome these issues, the Proposed Approach uses a novel combination of specialised technologies and a multi-tiered architecture of cloud services, edge computing, and IoMT. The Health Prediction using Cloud Edge 2.0 (HPCE 2.0) algorithm employs fuzzy logic to combine static Electronic Health Records (EHRs) with dynamic real-time IoMT data to handle medical input uncertainty and imprecision. This algorithm predicts health severity accurately and individually. Proof of Authentication 2.0 (PoAh 2.0) consensus ensures data integrity and non-repudiation in the blockchain-enhanced architecture's immutable, decentralised ledger. By adding XAI (LIME/SHAP) to give local and alternative answers, the system stops being a black box and becomes an open collaborator. Edge-cloud integration improves performance by lowering delay for important real-time alerts. Security tests show that the PoAh 2.0 system works well and can be expanded by quickly building and verifying blocks. This makes sure that strict privacy rules are followed while keeping the good predictive performance of a cardiac arrest prediction case study. This platform sets a new standard for interpretable, safe, and responsive AI-driven healthcare.
Additional Links: PMID-42129248
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42129248,
year = {2026},
author = {Murala, DK and Batta, KB and Madhura, K and Vuyyuru, VA and Romeo, B},
title = {A fuzzy logic and blockchain-enhanced framework for secure, explainable eHealth in Society 5.0.},
journal = {Scientific reports},
volume = {},
number = {},
pages = {},
doi = {10.1038/s41598-026-52222-2},
pmid = {42129248},
issn = {2045-2322},
abstract = {The constraints of current intelligent healthcare systems are extensively addressed in this study, which offers a thorough framework for expanding eHealth within the human-centered paradigm of Society 5.0. Reliance on centralised cloud systems, which have delay for real-time IoMT data, single points of failure, and serious data privacy/security threats, are some of the disadvantages of current approaches. Traditional healthcare AI models are often black-boxes, lacking explainability and transparency (XAI), which are necessary for patient acceptance and physician trust. To overcome these issues, the Proposed Approach uses a novel combination of specialised technologies and a multi-tiered architecture of cloud services, edge computing, and IoMT. The Health Prediction using Cloud Edge 2.0 (HPCE 2.0) algorithm employs fuzzy logic to combine static Electronic Health Records (EHRs) with dynamic real-time IoMT data to handle medical input uncertainty and imprecision. This algorithm predicts health severity accurately and individually. Proof of Authentication 2.0 (PoAh 2.0) consensus ensures data integrity and non-repudiation in the blockchain-enhanced architecture's immutable, decentralised ledger. By adding XAI (LIME/SHAP) to give local and alternative answers, the system stops being a black box and becomes an open collaborator. Edge-cloud integration improves performance by lowering delay for important real-time alerts. Security tests show that the PoAh 2.0 system works well and can be expanded by quickly building and verifying blocks. This makes sure that strict privacy rules are followed while keeping the good predictive performance of a cardiac arrest prediction case study. This platform sets a new standard for interpretable, safe, and responsive AI-driven healthcare.},
}
RevDate: 2026-05-12
Machine learning-driven adaptive parameter selection for homomorphic encryption in edge computing.
Scientific reports pii:10.1038/s41598-026-52587-4 [Epub ahead of print].
The rapid proliferation of Internet of Things (IoT) devices and edge computing infrastructures has intensified concerns regarding data security and privacy, particularly when sensitive information is processed beyond centralized cloud environments. Homomorphic encryption (HE) offers a compelling solution by enabling computations directly on encrypted data; however, its substantial computational overhead continues to limit deployment in latency-sensitive edge applications. This paper presents a machine learning-driven framework designed to enhance the practicality of homomorphic encryption for intelligent edge environments. Our approach integrates gradient boosting optimization with the Cheon-Kim-Kim-Song (CKKS) encryption scheme to dynamically adjust cryptographic parameters in response to varying workload characteristics. We develop rigorous mathematical foundations, including formal optimization models, complexity analysis, and security proofs grounded in the Ring Learning With Errors (RLWE) assumption. We validate our framework through comprehensive experiments on the Heart Failure Prediction dataset from the UCI Machine Learning Repository, employing an expanded parameter space spanning 20 configurations across polynomial degrees from 4096 to 16,384, with security levels validated using the Albrecht-Player-Scott lattice-estimator methodology. The empirical results demonstrate substantial improvements over a conservative static baseline: latency reduction of 53.09%, throughput enhancement of 285.28%, and energy savings of 72.53%, all while maintaining computational accuracy above 0.999 and cryptographic security guarantees of at least 128 bits. Statistical analysis confirms the significance of these improvements with a p-value of [Formula: see text] and a large effect size (Cohen's [Formula: see text]). Five-fold cross-validation confirms model generalisability ([Formula: see text]). Furthermore, we provide interpretability analysis through SHAP (SHapley Additive exPlanations) values to elucidate the ML optimizer's decision-making process, addressing concerns about transparency in automated cryptographic systems. Crucially, unlike simple heuristic baselines that may sacrifice computational accuracy for speed, our ML optimizer enforces accuracy as a hard constraint, ensuring reliable results in safety-critical applications. This work offers both theoretical rigor and empirical validation, demonstrating that machine learning-enhanced homomorphic encryption can serve as an effective and secure solution for edge computing applications in healthcare, industrial IoT, and smart city domains.
Additional Links: PMID-42120489
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42120489,
year = {2026},
author = {Bouabidi, HE and Ghmary, ME and Hebabaze, SE and Amnai, M},
title = {Machine learning-driven adaptive parameter selection for homomorphic encryption in edge computing.},
journal = {Scientific reports},
volume = {},
number = {},
pages = {},
doi = {10.1038/s41598-026-52587-4},
pmid = {42120489},
issn = {2045-2322},
abstract = {The rapid proliferation of Internet of Things (IoT) devices and edge computing infrastructures has intensified concerns regarding data security and privacy, particularly when sensitive information is processed beyond centralized cloud environments. Homomorphic encryption (HE) offers a compelling solution by enabling computations directly on encrypted data; however, its substantial computational overhead continues to limit deployment in latency-sensitive edge applications. This paper presents a machine learning-driven framework designed to enhance the practicality of homomorphic encryption for intelligent edge environments. Our approach integrates gradient boosting optimization with the Cheon-Kim-Kim-Song (CKKS) encryption scheme to dynamically adjust cryptographic parameters in response to varying workload characteristics. We develop rigorous mathematical foundations, including formal optimization models, complexity analysis, and security proofs grounded in the Ring Learning With Errors (RLWE) assumption. We validate our framework through comprehensive experiments on the Heart Failure Prediction dataset from the UCI Machine Learning Repository, employing an expanded parameter space spanning 20 configurations across polynomial degrees from 4096 to 16,384, with security levels validated using the Albrecht-Player-Scott lattice-estimator methodology. The empirical results demonstrate substantial improvements over a conservative static baseline: latency reduction of 53.09%, throughput enhancement of 285.28%, and energy savings of 72.53%, all while maintaining computational accuracy above 0.999 and cryptographic security guarantees of at least 128 bits. Statistical analysis confirms the significance of these improvements with a p-value of [Formula: see text] and a large effect size (Cohen's [Formula: see text]). Five-fold cross-validation confirms model generalisability ([Formula: see text]). Furthermore, we provide interpretability analysis through SHAP (SHapley Additive exPlanations) values to elucidate the ML optimizer's decision-making process, addressing concerns about transparency in automated cryptographic systems. Crucially, unlike simple heuristic baselines that may sacrifice computational accuracy for speed, our ML optimizer enforces accuracy as a hard constraint, ensuring reliable results in safety-critical applications. This work offers both theoretical rigor and empirical validation, demonstrating that machine learning-enhanced homomorphic encryption can serve as an effective and secure solution for edge computing applications in healthcare, industrial IoT, and smart city domains.},
}
RevDate: 2026-05-12
TaWSA-WRN: a Taylor wave search optimized WideResNet framework for intrusion detection with response-aware mitigation in cloud computing.
Scientific reports pii:10.1038/s41598-026-52050-4 [Epub ahead of print].
Targeting cloud computing environments has become increasingly attractive to sophisticated cyberattackers due to their open, scalable, and distributed nature. Intrusion Detection Systems (IDSs) analyse traffic patterns to detect these attacks; deep learning has become a common approach for building such systems, but many suffer from overfitting, high false-positive rates, and/or unstable training behaviour. To overcome these drawbacks, this paper introduces a Taylor Wave Search Algorithm-optimised Wide Residual Network (TaWSA_WRN) framework for intrusion detection and mitigation in cloud environments, which protects against incoming attacks. The network traffic data accessed from benchmark datasets, such as NSL-KDD and CICIDS2017, are subsequently preprocessed by restoring missing values and applying Min-Max normalisation. Finally, the TaWSA_WRN model performs feature selection and intrusion classification, using the Taylor Wave Search Algorithm to enhance parameter optimisation and improve learning stability by optimising a hyperparameter. This model-agnostic interpretability approach, using SHAP, also offers valuable insights into domain-relevant traffic features. The empirical results show that the proposed approach can achieve maximum TNR, accuracy, and TPR of 96.857%, 97.190%, and 97.589%, respectively. We introduce the mitigation component as a response-guided strategy based on detections rather than a single network-level defence. The proposed framework enables greater reliability, interpretability, and robustness, thereby facilitating detection in a secure cloud computing environment. Code implementation is available at https://github.com/vedasahithi/wideResNet-for-intrusion-detection-.
Additional Links: PMID-42120623
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42120623,
year = {2026},
author = {Yellanki, VS and Sah, B},
title = {TaWSA-WRN: a Taylor wave search optimized WideResNet framework for intrusion detection with response-aware mitigation in cloud computing.},
journal = {Scientific reports},
volume = {},
number = {},
pages = {},
doi = {10.1038/s41598-026-52050-4},
pmid = {42120623},
issn = {2045-2322},
abstract = {Targeting cloud computing environments has become increasingly attractive to sophisticated cyberattackers due to their open, scalable, and distributed nature. Intrusion Detection Systems (IDSs) analyse traffic patterns to detect these attacks; deep learning has become a common approach for building such systems, but many suffer from overfitting, high false-positive rates, and/or unstable training behaviour. To overcome these drawbacks, this paper introduces a Taylor Wave Search Algorithm-optimised Wide Residual Network (TaWSA_WRN) framework for intrusion detection and mitigation in cloud environments, which protects against incoming attacks. The network traffic data accessed from benchmark datasets, such as NSL-KDD and CICIDS2017, are subsequently preprocessed by restoring missing values and applying Min-Max normalisation. Finally, the TaWSA_WRN model performs feature selection and intrusion classification, using the Taylor Wave Search Algorithm to enhance parameter optimisation and improve learning stability by optimising a hyperparameter. This model-agnostic interpretability approach, using SHAP, also offers valuable insights into domain-relevant traffic features. The empirical results show that the proposed approach can achieve maximum TNR, accuracy, and TPR of 96.857%, 97.190%, and 97.589%, respectively. We introduce the mitigation component as a response-guided strategy based on detections rather than a single network-level defence. The proposed framework enables greater reliability, interpretability, and robustness, thereby facilitating detection in a secure cloud computing environment. Code implementation is available at https://github.com/vedasahithi/wideResNet-for-intrusion-detection-.},
}
RevDate: 2026-05-12
AI-enabled smart surveillance system for secure monitoring and authentication.
Scientific reports pii:10.1038/s41598-026-52387-w [Epub ahead of print].
The proposed Smart Surveillance System presents a novel, hardware-integrated prototype demonstration aimed The proposed Smart Surveillance System presents a groundbreaking hardware-integrated prototype that decisively validates the effectiveness of a dual-branch anti-spoofing model on the low-power edge device, Raspberry Pi 3B+. This prototype goes beyond algorithmic performance research, showcasing a fully functional proof of concept. In contrast to existing surveillance solutions that typically rely on centralized cloud processing or basic recognition systems, our system employs an advanced dual-branch model that utilizes both spatial and frequency-domain features. This approach enables real-time anti-spoofing with an impressive error rate of less than 2%. What truly sets our system apart is its seamless end-to-end integration of cloud-based authentication, edge-level inference for rapid response, and an interactive live video conferencing feature. This configuration empowers immediate verification and action during potential spoofing events. With IoT-enabled devices, our system ensures effortless communication for live streaming, automated alerts, and scalable cloud data management. Coupled with edge computing, it guarantees real-time decision-making with minimal latency. Experimental results confirm its high accuracy in distinguishing genuine users from spoofing attempts, positioning our solution as a lightweight, proactive, and user-interactive surveillance option that is perfectly suited for homes, enterprises, and public infrastructures.
Additional Links: PMID-42120936
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42120936,
year = {2026},
author = {Ali, FA and Mali, S and Mahakud, R and Yadav, G},
title = {AI-enabled smart surveillance system for secure monitoring and authentication.},
journal = {Scientific reports},
volume = {},
number = {},
pages = {},
doi = {10.1038/s41598-026-52387-w},
pmid = {42120936},
issn = {2045-2322},
abstract = {The proposed Smart Surveillance System presents a novel, hardware-integrated prototype demonstration aimed The proposed Smart Surveillance System presents a groundbreaking hardware-integrated prototype that decisively validates the effectiveness of a dual-branch anti-spoofing model on the low-power edge device, Raspberry Pi 3B+. This prototype goes beyond algorithmic performance research, showcasing a fully functional proof of concept. In contrast to existing surveillance solutions that typically rely on centralized cloud processing or basic recognition systems, our system employs an advanced dual-branch model that utilizes both spatial and frequency-domain features. This approach enables real-time anti-spoofing with an impressive error rate of less than 2%. What truly sets our system apart is its seamless end-to-end integration of cloud-based authentication, edge-level inference for rapid response, and an interactive live video conferencing feature. This configuration empowers immediate verification and action during potential spoofing events. With IoT-enabled devices, our system ensures effortless communication for live streaming, automated alerts, and scalable cloud data management. Coupled with edge computing, it guarantees real-time decision-making with minimal latency. Experimental results confirm its high accuracy in distinguishing genuine users from spoofing attempts, positioning our solution as a lightweight, proactive, and user-interactive surveillance option that is perfectly suited for homes, enterprises, and public infrastructures.},
}
RevDate: 2026-05-11
CmpDate: 2026-05-11
Evapotranspiration Everywhere, All the Time: Towards a Unified View From Earth Observation.
Global change biology, 32(5):e70898.
Scientists want to know everything, everywhere, and all the time. This is particularly true in Earth science, where we seek to understand processes that span from the molecular to the planetary scale in how the world works, how it affects us, and how we impact it-especially the water cycle. Evapotranspiration (ET) was the last component to be measured in closing the water cycle: for decades, closing the water budget meant adding up all the measurable components, then inferring ET as the residual. Early measurements relied on water loss from pans and weighing lysimeters, followed by sensors inserted into plants to monitor sap flow and leaf chambers capturing transpiration. Scaling up to ecosystems became possible through eddy-covariance flux towers and further across landscapes through proximal sensing with drones, aircraft, and, ultimately, with satellites. While enormous progress has been made to measure or estimate ET everywhere and all the time, no single approach has yet achieved both simultaneously. Flux towers help with all the time, but not everywhere. Satellites can do everywhere, but not all the time (except, in part, for geostationary satellites, though with insufficient spatial coverage and resolution). A new advent of smallsat constellations is moving us to everywhere and all the time in detail, though we are only in the beginning of that era. This paper discusses the evolution and revolution of Earth observation for ET, as we advanced from the first Landsat and development of ET models through the progression of increasingly higher spatiotemporal resolution across international space agencies and commercial industry with increasing ET model sophistication, cloud computing, and machine learning. We continue to march ahead towards ET everywhere, all the time, and use that knowledge to better manage water and sustain our planet.
Additional Links: PMID-42108617
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42108617,
year = {2026},
author = {Fisher, JB and Anderson, MC and Miralles, DG and Mallick, K and Stoy, PC and Ryu, Y and Bastiaanssen, WGM},
title = {Evapotranspiration Everywhere, All the Time: Towards a Unified View From Earth Observation.},
journal = {Global change biology},
volume = {32},
number = {5},
pages = {e70898},
doi = {10.1111/gcb.70898},
pmid = {42108617},
issn = {1365-2486},
support = {80NSSC22K0936//Aeronautics Research Mission Directorate/ ; 80NSSC23K0309//Aeronautics Research Mission Directorate/ ; 80NSSC24K1617//Aeronautics Research Mission Directorate/ ; INTER/ANR/22/17204507/HiDRATE//FNR-ANR Inter programme/ ; 2012893//National Science Foundation/ ; 2422397//National Science Foundation/ ; },
mesh = {*Plant Transpiration ; Earth, Planet ; *Earth Sciences ; Ecosystem ; Water ; *Water Cycle ; },
abstract = {Scientists want to know everything, everywhere, and all the time. This is particularly true in Earth science, where we seek to understand processes that span from the molecular to the planetary scale in how the world works, how it affects us, and how we impact it-especially the water cycle. Evapotranspiration (ET) was the last component to be measured in closing the water cycle: for decades, closing the water budget meant adding up all the measurable components, then inferring ET as the residual. Early measurements relied on water loss from pans and weighing lysimeters, followed by sensors inserted into plants to monitor sap flow and leaf chambers capturing transpiration. Scaling up to ecosystems became possible through eddy-covariance flux towers and further across landscapes through proximal sensing with drones, aircraft, and, ultimately, with satellites. While enormous progress has been made to measure or estimate ET everywhere and all the time, no single approach has yet achieved both simultaneously. Flux towers help with all the time, but not everywhere. Satellites can do everywhere, but not all the time (except, in part, for geostationary satellites, though with insufficient spatial coverage and resolution). A new advent of smallsat constellations is moving us to everywhere and all the time in detail, though we are only in the beginning of that era. This paper discusses the evolution and revolution of Earth observation for ET, as we advanced from the first Landsat and development of ET models through the progression of increasingly higher spatiotemporal resolution across international space agencies and commercial industry with increasing ET model sophistication, cloud computing, and machine learning. We continue to march ahead towards ET everywhere, all the time, and use that knowledge to better manage water and sustain our planet.},
}
MeSH Terms:
show MeSH Terms
hide MeSH Terms
*Plant Transpiration
Earth, Planet
*Earth Sciences
Ecosystem
Water
*Water Cycle
RevDate: 2026-05-11
CmpDate: 2026-05-11
Action-factorized Rainbow deep Q-network with token Transformer for computation offloading in edge computing-enabled Internet of Ships.
PloS one, 21(5):e0348376 pii:PONE-D-25-60650.
Edge computing (EC) in the Internet of Ships (IoS) reduces the latency and energy burdens of cloud-centric architectures, but fully realizing its benefits requires effective computation offloading strategies. Designing such strategies in dynamic maritime environments remains challenging due to the high-dimensional, combinatorial decision space, strict system constraints, and rapidly varying maritime wireless channels. This study proposes the action-factorized Rainbow deep Q-network (DQN) with token Transformer, a deep reinforcement learning (DRL) algorithm for discovering effective computation offloading strategies in EC-enabled IoS (EC-IoS). The core innovation of the algorithm lies in a novel action factorization mechanism coupled with our custom token Transformer-based state and action encoders, which effectively handle the complex decision space. Built upon Rainbow DQN and further accelerated with a parallel training architecture, the algorithm improves learning efficiency and stability. Experimental results illustrate that the computation offloading strategies learned by our algorithm significantly outperform multiple baselines on the weighted latency-energy objective. More importantly, these strategies achieve a zero rate of invalid actions, satisfy all system constraints, and ensure practical feasibility. Overall, the study demonstrates that the algorithm provides a robust method for computation offloading, effectively balancing latency and energy consumption in EC-IoS, thereby supporting maritime digitalization and automation.
Additional Links: PMID-42113833
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42113833,
year = {2026},
author = {Zhang, S and Yang, H and Kim, H and Shin, I and Wu, RMX},
title = {Action-factorized Rainbow deep Q-network with token Transformer for computation offloading in edge computing-enabled Internet of Ships.},
journal = {PloS one},
volume = {21},
number = {5},
pages = {e0348376},
doi = {10.1371/journal.pone.0348376},
pmid = {42113833},
issn = {1932-6203},
mesh = {Algorithms ; *Ships ; *Internet ; *Deep Learning ; Wireless Technology ; Neural Networks, Computer ; },
abstract = {Edge computing (EC) in the Internet of Ships (IoS) reduces the latency and energy burdens of cloud-centric architectures, but fully realizing its benefits requires effective computation offloading strategies. Designing such strategies in dynamic maritime environments remains challenging due to the high-dimensional, combinatorial decision space, strict system constraints, and rapidly varying maritime wireless channels. This study proposes the action-factorized Rainbow deep Q-network (DQN) with token Transformer, a deep reinforcement learning (DRL) algorithm for discovering effective computation offloading strategies in EC-enabled IoS (EC-IoS). The core innovation of the algorithm lies in a novel action factorization mechanism coupled with our custom token Transformer-based state and action encoders, which effectively handle the complex decision space. Built upon Rainbow DQN and further accelerated with a parallel training architecture, the algorithm improves learning efficiency and stability. Experimental results illustrate that the computation offloading strategies learned by our algorithm significantly outperform multiple baselines on the weighted latency-energy objective. More importantly, these strategies achieve a zero rate of invalid actions, satisfy all system constraints, and ensure practical feasibility. Overall, the study demonstrates that the algorithm provides a robust method for computation offloading, effectively balancing latency and energy consumption in EC-IoS, thereby supporting maritime digitalization and automation.},
}
MeSH Terms:
show MeSH Terms
hide MeSH Terms
Algorithms
*Ships
*Internet
*Deep Learning
Wireless Technology
Neural Networks, Computer
RevDate: 2026-05-11
Energy-aware load balancing in cloud environments using graph neural networks and grey wolf optimization.
Scientific reports pii:10.1038/s41598-026-51660-2 [Epub ahead of print].
Cloud computing infrastructures must constantly maintain a balance between resource utilization and energy consumption to work effective under dynamic workloads. The training expense and generalizability of machine learning-based load balancing algorithms are both considerable, while existing methods often fails in adjusting in real time conditions. To work with both energy-aware and scalable load balancing, this research proposes a hybrid framework that combines Graph Neural Networks (GNNs) with the Grey Wolf Optimization (GWO) method. GNN gives accurate workload representation, representing the intricate structural relationships among virtual machines (VMs), tasks, and resources. Afterwards, the usage of GWO maximizes task-to-virtual machine mappings by reducing load imbalance, energy consumption, and task completion time. The hybrid framework utilizes sustainability parameters while constantly adapting to workload variations, unlike traditional methods. The experiments are done in CloudSim, where the proposed hybrid model reduced energy consumption by approximately 18-27%, decreases task completion time by 12-20%, and improves resource utilization balance by 15-22% when compared to existing approaches. The simulations are run in CloudSim Plus environment using real-world traces.
Additional Links: PMID-42115249
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42115249,
year = {2026},
author = {Niyasudeen, F and Mohan, M},
title = {Energy-aware load balancing in cloud environments using graph neural networks and grey wolf optimization.},
journal = {Scientific reports},
volume = {},
number = {},
pages = {},
doi = {10.1038/s41598-026-51660-2},
pmid = {42115249},
issn = {2045-2322},
abstract = {Cloud computing infrastructures must constantly maintain a balance between resource utilization and energy consumption to work effective under dynamic workloads. The training expense and generalizability of machine learning-based load balancing algorithms are both considerable, while existing methods often fails in adjusting in real time conditions. To work with both energy-aware and scalable load balancing, this research proposes a hybrid framework that combines Graph Neural Networks (GNNs) with the Grey Wolf Optimization (GWO) method. GNN gives accurate workload representation, representing the intricate structural relationships among virtual machines (VMs), tasks, and resources. Afterwards, the usage of GWO maximizes task-to-virtual machine mappings by reducing load imbalance, energy consumption, and task completion time. The hybrid framework utilizes sustainability parameters while constantly adapting to workload variations, unlike traditional methods. The experiments are done in CloudSim, where the proposed hybrid model reduced energy consumption by approximately 18-27%, decreases task completion time by 12-20%, and improves resource utilization balance by 15-22% when compared to existing approaches. The simulations are run in CloudSim Plus environment using real-world traces.},
}
RevDate: 2026-05-11
SENSEYE: a resource-aware visionary framework for assisting individuals with visual disabilities.
Scientific reports pii:10.1038/s41598-026-51257-9 [Epub ahead of print].
Despite significant recent advances, visual aid systems are still limited by the use of conventional computer vision algorithms, constrained sensor capabilities, high power consumption, and reliance on cloud-based processing, which introduce latency and privacy risks. Current assistive technologies for visually impaired individuals often suffer from a lack of secure and competent communication and an inability to deal with complex computer vision tasks. This paper introduces SENSEYE, a resource-aware visionary framework that employs edge computing with a secure and competent communication mechanism. The proposed architecture integrates IoT Edge and virtual decentralized services in a portable system that is small, cost-effective, and power-efficient. The integration of open AI models with advanced functionality in this system design helps to recognize objects, locate moving obstacles, detect sudden changes, perceive a summary from a live feed, and represent them as audio in real time. SENSEYE integrates real-time object detection, scene comprehension, and global positioning system (GPS)-based navigation into a portable, low-latency device. This system leverages optimized lightweight AI models, e.g., SSD-MobileNetV2 and VILA1.5-3b, to provide accurate environmental awareness and seamless auditory feedback through efficient speech processing. The system also enables secure remote assistance via video streaming and real-time GPS location sharing, ensuring enhanced user safety and connectivity. The evaluations confirm superior accuracy, power efficiency, and responsiveness compared to traditional sensor-based or cloud-reliant systems. Although challenges remain, particularly in constrained sensor capabilities, power efficiency trade-offs, and potential sensory overload, future work will focus on improving wearability, optimizing energy consumption, and advancing multimodal, user-centric AI integration for enhanced accessibility. This paper presents a novel resource-aware edge AI architecture with integrated real-time perception and secure IoT communication, establishing a scalable, privacy-preserving, and interpretable foundation for next-generation assistive systems for visually impaired individuals.
Additional Links: PMID-42115269
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42115269,
year = {2026},
author = {Bappy, AS and Seppänen, T and Hoque, MZ},
title = {SENSEYE: a resource-aware visionary framework for assisting individuals with visual disabilities.},
journal = {Scientific reports},
volume = {},
number = {},
pages = {},
doi = {10.1038/s41598-026-51257-9},
pmid = {42115269},
issn = {2045-2322},
abstract = {Despite significant recent advances, visual aid systems are still limited by the use of conventional computer vision algorithms, constrained sensor capabilities, high power consumption, and reliance on cloud-based processing, which introduce latency and privacy risks. Current assistive technologies for visually impaired individuals often suffer from a lack of secure and competent communication and an inability to deal with complex computer vision tasks. This paper introduces SENSEYE, a resource-aware visionary framework that employs edge computing with a secure and competent communication mechanism. The proposed architecture integrates IoT Edge and virtual decentralized services in a portable system that is small, cost-effective, and power-efficient. The integration of open AI models with advanced functionality in this system design helps to recognize objects, locate moving obstacles, detect sudden changes, perceive a summary from a live feed, and represent them as audio in real time. SENSEYE integrates real-time object detection, scene comprehension, and global positioning system (GPS)-based navigation into a portable, low-latency device. This system leverages optimized lightweight AI models, e.g., SSD-MobileNetV2 and VILA1.5-3b, to provide accurate environmental awareness and seamless auditory feedback through efficient speech processing. The system also enables secure remote assistance via video streaming and real-time GPS location sharing, ensuring enhanced user safety and connectivity. The evaluations confirm superior accuracy, power efficiency, and responsiveness compared to traditional sensor-based or cloud-reliant systems. Although challenges remain, particularly in constrained sensor capabilities, power efficiency trade-offs, and potential sensory overload, future work will focus on improving wearability, optimizing energy consumption, and advancing multimodal, user-centric AI integration for enhanced accessibility. This paper presents a novel resource-aware edge AI architecture with integrated real-time perception and secure IoT communication, establishing a scalable, privacy-preserving, and interpretable foundation for next-generation assistive systems for visually impaired individuals.},
}
RevDate: 2026-05-09
A national-scale sandy beach dataset for India derived from high-resolution satellite imagery and deep learning.
Scientific data pii:10.1038/s41597-026-07408-8 [Epub ahead of print].
Sandy beaches are important coastal features with ecological, social, and economic significance, yet comprehensive national-scale datasets mapping their extent in India remain scarce. Here, we present a high-resolution, geo-referenced dataset of sandy beach extents along the Indian coastline, derived from IRS ResourceSat-2/2 A LISS-IV multispectral imagery (5.8 m resolution) collected between 2021 and 2024. The dataset was derived from cloud-free imagery acquired under low-tide conditions to ensure consistent delineation of exposed sandy beach extents. Fourteen representative coastal sites were manually annotated to train and validate a U-Net deep learning model, which was subsequently applied to the entire Indian coastline. The model achieved robust performance on independent test tiles, with an intersection-over-union of 0.84, precision of 0.90, recall of 0.94, and F1-score of 0.92. Accuracy was further validated at two independent beaches with low tidal influence, yielding an RMSE of 11.8 m[2] (<0.05% relative deviation) between U-Net-derived and manually digitized areas. The final dataset is distributed in Shapefile format to ensure compatibility with standard GIS workflows, supporting applications such as coastal monitoring, habitat assessment, and shoreline change analysis, as well as serving as training data for future machine learning models. An accompanying Google Earth Engine web application is provided for interactive visualization and exploration of the mapped sandy beaches. This dataset represents the first comprehensive, high-resolution mapping of sandy beaches across India, enabling improved coastal management, conservation planning, and research into coastal dynamics.
Additional Links: PMID-42106382
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42106382,
year = {2026},
author = {Dandabathula, G and Roy, S and Ghatage, OS and Salunkhe, SS and Nandani, D and Bera, AK and Srivastav, SK},
title = {A national-scale sandy beach dataset for India derived from high-resolution satellite imagery and deep learning.},
journal = {Scientific data},
volume = {},
number = {},
pages = {},
doi = {10.1038/s41597-026-07408-8},
pmid = {42106382},
issn = {2052-4463},
abstract = {Sandy beaches are important coastal features with ecological, social, and economic significance, yet comprehensive national-scale datasets mapping their extent in India remain scarce. Here, we present a high-resolution, geo-referenced dataset of sandy beach extents along the Indian coastline, derived from IRS ResourceSat-2/2 A LISS-IV multispectral imagery (5.8 m resolution) collected between 2021 and 2024. The dataset was derived from cloud-free imagery acquired under low-tide conditions to ensure consistent delineation of exposed sandy beach extents. Fourteen representative coastal sites were manually annotated to train and validate a U-Net deep learning model, which was subsequently applied to the entire Indian coastline. The model achieved robust performance on independent test tiles, with an intersection-over-union of 0.84, precision of 0.90, recall of 0.94, and F1-score of 0.92. Accuracy was further validated at two independent beaches with low tidal influence, yielding an RMSE of 11.8 m[2] (<0.05% relative deviation) between U-Net-derived and manually digitized areas. The final dataset is distributed in Shapefile format to ensure compatibility with standard GIS workflows, supporting applications such as coastal monitoring, habitat assessment, and shoreline change analysis, as well as serving as training data for future machine learning models. An accompanying Google Earth Engine web application is provided for interactive visualization and exploration of the mapped sandy beaches. This dataset represents the first comprehensive, high-resolution mapping of sandy beaches across India, enabling improved coastal management, conservation planning, and research into coastal dynamics.},
}
RevDate: 2026-05-08
CmpDate: 2026-05-08
Innovative technologies and workplace collaborations in the energy sector based in the United Arab Emirates.
Frontiers in artificial intelligence, 9:1798647.
INTRODUCTION: The UAE energy sector is navigating digital transformation mandates such as the UAE AI Strategy 2031 and Net Zero commitments, with technologies like AI, IoT and cloud computing creating new avenues for real-time coordination, data-driven decision-making and cross-functional collaboration. These oppor tunities are tempered by challenges of organisational readiness, cultural iner tia and technological integration. Yet, research on innovative practices in the UAE energy context remains limited. Therefore, this study investigates the role of AI, IoT and cloud computing in shaping workplace collaboration in the UAE energy sector.
METHODS: An explanatory sequential mixed-methods design was adopted which involved Phase 1 (15 October, 2024-31 January, 2025) interviews with 15 professionals in operations, IT and leadership roles from major energy companies, analysed via thematic analysis. Phase 2 (15 February, 2025-15 May, 2025) distributed a survey to a broader sample, yielding 115 valid responses, which were analysed quan titatively. The study is primarily grounded in the Unified Theory of Acceptance and Use of Technology (UTAUT), with the Technology Acceptance Model (TAM), Resource-Based View (RBV) and Actor-Network Theory (ANT) serving as supporting interpretive lenses.
RESULTS: Findings show that AI, IoT, and cloud platforms enhance collaboration, especially in remote coordination and predictive decision sup port, but adoption is hindered by resistance to change, fragmented systems and uneven digital literacy.
DISCUSSION: Practical implications include modular rollouts, digital maturity audits and AI onboarding programs. Policy recommendations include national collaboration standards, KPI integration and incentives for joint innova tion projects.
Additional Links: PMID-42099704
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42099704,
year = {2026},
author = {Boath, JC and Gilani, SAM and Tiemo, TH and Tantry, A},
title = {Innovative technologies and workplace collaborations in the energy sector based in the United Arab Emirates.},
journal = {Frontiers in artificial intelligence},
volume = {9},
number = {},
pages = {1798647},
pmid = {42099704},
issn = {2624-8212},
abstract = {INTRODUCTION: The UAE energy sector is navigating digital transformation mandates such as the UAE AI Strategy 2031 and Net Zero commitments, with technologies like AI, IoT and cloud computing creating new avenues for real-time coordination, data-driven decision-making and cross-functional collaboration. These oppor tunities are tempered by challenges of organisational readiness, cultural iner tia and technological integration. Yet, research on innovative practices in the UAE energy context remains limited. Therefore, this study investigates the role of AI, IoT and cloud computing in shaping workplace collaboration in the UAE energy sector.
METHODS: An explanatory sequential mixed-methods design was adopted which involved Phase 1 (15 October, 2024-31 January, 2025) interviews with 15 professionals in operations, IT and leadership roles from major energy companies, analysed via thematic analysis. Phase 2 (15 February, 2025-15 May, 2025) distributed a survey to a broader sample, yielding 115 valid responses, which were analysed quan titatively. The study is primarily grounded in the Unified Theory of Acceptance and Use of Technology (UTAUT), with the Technology Acceptance Model (TAM), Resource-Based View (RBV) and Actor-Network Theory (ANT) serving as supporting interpretive lenses.
RESULTS: Findings show that AI, IoT, and cloud platforms enhance collaboration, especially in remote coordination and predictive decision sup port, but adoption is hindered by resistance to change, fragmented systems and uneven digital literacy.
DISCUSSION: Practical implications include modular rollouts, digital maturity audits and AI onboarding programs. Policy recommendations include national collaboration standards, KPI integration and incentives for joint innova tion projects.},
}
RevDate: 2026-05-08
Quantum convolution searched binary neural networks based autism spectrum disorder detection using MRI images in cloud computing.
Psychiatry research. Neuroimaging, 361:112226 pii:S0925-4927(26)00091-0 [Epub ahead of print].
Autism Spectrum Disorder (ASD) is a neurodevelopmental disease that causes discrepancies in social interaction and behavioral changes. The developments of neuroimaging techniques, like Magnetic Resonance Imaging (MRI) is employed to detect brain abnormalities. Due to the heterogeneity of disease severity and symptoms, the detection of ASD is difficult. To solve such complexity, a novel model named Fractional Painting Training Based Optimization trained Quantum Convolution Searched Binary Neural Network (FPTO_QCSBNN) is proposed for ASD detection in cloud. A cloud-based detection system offers the analysis and storage of large-scale neuroimages. Moreover, it provides faster diagnosis with scalable storage. Initially, the cloud system is simulated, and pre-processing is done using Mid-Point filter and Region of Interest (ROI) extraction. Image enhancement is done by gamma correction method, and pivotal region is extracted using functional connectivity. The optimal grid selection in pivotal region extraction is done using FPTO, and features are extracted from enhanced image. Using features and pivotal region extracted image, QCSBNN detects ASD, and it is trained by FPTO. Furthermore, developed FPTO_QCSBNN attains the accuracy, True Positive Rate (TPR), and True Negative Rate (TNR) of 91.37%, 91.32%, and 91.89%.
Additional Links: PMID-42102471
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42102471,
year = {2026},
author = {George, GM and Kumareshan, N},
title = {Quantum convolution searched binary neural networks based autism spectrum disorder detection using MRI images in cloud computing.},
journal = {Psychiatry research. Neuroimaging},
volume = {361},
number = {},
pages = {112226},
doi = {10.1016/j.pscychresns.2026.112226},
pmid = {42102471},
issn = {1872-7506},
abstract = {Autism Spectrum Disorder (ASD) is a neurodevelopmental disease that causes discrepancies in social interaction and behavioral changes. The developments of neuroimaging techniques, like Magnetic Resonance Imaging (MRI) is employed to detect brain abnormalities. Due to the heterogeneity of disease severity and symptoms, the detection of ASD is difficult. To solve such complexity, a novel model named Fractional Painting Training Based Optimization trained Quantum Convolution Searched Binary Neural Network (FPTO_QCSBNN) is proposed for ASD detection in cloud. A cloud-based detection system offers the analysis and storage of large-scale neuroimages. Moreover, it provides faster diagnosis with scalable storage. Initially, the cloud system is simulated, and pre-processing is done using Mid-Point filter and Region of Interest (ROI) extraction. Image enhancement is done by gamma correction method, and pivotal region is extracted using functional connectivity. The optimal grid selection in pivotal region extraction is done using FPTO, and features are extracted from enhanced image. Using features and pivotal region extracted image, QCSBNN detects ASD, and it is trained by FPTO. Furthermore, developed FPTO_QCSBNN attains the accuracy, True Positive Rate (TPR), and True Negative Rate (TNR) of 91.37%, 91.32%, and 91.89%.},
}
RevDate: 2026-05-07
Characterizing core outcomes of responsible stewardship for human genomic data in the cloud.
BMC medical genomics pii:10.1186/s12920-026-02382-x [Epub ahead of print].
We present findings from a scoping review of the genomic data sharing literature used to inform a core outcomes set for responsible data stewardship in the cloud. Genomic and related health data stemming from government funded research have undergone mass migration to the cloud where they can be more securely stored, accessed, and analyzed within shared computing environments. While this migration reflects a shift in privacy and security infrastructure for cloud-based repositories as oversight becomes more globalized, it also necessitates new data stewardship responsibilities to align authorized data access with ethical data use. Responsible data stewardship refers to the ethical and secure management, use, and protection of data to ensure its accuracy, privacy, integrity, and appropriate access throughout its lifecycle. Practicing responsible data stewardship is therefore one axis by which repositories can demonstrate trustworthiness in their data access and management practices. We searched the cloud governance and data sharing literature indexed in Web of Science as well as Elicit using the scoping review approach by Arksey and O'Mally. A total of 46 articles met our inclusion criteria, to which we applied a deductive, thematic content analysis to generate relevant outcome domains as well as individual core outcomes of cloud-based data. Our qualitative synthesis resulted in 35 individual core outcomes organized under 9 core domains: transparency, authentication, auditing, accountability, security, sustainability, standardization, consent and compliance, and community engagement.
Additional Links: PMID-42092915
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42092915,
year = {2026},
author = {Rahimzadeh, V and Walsh, B and Rehm, HL and Cho, M and McGuire, AL},
title = {Characterizing core outcomes of responsible stewardship for human genomic data in the cloud.},
journal = {BMC medical genomics},
volume = {},
number = {},
pages = {},
doi = {10.1186/s12920-026-02382-x},
pmid = {42092915},
issn = {1755-8794},
support = {K01HG013112/HG/NHGRI NIH HHS/United States ; },
abstract = {We present findings from a scoping review of the genomic data sharing literature used to inform a core outcomes set for responsible data stewardship in the cloud. Genomic and related health data stemming from government funded research have undergone mass migration to the cloud where they can be more securely stored, accessed, and analyzed within shared computing environments. While this migration reflects a shift in privacy and security infrastructure for cloud-based repositories as oversight becomes more globalized, it also necessitates new data stewardship responsibilities to align authorized data access with ethical data use. Responsible data stewardship refers to the ethical and secure management, use, and protection of data to ensure its accuracy, privacy, integrity, and appropriate access throughout its lifecycle. Practicing responsible data stewardship is therefore one axis by which repositories can demonstrate trustworthiness in their data access and management practices. We searched the cloud governance and data sharing literature indexed in Web of Science as well as Elicit using the scoping review approach by Arksey and O'Mally. A total of 46 articles met our inclusion criteria, to which we applied a deductive, thematic content analysis to generate relevant outcome domains as well as individual core outcomes of cloud-based data. Our qualitative synthesis resulted in 35 individual core outcomes organized under 9 core domains: transparency, authentication, auditing, accountability, security, sustainability, standardization, consent and compliance, and community engagement.},
}
RevDate: 2026-05-07
Anomaly-based data reduction for energy-efficient edge computing in IoT with LoRa.
Scientific reports pii:10.1038/s41598-026-48086-1 [Epub ahead of print].
Edge computing, a key component of Internet of Things (IoT) systems, enables data processing close to the data source. In low-power, resource-constrained IoT environments, it can reduce dependency on centralized cloud systems, lower communication load, and minimize overall energy consumption. However, transmitting all sensor data from edge devices still incurs significant communication and energy costs. The key research gap is that existing approaches rarely address this inefficiency through selective transmission; specifically, few studies have explored how filtering and sending only anomalous data can improve energy efficiency. To bridge this gap, we propose an anomaly detection-based data reduction method operating at the edge using LoRa technology. We apply two unsupervised learning algorithms, DBSCAN and Isolation Forest, to identify and transmit only anomalous sensor instances. The proposed methods are evaluated against a full-data transmission (FDT) baseline. The key contributions are demonstrated through experimental results: DBSCAN reduces data volume by 98.19% and energy consumption by 98.10%, while Isolation Forest achieves reductions of 97.32% and 97.32%, respectively. These findings confirm that anomaly-driven selective transmission significantly reduces the communication load while ensuring high energy efficiency in edge computing systems.
Additional Links: PMID-42098196
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42098196,
year = {2026},
author = {Karadas, F and Usanmaz, B},
title = {Anomaly-based data reduction for energy-efficient edge computing in IoT with LoRa.},
journal = {Scientific reports},
volume = {},
number = {},
pages = {},
doi = {10.1038/s41598-026-48086-1},
pmid = {42098196},
issn = {2045-2322},
abstract = {Edge computing, a key component of Internet of Things (IoT) systems, enables data processing close to the data source. In low-power, resource-constrained IoT environments, it can reduce dependency on centralized cloud systems, lower communication load, and minimize overall energy consumption. However, transmitting all sensor data from edge devices still incurs significant communication and energy costs. The key research gap is that existing approaches rarely address this inefficiency through selective transmission; specifically, few studies have explored how filtering and sending only anomalous data can improve energy efficiency. To bridge this gap, we propose an anomaly detection-based data reduction method operating at the edge using LoRa technology. We apply two unsupervised learning algorithms, DBSCAN and Isolation Forest, to identify and transmit only anomalous sensor instances. The proposed methods are evaluated against a full-data transmission (FDT) baseline. The key contributions are demonstrated through experimental results: DBSCAN reduces data volume by 98.19% and energy consumption by 98.10%, while Isolation Forest achieves reductions of 97.32% and 97.32%, respectively. These findings confirm that anomaly-driven selective transmission significantly reduces the communication load while ensuring high energy efficiency in edge computing systems.},
}
RevDate: 2026-05-07
Fuzzy adaptive human memory optimization based optimal task scheduling in cloud computing.
Scientific reports pii:10.1038/s41598-026-51611-x [Epub ahead of print].
Task scheduling has become a significant research focus in cloud computing because of the growing need for efficient resource utilization. This paper explores an innovative scheduling approach harnessing Human Memory Optimization (HMO) and Fuzzy Adaptive Human Memory Optimization (FAHMO). Such techniques are inspired by human cognitive principles and employ an adaptive search strategy that maintains an effective trade-off between exploration and exploitation. By maintaining a history of successful and unsuccessful scheduling decisions, HMO enables continuous enhancement of scheduling efficiency. Integrating fuzzy logic into FAHMO improves the decision-making process by effectively managing uncertainty and ambiguity in task scheduling, thereby producing more flexible and efficient solutions. Comparative analysis demonstrates that HMO and FAHMO outperform conventional metaheuristic algorithms, including PSO-PGA, in terms of convergence speed and task completion time. The results confirm that the proposed approach significantly reduces makespan and enhances overall cloud task scheduling performance. Specifically, FAHMO achieved up to 67.46% improvement in makespan and 63.18% in convergence accuracy compared to PSO-PGA.
Additional Links: PMID-42098457
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42098457,
year = {2026},
author = {Patel, P and Gopal, KM and Patel, NC and Sahu, BK and Tripathy, SP and Altayeb, M and Panchyk, M and Touti, E},
title = {Fuzzy adaptive human memory optimization based optimal task scheduling in cloud computing.},
journal = {Scientific reports},
volume = {},
number = {},
pages = {},
doi = {10.1038/s41598-026-51611-x},
pmid = {42098457},
issn = {2045-2322},
abstract = {Task scheduling has become a significant research focus in cloud computing because of the growing need for efficient resource utilization. This paper explores an innovative scheduling approach harnessing Human Memory Optimization (HMO) and Fuzzy Adaptive Human Memory Optimization (FAHMO). Such techniques are inspired by human cognitive principles and employ an adaptive search strategy that maintains an effective trade-off between exploration and exploitation. By maintaining a history of successful and unsuccessful scheduling decisions, HMO enables continuous enhancement of scheduling efficiency. Integrating fuzzy logic into FAHMO improves the decision-making process by effectively managing uncertainty and ambiguity in task scheduling, thereby producing more flexible and efficient solutions. Comparative analysis demonstrates that HMO and FAHMO outperform conventional metaheuristic algorithms, including PSO-PGA, in terms of convergence speed and task completion time. The results confirm that the proposed approach significantly reduces makespan and enhances overall cloud task scheduling performance. Specifically, FAHMO achieved up to 67.46% improvement in makespan and 63.18% in convergence accuracy compared to PSO-PGA.},
}
RevDate: 2026-05-06
CmpDate: 2026-05-06
The Common Fund Data Ecosystem (CFDE).
bioRxiv : the preprint server for biology pii:2026.04.10.717672.
The NIH Common Fund Data Ecosystem (CFDE) integrates data resources from 18 NIH Common Fund programs for discovery and integrative analysis. These programs generate valuable but heterogeneous datasets that can be difficult to discover, access, and reuse. CFDE aims to provide a collaborative, community-built infrastructure that links and enriches Common Fund programs. We describe the evolution, structure, and core technologies of CFDE, including practical approaches that support submission, integration, visualization, and public release of multimodal data. Training programs and workforce initiatives lower barriers to adoption. CFDE has devised solutions to critical issues facing cross-program initiatives, including data scale and heterogeneity, dataset integration, and long-term sustainability. We demonstrate the utility of linking Common Fund resources through integrative tools and cross-dataset queries to yield insights that would otherwise be infeasible. Collectively, CFDE shows that a standards-driven, federated approach enhances and unifies cross-disciplinary resources, fostering collaboration and data-driven discovery.
Additional Links: PMID-41993383
Full Text:
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41993383,
year = {2026},
author = {Jurgens, JA and Bueckle, A and Vora, J and Maurya, MR and Ahooyi, TM and Zheng, E and Stear, B and Wang, D and Ree, C and Ramachandran, S and Nekrutenko, A and Brandes, M and Thaker, S and Katz, DH and Munoz-Torres, MC and Diamant, I and Chun, HE and Simmons, JA and Tasian, SK and Jenkins, SL and Evangelista, JE and Dodia, H and Saha, S and Lindquist, MA and Gajjala, V and Nemarich, C and Zhen, J and Ross, KE and Byrd, AI and Shilin, A and Metzger, VT and Bologa, CG and Srinivasan, S and Jang, D and Kumar, P and Taub, LD and Levanto, MP and Petrosyan, V and Anandakrishnan, M and Kim, M and Clarke, DJB and Ivich, A and Crichton, DJ and Smallen, S and Bordelon, D and Chen, C and Schroeder, AJ and Mahabal, A and Cao-Berg, I and Kim, S and Masood, D and Yu, K and Gaulton, KJ and Jimenez-Morales, D and Rincon, JM and Honick, BJ and Wang, W and Wu, CH and Milosavljevic, A and Blood, PD and Boline, J and Oprea, TI and Lambert, CG and de Bono, B and Park, PJ and Silverstein, JC and Flannick, J and Yang, JJ and Grethe, JS and Subramaniam, S and Tiemeyer, M and Clark, T and Wheeler, MT and Kahn, A and Burnette, J and Ranzinger, R and Schatz, MC and Gibson, L and Burtt, NP and Carson, JP and Chen, JY and Ping, P and Davis, S and Taylor, DM and Börner, K and Dillman, A and Bursey, K and Ma'ayan, A and , and Mazumder, R and Roth, ME and Greene, CS},
title = {The Common Fund Data Ecosystem (CFDE).},
journal = {bioRxiv : the preprint server for biology},
volume = {},
number = {},
pages = {},
doi = {10.64898/2026.04.10.717672},
pmid = {41993383},
issn = {2692-8205},
abstract = {The NIH Common Fund Data Ecosystem (CFDE) integrates data resources from 18 NIH Common Fund programs for discovery and integrative analysis. These programs generate valuable but heterogeneous datasets that can be difficult to discover, access, and reuse. CFDE aims to provide a collaborative, community-built infrastructure that links and enriches Common Fund programs. We describe the evolution, structure, and core technologies of CFDE, including practical approaches that support submission, integration, visualization, and public release of multimodal data. Training programs and workforce initiatives lower barriers to adoption. CFDE has devised solutions to critical issues facing cross-program initiatives, including data scale and heterogeneity, dataset integration, and long-term sustainability. We demonstrate the utility of linking Common Fund resources through integrative tools and cross-dataset queries to yield insights that would otherwise be infeasible. Collectively, CFDE shows that a standards-driven, federated approach enhances and unifies cross-disciplinary resources, fostering collaboration and data-driven discovery.},
}
RevDate: 2026-05-05
Self-supervised multi-scale cloud workload prediction with time series data augmentation.
Neural networks : the official journal of the International Neural Network Society, 202:109034 pii:S0893-6080(26)00494-6 [Epub ahead of print].
Accurate cloud workload forecasting is critical for proactive resource provisioning, cost control, and Service Level Agreement (SLA) compliance; however, it is hindered by the scarcity and heterogeneity of labels. We present Time Series Augmentation for Multi-Scale Prediction (TSA-MSP), a self-supervised framework that achieves near-fully supervised accuracy with limited labels. Conceptually, TSA-MSP couples cloud-informed augmentations-multi-scale time warping, frequency-domain mixing, and periodic pattern injection-with a hierarchical multi-scale contrastive objective and efficient fine-tuning using lightweight adapters to capture short- and long-range workload patterns. We conducted an empirical experimental study on real-world traces (Alibaba 2018, Google 2019, Azure 2019): self-supervised pre-training on unlabeled data followed by fine-tuning with small labeled subsets. We evaluated the Mean Absolute Error (MAE), Root Mean Square Error (RMSE), Symmetric Mean Absolute Percentage Error (sMAPE), and a peak-oriented metric (Peak Prediction Accuracy, PPA) and performed ablations (augmentations, scales), label efficiency, and cross-dataset transfer tests. Remarkably, with only 20% labels, TSA-MSP attains RMSE within ∼ 1.5-1.7% of fully supervised training (100% labels) across all three datasets; for example, on Alibaba, it achieves MAE/RMSE 0.241/0.335 versus 0.238/0.330 for a fully supervised Pathformer. Against the best self-supervised baseline at 20% labels, TSA-MSP reduces RMSE by ∼ 6.6-6.9%. In a 5%-label setting, it outperformed supervised training from scratch by ∼ 23-26% RMSE. Cross-dataset transfer further improves the RMSE by ∼ 2.4-5.2% over direct target-only pre-training. By combining domain-aware augmentations with multi-scale self-supervision and efficient adaptation, TSA-MSP delivers accurate forecasts under scarce labels, improving peak readiness while enabling faster, more cost-effective deployment for real-world cloud resource management.
Additional Links: PMID-42085835
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42085835,
year = {2026},
author = {Jiang, C and Wu, W and Zhong, Q},
title = {Self-supervised multi-scale cloud workload prediction with time series data augmentation.},
journal = {Neural networks : the official journal of the International Neural Network Society},
volume = {202},
number = {},
pages = {109034},
doi = {10.1016/j.neunet.2026.109034},
pmid = {42085835},
issn = {1879-2782},
abstract = {Accurate cloud workload forecasting is critical for proactive resource provisioning, cost control, and Service Level Agreement (SLA) compliance; however, it is hindered by the scarcity and heterogeneity of labels. We present Time Series Augmentation for Multi-Scale Prediction (TSA-MSP), a self-supervised framework that achieves near-fully supervised accuracy with limited labels. Conceptually, TSA-MSP couples cloud-informed augmentations-multi-scale time warping, frequency-domain mixing, and periodic pattern injection-with a hierarchical multi-scale contrastive objective and efficient fine-tuning using lightweight adapters to capture short- and long-range workload patterns. We conducted an empirical experimental study on real-world traces (Alibaba 2018, Google 2019, Azure 2019): self-supervised pre-training on unlabeled data followed by fine-tuning with small labeled subsets. We evaluated the Mean Absolute Error (MAE), Root Mean Square Error (RMSE), Symmetric Mean Absolute Percentage Error (sMAPE), and a peak-oriented metric (Peak Prediction Accuracy, PPA) and performed ablations (augmentations, scales), label efficiency, and cross-dataset transfer tests. Remarkably, with only 20% labels, TSA-MSP attains RMSE within ∼ 1.5-1.7% of fully supervised training (100% labels) across all three datasets; for example, on Alibaba, it achieves MAE/RMSE 0.241/0.335 versus 0.238/0.330 for a fully supervised Pathformer. Against the best self-supervised baseline at 20% labels, TSA-MSP reduces RMSE by ∼ 6.6-6.9%. In a 5%-label setting, it outperformed supervised training from scratch by ∼ 23-26% RMSE. Cross-dataset transfer further improves the RMSE by ∼ 2.4-5.2% over direct target-only pre-training. By combining domain-aware augmentations with multi-scale self-supervision and efficient adaptation, TSA-MSP delivers accurate forecasts under scarce labels, improving peak readiness while enabling faster, more cost-effective deployment for real-world cloud resource management.},
}
RevDate: 2026-05-05
A two-stage generative-AI fusion intrusion detection system for calibrated and reliable cloud security.
Scientific reports pii:10.1038/s41598-026-51527-6 [Epub ahead of print].
The rapid expansion of cloud computing has significantly increased the scale, sophistication, and frequency of cyber threats, making reliable intrusion detection essential for secure cloud environments. However, conventional single-stage intrusion detection systems exhibit high false-positive rates, poor probability calibration, and degraded performance under severe class imbalance, thereby limiting their real-world deployment. This paper proposes a novel two-stage Generative-AI fusion intrusion detection model that integrates discriminative and generative learning to enhance predictive reliability and decision confidence. In the first stage, a binary classifier combining a Feature-Token Transformer and a Variational Autoencoder differentiates normal from malicious traffic using class-balanced focal loss and a precision-oriented routing threshold to minimize false alarms while preserving detection sensitivity. In the second stage, detected attack samples are forwarded to a conditional multi-class classifier for fine-grained attack categorization, incorporating SMOTE-based rebalancing, class-balanced focal loss, and class-specific threshold optimization to improve minority-class detection. The post-hoc temperature scaling is applied at both stages to produce well-calibrated probability estimates and support risk-aware decision-making. The performance of the proposed model measured on the UNSW-NB15 and NSL-KDD benchmark datasets indicate that proposed model performed well as compared to the single-stage Generative-AI fusion and evolutionary feature-selection baselines model and obtained the accuracy score of 94.03% and 77.07%, respectively to delivered the improved calibration and reduced false-alarm, and provide the robust and deployment-ready solution for modern cloud security.
Additional Links: PMID-42086677
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42086677,
year = {2026},
author = {Ganesh, V and Khade, N and Taiwade, H and Deshmukh, PV},
title = {A two-stage generative-AI fusion intrusion detection system for calibrated and reliable cloud security.},
journal = {Scientific reports},
volume = {},
number = {},
pages = {},
doi = {10.1038/s41598-026-51527-6},
pmid = {42086677},
issn = {2045-2322},
abstract = {The rapid expansion of cloud computing has significantly increased the scale, sophistication, and frequency of cyber threats, making reliable intrusion detection essential for secure cloud environments. However, conventional single-stage intrusion detection systems exhibit high false-positive rates, poor probability calibration, and degraded performance under severe class imbalance, thereby limiting their real-world deployment. This paper proposes a novel two-stage Generative-AI fusion intrusion detection model that integrates discriminative and generative learning to enhance predictive reliability and decision confidence. In the first stage, a binary classifier combining a Feature-Token Transformer and a Variational Autoencoder differentiates normal from malicious traffic using class-balanced focal loss and a precision-oriented routing threshold to minimize false alarms while preserving detection sensitivity. In the second stage, detected attack samples are forwarded to a conditional multi-class classifier for fine-grained attack categorization, incorporating SMOTE-based rebalancing, class-balanced focal loss, and class-specific threshold optimization to improve minority-class detection. The post-hoc temperature scaling is applied at both stages to produce well-calibrated probability estimates and support risk-aware decision-making. The performance of the proposed model measured on the UNSW-NB15 and NSL-KDD benchmark datasets indicate that proposed model performed well as compared to the single-stage Generative-AI fusion and evolutionary feature-selection baselines model and obtained the accuracy score of 94.03% and 77.07%, respectively to delivered the improved calibration and reduced false-alarm, and provide the robust and deployment-ready solution for modern cloud security.},
}
RevDate: 2026-05-04
CmpDate: 2026-05-04
Design and Pilot Evaluation of an IoT-Based Blood Pressure Monitoring System for Rabbits.
Bioengineering (Basel, Switzerland), 13(4): pii:bioengineering13040384.
Telemedicine, driven by the Internet of Things (IoT) and wireless connectivity, is essential for managing cardiovascular diseases, where hypertension remains the primary risk factor. In preclinical research, rabbits are superior biological models compared to rodents due to their human-like lipid metabolism. However, continuous blood pressure monitoring in this species remains challenging. The gold-standard technique (direct carotid catheterization) requires terminal procedures, and indirect methods (Doppler, oscillometric) show limited agreement with direct measurements. Furthermore, commercially available implantable telemetry platforms, while enabling real-time monitoring in freely moving animals, require costly surgical implantation, specialized proprietary hardware, and post-operative recovery periods that may confound early hemodynamic data. To address these limitations, this study presents a low-cost, customizable, and minimally invasive monitoring system utilizing a pressure transducer in the central auricular artery. The device integrates an ESP32 microcontroller with IoT technology for digital signal processing and seamless wireless data transmission to the ThingSpeak cloud platform. Unlike implantable telemetry, the proposed approach avoids surgical implantation and its associated costs and recovery time, while still enabling continuous, real-time hemodynamic tracking throughout the experimental period. A pilot evaluation against the BIOPAC MP100 reference (carotid artery) demonstrated relative errors of 1.60% for mean arterial pressure, 8.58% for systolic blood pressure, and 2.43% for diastolic blood pressure. By reducing invasiveness and enhancing remote data accessibility, this system provides a promising framework for the preclinical evaluation of antihypertensive agents and cardiovascular mechanisms, bridging the gap between edge computing and remote clinical diagnostics.
Additional Links: PMID-42072178
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42072178,
year = {2026},
author = {Garay, CE and Mansilla, GN and Madrid, RE and González Colombres, A and Jerez, SJ},
title = {Design and Pilot Evaluation of an IoT-Based Blood Pressure Monitoring System for Rabbits.},
journal = {Bioengineering (Basel, Switzerland)},
volume = {13},
number = {4},
pages = {},
doi = {10.3390/bioengineering13040384},
pmid = {42072178},
issn = {2306-5354},
support = {PIUNT G621//Universidad Nacional de Tucumán/ ; PIUNT G728//Universidad Nacional de Tucumán/ ; 2025//Institucional funds from the Instituto Superior de Investigaciones Biológicas (INSIBIO), CONICET/ ; 2025//CIASUR (UTN-FRT)/ ; },
abstract = {Telemedicine, driven by the Internet of Things (IoT) and wireless connectivity, is essential for managing cardiovascular diseases, where hypertension remains the primary risk factor. In preclinical research, rabbits are superior biological models compared to rodents due to their human-like lipid metabolism. However, continuous blood pressure monitoring in this species remains challenging. The gold-standard technique (direct carotid catheterization) requires terminal procedures, and indirect methods (Doppler, oscillometric) show limited agreement with direct measurements. Furthermore, commercially available implantable telemetry platforms, while enabling real-time monitoring in freely moving animals, require costly surgical implantation, specialized proprietary hardware, and post-operative recovery periods that may confound early hemodynamic data. To address these limitations, this study presents a low-cost, customizable, and minimally invasive monitoring system utilizing a pressure transducer in the central auricular artery. The device integrates an ESP32 microcontroller with IoT technology for digital signal processing and seamless wireless data transmission to the ThingSpeak cloud platform. Unlike implantable telemetry, the proposed approach avoids surgical implantation and its associated costs and recovery time, while still enabling continuous, real-time hemodynamic tracking throughout the experimental period. A pilot evaluation against the BIOPAC MP100 reference (carotid artery) demonstrated relative errors of 1.60% for mean arterial pressure, 8.58% for systolic blood pressure, and 2.43% for diastolic blood pressure. By reducing invasiveness and enhancing remote data accessibility, this system provides a promising framework for the preclinical evaluation of antihypertensive agents and cardiovascular mechanisms, bridging the gap between edge computing and remote clinical diagnostics.},
}
RevDate: 2026-05-04
CmpDate: 2026-05-04
An Intelligent Micromachine Perception System for Elevator Fault Diagnosis.
Micromachines, 17(4): pii:mi17040401.
Elevator fault diagnosis heavily relies on high-precision sensing of microscopic physical states. Although Micro-Electro-Mechanical System (MEMS) sensors can capture such subtle features, they are constrained by high-frequency data streams, environmental noise, and the semantic gap between raw sensor data and actionable maintenance decisions. This study proposes a collaborative edge-cloud intelligent diagnosis framework specifically designed for elevator systems. On the edge side, a lightweight temporal Transformer model, ELiTe-Transformer, was designed and deployed on the Jetson platform. This model enhances sensitivity to event-driven MEMS signals through an industrial positional encoding mechanism and by integrating linear attention and INT8 quantization techniques, achieving a real-time inference latency of 21.4 ms. On the cloud side, retrieval-augmented generation (RAG) technology was adopted to integrate physical features extracted at the edge with domain knowledge, generating interpretable diagnostic reports. The experimental results show that the overall accuracy of the system reaches 96.0%. The edge-cloud collaborative framework improves the accuracy of complex fault diagnosis to 92.5%, and the adoption of RAG reduces the report hallucination rate by 71.4%. This work effectively addresses the bottlenecks of MEMS perception in elevator fault diagnosis, forming a closed loop from micro-signal acquisition to high-level decision support.
Additional Links: PMID-42076178
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42076178,
year = {2026},
author = {Lai, L and Ding, S and Li, Z and Luo, Z and Wang, H},
title = {An Intelligent Micromachine Perception System for Elevator Fault Diagnosis.},
journal = {Micromachines},
volume = {17},
number = {4},
pages = {},
doi = {10.3390/mi17040401},
pmid = {42076178},
issn = {2072-666X},
support = {No. 2025JD-1-05//Guangdong Institute of Special Equipment Inspection and Research/ ; },
abstract = {Elevator fault diagnosis heavily relies on high-precision sensing of microscopic physical states. Although Micro-Electro-Mechanical System (MEMS) sensors can capture such subtle features, they are constrained by high-frequency data streams, environmental noise, and the semantic gap between raw sensor data and actionable maintenance decisions. This study proposes a collaborative edge-cloud intelligent diagnosis framework specifically designed for elevator systems. On the edge side, a lightweight temporal Transformer model, ELiTe-Transformer, was designed and deployed on the Jetson platform. This model enhances sensitivity to event-driven MEMS signals through an industrial positional encoding mechanism and by integrating linear attention and INT8 quantization techniques, achieving a real-time inference latency of 21.4 ms. On the cloud side, retrieval-augmented generation (RAG) technology was adopted to integrate physical features extracted at the edge with domain knowledge, generating interpretable diagnostic reports. The experimental results show that the overall accuracy of the system reaches 96.0%. The edge-cloud collaborative framework improves the accuracy of complex fault diagnosis to 92.5%, and the adoption of RAG reduces the report hallucination rate by 71.4%. This work effectively addresses the bottlenecks of MEMS perception in elevator fault diagnosis, forming a closed loop from micro-signal acquisition to high-level decision support.},
}
RevDate: 2026-05-04
IFA-ICP: A Low-Complexity and Image Feature-Assisted Iterative Closest Point (ICP) Scheme for Odometry Estimation in SLAM, and Its FPGA-Based Hardware Accelerator Design.
Sensors (Basel, Switzerland), 26(8): pii:s26082326.
Odometry estimation, which calculates the trajectory of a moving object across timeframes, is a critical and time-consuming function in SLAM (Simultaneous Localization and Mapping) systems. Although LiDAR-based sensing is most popular for outdoor and long-range applications because of its ranging accuracy, the sparsity of laser point cloud poses a significant challenge to feature extraction and matching in odometry estimation. In this paper, we investigate odometry estimation from two aspects, i.e., algorithm optimization, and system design/implementation. In algorithm optimization, we present an image feature-assisted odometry estimation scheme that leverages the richness of image information captured by a companion camera to enhance the accuracy of laser point cloud matching. This also serves as a screening mechanism to reduce the matching size and lower the computing complexity for a higher estimation rate. In addition, various schemes, such as adaptive threshold in image feature point selection, principal component analysis (PCA)-based plane fitting for laser point interpolation, and Gauss-Newton optimization for calculating the transform matrix, are also employed to improve the accuracy of odometry estimation. The performance of improved odometry estimation is verified using an existing FLOAM (Fast Lidar Odometry and Mapping) framework. The KITTI dataset for autonomous vehicles with ground truth was used as the test bench. Simulation results indicate that the translation error and rotation error can be reduced by 16.6% and 1.3%, respectively. Computing complexity, measured as the software execution time, also reduced by 63%. In system implementation, a hardware/software (HW/SW) co-design strategy was adopted, where complexity profiling was first conducted to determine the task partitioning and time-consuming tasks are offloaded to a hardware accelerator. This facilitates real-time execution on a resource-constrained embedded platform consisting of a microprocessor module (Raspberry Pi) and an attached FPGA board (Pynq Z2). Efficient hardware designs for customized DSP functions (adaptive threshold and PCA) were developed in an FPGA capable of completing one data frame in 20ms. The final system implementation met the target throughput of 10 estimations per second, and can be scaled up further.
Additional Links: PMID-42076437
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42076437,
year = {2026},
author = {Li, JE and Hwang, YT},
title = {IFA-ICP: A Low-Complexity and Image Feature-Assisted Iterative Closest Point (ICP) Scheme for Odometry Estimation in SLAM, and Its FPGA-Based Hardware Accelerator Design.},
journal = {Sensors (Basel, Switzerland)},
volume = {26},
number = {8},
pages = {},
doi = {10.3390/s26082326},
pmid = {42076437},
issn = {1424-8220},
support = {112-2221-E-005-095//National Science and Technology Council, Taiwan/ ; },
abstract = {Odometry estimation, which calculates the trajectory of a moving object across timeframes, is a critical and time-consuming function in SLAM (Simultaneous Localization and Mapping) systems. Although LiDAR-based sensing is most popular for outdoor and long-range applications because of its ranging accuracy, the sparsity of laser point cloud poses a significant challenge to feature extraction and matching in odometry estimation. In this paper, we investigate odometry estimation from two aspects, i.e., algorithm optimization, and system design/implementation. In algorithm optimization, we present an image feature-assisted odometry estimation scheme that leverages the richness of image information captured by a companion camera to enhance the accuracy of laser point cloud matching. This also serves as a screening mechanism to reduce the matching size and lower the computing complexity for a higher estimation rate. In addition, various schemes, such as adaptive threshold in image feature point selection, principal component analysis (PCA)-based plane fitting for laser point interpolation, and Gauss-Newton optimization for calculating the transform matrix, are also employed to improve the accuracy of odometry estimation. The performance of improved odometry estimation is verified using an existing FLOAM (Fast Lidar Odometry and Mapping) framework. The KITTI dataset for autonomous vehicles with ground truth was used as the test bench. Simulation results indicate that the translation error and rotation error can be reduced by 16.6% and 1.3%, respectively. Computing complexity, measured as the software execution time, also reduced by 63%. In system implementation, a hardware/software (HW/SW) co-design strategy was adopted, where complexity profiling was first conducted to determine the task partitioning and time-consuming tasks are offloaded to a hardware accelerator. This facilitates real-time execution on a resource-constrained embedded platform consisting of a microprocessor module (Raspberry Pi) and an attached FPGA board (Pynq Z2). Efficient hardware designs for customized DSP functions (adaptive threshold and PCA) were developed in an FPGA capable of completing one data frame in 20ms. The final system implementation met the target throughput of 10 estimations per second, and can be scaled up further.},
}
RevDate: 2026-05-04
An Optical Method for the Rapid Measurement of Corrugated Plate Depth Based on Line Laser Sensor.
Sensors (Basel, Switzerland), 26(8): pii:s26082446.
This paper presents a non-contact depth detection method for corrugated heat exchanger plates, aiming to improve measurement efficiency and accuracy. The system integrates a line laser sensor with a precision linear guide rail, enabling continuous acquisition of high-resolution 2D surface profiles as the sensor moves along the plate. To reduce data redundancy while preserving geometric features, a multi-stage data reduction strategy is proposed. This strategy combines the angle-chord height criterion with spline-based filtering to identify key regions of curvature and eliminate unnecessary point cloud data. For depth extraction, a two-stage feature recognition algorithm is designed. First, a coarse analysis locates candidate peaks and valleys by identifying local extrema in the reduced 2D data. Then, a fine detection process is applied: local B-spline fitting is performed near each candidate point, and a binary search algorithm is used to accurately determine the spline extrema. By computing the vertical distance between precisely located peaks and valleys, the system rapidly extracts the corrugation depth parameters. This method achieves a high balance between speed and precision, offering a practical and reliable solution for automated surface morphology inspection in heat exchanger manufacturing.
Additional Links: PMID-42076557
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42076557,
year = {2026},
author = {Chen, J and Mao, X and Li, X and Zhou, Q and Huang, C and Wu, C},
title = {An Optical Method for the Rapid Measurement of Corrugated Plate Depth Based on Line Laser Sensor.},
journal = {Sensors (Basel, Switzerland)},
volume = {26},
number = {8},
pages = {},
doi = {10.3390/s26082446},
pmid = {42076557},
issn = {1424-8220},
support = {Nos. 52305535//The National Natural Science Foundation of China/ ; },
abstract = {This paper presents a non-contact depth detection method for corrugated heat exchanger plates, aiming to improve measurement efficiency and accuracy. The system integrates a line laser sensor with a precision linear guide rail, enabling continuous acquisition of high-resolution 2D surface profiles as the sensor moves along the plate. To reduce data redundancy while preserving geometric features, a multi-stage data reduction strategy is proposed. This strategy combines the angle-chord height criterion with spline-based filtering to identify key regions of curvature and eliminate unnecessary point cloud data. For depth extraction, a two-stage feature recognition algorithm is designed. First, a coarse analysis locates candidate peaks and valleys by identifying local extrema in the reduced 2D data. Then, a fine detection process is applied: local B-spline fitting is performed near each candidate point, and a binary search algorithm is used to accurately determine the spline extrema. By computing the vertical distance between precisely located peaks and valleys, the system rapidly extracts the corrugation depth parameters. This method achieves a high balance between speed and precision, offering a practical and reliable solution for automated surface morphology inspection in heat exchanger manufacturing.},
}
RevDate: 2026-05-04
Joint Service Chain Orchestration and Computation Offloading via GNN-Based QMIX in Industrial IoT.
Sensors (Basel, Switzerland), 26(8): pii:s26082559.
In IIoT edge computing, multi-edge server collaborative scheduling faces two core issues due to random task arrivals, heterogeneous resources, and complex topology: traditional model-driven methods cannot make dynamic decisions in dynamic environments, and conventional MARL fails to characterize inter-node topological dependencies and load correlations. To address this, this paper investigates the joint optimization of task offloading, computing resource allocation, and SFC orchestration in IIoT, constructs a cloud-edge-end collaborative architecture, and models the problem as a POMDP to minimize the overall system cost under multiple constraints. A graph-guided value-decomposition MARL method is proposed, which extracts spatial topology and neighborhood-load features of edge nodes via a GNN and combines them with the QMIX framework to realize multi-agent centralized training and distributed execution. Simulations show that the algorithm converges stably under different server scales and task loads, significantly outperforms benchmark algorithms, and can suppress performance degradation in high-load scenarios, demonstrating its robustness and scalability in complex industrial environments.
Additional Links: PMID-42076668
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42076668,
year = {2026},
author = {Huang, X and Tian, B},
title = {Joint Service Chain Orchestration and Computation Offloading via GNN-Based QMIX in Industrial IoT.},
journal = {Sensors (Basel, Switzerland)},
volume = {26},
number = {8},
pages = {},
doi = {10.3390/s26082559},
pmid = {42076668},
issn = {1424-8220},
support = {N/A//China Mobile Research Institute/ ; },
abstract = {In IIoT edge computing, multi-edge server collaborative scheduling faces two core issues due to random task arrivals, heterogeneous resources, and complex topology: traditional model-driven methods cannot make dynamic decisions in dynamic environments, and conventional MARL fails to characterize inter-node topological dependencies and load correlations. To address this, this paper investigates the joint optimization of task offloading, computing resource allocation, and SFC orchestration in IIoT, constructs a cloud-edge-end collaborative architecture, and models the problem as a POMDP to minimize the overall system cost under multiple constraints. A graph-guided value-decomposition MARL method is proposed, which extracts spatial topology and neighborhood-load features of edge nodes via a GNN and combines them with the QMIX framework to realize multi-agent centralized training and distributed execution. Simulations show that the algorithm converges stably under different server scales and task loads, significantly outperforms benchmark algorithms, and can suppress performance degradation in high-load scenarios, demonstrating its robustness and scalability in complex industrial environments.},
}
RevDate: 2026-05-04
CmpDate: 2026-05-04
From Spreadsheet To Prediction Tool: A Practical Artificial Intelligence Guide For Urologists.
Cureus, 18(5):e108082.
Artificial intelligence (AI) and machine learning (ML) are transforming urological practice; however, most clinicians lack the technical background required to develop, evaluate, or critically appraise predictive models. Existing resources are often written by data scientists for a technical audience, highlighting the need for a practical, clinician-oriented framework that enables urologists to build and deploy meaningful AI tools using data they already possess. Following an overview of the AI landscape in urology, we present a structured nine-part framework that includes clinical data appraisal; data cleaning and variable engineering; model selection (e.g., logistic regression, Random Forest, Extreme Gradient Boosting (XGBoost), and Cox regression); train-test splitting; cross-validation; performance evaluation (including area under the curve (AUC), calibration, and decision curve analysis); AI-assisted coding using platforms such as Google Colab and large language models (LLMs); web application deployment (e.g., Hugging Face, Gradio, GitHub, Render, and Google Cloud); manuscript preparation aligned with Transparent Reporting of a Multivariable Prediction Model for Individual Prognosis or Diagnosis-Artificial Intelligence (TRIPOD-AI) reporting standards; and ethical considerations for responsible AI deployment. Each component is illustrated with real-world examples and supported by validated prompt templates. Applying this framework to a high-risk prostate cancer cohort, the lead author, without prior programming experience, successfully developed and publicly deployed a validated multi-outcome prediction tool within 72 hours using entirely free, open-source infrastructure. AI-based clinical prediction tools are increasingly accessible to urologists with structured datasets and a systematic approach. This guide aims to democratize AI model development by enabling clinicians to extract actionable insights from existing data, build validated tools, and contribute meaningfully to the evolving landscape of AI-driven urological care, without the need to write code from scratch.
Additional Links: PMID-42078152
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42078152,
year = {2026},
author = {Joshi, A and Adhikari, K and Taori, R and Krishnappa, D and Jain, A and Chelliah, L and Fatima, L and Krishnappa, R},
title = {From Spreadsheet To Prediction Tool: A Practical Artificial Intelligence Guide For Urologists.},
journal = {Cureus},
volume = {18},
number = {5},
pages = {e108082},
pmid = {42078152},
issn = {2168-8184},
abstract = {Artificial intelligence (AI) and machine learning (ML) are transforming urological practice; however, most clinicians lack the technical background required to develop, evaluate, or critically appraise predictive models. Existing resources are often written by data scientists for a technical audience, highlighting the need for a practical, clinician-oriented framework that enables urologists to build and deploy meaningful AI tools using data they already possess. Following an overview of the AI landscape in urology, we present a structured nine-part framework that includes clinical data appraisal; data cleaning and variable engineering; model selection (e.g., logistic regression, Random Forest, Extreme Gradient Boosting (XGBoost), and Cox regression); train-test splitting; cross-validation; performance evaluation (including area under the curve (AUC), calibration, and decision curve analysis); AI-assisted coding using platforms such as Google Colab and large language models (LLMs); web application deployment (e.g., Hugging Face, Gradio, GitHub, Render, and Google Cloud); manuscript preparation aligned with Transparent Reporting of a Multivariable Prediction Model for Individual Prognosis or Diagnosis-Artificial Intelligence (TRIPOD-AI) reporting standards; and ethical considerations for responsible AI deployment. Each component is illustrated with real-world examples and supported by validated prompt templates. Applying this framework to a high-risk prostate cancer cohort, the lead author, without prior programming experience, successfully developed and publicly deployed a validated multi-outcome prediction tool within 72 hours using entirely free, open-source infrastructure. AI-based clinical prediction tools are increasingly accessible to urologists with structured datasets and a systematic approach. This guide aims to democratize AI model development by enabling clinicians to extract actionable insights from existing data, build validated tools, and contribute meaningfully to the evolving landscape of AI-driven urological care, without the need to write code from scratch.},
}
RevDate: 2026-05-02
Secured framework for IoT based healthcare application.
Scientific reports pii:10.1038/s41598-026-51036-6 [Epub ahead of print].
The Internet of Things (IoT) allows continuous health monitoring through the interconnection of wearable and medical devices with computing and storage infrastructures. As cyber threats grow and the sensitivity of healthcare information increases, data integrity, privacy, and access control become critical concerns in digital healthcare environments. This paper proposes a secure IoT-based healthcare framework that integrates machine learning and blockchain techniques for data protection and intelligent health risk assessment.The proposed framework uses cryptographic hashing, Merkle tree construction, digital signatures, and a threshold-based blockchain validation mechanism to enhance the integrity and secure handling of healthcare data in a permissioned simulation environment. The blockchain validation mechanism is evaluated through simulated tampering, replay, and high-load scenarios to assess the integrity verification capability of the proposed framework.Various machine learning models are trained and evaluated on medical datasets to predict disease risk, and their performance is measured using accuracy, precision, recall, and F1-score metrics. The framework is implemented in Python and deployed in a scalable cloud-based environment. Experimental results demonstrate that the proposed framework improves healthcare data integrity verification and supports reliable predictive performance for secure digital healthcare applications.
Additional Links: PMID-42069783
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42069783,
year = {2026},
author = {Nagavel, V and Bhuvaneswari, PTV and Ramesh, P and Tamaraiselvi, K},
title = {Secured framework for IoT based healthcare application.},
journal = {Scientific reports},
volume = {},
number = {},
pages = {},
doi = {10.1038/s41598-026-51036-6},
pmid = {42069783},
issn = {2045-2322},
abstract = {The Internet of Things (IoT) allows continuous health monitoring through the interconnection of wearable and medical devices with computing and storage infrastructures. As cyber threats grow and the sensitivity of healthcare information increases, data integrity, privacy, and access control become critical concerns in digital healthcare environments. This paper proposes a secure IoT-based healthcare framework that integrates machine learning and blockchain techniques for data protection and intelligent health risk assessment.The proposed framework uses cryptographic hashing, Merkle tree construction, digital signatures, and a threshold-based blockchain validation mechanism to enhance the integrity and secure handling of healthcare data in a permissioned simulation environment. The blockchain validation mechanism is evaluated through simulated tampering, replay, and high-load scenarios to assess the integrity verification capability of the proposed framework.Various machine learning models are trained and evaluated on medical datasets to predict disease risk, and their performance is measured using accuracy, precision, recall, and F1-score metrics. The framework is implemented in Python and deployed in a scalable cloud-based environment. Experimental results demonstrate that the proposed framework improves healthcare data integrity verification and supports reliable predictive performance for secure digital healthcare applications.},
}
RevDate: 2026-05-02
OncoPT: long-context transformer models for in hospital tumor phenotype extraction from pathology reports.
NPJ digital medicine pii:10.1038/s41746-026-02630-5 [Epub ahead of print].
Despite recent advances in medical informatics, extracting tumor information from pathology reports remains a challenge in modern cancer registry and surveillance workflows. These documents often have an unstructured format, complex medical content, and a considerably lengthy context, creating significant challenges for automated phenotypic information extraction. Although some recent language models such as BERT, GatorTron, and GPT-4 have demonstrated efficacy in medical applications, they are either constrained by sequence length limitations or cloud-based computing that violates the handling of protected health information. We introduce two oncology pathology-optimized transformer models OncoPT, based on Longformer and BigBird architectures and trained on real-world pathology reports. OncoPT efficiently processes reports up to 4,096 tokens, making it suitable for hospitals' onsite deployment with limited resources. We apply OncoPT to a common malignancy (exemplified by breast cancer) and a rare malignancy (exemplified by gastric cancer), across five key tumor phenotypes: Subsite, Histology, Grade, Stage, and Laterality. The results demonstrate that OncoPT achieves state-of-the-art weighted F-1 on a private pathology dataset and surpasses commercial chatbots (ChatGPT 4o and o1) on the public CORAL dataset (up to 30% improvement). These findings highlight the robustness of OncoPT models with the added benefit of preserving the privacy of patient health information.
Additional Links: PMID-42069805
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42069805,
year = {2026},
author = {Duong, T and Le, D and Williams, V and Stewart, S and Zhao, Y and Zitu, M and El Naqa, I and Rollison, D and Thieu, T},
title = {OncoPT: long-context transformer models for in hospital tumor phenotype extraction from pathology reports.},
journal = {NPJ digital medicine},
volume = {},
number = {},
pages = {},
doi = {10.1038/s41746-026-02630-5},
pmid = {42069805},
issn = {2398-6352},
support = {P30 CA076292-25S4/NH/NIH HHS/United States ; P30 CA076292-25S4/NH/NIH HHS/United States ; P30 CA076292-25S4/NH/NIH HHS/United States ; P30 CA076292-25S4/NH/NIH HHS/United States ; },
abstract = {Despite recent advances in medical informatics, extracting tumor information from pathology reports remains a challenge in modern cancer registry and surveillance workflows. These documents often have an unstructured format, complex medical content, and a considerably lengthy context, creating significant challenges for automated phenotypic information extraction. Although some recent language models such as BERT, GatorTron, and GPT-4 have demonstrated efficacy in medical applications, they are either constrained by sequence length limitations or cloud-based computing that violates the handling of protected health information. We introduce two oncology pathology-optimized transformer models OncoPT, based on Longformer and BigBird architectures and trained on real-world pathology reports. OncoPT efficiently processes reports up to 4,096 tokens, making it suitable for hospitals' onsite deployment with limited resources. We apply OncoPT to a common malignancy (exemplified by breast cancer) and a rare malignancy (exemplified by gastric cancer), across five key tumor phenotypes: Subsite, Histology, Grade, Stage, and Laterality. The results demonstrate that OncoPT achieves state-of-the-art weighted F-1 on a private pathology dataset and surpasses commercial chatbots (ChatGPT 4o and o1) on the public CORAL dataset (up to 30% improvement). These findings highlight the robustness of OncoPT models with the added benefit of preserving the privacy of patient health information.},
}
RevDate: 2026-05-03
Advanced security in fog environments using encryption and adaptive user activity tracking.
Scientific reports pii:10.1038/s41598-026-51379-0 [Epub ahead of print].
The use of fog computing is on the rise, adding new dimensions to security and, more specifically, to data protection in fog cloud environments. Storing fog-computing data increases the likelihood of data exploitation when it is uploaded to fog-computing storage. In this paper, Adaptable User Activity Tracking (ASUT) is introduced, integrating AES-256, SHA-512, and user activity tracking (UAT). The need to integrate activity monitoring into the ASUT to collect statistical information on user actions has been stated. The file uploaded to the fog computing storage is encrypted using a 256-bit AES key. Then, this key is hashed with SHA-512 and stored in the fog cloud. The AES expansion is used to decrypt the data, while the SHA-512 hash of the AES key is used to verify that the user-provided key matches the original before decryption proceeds-the hash is irreversible, and the original key is never stored in plaintext. The user must know the initial key to access the file further. When the client re-enters the fog, the algorithm compares the hashes of the two: the initial and the second entry keys. In parallel, the fog cloud broadcasts the user's actions to track any abnormal activity on the account. This mechanism helps mitigate risks of unauthorized data access and suggests ways to improve user protection. The proposed ASUT is designed using Python and PHP. Experimental results show that ASUT achieves 43.39% faster encryption, 66% faster decryption, and 19.86% higher throughput compared to the best-performing competing method, indicating improved computational efficiency and practical feasibility under the evaluated conditions.
Additional Links: PMID-42071035
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42071035,
year = {2026},
author = {Rai, HM and Razaque, A and Agarwal, N and Agarwal, S and Abdallah, HA and Kant, S},
title = {Advanced security in fog environments using encryption and adaptive user activity tracking.},
journal = {Scientific reports},
volume = {},
number = {},
pages = {},
doi = {10.1038/s41598-026-51379-0},
pmid = {42071035},
issn = {2045-2322},
abstract = {The use of fog computing is on the rise, adding new dimensions to security and, more specifically, to data protection in fog cloud environments. Storing fog-computing data increases the likelihood of data exploitation when it is uploaded to fog-computing storage. In this paper, Adaptable User Activity Tracking (ASUT) is introduced, integrating AES-256, SHA-512, and user activity tracking (UAT). The need to integrate activity monitoring into the ASUT to collect statistical information on user actions has been stated. The file uploaded to the fog computing storage is encrypted using a 256-bit AES key. Then, this key is hashed with SHA-512 and stored in the fog cloud. The AES expansion is used to decrypt the data, while the SHA-512 hash of the AES key is used to verify that the user-provided key matches the original before decryption proceeds-the hash is irreversible, and the original key is never stored in plaintext. The user must know the initial key to access the file further. When the client re-enters the fog, the algorithm compares the hashes of the two: the initial and the second entry keys. In parallel, the fog cloud broadcasts the user's actions to track any abnormal activity on the account. This mechanism helps mitigate risks of unauthorized data access and suggests ways to improve user protection. The proposed ASUT is designed using Python and PHP. Experimental results show that ASUT achieves 43.39% faster encryption, 66% faster decryption, and 19.86% higher throughput compared to the best-performing competing method, indicating improved computational efficiency and practical feasibility under the evaluated conditions.},
}
RevDate: 2026-04-30
On-device artificial intelligence agent based on language models for electrochemical water desalination.
Water research, 301:125995 pii:S0043-1354(26)00676-7 [Epub ahead of print].
Electrochemical water treatment is essential for tackling global water scarcity but remains difficult to optimize due to limited expertise and computing resources at many treatment facilities. Here, we introduce an intelligent on-device platform that combines electrochemical process knowledge with large language models deployed directly on edge devices such as Raspberry Pi. This system integrates theoretical understanding with real-time optimization, eliminating the need for cloud connectivity while ensuring data privacy and accessibility. Tested against 320 published studies, it achieves a 60 % reduction in hallucination rates and maintains high predictive accuracy (R[2] > 0.80) for key variables such as effluent concentration and energy, even with incomplete sensor inputs. Notably, prediction accuracy for challenging parameters, such as the applied current (the driving force for electrochemical water desalination), improves from 0.03 to 0.63. By bringing intelligence to the data rather than sending it to the cloud, this approach makes advanced water-treatment intelligence feasible in resource-limited, data-imperfect, decentralized environments where physics-based models cannot be deployed.
Additional Links: PMID-42060995
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42060995,
year = {2026},
author = {Ullah, Z and Kim, HH and Son, M},
title = {On-device artificial intelligence agent based on language models for electrochemical water desalination.},
journal = {Water research},
volume = {301},
number = {},
pages = {125995},
doi = {10.1016/j.watres.2026.125995},
pmid = {42060995},
issn = {1879-2448},
abstract = {Electrochemical water treatment is essential for tackling global water scarcity but remains difficult to optimize due to limited expertise and computing resources at many treatment facilities. Here, we introduce an intelligent on-device platform that combines electrochemical process knowledge with large language models deployed directly on edge devices such as Raspberry Pi. This system integrates theoretical understanding with real-time optimization, eliminating the need for cloud connectivity while ensuring data privacy and accessibility. Tested against 320 published studies, it achieves a 60 % reduction in hallucination rates and maintains high predictive accuracy (R[2] > 0.80) for key variables such as effluent concentration and energy, even with incomplete sensor inputs. Notably, prediction accuracy for challenging parameters, such as the applied current (the driving force for electrochemical water desalination), improves from 0.03 to 0.63. By bringing intelligence to the data rather than sending it to the cloud, this approach makes advanced water-treatment intelligence feasible in resource-limited, data-imperfect, decentralized environments where physics-based models cannot be deployed.},
}
RevDate: 2026-04-30
CmpDate: 2026-04-30
Simulated Workflow Feasibility Evaluation of a Web-Based Periorbital Measurement Platform: Development and Usability Study.
JMIR human factors, 13:e82859 pii:v13i1e82859.
BACKGROUND: Periorbital measurements such as margin to reflex distances, palpebral fissure height, and scleral show are critical in diagnosing and managing conditions like ptosis and disorders of the eyelid. However, deployment of automated periorbital measurement algorithms in structured research workflows remains limited by the lack of integrated capture and data management infrastructure.
OBJECTIVE: We developed and evaluated Glorbit, a lightweight, browser-based application for automated periorbital distance measurement using artificial intelligence (AI). The objective was to evaluate end-to-end workflow feasibility of the platform under simulated, operator-run conditions.
METHODS: The application integrates a DeepLabV3 segmentation model into a modular image processing pipeline with secure, site-specific Google Cloud storage, supporting local preprocessing and cloud upload through Firebase-authenticated logins. The full workflow-metadata entry, facial image capture, segmentation, and upload-was tested. After the session, the participants completed a Likert-style survey.
RESULTS: Glorbit successfully ran on all tested platforms, including laptops, tablets, and mobile phones across major browsers. A total of 15 volunteers were enrolled in this study in which the app completed predefined workflow steps in all simulated, operator-run sessions. The segmentation model produced outputs on all images, and the average session duration was 101.7 (SD 17.5) seconds. Simulated experience scores on a 5-point Likert scale were uniformly high.
CONCLUSIONS: Glorbit is a cross-platform application that supports structured periorbital image capture and automated inference within a unified workflow. In simulated, operator-run testing, the platform demonstrated successful execution of predefined workflow steps across devices. These findings support the technical feasibility of the system as a research-oriented data collection framework and may inform future evaluations in broader research settings.
Additional Links: PMID-42061843
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42061843,
year = {2026},
author = {Nahass, GR and Ende, JV and Hubschman, S and Beltran, B and Kolli, B and Berek, C and Edmonds, JD and Chan, RVP and Setabutr, P and Larrick, JW and Yi, D and Tran, AQ},
title = {Simulated Workflow Feasibility Evaluation of a Web-Based Periorbital Measurement Platform: Development and Usability Study.},
journal = {JMIR human factors},
volume = {13},
number = {},
pages = {e82859},
doi = {10.2196/82859},
pmid = {42061843},
issn = {2292-9495},
mesh = {Humans ; *Workflow ; Feasibility Studies ; *Artificial Intelligence ; *Image Processing, Computer-Assisted/methods ; *Internet ; Adult ; *Mobile Applications ; },
abstract = {BACKGROUND: Periorbital measurements such as margin to reflex distances, palpebral fissure height, and scleral show are critical in diagnosing and managing conditions like ptosis and disorders of the eyelid. However, deployment of automated periorbital measurement algorithms in structured research workflows remains limited by the lack of integrated capture and data management infrastructure.
OBJECTIVE: We developed and evaluated Glorbit, a lightweight, browser-based application for automated periorbital distance measurement using artificial intelligence (AI). The objective was to evaluate end-to-end workflow feasibility of the platform under simulated, operator-run conditions.
METHODS: The application integrates a DeepLabV3 segmentation model into a modular image processing pipeline with secure, site-specific Google Cloud storage, supporting local preprocessing and cloud upload through Firebase-authenticated logins. The full workflow-metadata entry, facial image capture, segmentation, and upload-was tested. After the session, the participants completed a Likert-style survey.
RESULTS: Glorbit successfully ran on all tested platforms, including laptops, tablets, and mobile phones across major browsers. A total of 15 volunteers were enrolled in this study in which the app completed predefined workflow steps in all simulated, operator-run sessions. The segmentation model produced outputs on all images, and the average session duration was 101.7 (SD 17.5) seconds. Simulated experience scores on a 5-point Likert scale were uniformly high.
CONCLUSIONS: Glorbit is a cross-platform application that supports structured periorbital image capture and automated inference within a unified workflow. In simulated, operator-run testing, the platform demonstrated successful execution of predefined workflow steps across devices. These findings support the technical feasibility of the system as a research-oriented data collection framework and may inform future evaluations in broader research settings.},
}
MeSH Terms:
show MeSH Terms
hide MeSH Terms
Humans
*Workflow
Feasibility Studies
*Artificial Intelligence
*Image Processing, Computer-Assisted/methods
*Internet
Adult
*Mobile Applications
RevDate: 2026-04-30
Microinterventional in-sensor computing system for real-time metabolic health assessment.
Nature communications pii:10.1038/s41467-026-72520-7 [Epub ahead of print].
Microneedle biosensors enable dynamic monitoring of interstitial fluid biomarkers, but remain constrained by sensing interface susceptibility to motion artifacts and the prohibitive energy consumption of wireless cloud-based processing. Here, we report a bio-inspired, self-anchoring microinterventional in-sensor computing system. By leveraging a starfish-inspired suction cup-microneedle self-anchoring mechanism, the system effectively counteracts microneedle extrusion, attenuating signal fluctuations by 38-fold and enhancing signal intensity by up to 5.49-fold compared to conventional planar devices. Crucially, the high-fidelity data acquisition reduces the computational burden, enabling the deployment of a lightweight algorithm (43 KB) on a coin-sized embedded circuit, achieving 98.68% diagnostic accuracy and a 120-h battery life via local closed-loop feedback. Validation in a porcine model confirmed the system's capability to capture continuous biochemical dynamics. This co-design of a robust biomimetic interface and lightweight deep learning paves the way for next-generation wearables capable of performing high-fidelity, on-chip metabolic risk stratification in dynamic daily settings.
Additional Links: PMID-42062300
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42062300,
year = {2026},
author = {Fan, P and Zhang, H and Su, X and Yang, X and Liu, Y and Pan, S and Li, X and Ying, Y and Pan, Y and Ping, J},
title = {Microinterventional in-sensor computing system for real-time metabolic health assessment.},
journal = {Nature communications},
volume = {},
number = {},
pages = {},
doi = {10.1038/s41467-026-72520-7},
pmid = {42062300},
issn = {2041-1723},
abstract = {Microneedle biosensors enable dynamic monitoring of interstitial fluid biomarkers, but remain constrained by sensing interface susceptibility to motion artifacts and the prohibitive energy consumption of wireless cloud-based processing. Here, we report a bio-inspired, self-anchoring microinterventional in-sensor computing system. By leveraging a starfish-inspired suction cup-microneedle self-anchoring mechanism, the system effectively counteracts microneedle extrusion, attenuating signal fluctuations by 38-fold and enhancing signal intensity by up to 5.49-fold compared to conventional planar devices. Crucially, the high-fidelity data acquisition reduces the computational burden, enabling the deployment of a lightweight algorithm (43 KB) on a coin-sized embedded circuit, achieving 98.68% diagnostic accuracy and a 120-h battery life via local closed-loop feedback. Validation in a porcine model confirmed the system's capability to capture continuous biochemical dynamics. This co-design of a robust biomimetic interface and lightweight deep learning paves the way for next-generation wearables capable of performing high-fidelity, on-chip metabolic risk stratification in dynamic daily settings.},
}
RevDate: 2026-04-29
CmpDate: 2026-04-29
Distribution-preserved sampling (DPS) for smarter machine learning assisted ultra-large-scale virtual screening.
RSC advances, 16(24):21855-21866.
Ultra-large-scale structure-based virtual screening (SBVS) for identifying novel bioactive compounds poses significant computational challenges. These challenges arise from the size of available chemical libraries, which can contain billions of molecules that require exhaustive docking and scoring, placing prohibitive demands on CPU/GPU resources. Small- and mid-sized laboratories often lack access to the high-performance computing clusters or cloud resources necessary to process such workloads in a timely manner. Furthermore, managing and analyzing the resulting terabytes of docking data requires robust data-handling pipelines and expertise that are not universally accessible. Here, we present a data-driven drug development pipeline that leverages a subset of molecules from a database with a common scaffold, reducing the chemical search space by tens to hundreds of orders of magnitude. In this case, the common scaffold that is the key to allowing this reduction is the 2-phenylthiazole moiety, identified through NMR fragment screening. We started with a subset of over 400 000 drug-sized 2-phenylthiazole-containing molecules selected from the zinc database and trained a random forest regression model on about 1% of this data to predict binding scores for the entire library. For this purpose, we used a distribution-preserving sampling approach based on KMeans clustering and binning, and we evaluated its statistical fidelity using KS, Wasserstein, JS, and KL divergence metrics. Our approach preserved the distribution of docking scores, demonstrating the utility of data-driven strategies for scalable virtual screening and establishing a benchmark dataset for machine learning in drug discovery.
Additional Links: PMID-42052188
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42052188,
year = {2026},
author = {Trachtenberg, A and Spelkov, A and Akabayov, B},
title = {Distribution-preserved sampling (DPS) for smarter machine learning assisted ultra-large-scale virtual screening.},
journal = {RSC advances},
volume = {16},
number = {24},
pages = {21855-21866},
pmid = {42052188},
issn = {2046-2069},
abstract = {Ultra-large-scale structure-based virtual screening (SBVS) for identifying novel bioactive compounds poses significant computational challenges. These challenges arise from the size of available chemical libraries, which can contain billions of molecules that require exhaustive docking and scoring, placing prohibitive demands on CPU/GPU resources. Small- and mid-sized laboratories often lack access to the high-performance computing clusters or cloud resources necessary to process such workloads in a timely manner. Furthermore, managing and analyzing the resulting terabytes of docking data requires robust data-handling pipelines and expertise that are not universally accessible. Here, we present a data-driven drug development pipeline that leverages a subset of molecules from a database with a common scaffold, reducing the chemical search space by tens to hundreds of orders of magnitude. In this case, the common scaffold that is the key to allowing this reduction is the 2-phenylthiazole moiety, identified through NMR fragment screening. We started with a subset of over 400 000 drug-sized 2-phenylthiazole-containing molecules selected from the zinc database and trained a random forest regression model on about 1% of this data to predict binding scores for the entire library. For this purpose, we used a distribution-preserving sampling approach based on KMeans clustering and binning, and we evaluated its statistical fidelity using KS, Wasserstein, JS, and KL divergence metrics. Our approach preserved the distribution of docking scores, demonstrating the utility of data-driven strategies for scalable virtual screening and establishing a benchmark dataset for machine learning in drug discovery.},
}
RevDate: 2026-04-29
On cloud microfluidic experiment platform powered by in situ maskless lithography.
Lab on a chip [Epub ahead of print].
Microfluidics has seen rapid growth across research and development, offering significant potential for scientific, engineering, and commercial applications. Yet, current teaching methodologies often lack a hands-on, problem-based learning approach, limiting students' practical experience. Researchers in low-resource regions also face barriers to accessing comprehensive microfluidic setups. Addressing this gap, we introduce a cloud-based platform for microfluidic experiments that integrates in situ polymerization, advanced fluid flow control, high-speed imaging, and edge computing. This first-of-its-kind platform allows users to fabricate high-resolution microfluidic devices and conduct experiments remotely through a web interface, expanding access for researchers, educators, and students. It features an image-assisted in situ polymerization process that enables easy pattern generation from uploaded images or CAD files, alongside robust computational resources for data processing, analysis, and machine learning applications. We demonstrate the platform in an educational setting through a Biological Fluid Mechanics course project and in research through experiments on organoid mechanical stretching. This work marks a milestone in democratizing access to microfluidic technology and advancing experimental capabilities in research and education.
Additional Links: PMID-42052730
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42052730,
year = {2026},
author = {Paul, R and Coster, D and Zhao, Y and Liu, Y and Liu, Y},
title = {On cloud microfluidic experiment platform powered by in situ maskless lithography.},
journal = {Lab on a chip},
volume = {},
number = {},
pages = {},
doi = {10.1039/d6lc00035e},
pmid = {42052730},
issn = {1473-0189},
abstract = {Microfluidics has seen rapid growth across research and development, offering significant potential for scientific, engineering, and commercial applications. Yet, current teaching methodologies often lack a hands-on, problem-based learning approach, limiting students' practical experience. Researchers in low-resource regions also face barriers to accessing comprehensive microfluidic setups. Addressing this gap, we introduce a cloud-based platform for microfluidic experiments that integrates in situ polymerization, advanced fluid flow control, high-speed imaging, and edge computing. This first-of-its-kind platform allows users to fabricate high-resolution microfluidic devices and conduct experiments remotely through a web interface, expanding access for researchers, educators, and students. It features an image-assisted in situ polymerization process that enables easy pattern generation from uploaded images or CAD files, alongside robust computational resources for data processing, analysis, and machine learning applications. We demonstrate the platform in an educational setting through a Biological Fluid Mechanics course project and in research through experiments on organoid mechanical stretching. This work marks a milestone in democratizing access to microfluidic technology and advancing experimental capabilities in research and education.},
}
RevDate: 2026-04-29
A review of the State-of-the-Art: progress in ultrasonic and acoustic techniques for quality assessment in the development and manufacturing of oral solid dosage forms - Part II: Applications and emerging directions.
International journal of pharmaceutics pii:S0378-5173(26)00373-X [Epub ahead of print].
This review is presented in two parts: Part I addresses the theoretical foundations and principles of ultrasonic and acoustic techniques, while Part II-presented here-focuses on their practical applications and emerging directions in advanced pharmaceutical tablet manufacturing. Building on the concepts established in Part I, this article (Part II) surveys real-world use cases and forward-looking innovations, highlighting how ultrasonic techniques enable rapid, non-destructive evaluation of Critical Quality Attributes (CQAs), including dissolution performance, tensile strength, porosity, friability, coating thickness, and subsurface defects. These methods are shown to align with United States Pharmacopeia (USP) reference tests and support regulatory frameworks and initiatives, including Process Analytical Technology (PAT), Quality by Design (QbD), Continuous Manufacturing (CM), and Real-Time Release Testing (RTRT). Illustrative case studies from both industry and academia demonstrate the integration of ultrasonic tools into advanced manufacturing ecosystems. Key developments include the use of 3D printing for Oral Solid Dosage (OSD) forms, ML-driven quality analytics, cyber-physical systems for closed-loop control, and cloud-based Manufacturing Execution Systems (MES) secured by public blockchain and cloud computing infrastructure. Despite these advances, challenges persist-such as multi-scale material complexity, signal degradation from material irregularities, and the need for robust multimodal data integration-which necessitate the use of sophisticated software and ML-based predictive modeling. Looking ahead, the convergence of wave sensing, robotics, industrial IoT, and digital twin technology is poised to transform pharmaceutical manufacturing into a highly automated, data-centric enterprise. This transformation promises not only to advance RTRT and CM but also to deliver unprecedented levels of quality, traceability, efficiency, and agility across the tablet formulation, design, and production lifecycle.
Additional Links: PMID-42055149
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42055149,
year = {2026},
author = {Çetinkaya, Ç and Bazzocchi, M and Dave, VS and Halkude, B and Hussain, AS and Prasad Vallabha, CK and Razavi, SM and Stephens, J and Steiner, R and Sultan, T and Sun, CC and Tantuccio, AS and Tajarobi, P and Ündey, C and Wikström, H and Xu, X},
title = {A review of the State-of-the-Art: progress in ultrasonic and acoustic techniques for quality assessment in the development and manufacturing of oral solid dosage forms - Part II: Applications and emerging directions.},
journal = {International journal of pharmaceutics},
volume = {},
number = {},
pages = {126925},
doi = {10.1016/j.ijpharm.2026.126925},
pmid = {42055149},
issn = {1873-3476},
abstract = {This review is presented in two parts: Part I addresses the theoretical foundations and principles of ultrasonic and acoustic techniques, while Part II-presented here-focuses on their practical applications and emerging directions in advanced pharmaceutical tablet manufacturing. Building on the concepts established in Part I, this article (Part II) surveys real-world use cases and forward-looking innovations, highlighting how ultrasonic techniques enable rapid, non-destructive evaluation of Critical Quality Attributes (CQAs), including dissolution performance, tensile strength, porosity, friability, coating thickness, and subsurface defects. These methods are shown to align with United States Pharmacopeia (USP) reference tests and support regulatory frameworks and initiatives, including Process Analytical Technology (PAT), Quality by Design (QbD), Continuous Manufacturing (CM), and Real-Time Release Testing (RTRT). Illustrative case studies from both industry and academia demonstrate the integration of ultrasonic tools into advanced manufacturing ecosystems. Key developments include the use of 3D printing for Oral Solid Dosage (OSD) forms, ML-driven quality analytics, cyber-physical systems for closed-loop control, and cloud-based Manufacturing Execution Systems (MES) secured by public blockchain and cloud computing infrastructure. Despite these advances, challenges persist-such as multi-scale material complexity, signal degradation from material irregularities, and the need for robust multimodal data integration-which necessitate the use of sophisticated software and ML-based predictive modeling. Looking ahead, the convergence of wave sensing, robotics, industrial IoT, and digital twin technology is poised to transform pharmaceutical manufacturing into a highly automated, data-centric enterprise. This transformation promises not only to advance RTRT and CM but also to deliver unprecedented levels of quality, traceability, efficiency, and agility across the tablet formulation, design, and production lifecycle.},
}
RevDate: 2026-04-28
CmpDate: 2026-04-28
How digital transformation in "diverse directions" activates enterprise total factor productivity: A mechanism study based on dynamic capability reconfiguration.
PloS one, 21(4):e0347212 pii:PONE-D-25-41246.
Digital transformation is a key force driving high-quality economic development, yet the economic consequences of different digital technology directions vary significantly. Existing research often treats it as a homogeneous whole, overlooking the "diverse direction" characteristics of technologies, making it difficult to explain the "productivity paradox." From the perspective of dynamic capability reconstruction, this paper constructs a theoretical model of "Digital 'Diverse Direction' Transformation-Dynamic Capability-Total Factor Productivity (TFP)." Using the LDA topic model to conduct semantic analysis on the annual reports of A-share listed companies, we categorize digital transformation into five directions: Artificial Intelligence (AI), Big Data, Cloud Computing, Blockchain, and Digital Technology Application. We empirically test their differentiated impacts on enterprise TFP and the underlying mechanisms. The findings are as follows: First, while digital transformation overall significantly promotes enterprise TFP, there is significant "technological heterogeneity" among different directions. AI has the strongest promoting effect, followed by Big Data and Digital Technology Application, whereas the impacts of Cloud Computing and Blockchain are not yet significant. This provides micro-evidence for explaining the "productivity paradox." Second, mechanism tests indicate that dynamic capability reconstruction is the key transmission path; digital transformation enhances TFP by strengthening organizational coordination and integration capabilities, change and reconstruction capabilities, and learning and absorption capabilities. Third, heterogeneity analysis reveals that digital transformation exerts a more pronounced effect on enhancing productivity in labor-intensive and technology-intensive industries, as well as in the manufacturing sector. These conclusions deepen the theoretical understanding of the economic consequences of digital transformation and provide empirical evidence and decision-making references for enterprises to choose adaptable and differentiated transformation paths.
Additional Links: PMID-42048396
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42048396,
year = {2026},
author = {Song, P and Li, J and Wu, N},
title = {How digital transformation in "diverse directions" activates enterprise total factor productivity: A mechanism study based on dynamic capability reconfiguration.},
journal = {PloS one},
volume = {21},
number = {4},
pages = {e0347212},
doi = {10.1371/journal.pone.0347212},
pmid = {42048396},
issn = {1932-6203},
mesh = {Artificial Intelligence ; *Digital Technology/economics ; Cloud Computing ; Humans ; Blockchain ; *Efficiency ; Big Data ; Models, Theoretical ; Economic Development ; },
abstract = {Digital transformation is a key force driving high-quality economic development, yet the economic consequences of different digital technology directions vary significantly. Existing research often treats it as a homogeneous whole, overlooking the "diverse direction" characteristics of technologies, making it difficult to explain the "productivity paradox." From the perspective of dynamic capability reconstruction, this paper constructs a theoretical model of "Digital 'Diverse Direction' Transformation-Dynamic Capability-Total Factor Productivity (TFP)." Using the LDA topic model to conduct semantic analysis on the annual reports of A-share listed companies, we categorize digital transformation into five directions: Artificial Intelligence (AI), Big Data, Cloud Computing, Blockchain, and Digital Technology Application. We empirically test their differentiated impacts on enterprise TFP and the underlying mechanisms. The findings are as follows: First, while digital transformation overall significantly promotes enterprise TFP, there is significant "technological heterogeneity" among different directions. AI has the strongest promoting effect, followed by Big Data and Digital Technology Application, whereas the impacts of Cloud Computing and Blockchain are not yet significant. This provides micro-evidence for explaining the "productivity paradox." Second, mechanism tests indicate that dynamic capability reconstruction is the key transmission path; digital transformation enhances TFP by strengthening organizational coordination and integration capabilities, change and reconstruction capabilities, and learning and absorption capabilities. Third, heterogeneity analysis reveals that digital transformation exerts a more pronounced effect on enhancing productivity in labor-intensive and technology-intensive industries, as well as in the manufacturing sector. These conclusions deepen the theoretical understanding of the economic consequences of digital transformation and provide empirical evidence and decision-making references for enterprises to choose adaptable and differentiated transformation paths.},
}
MeSH Terms:
show MeSH Terms
hide MeSH Terms
Artificial Intelligence
*Digital Technology/economics
Cloud Computing
Humans
Blockchain
*Efficiency
Big Data
Models, Theoretical
Economic Development
RevDate: 2026-04-28
DRL-based multi-objective task scheduling for edge-cloud computing: latency, energy, and SLA optimisation.
Scientific reports pii:10.1038/s41598-026-49824-1 [Epub ahead of print].
Additional Links: PMID-42050010
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42050010,
year = {2026},
author = {Sravan, P and Shaik, MA},
title = {DRL-based multi-objective task scheduling for edge-cloud computing: latency, energy, and SLA optimisation.},
journal = {Scientific reports},
volume = {},
number = {},
pages = {},
doi = {10.1038/s41598-026-49824-1},
pmid = {42050010},
issn = {2045-2322},
}
RevDate: 2026-04-27
CmpDate: 2026-04-27
Enhancing Cloud-Based Healthcare Security With Quantum-Secure HealthChain: A Quantum Computing and Blockchain Integrated Framework.
Health science reports, 9(5):e72367.
BACKGROUND AND AIMS: Rising quantum hazards and flaws in conventional encryption make cloud-based healthcare data security harder. Quantum-Secure HealthChain, a new architecture using blockchain and quantum computing, improves medical data security, patient privacy, and data fidelity.
METHODS: To prevent quantum attacks, the proposed system uses Quantum Key Distribution (QKD) for safe cryptographic key exchange and quantum-resistant encryption. Blockchain technology secures medical records, while multi-layered encryption ensures data privacy. Quantum Biometric Authentication improves access control using quantum entanglement and biometric data. Key generation, encryption, blockchain storage, authentication, and decryption are system process steps. Experimental evaluation focuses on encryption speed, resource economy, throughput, and scalability using simulated healthcare data.
RESULTS: Experimental data demonstrate system strength and efficiency. Encryption and decryption perform consistently for 1 to 100 MB data sizes with negligible overhead. Throughput can reach 105 transactions per second under normal demand; CPU (82%) and memory (210 MB) utilization are low. Scalability studies show linear expansion lets the system handle increased data volumes and user demands without sacrificing performance. Security study confirms quantum attack, data corruption, and unauthorized access resistance.
CONCLUSION: Quantum-Secure HealthChain offers a revolutionary method to cloud-based healthcare system security. Blockchain-quantum computing integration ensures strong authentication, safe key exchange, and quantum-resistant encryption. Its security, scalability, and efficiency make it a future-ready platform for safe medical data management, reducing quantum computing hazards.
Additional Links: PMID-42038155
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42038155,
year = {2026},
author = {Bose, R and Mondal, S and Sutradhar, S and Das, S and Faheem, M and Roy, S and Ahmad Khan, A},
title = {Enhancing Cloud-Based Healthcare Security With Quantum-Secure HealthChain: A Quantum Computing and Blockchain Integrated Framework.},
journal = {Health science reports},
volume = {9},
number = {5},
pages = {e72367},
pmid = {42038155},
issn = {2398-8835},
abstract = {BACKGROUND AND AIMS: Rising quantum hazards and flaws in conventional encryption make cloud-based healthcare data security harder. Quantum-Secure HealthChain, a new architecture using blockchain and quantum computing, improves medical data security, patient privacy, and data fidelity.
METHODS: To prevent quantum attacks, the proposed system uses Quantum Key Distribution (QKD) for safe cryptographic key exchange and quantum-resistant encryption. Blockchain technology secures medical records, while multi-layered encryption ensures data privacy. Quantum Biometric Authentication improves access control using quantum entanglement and biometric data. Key generation, encryption, blockchain storage, authentication, and decryption are system process steps. Experimental evaluation focuses on encryption speed, resource economy, throughput, and scalability using simulated healthcare data.
RESULTS: Experimental data demonstrate system strength and efficiency. Encryption and decryption perform consistently for 1 to 100 MB data sizes with negligible overhead. Throughput can reach 105 transactions per second under normal demand; CPU (82%) and memory (210 MB) utilization are low. Scalability studies show linear expansion lets the system handle increased data volumes and user demands without sacrificing performance. Security study confirms quantum attack, data corruption, and unauthorized access resistance.
CONCLUSION: Quantum-Secure HealthChain offers a revolutionary method to cloud-based healthcare system security. Blockchain-quantum computing integration ensures strong authentication, safe key exchange, and quantum-resistant encryption. Its security, scalability, and efficiency make it a future-ready platform for safe medical data management, reducing quantum computing hazards.},
}
RevDate: 2026-04-27
CmpDate: 2026-04-27
Epidemic Forecasting via Hybrid Deep Learning With Unified Visibility and Temporal Graphs Under Stochastic Noise Modelling.
Healthcare technology letters, 13:e70073.
Epidemic forecasts are unreliable when surveillance data are noisy or incomplete and when underreporting and rapidly changing population behaviour distort observed incidence, degrading the stability of conventional statistical and deep-learning models. We aim to develop an interpretable, uncertainty-aware forecasting pipeline that remains robust under data corruption and is practical for real-time use. We convert COVID-19 incidence into multilayer temporal graphs: global cumulative counts are differenced to daily incidence, normalised, and segmented into overlapping 30-day windows; for each window, we build a visibility graph from the empirical series and a matched-length visibility graph from stochastic simulations (fractional Brownian motion and Lévy-type dynamics) to represent reporting and behavioural randomness. We fuse the graphs (weighted edge averaging), extract compact descriptors (mean degree, clustering coefficient, entropy) and train a lightweight regressor to predict the 7-day-ahead average incidence. On the Johns Hopkins COVID-19 dataset, the method outperforms ARIMA, LSTM and standard GCN baselines (MAE = 0.0558; RMSE = 0.0709). Stress tests with noise and missingness and ablations show that stochastic augmentation and graph fusion materially improve robustness, while a cloud-oriented deployment reduces inference time by >60% and memory usage by 35%, enabling low-latency monitoring for timely public-health decision-making.
Additional Links: PMID-42038659
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42038659,
year = {2026},
author = {Ghafi, AK and Pirkhedri, A and Akhbarifar, S and Shafiabadi, MH},
title = {Epidemic Forecasting via Hybrid Deep Learning With Unified Visibility and Temporal Graphs Under Stochastic Noise Modelling.},
journal = {Healthcare technology letters},
volume = {13},
number = {},
pages = {e70073},
pmid = {42038659},
issn = {2053-3713},
abstract = {Epidemic forecasts are unreliable when surveillance data are noisy or incomplete and when underreporting and rapidly changing population behaviour distort observed incidence, degrading the stability of conventional statistical and deep-learning models. We aim to develop an interpretable, uncertainty-aware forecasting pipeline that remains robust under data corruption and is practical for real-time use. We convert COVID-19 incidence into multilayer temporal graphs: global cumulative counts are differenced to daily incidence, normalised, and segmented into overlapping 30-day windows; for each window, we build a visibility graph from the empirical series and a matched-length visibility graph from stochastic simulations (fractional Brownian motion and Lévy-type dynamics) to represent reporting and behavioural randomness. We fuse the graphs (weighted edge averaging), extract compact descriptors (mean degree, clustering coefficient, entropy) and train a lightweight regressor to predict the 7-day-ahead average incidence. On the Johns Hopkins COVID-19 dataset, the method outperforms ARIMA, LSTM and standard GCN baselines (MAE = 0.0558; RMSE = 0.0709). Stress tests with noise and missingness and ablations show that stochastic augmentation and graph fusion materially improve robustness, while a cloud-oriented deployment reduces inference time by >60% and memory usage by 35%, enabling low-latency monitoring for timely public-health decision-making.},
}
RevDate: 2026-04-27
Energy-constrained workflow scheduling for DVFS-enabled heterogeneous systems in cloud computing environments.
Scientific reports pii:10.1038/s41598-026-49785-5 [Epub ahead of print].
Additional Links: PMID-42045423
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42045423,
year = {2026},
author = {Ahmad, W and Silaparasetti, L and Arya, P and Pandya, S and Kumar, P and Khan, T and Alabdulatif, A},
title = {Energy-constrained workflow scheduling for DVFS-enabled heterogeneous systems in cloud computing environments.},
journal = {Scientific reports},
volume = {},
number = {},
pages = {},
doi = {10.1038/s41598-026-49785-5},
pmid = {42045423},
issn = {2045-2322},
support = {QU-APC-2026//Qassim University/ ; },
}
RevDate: 2026-04-24
CmpDate: 2026-04-24
AQuA2-Cloud: a web platform for fluorescence bioimaging activity analysis.
bioRxiv : the preprint server for biology.
BACKGROUND: Advanced biological imaging analysis platforms such as Activity Quantification and Analysis (AQuA2) enable accurate spatiotemporal activity analysis across diverse cell populations within many species. These tools are increasingly important for investigating cellular signaling dynamics and behavior. However, despite advances in the accuracy and species capability of AQuA2, it remains computationally demanding for analysis of long time-series datasets and requires all users to maintain a MATLAB license, which may limit accessibility and large-scale deployment.
RESULTS: To address these limitations, we have designed and made available AQuA2-Cloud, a portable software stack and web platform developed as an improvement and further evolution of AQuA2. This container-deployable system permits multi-user cloud-based high accuracy activity quantification with intuitive workflows, export of analysis data and project files, and comparable processing times. The platform offers integrated features such as in-browser analysis control interfaces, asynchronous program state control, multiple users and user management, support for unreliable connections, file uploading and downloading via web browsers and File Transfer Protocol, and centralized organization of analysis output.
CONCLUSION: AQuA2-Cloud constitutes a cloud-native solution for laboratories or research groups seeking to centralize analysis of spatiotemporal biological imaging datasets while reducing software installation and licensing barriers for end users. The platform enables researchers with minimal technical expertise to perform advanced bioimaging analysis through standard web browsers while maintaining the analytical capabilities of AQuA2. AQuA2-Cloud source code, deployment procedures, and documentation are freely available at (https://github.com/yu-lab-vt/AQuA2-Cloud).
Additional Links: PMID-41959064
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41959064,
year = {2026},
author = {Bright, M and Mi, X and Duarte, D and Carey, E and Lyu, B and Wang, Y and Nimmerjahn, A and Yu, G},
title = {AQuA2-Cloud: a web platform for fluorescence bioimaging activity analysis.},
journal = {bioRxiv : the preprint server for biology},
volume = {},
number = {},
pages = {},
pmid = {41959064},
issn = {2692-8205},
abstract = {BACKGROUND: Advanced biological imaging analysis platforms such as Activity Quantification and Analysis (AQuA2) enable accurate spatiotemporal activity analysis across diverse cell populations within many species. These tools are increasingly important for investigating cellular signaling dynamics and behavior. However, despite advances in the accuracy and species capability of AQuA2, it remains computationally demanding for analysis of long time-series datasets and requires all users to maintain a MATLAB license, which may limit accessibility and large-scale deployment.
RESULTS: To address these limitations, we have designed and made available AQuA2-Cloud, a portable software stack and web platform developed as an improvement and further evolution of AQuA2. This container-deployable system permits multi-user cloud-based high accuracy activity quantification with intuitive workflows, export of analysis data and project files, and comparable processing times. The platform offers integrated features such as in-browser analysis control interfaces, asynchronous program state control, multiple users and user management, support for unreliable connections, file uploading and downloading via web browsers and File Transfer Protocol, and centralized organization of analysis output.
CONCLUSION: AQuA2-Cloud constitutes a cloud-native solution for laboratories or research groups seeking to centralize analysis of spatiotemporal biological imaging datasets while reducing software installation and licensing barriers for end users. The platform enables researchers with minimal technical expertise to perform advanced bioimaging analysis through standard web browsers while maintaining the analytical capabilities of AQuA2. AQuA2-Cloud source code, deployment procedures, and documentation are freely available at (https://github.com/yu-lab-vt/AQuA2-Cloud).},
}
RevDate: 2026-04-24
CmpDate: 2026-04-24
Geospatial analysis of flooding events using Sentinel-1 and Sentinel-2 data: a tale of two South African cities.
Environmental monitoring and assessment, 198(5):.
The frequency and severity of floods have increased in the last five decades due to climate change and human activities, significantly impacting human lives, economies, and infrastructure. South Africa is among the most affected regions, primarily due to informal settlements, limited resources, and a weak capacity to respond to the growing flood risk, with annual impacts increasing. Earth Observation data offers crucial insights for flood monitoring and risk management, yet studies and proactive measures remain limited in the country. Therefore, this paper conducted a geospatial analysis of recent flooding incidents (i.e., 2017-2022) in two South African cities using Sentinel-1 and Sentinel-2 datasets within a cloud computing environment. Specifically, we evaluated the potential of Sentinel-1 Radar and Sentinel-2 multispectral data for flood mapping using thresholding techniques and estimated the number of people affected by incorporating statistical and building-count data. The results showed that Sentinel-2 misclassified many areas due to confusion with clouds shadows. In contrast, Sentinel-1 showed greater potential for rapidly mapping floods near the incident date and estimating the number of people exposed, making it suitable for rapid flood assessments. Consequently, flooded areas derived from Sentinel-1 imagery were more realistic, indicating that about 60,000 people were cumulatively affected by flooding in eThekwini in April 2019 and October 2017, respectively. Comparatively, relatively few people (i.e., ~ 42,068 in March 2018 and 39,903 in February 2020) were affected by the various flood incidents in Johannesburg. Overall, the study has the potential to provide pertinent information on flooded areas and to aid follow-up analysis, such as infrastructure damage assessment, thereby offering prospects for informing not only disaster management and policy formulation but also critical decisions and resource allocation.
Additional Links: PMID-42029755
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42029755,
year = {2026},
author = {Rathupetsane, EM and Kganyago, M},
title = {Geospatial analysis of flooding events using Sentinel-1 and Sentinel-2 data: a tale of two South African cities.},
journal = {Environmental monitoring and assessment},
volume = {198},
number = {5},
pages = {},
pmid = {42029755},
issn = {1573-2959},
mesh = {South Africa ; *Floods/statistics & numerical data ; *Environmental Monitoring/methods ; Cities ; Humans ; Climate Change ; Spatial Analysis ; },
abstract = {The frequency and severity of floods have increased in the last five decades due to climate change and human activities, significantly impacting human lives, economies, and infrastructure. South Africa is among the most affected regions, primarily due to informal settlements, limited resources, and a weak capacity to respond to the growing flood risk, with annual impacts increasing. Earth Observation data offers crucial insights for flood monitoring and risk management, yet studies and proactive measures remain limited in the country. Therefore, this paper conducted a geospatial analysis of recent flooding incidents (i.e., 2017-2022) in two South African cities using Sentinel-1 and Sentinel-2 datasets within a cloud computing environment. Specifically, we evaluated the potential of Sentinel-1 Radar and Sentinel-2 multispectral data for flood mapping using thresholding techniques and estimated the number of people affected by incorporating statistical and building-count data. The results showed that Sentinel-2 misclassified many areas due to confusion with clouds shadows. In contrast, Sentinel-1 showed greater potential for rapidly mapping floods near the incident date and estimating the number of people exposed, making it suitable for rapid flood assessments. Consequently, flooded areas derived from Sentinel-1 imagery were more realistic, indicating that about 60,000 people were cumulatively affected by flooding in eThekwini in April 2019 and October 2017, respectively. Comparatively, relatively few people (i.e., ~ 42,068 in March 2018 and 39,903 in February 2020) were affected by the various flood incidents in Johannesburg. Overall, the study has the potential to provide pertinent information on flooded areas and to aid follow-up analysis, such as infrastructure damage assessment, thereby offering prospects for informing not only disaster management and policy formulation but also critical decisions and resource allocation.},
}
MeSH Terms:
show MeSH Terms
hide MeSH Terms
South Africa
*Floods/statistics & numerical data
*Environmental Monitoring/methods
Cities
Humans
Climate Change
Spatial Analysis
RevDate: 2026-04-24
WS-SSA: workflow scheduling in cloud computing using salp swarm algorithm.
Scientific reports, 16(1):.
Additional Links: PMID-42031862
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42031862,
year = {2026},
author = {Sharawy, AA and Sakr, RH and Eladrosy, W and Alrahmawy, MF},
title = {WS-SSA: workflow scheduling in cloud computing using salp swarm algorithm.},
journal = {Scientific reports},
volume = {16},
number = {1},
pages = {},
pmid = {42031862},
issn = {2045-2322},
}
RevDate: 2026-04-22
Edge-enabled IoT framework for real-time tobacco quality monitoring.
Scientific reports pii:10.1038/s41598-026-47038-z [Epub ahead of print].
Tobacco quality inspection plays a vital role in ensuring standardized processing, reducing economic losses, and improving industrial automation. However, traditional inspection methods often suffer from inefficiency, high labor costs, and limited real-time capabilities. To address these challenges, this paper proposes an Internet of Things (IoT)-based data acquisition and edge computing framework enhanced with deep learning models for tobacco quality inspection. The system integrates heterogeneous sensing devices for multi-source data collection, including moisture, color, and texture features, while leveraging edge computing nodes to conduct real-time preprocessing, feature extraction, and anomaly detection. Specifically, a convolutional neural network (CNN) is employed to extract spatial texture and color features, while a long short-term memory (LSTM) network captures temporal dependencies in moisture and process variations. A lightweight data transmission protocol and optimized scheduling algorithm are designed to balance computational efficiency and energy consumption. Experimental results demonstrate that the proposed hybrid edge model achieves an accuracy of 96.3% in tobacco quality classification, while reducing average processing latency by 38% compared with cloud-only architectures. In addition, complexity profiling shows that the deployed model requires 12.8M parameters, 3.42 GFLOPs, 486 MB peak runtime memory, and 25.0 ms end-to-end latency at [Formula: see text] input resolution on a Jetson Xavier NX platform. The study provides a practical solution for real-time and scalable tobacco quality monitoring, offering theoretical insights and engineering value for smart agriculture and industrial IoT applications.
Additional Links: PMID-42020563
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42020563,
year = {2026},
author = {Xie, L and Liu, C and Ding, Z and Tang, N and Shi, Y},
title = {Edge-enabled IoT framework for real-time tobacco quality monitoring.},
journal = {Scientific reports},
volume = {},
number = {},
pages = {},
doi = {10.1038/s41598-026-47038-z},
pmid = {42020563},
issn = {2045-2322},
abstract = {Tobacco quality inspection plays a vital role in ensuring standardized processing, reducing economic losses, and improving industrial automation. However, traditional inspection methods often suffer from inefficiency, high labor costs, and limited real-time capabilities. To address these challenges, this paper proposes an Internet of Things (IoT)-based data acquisition and edge computing framework enhanced with deep learning models for tobacco quality inspection. The system integrates heterogeneous sensing devices for multi-source data collection, including moisture, color, and texture features, while leveraging edge computing nodes to conduct real-time preprocessing, feature extraction, and anomaly detection. Specifically, a convolutional neural network (CNN) is employed to extract spatial texture and color features, while a long short-term memory (LSTM) network captures temporal dependencies in moisture and process variations. A lightweight data transmission protocol and optimized scheduling algorithm are designed to balance computational efficiency and energy consumption. Experimental results demonstrate that the proposed hybrid edge model achieves an accuracy of 96.3% in tobacco quality classification, while reducing average processing latency by 38% compared with cloud-only architectures. In addition, complexity profiling shows that the deployed model requires 12.8M parameters, 3.42 GFLOPs, 486 MB peak runtime memory, and 25.0 ms end-to-end latency at [Formula: see text] input resolution on a Jetson Xavier NX platform. The study provides a practical solution for real-time and scalable tobacco quality monitoring, offering theoretical insights and engineering value for smart agriculture and industrial IoT applications.},
}
RevDate: 2026-04-21
CmpDate: 2026-04-21
TinyAct: A framework for real-time action recognition in the cloud through distillation learning.
PloS one, 21(4):e0347245 pii:PONE-D-25-38260.
Human action recognition has become increasingly important for applications in security surveillance, healthcare monitoring, and smart environments. However, existing deep learning models typically require substantial computational resources, making deployment on resource-constrained edge devices challenging. To address this limitation, we propose TinyAct, a lightweight framework for real-time human action recognition that combines edge computing with cloud-based processing through knowledge distillation. TinyAct employs a 3D video autoencoder to extract compact spatiotemporal features from video sequences, coupled with classical machine learning classifiers for action prediction. The framework utilizes an AIoT (Artificial Intelligence of Things) architecture where feature extraction occurs on edge devices while classification is performed in the cloud, enabling real-time processing with reduced bandwidth requirements. To enhance performance, we implement knowledge distillation using the ILA-ViT-B/16 transformer as a teacher model to transfer temporal knowledge to our compact student architecture. Our experiments on the Kinetics-400 dataset demonstrate that TinyAct achieves competitive performance while maintaining computational efficiency. Using 16-frame video clips with 1024-dimensional latent features, Random Forest achieved the highest baseline accuracy of 57.00%, followed by SVM (55.00%) and XGBoost (54.00%). The autoencoder-based feature extraction significantly reduces computational overhead compared to end-to-end deep learning approaches while preserving essential spatiotemporal information for accurate action recognition. The knowledge distillation experiments reveal that training configuration critically affects performance, with non-pretrained student models achieving better results (15.11% with SVM) than pretrained ones under teacher supervision. This suggests that joint optimization of the encoder and classifier is essential for effective knowledge transfer in resource-constrained settings. TinyAct's modular architecture enables flexible deployment across diverse hardware configurations, supporting both lightweight edge inference and cloud-based training pipelines. The framework demonstrates that effective human action recognition can be achieved without computationally intensive deep networks, making it suitable for smart surveillance systems, IoT applications, and embedded devices where computational resources are limited.
Additional Links: PMID-42008450
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42008450,
year = {2026},
author = {Wanna, Y and Wiratchawa, K and Intharah, T},
title = {TinyAct: A framework for real-time action recognition in the cloud through distillation learning.},
journal = {PloS one},
volume = {21},
number = {4},
pages = {e0347245},
doi = {10.1371/journal.pone.0347245},
pmid = {42008450},
issn = {1932-6203},
mesh = {Humans ; Deep Learning ; *Cloud Computing ; *Machine Learning ; Video Recording ; Algorithms ; *Pattern Recognition, Automated/methods ; },
abstract = {Human action recognition has become increasingly important for applications in security surveillance, healthcare monitoring, and smart environments. However, existing deep learning models typically require substantial computational resources, making deployment on resource-constrained edge devices challenging. To address this limitation, we propose TinyAct, a lightweight framework for real-time human action recognition that combines edge computing with cloud-based processing through knowledge distillation. TinyAct employs a 3D video autoencoder to extract compact spatiotemporal features from video sequences, coupled with classical machine learning classifiers for action prediction. The framework utilizes an AIoT (Artificial Intelligence of Things) architecture where feature extraction occurs on edge devices while classification is performed in the cloud, enabling real-time processing with reduced bandwidth requirements. To enhance performance, we implement knowledge distillation using the ILA-ViT-B/16 transformer as a teacher model to transfer temporal knowledge to our compact student architecture. Our experiments on the Kinetics-400 dataset demonstrate that TinyAct achieves competitive performance while maintaining computational efficiency. Using 16-frame video clips with 1024-dimensional latent features, Random Forest achieved the highest baseline accuracy of 57.00%, followed by SVM (55.00%) and XGBoost (54.00%). The autoencoder-based feature extraction significantly reduces computational overhead compared to end-to-end deep learning approaches while preserving essential spatiotemporal information for accurate action recognition. The knowledge distillation experiments reveal that training configuration critically affects performance, with non-pretrained student models achieving better results (15.11% with SVM) than pretrained ones under teacher supervision. This suggests that joint optimization of the encoder and classifier is essential for effective knowledge transfer in resource-constrained settings. TinyAct's modular architecture enables flexible deployment across diverse hardware configurations, supporting both lightweight edge inference and cloud-based training pipelines. The framework demonstrates that effective human action recognition can be achieved without computationally intensive deep networks, making it suitable for smart surveillance systems, IoT applications, and embedded devices where computational resources are limited.},
}
MeSH Terms:
show MeSH Terms
hide MeSH Terms
Humans
Deep Learning
*Cloud Computing
*Machine Learning
Video Recording
Algorithms
*Pattern Recognition, Automated/methods
RevDate: 2026-04-20
Hybrid Monarch Butterfly Optimization-DenseNet framework for energy-aware task scheduling in cloud environments.
Scientific reports pii:10.1038/s41598-026-47949-x [Epub ahead of print].
Additional Links: PMID-42009763
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42009763,
year = {2026},
author = {Manavalan, T and Gunasekaran, P and Elumalai, S and Verma, LP and Kumar, G},
title = {Hybrid Monarch Butterfly Optimization-DenseNet framework for energy-aware task scheduling in cloud environments.},
journal = {Scientific reports},
volume = {},
number = {},
pages = {},
doi = {10.1038/s41598-026-47949-x},
pmid = {42009763},
issn = {2045-2322},
}
RevDate: 2026-04-21
CmpDate: 2026-04-21
A telemetry dataset on resource utilisation and power consumption in the edge-cloud continuum.
Data in brief, 66:112734 pii:S2352-3409(26)00287-8.
This paper presents a telemetry dataset capturing resource utilization and power consumption metrics across the ENACT edge-cloud continuum. The dataset contains empirical telemetry collected in real-time for both infrastructure nodes and application workloads. More specifically, a distributed weather forecasting scenario has been emulated, comprising five pods: two different weather data sources, two forecasting services (one per node/computing layer) and one long-term storage pool. A cloud-based machine and an edge device belonging to the same Kubernetes cluster have been considered for the deployment of the application pods, corresponding to heterogeneous computing tiers. Data acquisition was performed using ENACT's Telemetry Data Collector and Monitoring Engine which measures telemetry and energy metrics at node and pod levels in real-time. The resulting dataset provides time-series records including CPU, memory and disk utilization, network throughput, and energy consumption for the cloud node, the edge node and the five application pods. Telemetry data was collected during two distinct phases: for a period with application workloads running normally and for a baseline period when applications were removed from the cluster. This allows for assessing the impact of the applications activity in terms of resource usage and energy consumption. This dataset offers valuable insights for the research community in distributed systems, the edge-cloud continuum and cognitive computing, wherein datasets on real-world data, especially reflecting both infrastructure-level and application-level telemetry, are currently very limited. It is particularly useful for developers and research scientists that require such data for tasks such as training and fine-tuning time-series forecasting models, benchmarking anomaly detection models and validating scheduling algorithms and energy-aware strategies, to name a few.
Additional Links: PMID-42011237
Full Text:
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid42011237,
year = {2026},
author = {Kapetanidou, IA and Kotsiopoulos, T and Thanasoulis, G and Bizopoulos, P and Liatifis, A and Skoularikis, M and Nizamis, A and Sarigiannidis, P and Votis, K},
title = {A telemetry dataset on resource utilisation and power consumption in the edge-cloud continuum.},
journal = {Data in brief},
volume = {66},
number = {},
pages = {112734},
doi = {10.1016/j.dib.2026.112734},
pmid = {42011237},
issn = {2352-3409},
abstract = {This paper presents a telemetry dataset capturing resource utilization and power consumption metrics across the ENACT edge-cloud continuum. The dataset contains empirical telemetry collected in real-time for both infrastructure nodes and application workloads. More specifically, a distributed weather forecasting scenario has been emulated, comprising five pods: two different weather data sources, two forecasting services (one per node/computing layer) and one long-term storage pool. A cloud-based machine and an edge device belonging to the same Kubernetes cluster have been considered for the deployment of the application pods, corresponding to heterogeneous computing tiers. Data acquisition was performed using ENACT's Telemetry Data Collector and Monitoring Engine which measures telemetry and energy metrics at node and pod levels in real-time. The resulting dataset provides time-series records including CPU, memory and disk utilization, network throughput, and energy consumption for the cloud node, the edge node and the five application pods. Telemetry data was collected during two distinct phases: for a period with application workloads running normally and for a baseline period when applications were removed from the cluster. This allows for assessing the impact of the applications activity in terms of resource usage and energy consumption. This dataset offers valuable insights for the research community in distributed systems, the edge-cloud continuum and cognitive computing, wherein datasets on real-world data, especially reflecting both infrastructure-level and application-level telemetry, are currently very limited. It is particularly useful for developers and research scientists that require such data for tasks such as training and fine-tuning time-series forecasting models, benchmarking anomaly detection models and validating scheduling algorithms and energy-aware strategies, to name a few.},
}
RevDate: 2026-04-18
CmpDate: 2026-04-18
copick: An open dataset interface and toolkit for collaborative annotation and analysis of cryo-electron tomography data.
Protein science : a publication of the Protein Society, 35(5):e70578.
Cryo-electron tomography (cryoET) enables visualization of macromolecular complexes within intact cellular environments. Continued improvements in instrumentation, sample preparation, and data-processing pipelines have increased both the scale and the complexity of cryoET datasets, making manual analysis challenging. To support scalable, collaborative annotation, we developed copick, an open-source dataset application programming interface (API) and accompanying tool suite for cryoET analysis. Copick provides standardized access to tomograms, segmentations, point annotations, meshes, and feature maps across local storage, high-performance computing systems, cloud platforms, and public repositories. Plugins for napari and ChimeraX enable human-in-the-loop workflows for particle picking, segmentation, inspection of machine-learning outputs, and project-level collaboration. A multi-resolution Open Microscopy Environment (OME)-Zarr architecture supports responsive visualization and cross-platform access. Copick additionally provides a Model Context Protocol interface enabling automated generation of annotation-curation pipelines using natural-language instructions. Together, these tools support reproducible, scalable, and collaborative cryoET analysis.
Additional Links: PMID-41999094
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41999094,
year = {2026},
author = {Ermel, UH and Schwartz, J and Zhao, Z and Ji, D and Peck, A and Yu, Y and Paraan, M and Carragher, B and Frangakis, AS and Harrington, KIS},
title = {copick: An open dataset interface and toolkit for collaborative annotation and analysis of cryo-electron tomography data.},
journal = {Protein science : a publication of the Protein Society},
volume = {35},
number = {5},
pages = {e70578},
doi = {10.1002/pro.70578},
pmid = {41999094},
issn = {1469-896X},
mesh = {*Electron Microscope Tomography/methods ; *Software ; Humans ; Cryoelectron Microscopy ; User-Computer Interface ; Image Processing, Computer-Assisted ; },
abstract = {Cryo-electron tomography (cryoET) enables visualization of macromolecular complexes within intact cellular environments. Continued improvements in instrumentation, sample preparation, and data-processing pipelines have increased both the scale and the complexity of cryoET datasets, making manual analysis challenging. To support scalable, collaborative annotation, we developed copick, an open-source dataset application programming interface (API) and accompanying tool suite for cryoET analysis. Copick provides standardized access to tomograms, segmentations, point annotations, meshes, and feature maps across local storage, high-performance computing systems, cloud platforms, and public repositories. Plugins for napari and ChimeraX enable human-in-the-loop workflows for particle picking, segmentation, inspection of machine-learning outputs, and project-level collaboration. A multi-resolution Open Microscopy Environment (OME)-Zarr architecture supports responsive visualization and cross-platform access. Copick additionally provides a Model Context Protocol interface enabling automated generation of annotation-curation pipelines using natural-language instructions. Together, these tools support reproducible, scalable, and collaborative cryoET analysis.},
}
MeSH Terms:
show MeSH Terms
hide MeSH Terms
*Electron Microscope Tomography/methods
*Software
Humans
Cryoelectron Microscopy
User-Computer Interface
Image Processing, Computer-Assisted
RevDate: 2026-04-17
Enhancing smart factory performance via hybrid scheduling and intelligent resource management.
Scientific reports pii:10.1038/s41598-026-49107-9 [Epub ahead of print].
The rise of connected devices since the industrial revolution has led to vast data generation and new digital challenges. A huge data from smart assets demanded scalable, private, and low-latency solutions. We propose a fog computing approach that brings analytics closer to devices. Our system enhances a standard machine-to-machine architecture using container-based orchestration for autonomy and peer-to-peer cyber-physical system communication. The focus is on smart factories and industrial Internet of Things (IIoT) applications. Recent progress on lightweight deep learning algorithms and fog computing permits multiple model inference tasks to run simultaneously on these resource-limited edge devices, so that we can collaboratively make one thing instead of getting good model quality in each single task. However, the high running latencies overall in multi-model inferences are a drawback for real-time applications. The proposed method introduces a hybrid partial swarm optimization-genetic algorithm scheduler that merges particle swarm optimization and genetic algorithm techniques to fine-tune task initiation times and minimize latency. By leveraging the strengths of both algorithms, it dynamically updates scheduling decisions for enhanced efficiency. This AI-driven model integrates IoT and digital twins to support adaptive, real-time optimization in smart manufacturing environments. Its innovation lies in balancing complex trade-offs across multiple objectives, delivering significant gains in agility and performance within the Industry 4.0 paradigm.
Additional Links: PMID-41998135
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41998135,
year = {2026},
author = {Vaidya, S and Jethava, G and Jethava, S},
title = {Enhancing smart factory performance via hybrid scheduling and intelligent resource management.},
journal = {Scientific reports},
volume = {},
number = {},
pages = {},
doi = {10.1038/s41598-026-49107-9},
pmid = {41998135},
issn = {2045-2322},
abstract = {The rise of connected devices since the industrial revolution has led to vast data generation and new digital challenges. A huge data from smart assets demanded scalable, private, and low-latency solutions. We propose a fog computing approach that brings analytics closer to devices. Our system enhances a standard machine-to-machine architecture using container-based orchestration for autonomy and peer-to-peer cyber-physical system communication. The focus is on smart factories and industrial Internet of Things (IIoT) applications. Recent progress on lightweight deep learning algorithms and fog computing permits multiple model inference tasks to run simultaneously on these resource-limited edge devices, so that we can collaboratively make one thing instead of getting good model quality in each single task. However, the high running latencies overall in multi-model inferences are a drawback for real-time applications. The proposed method introduces a hybrid partial swarm optimization-genetic algorithm scheduler that merges particle swarm optimization and genetic algorithm techniques to fine-tune task initiation times and minimize latency. By leveraging the strengths of both algorithms, it dynamically updates scheduling decisions for enhanced efficiency. This AI-driven model integrates IoT and digital twins to support adaptive, real-time optimization in smart manufacturing environments. Its innovation lies in balancing complex trade-offs across multiple objectives, delivering significant gains in agility and performance within the Industry 4.0 paradigm.},
}
RevDate: 2026-04-14
A novel approach to reliable and flexible distributed computing with virtualization in smart healthcare applications.
Scientific reports, 16(1):.
Currently, fast and efficient computing is driving the new disruptive technologies required by modern healthcare systems. A simulation model is presented that studies how virtualization affects the performance of task offloading in smart health-care environments. Virtualization technology is suitable for task-offloading processes. A simulation-based framework can be used to examine how virtualization overhead influences task offloading efficiency in smart healthcare environments. Therefore, the proposed model uses virtualization to manage resources more effectively and make the system more reliable. Important factors such as how long a task takes to finish, how much energy it uses, how much data it can handle, and how well it can grow when more tasks are added must be considered for smart healthcare. The results were compared with those of a system that did not use virtualization; thus, we can clearly observe how virtualization changes the overall performance. The findings show that better resource use, lower energy consumption, and improved fault recovery are possible, which makes the proposed system suitable for real healthcare applications. In the future, this work can be extended by adding predictive analytics, improving machine-learning–based scheduling, using multiple cloud platforms, and making virtualization even more energy-efficient.
Additional Links: PMID-41786875
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41786875,
year = {2026},
author = {Dhiman, G and Singh, KD and Singh, PD and Alghamdi, NS and Albakri, GS},
title = {A novel approach to reliable and flexible distributed computing with virtualization in smart healthcare applications.},
journal = {Scientific reports},
volume = {16},
number = {1},
pages = {},
pmid = {41786875},
issn = {2045-2322},
abstract = {Currently, fast and efficient computing is driving the new disruptive technologies required by modern healthcare systems. A simulation model is presented that studies how virtualization affects the performance of task offloading in smart health-care environments. Virtualization technology is suitable for task-offloading processes. A simulation-based framework can be used to examine how virtualization overhead influences task offloading efficiency in smart healthcare environments. Therefore, the proposed model uses virtualization to manage resources more effectively and make the system more reliable. Important factors such as how long a task takes to finish, how much energy it uses, how much data it can handle, and how well it can grow when more tasks are added must be considered for smart healthcare. The results were compared with those of a system that did not use virtualization; thus, we can clearly observe how virtualization changes the overall performance. The findings show that better resource use, lower energy consumption, and improved fault recovery are possible, which makes the proposed system suitable for real healthcare applications. In the future, this work can be extended by adding predictive analytics, improving machine-learning–based scheduling, using multiple cloud platforms, and making virtualization even more energy-efficient.},
}
RevDate: 2026-04-16
A fusion deep Q-learning and particle swarm optimization algorithm for adaptive resource allocation in cloud computing circumstances.
Scientific reports pii:10.1038/s41598-025-33498-2 [Epub ahead of print].
Effective resource allocation in cloud computing continues a critical challenge due to dynamic loads, stringent service-level expectations, and the need to balance execution time, energy, and cost. This study suggests a hybrid framework that integrates Deep Q-Learning (DQL) with Particle Swarm Optimization (PSO) to aid adaptive, multi-objective scheduling. DQL learns allocation strategies through interaction with the cloud environment, while PSO performs global search to refine action selection and accelerate convergence. Using Cloud Sim with real and synthetic workloads (Google Cluster, Planet Lab traces), the proposed method achieved a 35% reduction in average task execution time (from 245 s to 159 s) and a ~ 40% relative growth in resource utilization (from 60.1% to 84.6%), reduced SLA violations from 28 to 8, and lowered energy consumption to 6.3 kWh, outperforming standalone and hybrid models across 30 independent runs. Statistical tests (two-tailed t-test, α = 0.05) confirm significance. These results demonstrate that coupling reinforcement learning among swarm intelligence yields adaptive, high-quality decisions on behalf of real-time cloud resource scheduling.
Additional Links: PMID-41991544
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41991544,
year = {2026},
author = {Al-Jumaili, AHA and Seno, ME and Awad, WK and Muniyandi, RC and Hasan, MK},
title = {A fusion deep Q-learning and particle swarm optimization algorithm for adaptive resource allocation in cloud computing circumstances.},
journal = {Scientific reports},
volume = {},
number = {},
pages = {},
doi = {10.1038/s41598-025-33498-2},
pmid = {41991544},
issn = {2045-2322},
abstract = {Effective resource allocation in cloud computing continues a critical challenge due to dynamic loads, stringent service-level expectations, and the need to balance execution time, energy, and cost. This study suggests a hybrid framework that integrates Deep Q-Learning (DQL) with Particle Swarm Optimization (PSO) to aid adaptive, multi-objective scheduling. DQL learns allocation strategies through interaction with the cloud environment, while PSO performs global search to refine action selection and accelerate convergence. Using Cloud Sim with real and synthetic workloads (Google Cluster, Planet Lab traces), the proposed method achieved a 35% reduction in average task execution time (from 245 s to 159 s) and a ~ 40% relative growth in resource utilization (from 60.1% to 84.6%), reduced SLA violations from 28 to 8, and lowered energy consumption to 6.3 kWh, outperforming standalone and hybrid models across 30 independent runs. Statistical tests (two-tailed t-test, α = 0.05) confirm significance. These results demonstrate that coupling reinforcement learning among swarm intelligence yields adaptive, high-quality decisions on behalf of real-time cloud resource scheduling.},
}
RevDate: 2026-04-16
A neural network-based framework for enterprise financial error correction using AI and big data.
Scientific reports pii:10.1038/s41598-026-48510-6 [Epub ahead of print].
Additional Links: PMID-41991750
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41991750,
year = {2026},
author = {Bndyan, Q and Salih, R and Ali, KAA and Mousa, KM and Ahmed, DH},
title = {A neural network-based framework for enterprise financial error correction using AI and big data.},
journal = {Scientific reports},
volume = {},
number = {},
pages = {},
doi = {10.1038/s41598-026-48510-6},
pmid = {41991750},
issn = {2045-2322},
}
RevDate: 2026-04-16
Edge station deployment by fewest covered user first for cost improvement.
Scientific reports pii:10.1038/s41598-026-48089-y [Epub ahead of print].
In this paper, we address the edge station deployment problem (ESDP), which aims to determine optimal sites for deploying edge stations so as to maximize user coverage and minimize deployment cost. We first formulate the ESDP as a binary linear programming model and prove its NP-hardness by reducing the set covering problem to a specialized instance of ESDP. To solve the ESDP in polynomial time, we propose a novel heuristic algorithm that prioritizes covering users who are within range of the fewest candidate sites. Our algorithm iteratively selects the site that can cover the most users from among the candidate sites capable of covering those least-covered users. To evaluate the performance of our algorithm, we conduct simulation experiments based on a real-world dataset. Experimental results demonstrate that our algorithm achieves 100% user coverage with lower deployment cost compared to several classical and state-of-the-art algorithms.
Additional Links: PMID-41992036
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41992036,
year = {2026},
author = {Shao, K and Wang, Y and Wang, B and Sang, Y},
title = {Edge station deployment by fewest covered user first for cost improvement.},
journal = {Scientific reports},
volume = {},
number = {},
pages = {},
doi = {10.1038/s41598-026-48089-y},
pmid = {41992036},
issn = {2045-2322},
support = {26AXQXT070//Henan Province School Enterprise Collaborative Innovation Project/ ; ZZZX202436//Zhengzhou Basic Research and Applied Basic Research Project/ ; YJS2025GZZ64//Henan Province Joint Graduate Training Base Project/ ; 2023IT043//China University Research Innovation Fund/ ; 24B520021//Key Research Project of Higher Education Institutions in Henan Province/ ; YuGongXin Data [2024] No. 266//University Intelligent Teaching Big Data Industry Integration Innovation Center/ ; 252102221017//Project of Science and Technology in Henan Province/ ; },
abstract = {In this paper, we address the edge station deployment problem (ESDP), which aims to determine optimal sites for deploying edge stations so as to maximize user coverage and minimize deployment cost. We first formulate the ESDP as a binary linear programming model and prove its NP-hardness by reducing the set covering problem to a specialized instance of ESDP. To solve the ESDP in polynomial time, we propose a novel heuristic algorithm that prioritizes covering users who are within range of the fewest candidate sites. Our algorithm iteratively selects the site that can cover the most users from among the candidate sites capable of covering those least-covered users. To evaluate the performance of our algorithm, we conduct simulation experiments based on a real-world dataset. Experimental results demonstrate that our algorithm achieves 100% user coverage with lower deployment cost compared to several classical and state-of-the-art algorithms.},
}
RevDate: 2026-04-15
Topological data analysis visualization for interpretable assessment of AI contouring quality.
Proceedings of SPIE--the International Society for Optical Engineering, 13929:.
Advances in artificial intelligence have increased the availability of auto-segmentation tools. However, conventional accuracy metrics cannot capture regional segmentation differences between AI models or with respect to reference segmentations, necessary to interpret contouring variations. To address this, we developed a novel distance metric based on topological data analysis (TDA) to evaluate 3D point cloud representations of segmentations applied to six organs-at-risk (OARs) and lung gross tumor volume (GTV). A total of 34 CTs and 54 CBCTs were analyzed to compare a bespoke AI segmentation method with reference clinical contours. TDA involved: (1) converting segmentations into 3D point clouds, (2) clustering them into regions via K-means with fixed seeds and cluster numbers determined by the Elbow method, (3) constructing directed graphs for AI and reference clusters using centroids as nodes, and (4) computing distances using unbalanced optimal mass transport. Dice similarity coefficient (DSC) and 95th percentile Hausdorff distance (HD95) were also calculated. TDA successfully identified local regions of high deviation in both OARs and GTVs of varying shapes. It correlated positively with HD95 and negatively with DSC based on Pearson's correlation coefficient. Computation was efficient, averaging 1.72 s, and TDA effectively highlighted regions of greatest mismatch, providing quantitative visualization of poor concordance. In conclusion, we developed a new TDA metric for comparing auto-segmentation of GTV and OARs. Importantly, it allows visualization of mismatching regions thus potentially allowing faster contour editing and evaluation.
Additional Links: PMID-41982557
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41982557,
year = {2026},
author = {Choi, CMS and Rangnekar, A and Jiang, J and Veeraraghavan, H},
title = {Topological data analysis visualization for interpretable assessment of AI contouring quality.},
journal = {Proceedings of SPIE--the International Society for Optical Engineering},
volume = {13929},
number = {},
pages = {},
pmid = {41982557},
issn = {0277-786X},
abstract = {Advances in artificial intelligence have increased the availability of auto-segmentation tools. However, conventional accuracy metrics cannot capture regional segmentation differences between AI models or with respect to reference segmentations, necessary to interpret contouring variations. To address this, we developed a novel distance metric based on topological data analysis (TDA) to evaluate 3D point cloud representations of segmentations applied to six organs-at-risk (OARs) and lung gross tumor volume (GTV). A total of 34 CTs and 54 CBCTs were analyzed to compare a bespoke AI segmentation method with reference clinical contours. TDA involved: (1) converting segmentations into 3D point clouds, (2) clustering them into regions via K-means with fixed seeds and cluster numbers determined by the Elbow method, (3) constructing directed graphs for AI and reference clusters using centroids as nodes, and (4) computing distances using unbalanced optimal mass transport. Dice similarity coefficient (DSC) and 95th percentile Hausdorff distance (HD95) were also calculated. TDA successfully identified local regions of high deviation in both OARs and GTVs of varying shapes. It correlated positively with HD95 and negatively with DSC based on Pearson's correlation coefficient. Computation was efficient, averaging 1.72 s, and TDA effectively highlighted regions of greatest mismatch, providing quantitative visualization of poor concordance. In conclusion, we developed a new TDA metric for comparing auto-segmentation of GTV and OARs. Importantly, it allows visualization of mismatching regions thus potentially allowing faster contour editing and evaluation.},
}
RevDate: 2026-04-15
Event-Driven Neuromorphic Gaze Decoding via e-Skin Electrooculography.
ACS nano [Epub ahead of print].
Wearable eye-tracking technologies remain constrained by bulky optics, high power consumption, and reliance on external computation. We present a hardware-software codesigned electrooculography (EOG) interface that integrates ultrathin conformal e-skin sensors with resistive random-access memory (RRAM) crossbar, used to implement synaptic vector-matrix multiplication within a neuromorphic processing pipeline for real-time gaze decoding. Conformal e-skin sensors provide stable and continuous acquisition of both vertical and horizontal oculomotor signals, which are transformed into attention-guided spike features for classification by a lightweight spiking neural network (SNN). Implemented on an RRAM array with quantized weights after noise-aware training, the system achieves robust inference while substantially lowering latency and energy demand. The proposed framework is designed for local edge-level computation, thereby preserving user privacy and eliminating the need for cloud-based inference. By eliminating head-mounted optics, this glassless architecture enables unobtrusive and energy-efficient wearable interfaces. These results establish flexible bioelectronics with neuromorphic processors to advance immersive computing, assistive interfaces, and mobile health monitoring.
Additional Links: PMID-41985122
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41985122,
year = {2026},
author = {Jeong, S and Ko, HW and Kang, JH and Ko, J and Sim, I and Xu, Z and Jeong, H and Kim, SI and Choi, Y and Jo, S and Shim, JW and Seo, PH and Chae, MS and Kim, Y and Rehman, A and Yeon, H and Park, BI and Suh, YW and Lee, H and Kim, J and Lee, K and Bae, SH and Park, MC and Mun, S},
title = {Event-Driven Neuromorphic Gaze Decoding via e-Skin Electrooculography.},
journal = {ACS nano},
volume = {},
number = {},
pages = {},
doi = {10.1021/acsnano.5c19720},
pmid = {41985122},
issn = {1936-086X},
abstract = {Wearable eye-tracking technologies remain constrained by bulky optics, high power consumption, and reliance on external computation. We present a hardware-software codesigned electrooculography (EOG) interface that integrates ultrathin conformal e-skin sensors with resistive random-access memory (RRAM) crossbar, used to implement synaptic vector-matrix multiplication within a neuromorphic processing pipeline for real-time gaze decoding. Conformal e-skin sensors provide stable and continuous acquisition of both vertical and horizontal oculomotor signals, which are transformed into attention-guided spike features for classification by a lightweight spiking neural network (SNN). Implemented on an RRAM array with quantized weights after noise-aware training, the system achieves robust inference while substantially lowering latency and energy demand. The proposed framework is designed for local edge-level computation, thereby preserving user privacy and eliminating the need for cloud-based inference. By eliminating head-mounted optics, this glassless architecture enables unobtrusive and energy-efficient wearable interfaces. These results establish flexible bioelectronics with neuromorphic processors to advance immersive computing, assistive interfaces, and mobile health monitoring.},
}
RevDate: 2026-04-14
CmpDate: 2026-04-14
From Episodic Screening to Continuous Insight: AI Architectures for Colorectal Care.
IEEE pulse, 17(1):15-20.
Integrating wearables and clinical data to reshape colorectal cancer (CRC) prevention.Colorectal cancer (CRC) pathways are still dominated by episodic screening through colonoscopy and stool-based tests, despite growing access to consumer sensors and mobile computing. This article presents an end-to-end AI architecture for multimodal colorectal risk stratification that combines traditional screening data with passively collected activity patterns, heart rate variability, stool frequency logs, and nutrition context. We describe a layered design consisting of data ingestion, feature engineering, temporal modeling, risk scoring, and clinician-facing decision support. Implementation patterns are illustrated using cloud-native and edge components suitable for deployment in both high-resource and resource-constrained health systems. The article discusses issues such as bias, data sparsity, longitudinal drift, and integration with existing screening guidelines. As a result, it provides a reference model that future clinical and engineering teams can adapt when building continuous, AI-assisted colorectal screening and monitoring tools.
Additional Links: PMID-41979928
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41979928,
year = {2026},
author = {Padliya, T},
title = {From Episodic Screening to Continuous Insight: AI Architectures for Colorectal Care.},
journal = {IEEE pulse},
volume = {17},
number = {1},
pages = {15-20},
doi = {10.1109/MPULS.2026.3659236},
pmid = {41979928},
issn = {2154-2317},
mesh = {Humans ; *Colorectal Neoplasms/diagnosis/prevention & control ; *Artificial Intelligence ; *Early Detection of Cancer/methods ; *Mass Screening/methods ; },
abstract = {Integrating wearables and clinical data to reshape colorectal cancer (CRC) prevention.Colorectal cancer (CRC) pathways are still dominated by episodic screening through colonoscopy and stool-based tests, despite growing access to consumer sensors and mobile computing. This article presents an end-to-end AI architecture for multimodal colorectal risk stratification that combines traditional screening data with passively collected activity patterns, heart rate variability, stool frequency logs, and nutrition context. We describe a layered design consisting of data ingestion, feature engineering, temporal modeling, risk scoring, and clinician-facing decision support. Implementation patterns are illustrated using cloud-native and edge components suitable for deployment in both high-resource and resource-constrained health systems. The article discusses issues such as bias, data sparsity, longitudinal drift, and integration with existing screening guidelines. As a result, it provides a reference model that future clinical and engineering teams can adapt when building continuous, AI-assisted colorectal screening and monitoring tools.},
}
MeSH Terms:
show MeSH Terms
hide MeSH Terms
Humans
*Colorectal Neoplasms/diagnosis/prevention & control
*Artificial Intelligence
*Early Detection of Cancer/methods
*Mass Screening/methods
RevDate: 2026-04-13
CmpDate: 2026-04-13
MorphoCloud: Democratizing Access to High-Performance Computing for Morphological Data Analysis.
F1000Research, 15:53.
BACKGROUND: The digitization of biological specimens has revolutionized morphology, generating massive 3D datasets such as microCT scans. While open-source platforms like 3D Slicer and SlicerMorph have democratized access to advanced visualization and analysis software, a significant "compute gap" persists. Processing high-resolution 3D data requires high-end GPUs and substantial RAM, resources that are frequently unavailable at Primarily Undergraduate Institutions (PUIs) and other educational settings. This "digital divide" prevents many researchers and students from utilizing the very data and software that have been made open to them.
METHODS: We present MorphoCloud, a platform designed to bridge this hardware barrier by providing on-demand, research-grade computing environments via a web browser. MorphoCloud utilizes an "IssuesOps" architecture, where users manage their remote workstations entirely through GitHub Issues using natural-language commands (e.g., /create, /unshelve). The technology stack leverages GitHub Issues and Actions for front-end and orchestration respectively, JetStream2 for backend compute, and Apache Guacamole to deliver a high-performance, GPU-accelerated desktop experience to any modern browser.
RESULTS: The platform enables a streamlined lifecycle for remote instances, which come pre-configured with the SlicerMorph ecosystem, R/RStudio, and AI-assisted segmentation tools like NNInteractive and MEMOs. Users have access to a persistent storage volume that is decoupled from the instance. For educational purposes, MorphoCloud supports "Workshop" instances that allow for bulk provisioning and stay online continuously for short-term events. This identical environment ensures that instructors can conduct complex 3D workflows without the typical troubleshooting delays caused by heterogeneous student hardware.
CONCLUSION: MorphoCloud demonstrates that true scientific accessibility requires not just open data and software, but also open infrastructure. By abstracting the complexities of cloud administration into a simple, command-driven interface, MorphoCloud empowers researchers at under-resourced institutions to engage in high-performance morphological analysis and AI-assisted segmentation.
Additional Links: PMID-41969925
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41969925,
year = {2026},
author = {Maga, AM and Fillion-Robin, JC},
title = {MorphoCloud: Democratizing Access to High-Performance Computing for Morphological Data Analysis.},
journal = {F1000Research},
volume = {15},
number = {},
pages = {53},
pmid = {41969925},
issn = {2046-1402},
mesh = {*Software ; *Imaging, Three-Dimensional ; Humans ; *Data Analysis ; },
abstract = {BACKGROUND: The digitization of biological specimens has revolutionized morphology, generating massive 3D datasets such as microCT scans. While open-source platforms like 3D Slicer and SlicerMorph have democratized access to advanced visualization and analysis software, a significant "compute gap" persists. Processing high-resolution 3D data requires high-end GPUs and substantial RAM, resources that are frequently unavailable at Primarily Undergraduate Institutions (PUIs) and other educational settings. This "digital divide" prevents many researchers and students from utilizing the very data and software that have been made open to them.
METHODS: We present MorphoCloud, a platform designed to bridge this hardware barrier by providing on-demand, research-grade computing environments via a web browser. MorphoCloud utilizes an "IssuesOps" architecture, where users manage their remote workstations entirely through GitHub Issues using natural-language commands (e.g., /create, /unshelve). The technology stack leverages GitHub Issues and Actions for front-end and orchestration respectively, JetStream2 for backend compute, and Apache Guacamole to deliver a high-performance, GPU-accelerated desktop experience to any modern browser.
RESULTS: The platform enables a streamlined lifecycle for remote instances, which come pre-configured with the SlicerMorph ecosystem, R/RStudio, and AI-assisted segmentation tools like NNInteractive and MEMOs. Users have access to a persistent storage volume that is decoupled from the instance. For educational purposes, MorphoCloud supports "Workshop" instances that allow for bulk provisioning and stay online continuously for short-term events. This identical environment ensures that instructors can conduct complex 3D workflows without the typical troubleshooting delays caused by heterogeneous student hardware.
CONCLUSION: MorphoCloud demonstrates that true scientific accessibility requires not just open data and software, but also open infrastructure. By abstracting the complexities of cloud administration into a simple, command-driven interface, MorphoCloud empowers researchers at under-resourced institutions to engage in high-performance morphological analysis and AI-assisted segmentation.},
}
MeSH Terms:
show MeSH Terms
hide MeSH Terms
*Software
*Imaging, Three-Dimensional
Humans
*Data Analysis
RevDate: 2026-04-13
CmpDate: 2026-04-13
EvalTest: a web-based tool for the assessment of diagnostic test performance.
Biochemia medica, 36(2):020101.
INTRODUCTION: Accurate diagnostic tests are essential in clinical and laboratory medicine. Evaluation of diagnostic test performance requires advanced statistical expertise and the use of specialized or proprietary software. The aim of this work is to develop an open-source R Shiny application for facilitating diagnostic test evaluation by integrating statistical rigor with user-friendly interactivity.
MATERIALS AND METHODS: The EvalTest application was developed in the R programming language using the Shiny framework and released as an open-source package on the Comprehensive R Archive Network, with the full source code available on GitHub. In addition, the application is available on a cloud platform and accessible via web browser. Statistical formulas used to compute diagnostic performance indicators and their confidence intervals were implemented within the R environment to ensure transparency and reproducibility.
RESULTS: The developed application provides an interactive interface for importing Excel datasets, setting test variable type, selecting test and reference variables, and specifying disease prevalence. It automatically computes key diagnostic performance indicators, including sensitivity, specificity, predictive values, likelihood ratios, accuracy, the Youden index, and the area under the curve (AUC), along with their 95% confidence intervals. EvalTest also generates confusion matrices, receiver operating characteristic (ROC) curves with confidence bands, and identifies the optimal cutoff for quantitative tests. All numerical and graphical outputs can be exported in suitable formats to facilitate reporting and documentation.
CONCLUSIONS: EvalTest provides an open and reproducible solution for diagnostic test evaluation by computing and visualizing key performance measures with their confidence intervals, supporting its use in clinical and research settings.
Additional Links: PMID-41971520
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41971520,
year = {2026},
author = {Ayad, N},
title = {EvalTest: a web-based tool for the assessment of diagnostic test performance.},
journal = {Biochemia medica},
volume = {36},
number = {2},
pages = {020101},
pmid = {41971520},
issn = {1846-7482},
mesh = {Humans ; *Software ; *Internet ; *Diagnostic Tests, Routine ; ROC Curve ; Reproducibility of Results ; },
abstract = {INTRODUCTION: Accurate diagnostic tests are essential in clinical and laboratory medicine. Evaluation of diagnostic test performance requires advanced statistical expertise and the use of specialized or proprietary software. The aim of this work is to develop an open-source R Shiny application for facilitating diagnostic test evaluation by integrating statistical rigor with user-friendly interactivity.
MATERIALS AND METHODS: The EvalTest application was developed in the R programming language using the Shiny framework and released as an open-source package on the Comprehensive R Archive Network, with the full source code available on GitHub. In addition, the application is available on a cloud platform and accessible via web browser. Statistical formulas used to compute diagnostic performance indicators and their confidence intervals were implemented within the R environment to ensure transparency and reproducibility.
RESULTS: The developed application provides an interactive interface for importing Excel datasets, setting test variable type, selecting test and reference variables, and specifying disease prevalence. It automatically computes key diagnostic performance indicators, including sensitivity, specificity, predictive values, likelihood ratios, accuracy, the Youden index, and the area under the curve (AUC), along with their 95% confidence intervals. EvalTest also generates confusion matrices, receiver operating characteristic (ROC) curves with confidence bands, and identifies the optimal cutoff for quantitative tests. All numerical and graphical outputs can be exported in suitable formats to facilitate reporting and documentation.
CONCLUSIONS: EvalTest provides an open and reproducible solution for diagnostic test evaluation by computing and visualizing key performance measures with their confidence intervals, supporting its use in clinical and research settings.},
}
MeSH Terms:
show MeSH Terms
hide MeSH Terms
Humans
*Software
*Internet
*Diagnostic Tests, Routine
ROC Curve
Reproducibility of Results
RevDate: 2026-04-10
CmpDate: 2026-04-10
Automated Proofreading of Digitally Reconstructed Neural Morphology Enhances Accuracy, Scalability, and Standardization.
bioRxiv : the preprint server for biology pii:2026.03.27.714818.
BACKGROUND: The rapid expansion of large-scale neuroscience datasets has increased the need for automated, accurate, and standardized quality control (QC). Manual proofreading of 3-dimensional neural morphology (SWC files) remains labor-intensive, error-prone, and non-scalable. We developed and evaluated a fully automated, machine-learning driven QC pipeline to standardize neural reconstructions, detect and correct structural anomalies, and rectify dendritic labeling in pyramidal neurons.
METHODS: We developed an end-to-end, cloud-deployed pipeline for automated QC, correction, and standardization of SWC-formatted neural morphologies. The framework integrates deterministic structural normalization, topology repair, geometric correction, quantitative morphometric analysis, and graph-based dendritic relabeling within a containerized React/Flask architecture deployed on Amazon Web Services. Rule-based algorithms systematically detect, classify, and correct structural irregularities including overlapping nodes, spurious side branches, non-positive radii, disconnected components, and anomalously long parent-child connections. A graph convolutional network, trained on Sholl-derived features from 20,500 pyramidal neurons, performs dendritic relabeling. Model training employed an 80/10/10 train-validation-test split with adaptive learning-rate scheduling and distributed execution across ten runs to evaluate stability and reproducibility. The pipeline generates images of the final product and computes quantitative morphometrics using L-Measure.
RESULTS: All neuronal reconstructions were processed without manual intervention. Automated normalization and topology repair restored structurally coherent and biologically accurate morphologies suitable for quantitative analysis and visualization without data loss. Dendritic relabeling achieved a mean accuracy of 99.51%, consistent between validation and test sets, with class-weighted precision of 0.978, recall of 0.977, and F1-score of 0.977. Enforcing a single apical dendritic tree per neuron improved anatomical consistency without reducing classification performance. Distributed training completed all runs in approximately 25 hours, demonstrating scalability and reproducibility for large datasets.
CONCLUSIONS: We present a fully automated and cloud-scalable open-source pipeline for standardizing neural reconstructions and performing biologically consistent dendritic classification with near-perfect accuracy. The automated correction and relabeling procedures do not alter or compromise the size or unaffected morphological detail of the original SWC files, ensuring geometric fidelity and compatibility with downstream analysis tools. This open-access framework provides a robust foundation for high-throughput neural morphology curation and large-scale neuroanatomical analysis.
Additional Links: PMID-41959061
Full Text:
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41959061,
year = {2026},
author = {Emissah, HA and Tecuatl, C and Ascoli, GA},
title = {Automated Proofreading of Digitally Reconstructed Neural Morphology Enhances Accuracy, Scalability, and Standardization.},
journal = {bioRxiv : the preprint server for biology},
volume = {},
number = {},
pages = {},
doi = {10.64898/2026.03.27.714818},
pmid = {41959061},
issn = {2692-8205},
abstract = {BACKGROUND: The rapid expansion of large-scale neuroscience datasets has increased the need for automated, accurate, and standardized quality control (QC). Manual proofreading of 3-dimensional neural morphology (SWC files) remains labor-intensive, error-prone, and non-scalable. We developed and evaluated a fully automated, machine-learning driven QC pipeline to standardize neural reconstructions, detect and correct structural anomalies, and rectify dendritic labeling in pyramidal neurons.
METHODS: We developed an end-to-end, cloud-deployed pipeline for automated QC, correction, and standardization of SWC-formatted neural morphologies. The framework integrates deterministic structural normalization, topology repair, geometric correction, quantitative morphometric analysis, and graph-based dendritic relabeling within a containerized React/Flask architecture deployed on Amazon Web Services. Rule-based algorithms systematically detect, classify, and correct structural irregularities including overlapping nodes, spurious side branches, non-positive radii, disconnected components, and anomalously long parent-child connections. A graph convolutional network, trained on Sholl-derived features from 20,500 pyramidal neurons, performs dendritic relabeling. Model training employed an 80/10/10 train-validation-test split with adaptive learning-rate scheduling and distributed execution across ten runs to evaluate stability and reproducibility. The pipeline generates images of the final product and computes quantitative morphometrics using L-Measure.
RESULTS: All neuronal reconstructions were processed without manual intervention. Automated normalization and topology repair restored structurally coherent and biologically accurate morphologies suitable for quantitative analysis and visualization without data loss. Dendritic relabeling achieved a mean accuracy of 99.51%, consistent between validation and test sets, with class-weighted precision of 0.978, recall of 0.977, and F1-score of 0.977. Enforcing a single apical dendritic tree per neuron improved anatomical consistency without reducing classification performance. Distributed training completed all runs in approximately 25 hours, demonstrating scalability and reproducibility for large datasets.
CONCLUSIONS: We present a fully automated and cloud-scalable open-source pipeline for standardizing neural reconstructions and performing biologically consistent dendritic classification with near-perfect accuracy. The automated correction and relabeling procedures do not alter or compromise the size or unaffected morphological detail of the original SWC files, ensuring geometric fidelity and compatibility with downstream analysis tools. This open-access framework provides a robust foundation for high-throughput neural morphology curation and large-scale neuroanatomical analysis.},
}
RevDate: 2026-04-10
CmpDate: 2026-04-10
Code-Based Versus AutoML Methods for Pill Recognition in Clinical Settings: Comparative Performance Study.
JMIR medical informatics, 14:e79160 pii:v14i1e79160.
BACKGROUND: Visual identification and verification of medications during dispensing and administration are prone to human error, particularly in high-pressure and high-volume clinical settings. Misidentification can lead to medication errors, posing risks to patient safety and placing a burden on health care systems. Recent advances in computer vision and object detection offer promising solutions for automated solid oral dosage form (pill) recognition. However, comprehensive studies comparing code-based and no-code (automated machine learning [AutoML]) approaches for pill recognition are lacking.
OBJECTIVE: This study aimed to evaluate and compare the performance, cost, usability, and deployment feasibility of pill recognition models developed with Ultralytics YOLO11 and 3 cloud-based AutoML platforms (Amazon Rekognition Custom Labels, Google Vertex artificial intelligence [AI] AutoML Vision, and Microsoft Azure Custom Vision) using multiple datasets, including real-world clinical images.
METHODS: Five training subsets of increasing size (1230, 3450, 7380, 14,400, and 26,880 images) from 30 commonly dispensed medications were used to train models on YOLO11 and 3 AutoML platforms. Models were evaluated on 6 datasets from different environments: clinical images from 3 hospitals, a verification dataset, a laboratory dataset, and an exhaustive testing set. Performance metrics, including accuracy, precision, recall, and mean average precision, were calculated. We evaluated the impact of training data size on performance and benchmarked training time, platform costs, and limitations.
RESULTS: No single platform dominated across all test environments. On the verification dataset (optimal conditions), accuracy ranged from 80.83% (YOLO11) to 91.60% (Google Vertex AI) when trained with the full training dataset. YOLO11 showed consistent performance improvement with increasing training data (accuracy: 63.06%-80.83%) and achieved near-perfect precision and mean average precision scores (0.95-1.00). Google Vertex AI reached above 90% accuracy on 3 training subsets but showed unpredictable declines. Amazon Rekognition maintained near-perfect precision (0.92-1.00) but had the highest false negative rates (up to 0.74), missing many pills. Custom Vision demonstrated steady performance improvements (77.08%-85.62% accuracy) but lagged behind other AutoML platforms, probably due to its older YOLOv2-based architecture. On clinical datasets, accuracy fluctuated (20.62%-90%) depending on the dataset and platform. Training costs and time varied: YOLO11 (open-source), Microsoft Azure (US $9.50-US $28.60, allowed user-predefined training duration), Google Vertex AI (US $69.30 with consistent 2.5-3-hour training times), and Amazon Rekognition (US $5.43-US $43.89 with size-dependent training time scaling, reaching nearly 40 hours on the full 26,880-image dataset).
CONCLUSIONS: Each platform offers distinct advantages and trade-offs: YOLO11 provides the highest flexibility and lowest platform costs but requires technical expertise, while AutoML platforms can offer high performance at a higher cost but with limited user control, introducing unpredictability. The performance variations demonstrate that successful clinical deployment requires careful platform selection based on specific performance requirements, budget constraints, and available technical resources, followed by rigorous validation using real-world, representative data to ensure patient safety in clinical workflows.
Additional Links: PMID-41961529
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41961529,
year = {2026},
author = {Ashraf, AR and Rádli, R and Vörösházi, Z and Fittler, A},
title = {Code-Based Versus AutoML Methods for Pill Recognition in Clinical Settings: Comparative Performance Study.},
journal = {JMIR medical informatics},
volume = {14},
number = {},
pages = {e79160},
doi = {10.2196/79160},
pmid = {41961529},
issn = {2291-9694},
mesh = {Humans ; *Machine Learning ; Medication Errors/prevention & control ; Artificial Intelligence ; },
abstract = {BACKGROUND: Visual identification and verification of medications during dispensing and administration are prone to human error, particularly in high-pressure and high-volume clinical settings. Misidentification can lead to medication errors, posing risks to patient safety and placing a burden on health care systems. Recent advances in computer vision and object detection offer promising solutions for automated solid oral dosage form (pill) recognition. However, comprehensive studies comparing code-based and no-code (automated machine learning [AutoML]) approaches for pill recognition are lacking.
OBJECTIVE: This study aimed to evaluate and compare the performance, cost, usability, and deployment feasibility of pill recognition models developed with Ultralytics YOLO11 and 3 cloud-based AutoML platforms (Amazon Rekognition Custom Labels, Google Vertex artificial intelligence [AI] AutoML Vision, and Microsoft Azure Custom Vision) using multiple datasets, including real-world clinical images.
METHODS: Five training subsets of increasing size (1230, 3450, 7380, 14,400, and 26,880 images) from 30 commonly dispensed medications were used to train models on YOLO11 and 3 AutoML platforms. Models were evaluated on 6 datasets from different environments: clinical images from 3 hospitals, a verification dataset, a laboratory dataset, and an exhaustive testing set. Performance metrics, including accuracy, precision, recall, and mean average precision, were calculated. We evaluated the impact of training data size on performance and benchmarked training time, platform costs, and limitations.
RESULTS: No single platform dominated across all test environments. On the verification dataset (optimal conditions), accuracy ranged from 80.83% (YOLO11) to 91.60% (Google Vertex AI) when trained with the full training dataset. YOLO11 showed consistent performance improvement with increasing training data (accuracy: 63.06%-80.83%) and achieved near-perfect precision and mean average precision scores (0.95-1.00). Google Vertex AI reached above 90% accuracy on 3 training subsets but showed unpredictable declines. Amazon Rekognition maintained near-perfect precision (0.92-1.00) but had the highest false negative rates (up to 0.74), missing many pills. Custom Vision demonstrated steady performance improvements (77.08%-85.62% accuracy) but lagged behind other AutoML platforms, probably due to its older YOLOv2-based architecture. On clinical datasets, accuracy fluctuated (20.62%-90%) depending on the dataset and platform. Training costs and time varied: YOLO11 (open-source), Microsoft Azure (US $9.50-US $28.60, allowed user-predefined training duration), Google Vertex AI (US $69.30 with consistent 2.5-3-hour training times), and Amazon Rekognition (US $5.43-US $43.89 with size-dependent training time scaling, reaching nearly 40 hours on the full 26,880-image dataset).
CONCLUSIONS: Each platform offers distinct advantages and trade-offs: YOLO11 provides the highest flexibility and lowest platform costs but requires technical expertise, while AutoML platforms can offer high performance at a higher cost but with limited user control, introducing unpredictability. The performance variations demonstrate that successful clinical deployment requires careful platform selection based on specific performance requirements, budget constraints, and available technical resources, followed by rigorous validation using real-world, representative data to ensure patient safety in clinical workflows.},
}
MeSH Terms:
show MeSH Terms
hide MeSH Terms
Humans
*Machine Learning
Medication Errors/prevention & control
Artificial Intelligence
RevDate: 2026-04-09
CmpDate: 2026-04-09
A field boundary dataset for the canadian prairies derived from sentinel-2 imagery using the segment anything model.
Data in brief, 66:112691.
This article presents a Prairie-wide spatial vector dataset of agricultural field boundaries across Alberta, Saskatchewan, and Manitoba, Canada. The dataset was generated from Sentinel-2 Level-2A surface reflectance imagery (10 m spatial resolution) using an automated segmentation workflow based on the Segment Anything Model version 2 (SAM2). Sentinel-2 imagery was accessed in Google Earth Engine (GEE), filtered using cloud/quality masks, and aggregated into seasonal RGB composites representing key crop phenological periods (early-, mid-, and late-season) for large-scale segmentation input. The composite images were exported and processed with a SAM2 segmentation pipeline (tiled inference and mosaic-based post-processing) to delineate candidate field units without manually labeled training samples. Segmentation outputs were then post-processed using rule-based filtering and topology repair (removal of small artifacts/sliver polygons, hole filling, boundary cleaning, and geometry validity correction). Final vector outputs are distributed in ESRI Shapefile and GeoParquet formats with geometry attributes for downstream spatial analysis. The workflow code and processing scripts are provided to support reproducibility and adaptation to other regions. This dataset provides a consistent field-scale boundary reference layer for agricultural monitoring, crop and yield modeling, soil and environmental analysis, cropland mapping, land management, and machine-learning applications across the Canadian Prairies. •Prairie-wide field boundary datasets generated using automated segmentation of seasonal Sentinel-2 composites with the Segment Anything Model version 2, followed by vectorization and topological post-processing.•Vector outputs provided in both Shapefile and GeoParquet formats, enabling efficient use in traditional GIS, cloud-native, and big-data geospatial workflows.•A consistent, large-scale field boundary reference dataset supporting agricultural analysis, spatial modeling, cropland mapping, and machine learning applications across the Canadian Prairies.
Additional Links: PMID-41952847
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41952847,
year = {2026},
author = {Ha, T and Nketia, KA and Neudorf, S and Shirtliffe, SJ},
title = {A field boundary dataset for the canadian prairies derived from sentinel-2 imagery using the segment anything model.},
journal = {Data in brief},
volume = {66},
number = {},
pages = {112691},
pmid = {41952847},
issn = {2352-3409},
abstract = {This article presents a Prairie-wide spatial vector dataset of agricultural field boundaries across Alberta, Saskatchewan, and Manitoba, Canada. The dataset was generated from Sentinel-2 Level-2A surface reflectance imagery (10 m spatial resolution) using an automated segmentation workflow based on the Segment Anything Model version 2 (SAM2). Sentinel-2 imagery was accessed in Google Earth Engine (GEE), filtered using cloud/quality masks, and aggregated into seasonal RGB composites representing key crop phenological periods (early-, mid-, and late-season) for large-scale segmentation input. The composite images were exported and processed with a SAM2 segmentation pipeline (tiled inference and mosaic-based post-processing) to delineate candidate field units without manually labeled training samples. Segmentation outputs were then post-processed using rule-based filtering and topology repair (removal of small artifacts/sliver polygons, hole filling, boundary cleaning, and geometry validity correction). Final vector outputs are distributed in ESRI Shapefile and GeoParquet formats with geometry attributes for downstream spatial analysis. The workflow code and processing scripts are provided to support reproducibility and adaptation to other regions. This dataset provides a consistent field-scale boundary reference layer for agricultural monitoring, crop and yield modeling, soil and environmental analysis, cropland mapping, land management, and machine-learning applications across the Canadian Prairies. •Prairie-wide field boundary datasets generated using automated segmentation of seasonal Sentinel-2 composites with the Segment Anything Model version 2, followed by vectorization and topological post-processing.•Vector outputs provided in both Shapefile and GeoParquet formats, enabling efficient use in traditional GIS, cloud-native, and big-data geospatial workflows.•A consistent, large-scale field boundary reference dataset supporting agricultural analysis, spatial modeling, cropland mapping, and machine learning applications across the Canadian Prairies.},
}
RevDate: 2026-04-07
A bi-level mobility-aware deep reinforcement learning approach for fault-tolerant task offloading in vehicular edge-cloud computing.
Scientific reports pii:10.1038/s41598-026-45763-z [Epub ahead of print].
Vehicular Edge Cloud Computing (VECC) has emerged as a promising paradigm to support delay-sensitive and computation-intensive applications in Intelligent Transportation Systems (ITS). However, dynamic traffic patterns, fluctuating network conditions, and uncertain resource availability often result in high task latency and service failures. To address these challenges, this paper proposes a bi-level Deep Q-Network (DQN)-based mobility-aware framework for fault-tolerant task offloading in VECC environments. Unlike existing approaches that offload tasks solely to the receiving Roadside Unit (RSU), the proposed framework introduces a level-1 DQN agent that performs high-level scheduling by selecting the most suitable RSU for task execution based on its workload, network latency, and failure rate. In parallel, level-2 DQN agents at each RSU handle low-level decisions, including task allocation and failure-recovery strategy selection, choosing among First Result, Recovery Block, or Retry mechanisms. To eliminate centralized dependency, the level-1 DQN is replicated across RSUs at the edge layer, ensuring high accessibility and resilience for distributed scheduling. Extensive simulations conducted using an integrated SimPy/SUMO environment demonstrate that, under heavy and imbalanced traffic, the proposed bi-level DQN improves the total reward by 7.7% to 37.8% and reduces the task failure rate by 29% to 63% relative to bi-level PPO, Greedy, and No-Forwarding baselines, based on averages over the final 40 training episodes.
Additional Links: PMID-41946871
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41946871,
year = {2026},
author = {Babaiyan, V and Bushehrian, O and Javidan, R},
title = {A bi-level mobility-aware deep reinforcement learning approach for fault-tolerant task offloading in vehicular edge-cloud computing.},
journal = {Scientific reports},
volume = {},
number = {},
pages = {},
doi = {10.1038/s41598-026-45763-z},
pmid = {41946871},
issn = {2045-2322},
abstract = {Vehicular Edge Cloud Computing (VECC) has emerged as a promising paradigm to support delay-sensitive and computation-intensive applications in Intelligent Transportation Systems (ITS). However, dynamic traffic patterns, fluctuating network conditions, and uncertain resource availability often result in high task latency and service failures. To address these challenges, this paper proposes a bi-level Deep Q-Network (DQN)-based mobility-aware framework for fault-tolerant task offloading in VECC environments. Unlike existing approaches that offload tasks solely to the receiving Roadside Unit (RSU), the proposed framework introduces a level-1 DQN agent that performs high-level scheduling by selecting the most suitable RSU for task execution based on its workload, network latency, and failure rate. In parallel, level-2 DQN agents at each RSU handle low-level decisions, including task allocation and failure-recovery strategy selection, choosing among First Result, Recovery Block, or Retry mechanisms. To eliminate centralized dependency, the level-1 DQN is replicated across RSUs at the edge layer, ensuring high accessibility and resilience for distributed scheduling. Extensive simulations conducted using an integrated SimPy/SUMO environment demonstrate that, under heavy and imbalanced traffic, the proposed bi-level DQN improves the total reward by 7.7% to 37.8% and reduces the task failure rate by 29% to 63% relative to bi-level PPO, Greedy, and No-Forwarding baselines, based on averages over the final 40 training episodes.},
}
RevDate: 2026-04-03
CmpDate: 2026-04-03
AI-Enhanced Adaptive Virtual Screening Platform Enabling Exploration of 69 Billion Molecules Discovers Structurally Validated FSP1 Inhibitors.
bioRxiv : the preprint server for biology pii:2023.04.25.537981.
Identifying potent lead molecules for specific targets remains a major bottleneck in drug discovery. As structural information about proteins becomes increasingly available, ultra-large virtual screenings (ULVSs) which computationally evaluate billions of molecules offer a powerful way to accelerate early-stage drug discovery. Here, we introduce AdaptiveFlow, an open-source platform designed to make ULVSs more accessible, scalable, and efficient. AdaptiveFlow provides free access to a screening-ready version of the Enamine REAL Space, the largest library of ready-to-dock, drug-like molecules, containing 69 billion compounds that we prepared using the ligand preparation module of the platform. A key innovation of the platform is its use of a multi-dimensional grid of molecular properties, which helps researchers explore and prioritize chemical space more effectively and reduce the computational costs by a factor of approximately 1000. This grid forms the basis of a new method for identifying promising regions of chemical space, enabling systematic exploration and prioritization of compound libraries. An optional active learning component can further accelerate this process by adaptively steering the search toward molecules most likely to bind a given target. To support a broad range of applications, AdaptiveFlow is compatible with over 1,500 docking methods. The platform achieves near-linear scaling on up to 5.6 million CPUs in the AWS Cloud, setting a new benchmark for large-scale cloud computing in drug discovery. Using this approach, we identified nanomolar inhibitors of two disease-relevant targets: ferroptosis suppressor protein 1 (FSP1) and poly(ADP-ribose) polymerase 1 (PARP-1). By leveraging newly solved crystal structures of FSP1 in complex with NAD+, FAD, and coenzyme Q1, we validated these hits experimentally and determined the first co-crystal structures of FSP1 bound to small-molecule inhibitors, enabling insights into inhibitor binding mechanisms previously unknown. With its high scalability, flexibility, and open accessibility, AdaptiveFlow offers a powerful new resource for discovering and optimizing drug candidates at an unprecedented scale and speed.
Additional Links: PMID-41929058
Full Text:
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41929058,
year = {2026},
author = {Cecchini, D and Nigam, A and Tang, M and Reis, J and Koop, M and Gottinger, A and Nicoll, CR and Wang, Y and Jayaraj, A and Cinaroglu, SS and Törner, R and Malets, Y and Gehev, M and Padmanabha Das, KM and Churion, K and Kim, J and Thomas, N and Li, Y and Seo, HS and Dhe-Paganon, S and Secker, C and Haddadnia, M and Hasson, A and Li, M and Kumar, A and Levin-Konigsberg, R and Choi, EB and Shapiro, GI and Cox, H and Sebastian, L and Braithwaite, C and Bashyal, P and Radchenko, DS and Kumar, A and Yang, L and Aquilanti, PY and Gabb, H and Alhossary, A and Wagner, G and Aspuru-Guzik, A and Moroz, YS and Kalodimos, CG and Fackeldey, K and Schuetz, JD and Mattevi, A and Arthanari, H and Gorgulla, C},
title = {AI-Enhanced Adaptive Virtual Screening Platform Enabling Exploration of 69 Billion Molecules Discovers Structurally Validated FSP1 Inhibitors.},
journal = {bioRxiv : the preprint server for biology},
volume = {},
number = {},
pages = {},
doi = {10.1101/2023.04.25.537981},
pmid = {41929058},
issn = {2692-8205},
abstract = {Identifying potent lead molecules for specific targets remains a major bottleneck in drug discovery. As structural information about proteins becomes increasingly available, ultra-large virtual screenings (ULVSs) which computationally evaluate billions of molecules offer a powerful way to accelerate early-stage drug discovery. Here, we introduce AdaptiveFlow, an open-source platform designed to make ULVSs more accessible, scalable, and efficient. AdaptiveFlow provides free access to a screening-ready version of the Enamine REAL Space, the largest library of ready-to-dock, drug-like molecules, containing 69 billion compounds that we prepared using the ligand preparation module of the platform. A key innovation of the platform is its use of a multi-dimensional grid of molecular properties, which helps researchers explore and prioritize chemical space more effectively and reduce the computational costs by a factor of approximately 1000. This grid forms the basis of a new method for identifying promising regions of chemical space, enabling systematic exploration and prioritization of compound libraries. An optional active learning component can further accelerate this process by adaptively steering the search toward molecules most likely to bind a given target. To support a broad range of applications, AdaptiveFlow is compatible with over 1,500 docking methods. The platform achieves near-linear scaling on up to 5.6 million CPUs in the AWS Cloud, setting a new benchmark for large-scale cloud computing in drug discovery. Using this approach, we identified nanomolar inhibitors of two disease-relevant targets: ferroptosis suppressor protein 1 (FSP1) and poly(ADP-ribose) polymerase 1 (PARP-1). By leveraging newly solved crystal structures of FSP1 in complex with NAD+, FAD, and coenzyme Q1, we validated these hits experimentally and determined the first co-crystal structures of FSP1 bound to small-molecule inhibitors, enabling insights into inhibitor binding mechanisms previously unknown. With its high scalability, flexibility, and open accessibility, AdaptiveFlow offers a powerful new resource for discovering and optimizing drug candidates at an unprecedented scale and speed.},
}
RevDate: 2026-04-03
Artificial Intelligence-Assisted reflectance confocal microscopy for Real-Time intraoperative margin assessment in oral squamous cell carcinoma.
Oral oncology, 177:107939 pii:S1368-8375(26)00092-8 [Epub ahead of print].
BACKGROUND: Oral cavity squamous cell carcinoma (OSCC) is a global health burden, where negative margins are essential for reducing recurrence and improving survival. Intraoperative frozen-section analysis is limited by time, sampling error, and interpretive variability, underscoring the need for more reliable margin assessment. Reflectance confocal microscopy (RCM) enables real-time, in vivo high-resolution imaging, but accuracy depends on expert interpretation. This study evaluated the diagnostic performance of an artificial intelligence (AI)-driven model for RCM in OSCC, aiming to develop a point-of-care platform for intraoperative use.
METHODS: Patients with biopsy-confirmed OSCC underwent in vivo RCM imaging using a handheld intraoral probe before biopsy. Histopathology was the reference standard. A deep learning model was developed with the Google Cloud Vertex AI Automated Machine Learning (AutoML) Vision platform and trained on 4,090 annotated RCM images (1,998 benign, 2,092 malignant). Performance was compared with blinded expert pathologist and RCM readers.
RESULTS: The AI model achieved an area under the precision-recall curve (AUC-PR) of 0.99 and an area under the receiver operating characteristic curve (AUC-ROC) of 0.99, with sensitivity 98.09%, specificity 95.00%, accuracy 96.58%, positive predictive value (PPV) 95.35%, and negative predictive value (NPV) 97.94%. Expert readers showed sensitivity 90.00%, specificity 98.30%, accuracy 94.15%, PPV 88.20%, and NPV 96.60%. Inter-reader agreement was 95.00% for benign and 81.70% for malignant cases.
CONCLUSIONS: AI-driven RCM interpretation provides an accurate, rapid, noninvasive approach for OSCC diagnosis and intraoperative margin assessment. It outperformed expert readers and can reduce reliance on frozen-section analysis, streamline workflows, and improve outcomes.
Additional Links: PMID-41932031
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41932031,
year = {2026},
author = {Hosseinzadeh, F and Zanoni, D and de Souza França, PD and Valero, C and Peterson, G and Ardigo, M and Ghossein, R and Dusza, SW and Pillarsetty, N and Kose, K and Wong, RJ and Ganly, I and Rajadhyaksha, M and Patel, SG},
title = {Artificial Intelligence-Assisted reflectance confocal microscopy for Real-Time intraoperative margin assessment in oral squamous cell carcinoma.},
journal = {Oral oncology},
volume = {177},
number = {},
pages = {107939},
doi = {10.1016/j.oraloncology.2026.107939},
pmid = {41932031},
issn = {1879-0593},
abstract = {BACKGROUND: Oral cavity squamous cell carcinoma (OSCC) is a global health burden, where negative margins are essential for reducing recurrence and improving survival. Intraoperative frozen-section analysis is limited by time, sampling error, and interpretive variability, underscoring the need for more reliable margin assessment. Reflectance confocal microscopy (RCM) enables real-time, in vivo high-resolution imaging, but accuracy depends on expert interpretation. This study evaluated the diagnostic performance of an artificial intelligence (AI)-driven model for RCM in OSCC, aiming to develop a point-of-care platform for intraoperative use.
METHODS: Patients with biopsy-confirmed OSCC underwent in vivo RCM imaging using a handheld intraoral probe before biopsy. Histopathology was the reference standard. A deep learning model was developed with the Google Cloud Vertex AI Automated Machine Learning (AutoML) Vision platform and trained on 4,090 annotated RCM images (1,998 benign, 2,092 malignant). Performance was compared with blinded expert pathologist and RCM readers.
RESULTS: The AI model achieved an area under the precision-recall curve (AUC-PR) of 0.99 and an area under the receiver operating characteristic curve (AUC-ROC) of 0.99, with sensitivity 98.09%, specificity 95.00%, accuracy 96.58%, positive predictive value (PPV) 95.35%, and negative predictive value (NPV) 97.94%. Expert readers showed sensitivity 90.00%, specificity 98.30%, accuracy 94.15%, PPV 88.20%, and NPV 96.60%. Inter-reader agreement was 95.00% for benign and 81.70% for malignant cases.
CONCLUSIONS: AI-driven RCM interpretation provides an accurate, rapid, noninvasive approach for OSCC diagnosis and intraoperative margin assessment. It outperformed expert readers and can reduce reliance on frozen-section analysis, streamline workflows, and improve outcomes.},
}
RevDate: 2026-04-01
An innovative framework for secure data transmission using machine learning based classification and ElGamal encryption with Ramanujan primes.
Scientific reports, 16(1):.
The secure processing and transmission of sensitive data has arisen as a crucial concern in the modern digital world. This paper presents a conditional ElGamal framework in which the prime modulus is chosen from either conventional primes or the Ramanujan prime based on data sensitivity, while the encryption and decryption techniques remain identical to the standard ElGamal scheme. To classify data into normal and highly sensitive categories, several machine learning models are evaluated among which the Support Vector Machine model achieves highest mean accuracy under 5-fold cross-validation. The normal sensitive data is encrypted using the standard ElGamal encryption method whereas highly sensitive data is encrypted by using the proposed variant with Ramanujan prime-based key generation. The security analysis confirmed that the proposed framework preserves the security of standard ElGamal scheme under known-plain text attack and chosen-plain text attack. The choice of Ramanujan primes affects only the key-generation procedure and does not change or strengthen the theoretical security guarantees of ElGamal scheme. To ensure both data credibility and reliability, a hash-based message authentication code is appended to each message before transmission. The encryption-decryption time and the average data rate for highly sensitive data is less compared to the normal sensitive data which ensures the less CPU memory usage of the new framework. Hence, the proposed framework can be suitable for applications in cloud computing, healthcare, and e-governance environments.
Additional Links: PMID-41748746
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41748746,
year = {2026},
author = {Haritha, N and Narayanan, V and Srikanth, R},
title = {An innovative framework for secure data transmission using machine learning based classification and ElGamal encryption with Ramanujan primes.},
journal = {Scientific reports},
volume = {16},
number = {1},
pages = {},
pmid = {41748746},
issn = {2045-2322},
abstract = {The secure processing and transmission of sensitive data has arisen as a crucial concern in the modern digital world. This paper presents a conditional ElGamal framework in which the prime modulus is chosen from either conventional primes or the Ramanujan prime based on data sensitivity, while the encryption and decryption techniques remain identical to the standard ElGamal scheme. To classify data into normal and highly sensitive categories, several machine learning models are evaluated among which the Support Vector Machine model achieves highest mean accuracy under 5-fold cross-validation. The normal sensitive data is encrypted using the standard ElGamal encryption method whereas highly sensitive data is encrypted by using the proposed variant with Ramanujan prime-based key generation. The security analysis confirmed that the proposed framework preserves the security of standard ElGamal scheme under known-plain text attack and chosen-plain text attack. The choice of Ramanujan primes affects only the key-generation procedure and does not change or strengthen the theoretical security guarantees of ElGamal scheme. To ensure both data credibility and reliability, a hash-based message authentication code is appended to each message before transmission. The encryption-decryption time and the average data rate for highly sensitive data is less compared to the normal sensitive data which ensures the less CPU memory usage of the new framework. Hence, the proposed framework can be suitable for applications in cloud computing, healthcare, and e-governance environments.},
}
RevDate: 2026-04-02
CmpDate: 2026-04-02
GermVarX: A Robust Workflow for Joint Germline Variant Exploration in whole-exome sequencing cohorts.
PloS one, 21(4):e0345561 pii:PONE-D-25-50266.
Accurate identification of germline variants from whole-exome sequencing (WES) data is foundational to population genetics, disease association studies, and clinical genomics. However, variant calling across cohorts poses challenges in scalability, consistency, and reproducibility. We present GermVarX, a fully automated, modular workflow for joint germline variant discovery and exploration in WES cohort studies. A key feature of GermVarX is its implementation of joint variant calling, enabling simultaneous genotyping of multiple samples to produce a single, high-confidence multi-sample VCF, optimized for downstream analyses. Developed with Nextflow DSL2, GermVarX ensures reproducibility, portability, and efficient parallelization across diverse computing environments, including workstations, HPC clusters, and cloud platforms. The workflow integrates two state-of-the-art variant callers-GATK HaplotypeCaller and DeepVariant-with joint genotyping performed via GATK or GLnexus. To increase reliability, GermVarX supports consensus generation between callers, coupled with sample- and cohort-level quality control, functional annotation using the Variant Effect Predictor (VEP), and unified reporting through MultiQC. In addition, it provides PLINK-compatible outputs, facilitating seamless integration with statistical and association analyses. GermVarX delivers a scalable, reproducible, and comprehensive solution for germline variant analysis in large WES studies, supporting consistent and interpretable results for both research and clinical genomics. The source code and usage instructions are available at https://github.com/thaontp711/GermVarX.
Additional Links: PMID-41926483
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41926483,
year = {2026},
author = {Nguyen, TTP and Nguyen, DD and Mai, TV and Nguyen, DK and Nguyen, TD and Truong, NTM and Ha, HH and Tran, TTH},
title = {GermVarX: A Robust Workflow for Joint Germline Variant Exploration in whole-exome sequencing cohorts.},
journal = {PloS one},
volume = {21},
number = {4},
pages = {e0345561},
doi = {10.1371/journal.pone.0345561},
pmid = {41926483},
issn = {1932-6203},
mesh = {Humans ; *Exome Sequencing/methods ; Workflow ; *Software ; *Germ-Line Mutation ; Cohort Studies ; Reproducibility of Results ; Genotype ; },
abstract = {Accurate identification of germline variants from whole-exome sequencing (WES) data is foundational to population genetics, disease association studies, and clinical genomics. However, variant calling across cohorts poses challenges in scalability, consistency, and reproducibility. We present GermVarX, a fully automated, modular workflow for joint germline variant discovery and exploration in WES cohort studies. A key feature of GermVarX is its implementation of joint variant calling, enabling simultaneous genotyping of multiple samples to produce a single, high-confidence multi-sample VCF, optimized for downstream analyses. Developed with Nextflow DSL2, GermVarX ensures reproducibility, portability, and efficient parallelization across diverse computing environments, including workstations, HPC clusters, and cloud platforms. The workflow integrates two state-of-the-art variant callers-GATK HaplotypeCaller and DeepVariant-with joint genotyping performed via GATK or GLnexus. To increase reliability, GermVarX supports consensus generation between callers, coupled with sample- and cohort-level quality control, functional annotation using the Variant Effect Predictor (VEP), and unified reporting through MultiQC. In addition, it provides PLINK-compatible outputs, facilitating seamless integration with statistical and association analyses. GermVarX delivers a scalable, reproducible, and comprehensive solution for germline variant analysis in large WES studies, supporting consistent and interpretable results for both research and clinical genomics. The source code and usage instructions are available at https://github.com/thaontp711/GermVarX.},
}
MeSH Terms:
show MeSH Terms
hide MeSH Terms
Humans
*Exome Sequencing/methods
Workflow
*Software
*Germ-Line Mutation
Cohort Studies
Reproducibility of Results
Genotype
RevDate: 2026-04-02
CmpDate: 2026-04-02
Robotic process automation for identifying missing codes on insurance claims.
BMJ health & care informatics, 33(1): pii:bmjhci-2025-101821.
OBJECTIVES: This study aimed to develop and implement robotic process automation (RPA) for identifying missing codes during insurance claim post-review at a tertiary hospital and to evaluate its feasibility and effectiveness METHODS: As a single-centre, operational implementation, an RPA system integrated with optical character recognition (OCR) and electronic medical record (EMR) platforms was developed using Blue Prism. The system compared 532 surgical procedure codes with 21 cutting device codes, automatically flagging discrepancies. Accuracy and efficiency were compared with manual review.
RESULTS: Between 1 and 31 May 2025, the RPA system analysed 61 claim statements and performed 199 OCR processes. The Google Cloud Vision API (application programming interface) achieved 100% detection accuracy without false positives, while Tesseract yielded lower accuracy. The RPA reduced average processing time from 120 (manual review) to 54 min, representing a 55% efficiency gain.
DISCUSSION: RPA reliably automated repetitive, rule-based administrative tasks, improving accuracy and standardisation of insurance claim audits. Secure system architecture ensured compliance with healthcare data protection standards. User-centred development and integration with EMR demonstrated feasibility in complex healthcare workflows.
CONCLUSION: Implementing RPA for insurance claim post-review significantly enhanced efficiency and accuracy, reduced administrative workload and provided a scalable model for digital transformation in healthcare administration.
Additional Links: PMID-41927105
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41927105,
year = {2026},
author = {Lee, J and Cho, JH and Lee, WJ and Kim, DH and Gong, YL and Kim, WT and Kim, CW},
title = {Robotic process automation for identifying missing codes on insurance claims.},
journal = {BMJ health & care informatics},
volume = {33},
number = {1},
pages = {},
doi = {10.1136/bmjhci-2025-101821},
pmid = {41927105},
issn = {2632-1009},
mesh = {Humans ; Electronic Health Records ; *Automation ; *Robotics/methods ; *Insurance Claim Review ; *Clinical Coding ; },
abstract = {OBJECTIVES: This study aimed to develop and implement robotic process automation (RPA) for identifying missing codes during insurance claim post-review at a tertiary hospital and to evaluate its feasibility and effectiveness METHODS: As a single-centre, operational implementation, an RPA system integrated with optical character recognition (OCR) and electronic medical record (EMR) platforms was developed using Blue Prism. The system compared 532 surgical procedure codes with 21 cutting device codes, automatically flagging discrepancies. Accuracy and efficiency were compared with manual review.
RESULTS: Between 1 and 31 May 2025, the RPA system analysed 61 claim statements and performed 199 OCR processes. The Google Cloud Vision API (application programming interface) achieved 100% detection accuracy without false positives, while Tesseract yielded lower accuracy. The RPA reduced average processing time from 120 (manual review) to 54 min, representing a 55% efficiency gain.
DISCUSSION: RPA reliably automated repetitive, rule-based administrative tasks, improving accuracy and standardisation of insurance claim audits. Secure system architecture ensured compliance with healthcare data protection standards. User-centred development and integration with EMR demonstrated feasibility in complex healthcare workflows.
CONCLUSION: Implementing RPA for insurance claim post-review significantly enhanced efficiency and accuracy, reduced administrative workload and provided a scalable model for digital transformation in healthcare administration.},
}
MeSH Terms:
show MeSH Terms
hide MeSH Terms
Humans
Electronic Health Records
*Automation
*Robotics/methods
*Insurance Claim Review
*Clinical Coding
RevDate: 2026-04-02
Slow drift aware dynamic risk assessment in cyber physical systems using quantum neutrosophic fuzzy modelling.
Scientific reports pii:10.1038/s41598-026-41732-8 [Epub ahead of print].
The dynamic risk assessment identifies, evaluates, and mitigates the vulnerabilities that compromise the reliability of the cyber-physical system (CPS). The slow degradation in network behaviour is known as the gradual and long-term shifts in traffic characteristics (variations in latency, packet flow distribution, and protocol level patterns) that accumulate over time. These subtle variations cause faults, stealthy intrusion, and network aging in CPS. However, the prevailing works overlooked the slow degradation that persists in the network behaviour. Thus, Quantum State-based Exponentially Weighted Moving Average (QS-EWMA)-based slow drift analysis is proposed. Initially, the medical devices are registered in the cloud server, followed by data sensing. During data transfer, the intrusion is detected by the Network Intrusion Detection System (NIDS). In NIDS, the data collection, pre-processing, and feature extraction are performed. Further, the QS-EWMA-based slow drift analysis is performed, followed by Sparse Random Walk Softplus S-shaped Rectified Gated Recurrent Unit (SRWSSR-GRU)-based intrusion detection. Next, the dependency-aware aggregation is performed using the Choquet k-Additive Function Integral Model (CkAFIM). Then, the uncertainty-based risk is assessed using Min-Max Normalization-based Neutrosophic Logic System (MMN-NLS). Here, the explainability is improved using SHapley Max-Abs Scaling Additive exPlanation (SMAS-HAP). Finally, the decision-making is performed using the Markov Linear Discrete-Time Propagation Decision Process (MLDTPDP). Hence, the proposed system effectively assessed the risk with an Indeterminacy Detection Rate (IDR) of 13.43%, showing superiority over prevailing works.
Additional Links: PMID-41927643
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41927643,
year = {2026},
author = {Kiruthika, K and Rajesh, A and Dhapekar, NK and Dubey, TK},
title = {Slow drift aware dynamic risk assessment in cyber physical systems using quantum neutrosophic fuzzy modelling.},
journal = {Scientific reports},
volume = {},
number = {},
pages = {},
doi = {10.1038/s41598-026-41732-8},
pmid = {41927643},
issn = {2045-2322},
abstract = {The dynamic risk assessment identifies, evaluates, and mitigates the vulnerabilities that compromise the reliability of the cyber-physical system (CPS). The slow degradation in network behaviour is known as the gradual and long-term shifts in traffic characteristics (variations in latency, packet flow distribution, and protocol level patterns) that accumulate over time. These subtle variations cause faults, stealthy intrusion, and network aging in CPS. However, the prevailing works overlooked the slow degradation that persists in the network behaviour. Thus, Quantum State-based Exponentially Weighted Moving Average (QS-EWMA)-based slow drift analysis is proposed. Initially, the medical devices are registered in the cloud server, followed by data sensing. During data transfer, the intrusion is detected by the Network Intrusion Detection System (NIDS). In NIDS, the data collection, pre-processing, and feature extraction are performed. Further, the QS-EWMA-based slow drift analysis is performed, followed by Sparse Random Walk Softplus S-shaped Rectified Gated Recurrent Unit (SRWSSR-GRU)-based intrusion detection. Next, the dependency-aware aggregation is performed using the Choquet k-Additive Function Integral Model (CkAFIM). Then, the uncertainty-based risk is assessed using Min-Max Normalization-based Neutrosophic Logic System (MMN-NLS). Here, the explainability is improved using SHapley Max-Abs Scaling Additive exPlanation (SMAS-HAP). Finally, the decision-making is performed using the Markov Linear Discrete-Time Propagation Decision Process (MLDTPDP). Hence, the proposed system effectively assessed the risk with an Indeterminacy Detection Rate (IDR) of 13.43%, showing superiority over prevailing works.},
}
RevDate: 2026-04-01
CmpDate: 2026-04-01
Efficient large-scale land cover change detection using Google Earth Engine: Climate-driven vegetation dynamics in Asian drylands (2001-2022).
PloS one, 21(4):e0344835 pii:PONE-D-25-35978.
Monitoring land cover dynamics and understanding vegetation responses to climate change are critical for ecological assessment and management in dryland regions. This study systematically analyzes land cover dynamics, vegetation type transitions, and their climatic drivers across Asian drylands from 2001 to 2022 by integrating MODIS land cover data, TerraClimate climate reanalysis datasets, and the Google Earth Engine (GEE) platform. Using a unified framework that combines land cover dynamic indices, transition probability and transfer matrix analyses, and climate attribution, we quantify spatiotemporal change patterns and identify dominant vegetation transition pathways. The results reveal pronounced land cover changes across Asian drylands over the past two decades, characterized by expansions of grasslands (GRA), savannas (SAV), croplands (CRO), and water, snow, and ice (WSI), alongside contractions of shrublands (SH), mixed forests (MF), permanent wetlands (WET), and barren land (BAR). Land cover transition analysis indicates that the most prominent conversion pathways are from barren land to grasslands and from grasslands to croplands, reflecting the combined influences of climate variability and land use processes. Climate attribution analyses further demonstrate that vegetation dynamics across different stability zones exhibit distinct responses to long-term climate trends, with increasing maximum temperature, soil moisture, and vapor-related variables, together with declining precipitation, drought indices, and surface radiation, jointly shaping vegetation persistence, expansion, or degradation. By integrating long-term multi-source datasets and cloud-based geospatial computing, this study provides a scalable and reproducible framework for assessing land cover change and vegetation stability in arid and semi-arid regions. The findings enhance understanding of dryland ecosystem dynamics under climate change and support large-scale ecological assessment in data-scarce environments.
Additional Links: PMID-41920809
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41920809,
year = {2026},
author = {Wu, J and Wei, S and Hao, H and Chen, M and Ismail, S},
title = {Efficient large-scale land cover change detection using Google Earth Engine: Climate-driven vegetation dynamics in Asian drylands (2001-2022).},
journal = {PloS one},
volume = {21},
number = {4},
pages = {e0344835},
doi = {10.1371/journal.pone.0344835},
pmid = {41920809},
issn = {1932-6203},
mesh = {*Climate Change ; Asia ; Grassland ; Ecosystem ; Forests ; Wetlands ; *Environmental Monitoring/methods ; },
abstract = {Monitoring land cover dynamics and understanding vegetation responses to climate change are critical for ecological assessment and management in dryland regions. This study systematically analyzes land cover dynamics, vegetation type transitions, and their climatic drivers across Asian drylands from 2001 to 2022 by integrating MODIS land cover data, TerraClimate climate reanalysis datasets, and the Google Earth Engine (GEE) platform. Using a unified framework that combines land cover dynamic indices, transition probability and transfer matrix analyses, and climate attribution, we quantify spatiotemporal change patterns and identify dominant vegetation transition pathways. The results reveal pronounced land cover changes across Asian drylands over the past two decades, characterized by expansions of grasslands (GRA), savannas (SAV), croplands (CRO), and water, snow, and ice (WSI), alongside contractions of shrublands (SH), mixed forests (MF), permanent wetlands (WET), and barren land (BAR). Land cover transition analysis indicates that the most prominent conversion pathways are from barren land to grasslands and from grasslands to croplands, reflecting the combined influences of climate variability and land use processes. Climate attribution analyses further demonstrate that vegetation dynamics across different stability zones exhibit distinct responses to long-term climate trends, with increasing maximum temperature, soil moisture, and vapor-related variables, together with declining precipitation, drought indices, and surface radiation, jointly shaping vegetation persistence, expansion, or degradation. By integrating long-term multi-source datasets and cloud-based geospatial computing, this study provides a scalable and reproducible framework for assessing land cover change and vegetation stability in arid and semi-arid regions. The findings enhance understanding of dryland ecosystem dynamics under climate change and support large-scale ecological assessment in data-scarce environments.},
}
MeSH Terms:
show MeSH Terms
hide MeSH Terms
*Climate Change
Asia
Grassland
Ecosystem
Forests
Wetlands
*Environmental Monitoring/methods
RevDate: 2026-04-01
Dynamic machine learning approach for workload prediction in cloud environments.
Scientific reports, 16(1):.
Additional Links: PMID-41922438
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41922438,
year = {2026},
author = {Nashaat, M and Moussa, W and Rizk, R and Saber, W},
title = {Dynamic machine learning approach for workload prediction in cloud environments.},
journal = {Scientific reports},
volume = {16},
number = {1},
pages = {},
pmid = {41922438},
issn = {2045-2322},
}
RevDate: 2026-03-31
Cloud assisted blockchain-enabled split federated learning framework for security and privacy-preserving of IoMT in healthcare 5.0.
Scientific reports pii:10.1038/s41598-026-41771-1 [Epub ahead of print].
The rapid adoption of Internet of Medical Things (IoMT) in Federated Learning (FL)-enabled Smart Healthcare 5.0 raises pressing concerns regarding privacy, security, and real-time threat detection. FL remains vulnerable to training-phase attacks, parameter breaches, and aggregation threats, with the central server posing risks of inference, poisoning, and single-point failure. To address the challenge of single point failure and lack of efficient decentralized trust mechanism, we propose a novel framework that integrates Split Federated Learning (SFL) with Blockchain. SFL uses hybrid Deep Learning (DL) model which is divided between the IoMT and Edge layers by the architecture: Edge-based BiLSTM networks identify threats and temporal patterns, while lightweight CNN at the IoT layer extract spatial features from patient data. While SFL facilitates safe decentralized training, Blockchain uses the Practical Byzantine Fault Tolerance (PBFT) consensus mechanism to guarantee tamper-proof integrity, trust, and authentication. This method improves decentralized trust, protects privacy, and lessens data leakage. The framework is a robust and real-time intrusion detection solution for next-generation smart healthcare, as demonstrated by experiments on ToN-IoT and IoT healthcare datasets, which show improved privacy, robustness against attacks, block commit rate (450 b/s), and reduced consensus time (250 ms) in addition to superior accuracy (99.95%).
Additional Links: PMID-41917035
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41917035,
year = {2026},
author = {Baihan, A and Kryvinska, N and Amoon, M and Jiang, W and Ullah, Z and Shafiq, M},
title = {Cloud assisted blockchain-enabled split federated learning framework for security and privacy-preserving of IoMT in healthcare 5.0.},
journal = {Scientific reports},
volume = {},
number = {},
pages = {},
doi = {10.1038/s41598-026-41771-1},
pmid = {41917035},
issn = {2045-2322},
abstract = {The rapid adoption of Internet of Medical Things (IoMT) in Federated Learning (FL)-enabled Smart Healthcare 5.0 raises pressing concerns regarding privacy, security, and real-time threat detection. FL remains vulnerable to training-phase attacks, parameter breaches, and aggregation threats, with the central server posing risks of inference, poisoning, and single-point failure. To address the challenge of single point failure and lack of efficient decentralized trust mechanism, we propose a novel framework that integrates Split Federated Learning (SFL) with Blockchain. SFL uses hybrid Deep Learning (DL) model which is divided between the IoMT and Edge layers by the architecture: Edge-based BiLSTM networks identify threats and temporal patterns, while lightweight CNN at the IoT layer extract spatial features from patient data. While SFL facilitates safe decentralized training, Blockchain uses the Practical Byzantine Fault Tolerance (PBFT) consensus mechanism to guarantee tamper-proof integrity, trust, and authentication. This method improves decentralized trust, protects privacy, and lessens data leakage. The framework is a robust and real-time intrusion detection solution for next-generation smart healthcare, as demonstrated by experiments on ToN-IoT and IoT healthcare datasets, which show improved privacy, robustness against attacks, block commit rate (450 b/s), and reduced consensus time (250 ms) in addition to superior accuracy (99.95%).},
}
RevDate: 2026-03-30
A unified low-carbon cybersecurity framework integrating energy-efficient intrusion detection, lightweight cryptography, and carbon-aware scheduling for edge-cloud architectures.
Scientific reports pii:10.1038/s41598-026-44260-7 [Epub ahead of print].
The rapid expansion of edge-cloud computing infrastructures has intensified both cybersecurity demands and the associated energy consumption and carbon footprint of intrusion detection systems (IDS). This paper presents GreenShield, a unified low-carbon cybersecurity framework that integrates energy-efficient deep learning-based intrusion detection with knowledge distillation and dynamic quantization, ASCON lightweight cryptography, hierarchical federated learning with gradient compression, and a carbon-aware scheduling engine across distributed edge-fog-cloud architectures. GreenShield employs a threat-adaptive quantization mechanism that scales model precision (4-32 bit) based on real-time threat levels and a carbon-conscious scheduling controller that dynamically aligns security workload execution with renewable energy availability forecasts. Extensive experiments on the UNSW-NB15 and CIC-IDS2017 datasets demonstrate that GreenShield achieves 98.73% detection accuracy with 67.4% energy reduction compared to conventional deep learning-based IDS, while reducing operational carbon emissions by up to 97.6% (equivalent to approximately 2.8 kg CO2-eq per hour savings in a typical edge deployment). The hierarchical federated learning architecture reduces communication overhead by 58.2% through Top-k gradient sparsification, and the dynamic quantization mechanism achieves 71.3% inference energy reduction during low-threat periods. These results establish GreenShield as a viable, scalable solution for sustainable cybersecurity that supports carbon-conscious security workflows in next-generation edge-cloud computing environments.
Additional Links: PMID-41912554
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41912554,
year = {2026},
author = {Alshammari, A},
title = {A unified low-carbon cybersecurity framework integrating energy-efficient intrusion detection, lightweight cryptography, and carbon-aware scheduling for edge-cloud architectures.},
journal = {Scientific reports},
volume = {},
number = {},
pages = {},
doi = {10.1038/s41598-026-44260-7},
pmid = {41912554},
issn = {2045-2322},
support = {0054-1446-S//Deputyship for Research and Innovation, Ministry of Education in Saudi Arabia/ ; },
abstract = {The rapid expansion of edge-cloud computing infrastructures has intensified both cybersecurity demands and the associated energy consumption and carbon footprint of intrusion detection systems (IDS). This paper presents GreenShield, a unified low-carbon cybersecurity framework that integrates energy-efficient deep learning-based intrusion detection with knowledge distillation and dynamic quantization, ASCON lightweight cryptography, hierarchical federated learning with gradient compression, and a carbon-aware scheduling engine across distributed edge-fog-cloud architectures. GreenShield employs a threat-adaptive quantization mechanism that scales model precision (4-32 bit) based on real-time threat levels and a carbon-conscious scheduling controller that dynamically aligns security workload execution with renewable energy availability forecasts. Extensive experiments on the UNSW-NB15 and CIC-IDS2017 datasets demonstrate that GreenShield achieves 98.73% detection accuracy with 67.4% energy reduction compared to conventional deep learning-based IDS, while reducing operational carbon emissions by up to 97.6% (equivalent to approximately 2.8 kg CO2-eq per hour savings in a typical edge deployment). The hierarchical federated learning architecture reduces communication overhead by 58.2% through Top-k gradient sparsification, and the dynamic quantization mechanism achieves 71.3% inference energy reduction during low-threat periods. These results establish GreenShield as a viable, scalable solution for sustainable cybersecurity that supports carbon-conscious security workflows in next-generation edge-cloud computing environments.},
}
RevDate: 2026-03-28
Toward Energy-Efficient and Low-Carbon Intrusion Detection in Edge and Cloud Computing Based on GreenShield Cybersecurity Framework.
Sensors (Basel, Switzerland), 26(6): pii:s26061780.
The fast growth of edge-cloud computing infrastructures has increased the cybersecurity burden even as it has substantially amplified the energy use and carbon footprint of intrusion detection systems (IDSs). In order to overcome this challenge, this paper suggests GreenShield, which is a framework of low-carbon cybersecurity involving lightweight cryptography, deep learning that is energy efficient, and carbon conscious system optimization across distributed edges and in cloud setup. GreenShield employs a hierarchical federated learning architecture with integrated knowledge distillation and a carbon-aware scheduling controller that dynamically adjusts security response execution based on threat intensity and renewable energy availability. As extensive experiments on the UNSW-NB15 and CIC-IDS2017 datasets show, GreenShield attains 98.73% detection accuracy and is 67.4% more energy efficient than traditional deeplearning-based IDSs. Further, the suggested system reduces the operational carbon emissions up to 97.6%, which is equivalent to a reduction of around 2.8 kg CO2-equivalent/per hour in a typical edge-deployment situation, yet it does not undermine the performance of the detection. These findings suggest that GreenShield can be one of the meaningful alternatives in providing viable and scalable sustainable cybersecurity that supports carbon-conscious security workflows in the future edge-cloud computing architecture.
Additional Links: PMID-41901949
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41901949,
year = {2026},
author = {Alshammari, A},
title = {Toward Energy-Efficient and Low-Carbon Intrusion Detection in Edge and Cloud Computing Based on GreenShield Cybersecurity Framework.},
journal = {Sensors (Basel, Switzerland)},
volume = {26},
number = {6},
pages = {},
doi = {10.3390/s26061780},
pmid = {41901949},
issn = {1424-8220},
abstract = {The fast growth of edge-cloud computing infrastructures has increased the cybersecurity burden even as it has substantially amplified the energy use and carbon footprint of intrusion detection systems (IDSs). In order to overcome this challenge, this paper suggests GreenShield, which is a framework of low-carbon cybersecurity involving lightweight cryptography, deep learning that is energy efficient, and carbon conscious system optimization across distributed edges and in cloud setup. GreenShield employs a hierarchical federated learning architecture with integrated knowledge distillation and a carbon-aware scheduling controller that dynamically adjusts security response execution based on threat intensity and renewable energy availability. As extensive experiments on the UNSW-NB15 and CIC-IDS2017 datasets show, GreenShield attains 98.73% detection accuracy and is 67.4% more energy efficient than traditional deeplearning-based IDSs. Further, the suggested system reduces the operational carbon emissions up to 97.6%, which is equivalent to a reduction of around 2.8 kg CO2-equivalent/per hour in a typical edge-deployment situation, yet it does not undermine the performance of the detection. These findings suggest that GreenShield can be one of the meaningful alternatives in providing viable and scalable sustainable cybersecurity that supports carbon-conscious security workflows in the future edge-cloud computing architecture.},
}
RevDate: 2026-03-28
AgroNova: An Autonomous IoT Platform for Greenhouse Climate Control.
Sensors (Basel, Switzerland), 26(6): pii:s26061861.
This study presents AgroNova-a hybrid IoT architecture for autonomous monitoring and management of microclimate in greenhouse environments. The system combines a capillary wireless sensor network, gateway-level rule-based agents, a server agent, cloud services and an advisory component based on a large language model (LLM) that supports local decision-making by incorporating external contextual information from meteorological services. The proposed architecture was validated through a seven-month deployment in an unheated tomato greenhouse, during which more than 380,000 environmental measurements were collected from five sensor nodes. The system operated continuously under real agricultural conditions, including during temporary internet connectivity interruptions, due to the autonomous gateway-level control and deterministic fallback mechanisms. The analysis of the collected data includes 3110 environmental threshold exceedance events, in which recovery dynamics, reaction latency, and actuator activation frequency were evaluated. The results show that the architecture supports stable autonomous operation under limited actuation conditions, with an average local reaction latency of less than 1 s, while physical actuator operations occur in approximately 2.3% of all control decisions. This behavior reflects a conservative control strategy that limits unnecessary mechanical operations and contributes to stable system operation. The experimental integration of a consultative LLM module within the server-side agent demonstrates the potential for context-enriched decision support using external meteorological data, while final control decisions remain under the authority of the gateway-based deterministic control mechanism. The main contribution of this study is the demonstration of a hybrid IoT architecture that combines edge-level autonomy with context-assisted reasoning, validated through deployment in a real greenhouse environment.
Additional Links: PMID-41902029
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41902029,
year = {2026},
author = {Toskov, B and Toskova, A},
title = {AgroNova: An Autonomous IoT Platform for Greenhouse Climate Control.},
journal = {Sensors (Basel, Switzerland)},
volume = {26},
number = {6},
pages = {},
doi = {10.3390/s26061861},
pmid = {41902029},
issn = {1424-8220},
support = {D01-65/19.03.2021//Ministry of Education and Science of the Republic of Bulgaria/ ; },
abstract = {This study presents AgroNova-a hybrid IoT architecture for autonomous monitoring and management of microclimate in greenhouse environments. The system combines a capillary wireless sensor network, gateway-level rule-based agents, a server agent, cloud services and an advisory component based on a large language model (LLM) that supports local decision-making by incorporating external contextual information from meteorological services. The proposed architecture was validated through a seven-month deployment in an unheated tomato greenhouse, during which more than 380,000 environmental measurements were collected from five sensor nodes. The system operated continuously under real agricultural conditions, including during temporary internet connectivity interruptions, due to the autonomous gateway-level control and deterministic fallback mechanisms. The analysis of the collected data includes 3110 environmental threshold exceedance events, in which recovery dynamics, reaction latency, and actuator activation frequency were evaluated. The results show that the architecture supports stable autonomous operation under limited actuation conditions, with an average local reaction latency of less than 1 s, while physical actuator operations occur in approximately 2.3% of all control decisions. This behavior reflects a conservative control strategy that limits unnecessary mechanical operations and contributes to stable system operation. The experimental integration of a consultative LLM module within the server-side agent demonstrates the potential for context-enriched decision support using external meteorological data, while final control decisions remain under the authority of the gateway-based deterministic control mechanism. The main contribution of this study is the demonstration of a hybrid IoT architecture that combines edge-level autonomy with context-assisted reasoning, validated through deployment in a real greenhouse environment.},
}
RevDate: 2026-03-27
Enhancement of cryptography algorithms for security of cloud-based IoT with machine learning models.
Scientific reports pii:10.1038/s41598-026-45938-8 [Epub ahead of print].
The rapid expansion of cloud-based Internet of Things (IoT) systems has intensified security challenges due to the large-scale transmission of sensitive data from resource-constrained devices to cloud infrastructures. Conventional cryptographic techniques often impose high computational and memory overhead. Consequently, there is a critical need for security frameworks that balance strong data protection with efficient resource utilization while supporting intelligent threat detection. This study proposes an integrated security framework that combines lightweight and hybrid cryptographic algorithms with machine learning (ML) models to secure IoT data transmission in cloud-based environments. Four encryption techniques, XOR, ChaCha20, AES, and a hybrid AES-RSA scheme, are systematically evaluated in terms of memory consumption, CPU usage, and overall resource efficiency using the Overall Resource Consumption Score (ORCS). Secure data transmission is simulated using the MQTT protocol, while ML-based intrusion detection is performed using Random Forest (RF), XGBoost, CatBoost, and ensemble classifiers. Experiments are conducted on two real-world IoT datasets, MQTTEEB-D and CIC IoT 2023 for IoT network traffic. On the MQTTEEB-D dataset, the hybrid AES-RSA scheme achieved a low memory usage of 0.126 KB per traffic with an ORCS of 0.56, while the voting ensemble classifier attained the highest detection accuracy of 92.68%. On the CIC IoT 2023 dataset, comprising 605,839 test records, the hybrid AES-RSA method required 0.374 KB per traffic and achieved an ORCS of 0.5425, whereas the voting ensemble model achieved an accuracy of 81.09%. The findings demonstrate that hybrid cryptography provides an effective balance between security and efficiency for cloud-based IoT systems, while ensemble ML models significantly enhance intrusion detection performance.
Additional Links: PMID-41888344
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41888344,
year = {2026},
author = {Qasem, MA and Motiram, BM and Thorat, S and Al-Hejri, AM and Alshamrani, SS and Alshmrany, KM},
title = {Enhancement of cryptography algorithms for security of cloud-based IoT with machine learning models.},
journal = {Scientific reports},
volume = {},
number = {},
pages = {},
doi = {10.1038/s41598-026-45938-8},
pmid = {41888344},
issn = {2045-2322},
abstract = {The rapid expansion of cloud-based Internet of Things (IoT) systems has intensified security challenges due to the large-scale transmission of sensitive data from resource-constrained devices to cloud infrastructures. Conventional cryptographic techniques often impose high computational and memory overhead. Consequently, there is a critical need for security frameworks that balance strong data protection with efficient resource utilization while supporting intelligent threat detection. This study proposes an integrated security framework that combines lightweight and hybrid cryptographic algorithms with machine learning (ML) models to secure IoT data transmission in cloud-based environments. Four encryption techniques, XOR, ChaCha20, AES, and a hybrid AES-RSA scheme, are systematically evaluated in terms of memory consumption, CPU usage, and overall resource efficiency using the Overall Resource Consumption Score (ORCS). Secure data transmission is simulated using the MQTT protocol, while ML-based intrusion detection is performed using Random Forest (RF), XGBoost, CatBoost, and ensemble classifiers. Experiments are conducted on two real-world IoT datasets, MQTTEEB-D and CIC IoT 2023 for IoT network traffic. On the MQTTEEB-D dataset, the hybrid AES-RSA scheme achieved a low memory usage of 0.126 KB per traffic with an ORCS of 0.56, while the voting ensemble classifier attained the highest detection accuracy of 92.68%. On the CIC IoT 2023 dataset, comprising 605,839 test records, the hybrid AES-RSA method required 0.374 KB per traffic and achieved an ORCS of 0.5425, whereas the voting ensemble model achieved an accuracy of 81.09%. The findings demonstrate that hybrid cryptography provides an effective balance between security and efficiency for cloud-based IoT systems, while ensemble ML models significantly enhance intrusion detection performance.},
}
RevDate: 2026-03-27
CmpDate: 2026-03-27
A Cloud-Aware Scalable Architecture for Distributed Edge-Enabled BCI Biosensor System.
Biosensors, 16(3): pii:bios16030157.
BCI biosensors enable continuous monitoring of neural activity, but existing systems face challenges in scalability, latency, and reliable integration with cloud infrastructure. This work presents a cloud-aware, real-time cognitive grid architecture for multimodal BCI biosensors, validated at the system level through a full physical prototype. The system integrates the BioAmp EXG Pill for signal acquisition with an RP2040 microcontroller for local preprocessing using edge-resident TinyML deployment for on-device feature/inference feasibility coupled with environmental context sensors to augment signal context for downstream analytics talking to the external world via Wi-Fi/4G connectivity. A tiered data pipeline was implemented: SD card buffering for raw signals, Redis for near-real-time streaming, PostgreSQL for structured analytics, and AWS S3 with Glacier for long-term archival. End-to-end validation demonstrated consistent edge-level inference with bounded latency, while cloud-assisted telemetry and analytics exhibited variable transmission and processing delays consistent with cellular connectivity and serverless execution characteristics; packet loss remained below 5%. Visualization was achieved through Python 3.10 using Matplotlib GUI, Grafana 10.2.3 dashboards, and on-device LCD displays. Hybrid deployment strategies-local development, simulated cloud testing, and limited cloud usage for benchmark capture-enabled cost-efficient validation while preserving architectural fidelity and latency observability. The results establish a scalable, modular, and energy-efficient biosensor framework, providing a foundation for advanced analytics and translational BCI applications to be explored in subsequent work, with explicit consideration of both edge-resident TinyML inference and cloud-based machine learning workflows.
Additional Links: PMID-41892049
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41892049,
year = {2026},
author = {Ghosh, S and Bhuvanakantham, R and Sindhujaa, P and Harishita, PB and Mohan, A and Gulyás, B and Máthé, D and Padmanabhan, P},
title = {A Cloud-Aware Scalable Architecture for Distributed Edge-Enabled BCI Biosensor System.},
journal = {Biosensors},
volume = {16},
number = {3},
pages = {},
doi = {10.3390/bios16030157},
pmid = {41892049},
issn = {2079-6374},
mesh = {*Biosensing Techniques ; *Brain-Computer Interfaces ; *Cloud Computing ; Humans ; Electroencephalography ; Signal Processing, Computer-Assisted ; },
abstract = {BCI biosensors enable continuous monitoring of neural activity, but existing systems face challenges in scalability, latency, and reliable integration with cloud infrastructure. This work presents a cloud-aware, real-time cognitive grid architecture for multimodal BCI biosensors, validated at the system level through a full physical prototype. The system integrates the BioAmp EXG Pill for signal acquisition with an RP2040 microcontroller for local preprocessing using edge-resident TinyML deployment for on-device feature/inference feasibility coupled with environmental context sensors to augment signal context for downstream analytics talking to the external world via Wi-Fi/4G connectivity. A tiered data pipeline was implemented: SD card buffering for raw signals, Redis for near-real-time streaming, PostgreSQL for structured analytics, and AWS S3 with Glacier for long-term archival. End-to-end validation demonstrated consistent edge-level inference with bounded latency, while cloud-assisted telemetry and analytics exhibited variable transmission and processing delays consistent with cellular connectivity and serverless execution characteristics; packet loss remained below 5%. Visualization was achieved through Python 3.10 using Matplotlib GUI, Grafana 10.2.3 dashboards, and on-device LCD displays. Hybrid deployment strategies-local development, simulated cloud testing, and limited cloud usage for benchmark capture-enabled cost-efficient validation while preserving architectural fidelity and latency observability. The results establish a scalable, modular, and energy-efficient biosensor framework, providing a foundation for advanced analytics and translational BCI applications to be explored in subsequent work, with explicit consideration of both edge-resident TinyML inference and cloud-based machine learning workflows.},
}
MeSH Terms:
show MeSH Terms
hide MeSH Terms
*Biosensing Techniques
*Brain-Computer Interfaces
*Cloud Computing
Humans
Electroencephalography
Signal Processing, Computer-Assisted
RevDate: 2026-03-26
A hybrid RL-GA-LSTM-AE framework for energy-aware and SLA-driven task scheduling in cloud computing environments.
Scientific reports pii:10.1038/s41598-026-43108-4 [Epub ahead of print].
Additional Links: PMID-41882156
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41882156,
year = {2026},
author = {Narsimhulu, B and Kumar, TS},
title = {A hybrid RL-GA-LSTM-AE framework for energy-aware and SLA-driven task scheduling in cloud computing environments.},
journal = {Scientific reports},
volume = {},
number = {},
pages = {},
doi = {10.1038/s41598-026-43108-4},
pmid = {41882156},
issn = {2045-2322},
}
RevDate: 2026-03-25
Comparative evaluation of a deep learning method QNet and LCModel for MRS quantification on the cloud computing platform CloudBrain-MRS.
BMC medical imaging pii:10.1186/s12880-026-02292-5 [Epub ahead of print].
Additional Links: PMID-41877086
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41877086,
year = {2026},
author = {Lin, M and Guo, L and Chen, D and Chen, J and Tu, Z and Huang, X and Wang, J and Qi, J and Long, Y and Huang, Z and Guo, D and Qu, X and Han, H},
title = {Comparative evaluation of a deep learning method QNet and LCModel for MRS quantification on the cloud computing platform CloudBrain-MRS.},
journal = {BMC medical imaging},
volume = {},
number = {},
pages = {},
doi = {10.1186/s12880-026-02292-5},
pmid = {41877086},
issn = {1471-2342},
support = {2023YFF0714200//National Key R&D Program of China/ ; 62331021 and 62371410//National Natural Science Foundation of China/ ; 2023J02005//Natural Science Foundation of Fujian Province of China/ ; 231107173160805//Industry-University Cooperation Projects of the Ministry of Education of China/ ; 0621-Z0332004//Zhou Yongtang Fund for High Talent Team/ ; },
}
RevDate: 2026-03-24
A 30 m Multi-Year Dataset of Major Crop Distributions in Xinjiang, China (2013-2024) Based on Harmonized Landsat-Sentinel-2 Data.
Scientific data pii:10.1038/s41597-026-07082-w [Epub ahead of print].
Accurate and timely information on the spatial distribution of crops is essential for ensuring food security, achieving sustainable agricultural management, and understanding ecosystem interactions. However, in large-scale arid regions like Xinjiang, China, constructing high-spatial-resolution, continuous, and multi-year crop distribution datasets remains a significant challenge due to complex terrain, sparse ground observations, and limited computational resources. In this study, we developed a robust crop classification framework leveraging the Google Earth Engine (GEE) cloud platform. The framework integrates all available NASA-Sentinel-2 (HLSL30) imagery to construct harmonic models based on NDVI and LSWI indices, effectively characterizing crop phenological trajectories. These features are combined with a Random Forest (RF) algorithm to achieve detailed identification of major crop types. To minimize interference from non-crop vegetation and background land cover, we implemented a pre-extracted cropland mask. Using this approach, we generated a 30 m resolution dataset of major crops (including cotton, maize, wheat, and rice) across Xinjiang for the period 2013-2024. Accuracy assessments using independent validation samples from 2018 and 2019 yielded producer accuracies of 0.83-0.99 and user accuracies of 0.83-0.96. The overall accuracy reached 0.90 and 0.93, with Kappa coefficients of 0.86 and 0.89, respectively. Furthermore, the estimated crop areas at the prefecture level show high consistency with official statistical yearbooks and align well with existing distribution maps of cotton, maize, and wheat. This dataset provides a systematic characterization of the long-term spatial dynamics of major crops in Xinjiang, offering critical and reliable data support for regional agricultural monitoring, food security assessment, policy formulation, and environmental change research.
Additional Links: PMID-41872228
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41872228,
year = {2026},
author = {Liang, Q and Di, Y and Hao, X and Zhang, J and Ci, M and Sun, F and Wang, C and Fan, X and Guo, X},
title = {A 30 m Multi-Year Dataset of Major Crop Distributions in Xinjiang, China (2013-2024) Based on Harmonized Landsat-Sentinel-2 Data.},
journal = {Scientific data},
volume = {},
number = {},
pages = {},
doi = {10.1038/s41597-026-07082-w},
pmid = {41872228},
issn = {2052-4463},
support = {XDB0720101//Chinese Academy of Sciences/ ; },
abstract = {Accurate and timely information on the spatial distribution of crops is essential for ensuring food security, achieving sustainable agricultural management, and understanding ecosystem interactions. However, in large-scale arid regions like Xinjiang, China, constructing high-spatial-resolution, continuous, and multi-year crop distribution datasets remains a significant challenge due to complex terrain, sparse ground observations, and limited computational resources. In this study, we developed a robust crop classification framework leveraging the Google Earth Engine (GEE) cloud platform. The framework integrates all available NASA-Sentinel-2 (HLSL30) imagery to construct harmonic models based on NDVI and LSWI indices, effectively characterizing crop phenological trajectories. These features are combined with a Random Forest (RF) algorithm to achieve detailed identification of major crop types. To minimize interference from non-crop vegetation and background land cover, we implemented a pre-extracted cropland mask. Using this approach, we generated a 30 m resolution dataset of major crops (including cotton, maize, wheat, and rice) across Xinjiang for the period 2013-2024. Accuracy assessments using independent validation samples from 2018 and 2019 yielded producer accuracies of 0.83-0.99 and user accuracies of 0.83-0.96. The overall accuracy reached 0.90 and 0.93, with Kappa coefficients of 0.86 and 0.89, respectively. Furthermore, the estimated crop areas at the prefecture level show high consistency with official statistical yearbooks and align well with existing distribution maps of cotton, maize, and wheat. This dataset provides a systematic characterization of the long-term spatial dynamics of major crops in Xinjiang, offering critical and reliable data support for regional agricultural monitoring, food security assessment, policy formulation, and environmental change research.},
}
RevDate: 2026-03-24
Quantum Computing and Visualization Research Challenges and Opportunities.
IEEE computer graphics and applications, 46(2):120-130.
Quantum computing (QC) has experienced rapid growth in recent years with the advent of robust programming environments, readily accessible software simulators and cloud-based QC hardware platforms, and growing interest in learning how to design useful methods that leverage this emerging technology for practical applications. From the perspective of the field of visualization, this article examines research challenges and opportunities along the path from initial feasibility to practical use of QC platforms applied to meaningful problems.
Additional Links: PMID-41875008
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41875008,
year = {2026},
author = {Bethel, EW and Van Beeumen, R and Perciano, T and Rhyne, TM},
title = {Quantum Computing and Visualization Research Challenges and Opportunities.},
journal = {IEEE computer graphics and applications},
volume = {46},
number = {2},
pages = {120-130},
doi = {10.1109/MCG.2025.3646315},
pmid = {41875008},
issn = {1558-1756},
abstract = {Quantum computing (QC) has experienced rapid growth in recent years with the advent of robust programming environments, readily accessible software simulators and cloud-based QC hardware platforms, and growing interest in learning how to design useful methods that leverage this emerging technology for practical applications. From the perspective of the field of visualization, this article examines research challenges and opportunities along the path from initial feasibility to practical use of QC platforms applied to meaningful problems.},
}
RevDate: 2026-03-23
A low-latency deep learning framework for volcanic ash cloud nowcasting using geostationary satellite imagery.
Scientific reports pii:10.1038/s41598-026-42230-7 [Epub ahead of print].
Rapid assessment of hazardous aerosol dispersion is critical for emergency response, yet operational dispersion workflows can exhibit end-to-end latency that is incompatible with the first minutes of decision-making. This study develops and validates a deep learning approach for near-real-time nowcasting of volcanic ash dispersion from geostationary observations. The model was trained on an archive of volcanic ash satellite imagery from EUMETSAT's SEVIRI instrument (Ash RGB composite) and achieved a structural similarity index of 0.88 for 15-minute next-frame forecasts. The complete edge workflow, including data download and inference, runs in under five seconds on an NVIDIA Jetson AGX Orin. To illustrate how the same nowcasting pipeline can be used for hypothetical scenario exploration across particulate sources, a pixel-based event-injection algorithm is introduced to overlay synthetic plumes of varying sizes into real-time satellite frames before inference. Scenario demonstrations parameterized by nuclear-yield-inspired sizes (10 kt to 100 Mt) are presented at urban (Paris, London, Berlin), national (Iberian Peninsula), and continental (Europe-wide) scales. These scenario outputs are intended as illustrative, low-latency visualizations of kinematic transport patterns in the SEVIRI observation space, as validated predictions of nuclear plume morphology. The primary contribution is a fast, low-cost volcanic ash nowcasting system, complemented by a generalizable injection framework for rapid scenario visualization on edge computing.
Additional Links: PMID-41866598
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41866598,
year = {2026},
author = {Alves, D and Radeta, M and Mendonça, F and Pereira, L and Morgado-Dias, F},
title = {A low-latency deep learning framework for volcanic ash cloud nowcasting using geostationary satellite imagery.},
journal = {Scientific reports},
volume = {},
number = {},
pages = {},
doi = {10.1038/s41598-026-42230-7},
pmid = {41866598},
issn = {2045-2322},
support = {10.54499/LA/P/0083/2022 & UID/50009/202//Fundação para a Ciência e a Tecnologia/ ; },
abstract = {Rapid assessment of hazardous aerosol dispersion is critical for emergency response, yet operational dispersion workflows can exhibit end-to-end latency that is incompatible with the first minutes of decision-making. This study develops and validates a deep learning approach for near-real-time nowcasting of volcanic ash dispersion from geostationary observations. The model was trained on an archive of volcanic ash satellite imagery from EUMETSAT's SEVIRI instrument (Ash RGB composite) and achieved a structural similarity index of 0.88 for 15-minute next-frame forecasts. The complete edge workflow, including data download and inference, runs in under five seconds on an NVIDIA Jetson AGX Orin. To illustrate how the same nowcasting pipeline can be used for hypothetical scenario exploration across particulate sources, a pixel-based event-injection algorithm is introduced to overlay synthetic plumes of varying sizes into real-time satellite frames before inference. Scenario demonstrations parameterized by nuclear-yield-inspired sizes (10 kt to 100 Mt) are presented at urban (Paris, London, Berlin), national (Iberian Peninsula), and continental (Europe-wide) scales. These scenario outputs are intended as illustrative, low-latency visualizations of kinematic transport patterns in the SEVIRI observation space, as validated predictions of nuclear plume morphology. The primary contribution is a fast, low-cost volcanic ash nowcasting system, complemented by a generalizable injection framework for rapid scenario visualization on edge computing.},
}
RevDate: 2026-03-21
Edge machine learning over IoT for chipless RFID environmental sensing in smart agriculture.
Scientific reports, 16(1):.
Chipless Radio Frequency Identification (RFID) has emerged as a promising technology for battery-free and maintenance-free sensing in Internet of Things (IoT) applications, particularly in smart agriculture where large-scale deployment and long-term autonomy are essential. However, practical agricultural sensing requires more than isolated tag or sensor designs; it demands an integrated system that jointly supports high-capacity identification, reliable multi-parameter environmental monitoring, and robust data interpretation within realistic radio-frequency (RF) environments. This work presents an IoT-ready chipless RFID framework that unifies resonator-based tag design, functional sensing materials, and physics-guided machine learning within a coherent hardware–analytics architecture. A compact 24-bit chipless RFID identification tag based on T-shaped resonators is designed within a 60 × 40 mm[2] footprint, achieving dense encoding with approximately 100 MHz spectral spacing. The tag is validated through full-wave CST simulations and anechoic-chamber radar cross-section (RCS) measurements, demonstrating high-Q, well-isolated spectral notches. Building on this platform, a 12-resonator sensing variant is developed for dual-parameter microclimate monitoring, exploiting the temperature-sensitive permittivity of Taconic RF-35 and the humidity responsiveness of a Kapton HN/PVA bilayer, with approximately 160 MHz reserved per sensing slot to prevent spectral overlap. To enable reliable operation under deployment-realistic interference, a physics-driven, edge-deployable machine learning framework is introduced, operating on interpretable RCS features rather than raw spectra. A hybrid ensemble combining Random Forest, Support Vector Regression, and XGBoost models are developed and augmented with k-means–based anomaly detection. This framework achieves 96.2% temperature-bin classification accuracy, with mean errors of ± 1.3 °C for temperature and ± 2.1% for relative humidity under frequency jitter, attenuation, and multipath distortions. The proposed co-design demonstrates a scalable, interpretable, and energy-autonomous solution for precision agriculture. It is compatible with edge gateways and cloud or serverless IoT infrastructures.
Additional Links: PMID-41708718
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41708718,
year = {2026},
author = {Mekki, K and Ghezaiel, N and Slimene, MB and Neffati, S and Rmili, H and Gharsallah, A},
title = {Edge machine learning over IoT for chipless RFID environmental sensing in smart agriculture.},
journal = {Scientific reports},
volume = {16},
number = {1},
pages = {},
pmid = {41708718},
issn = {2045-2322},
abstract = {Chipless Radio Frequency Identification (RFID) has emerged as a promising technology for battery-free and maintenance-free sensing in Internet of Things (IoT) applications, particularly in smart agriculture where large-scale deployment and long-term autonomy are essential. However, practical agricultural sensing requires more than isolated tag or sensor designs; it demands an integrated system that jointly supports high-capacity identification, reliable multi-parameter environmental monitoring, and robust data interpretation within realistic radio-frequency (RF) environments. This work presents an IoT-ready chipless RFID framework that unifies resonator-based tag design, functional sensing materials, and physics-guided machine learning within a coherent hardware–analytics architecture. A compact 24-bit chipless RFID identification tag based on T-shaped resonators is designed within a 60 × 40 mm[2] footprint, achieving dense encoding with approximately 100 MHz spectral spacing. The tag is validated through full-wave CST simulations and anechoic-chamber radar cross-section (RCS) measurements, demonstrating high-Q, well-isolated spectral notches. Building on this platform, a 12-resonator sensing variant is developed for dual-parameter microclimate monitoring, exploiting the temperature-sensitive permittivity of Taconic RF-35 and the humidity responsiveness of a Kapton HN/PVA bilayer, with approximately 160 MHz reserved per sensing slot to prevent spectral overlap. To enable reliable operation under deployment-realistic interference, a physics-driven, edge-deployable machine learning framework is introduced, operating on interpretable RCS features rather than raw spectra. A hybrid ensemble combining Random Forest, Support Vector Regression, and XGBoost models are developed and augmented with k-means–based anomaly detection. This framework achieves 96.2% temperature-bin classification accuracy, with mean errors of ± 1.3 °C for temperature and ± 2.1% for relative humidity under frequency jitter, attenuation, and multipath distortions. The proposed co-design demonstrates a scalable, interpretable, and energy-autonomous solution for precision agriculture. It is compatible with edge gateways and cloud or serverless IoT infrastructures.},
}
RevDate: 2026-03-22
Enhanced smart commuting with artificial intelligence for intelligent health and safety monitoring in school buses.
Scientific reports pii:10.1038/s41598-026-41628-7 [Epub ahead of print].
This paper introduces ESC.AI (Enhanced Smart Commuting with Artificial Intelligence), an intelligent and integrated safety framework designed to improve health monitoring, environmental awareness, behavioral detection, driver supervision, and route optimization in school bus transportation systems. The proposed framework combines multimodal sensing, edge-based artificial intelligence, adaptive routing, and secure data management to enable proactive risk detection and real-time decision-making during transit. Although school buses remain one of the safest modes of transportation for students, recent national statistics continue to highlight persistent risks related to health emergencies, behavioral incidents, and environmental hazards. According to data from the National Safety Council (NSC) and the National Highway Traffic Safety Administration (NHTSA), school bus-related crashes resulted in 104 fatalities in the United States in 2022, representing a 3.7% decrease from 2021. Between 2013 and 2022, approximately 71% of fatalities involved occupants of other vehicles, 16% were pedestrians, and only 5% were school bus passengers. Injury statistics show a similar pattern, emphasizing the need for safety solutions that protect both students and surrounding road users. ESC.AI addresses these challenges through a unified platform that integrates Internet of Things (IoT) sensors for physiological and environmental monitoring, computer vision-based behavioral analysis, driver monitoring, and intelligent routing. Edge-cloud computing is employed to ensure low-latency responses, while blockchain-based mechanisms are used selectively to enhance data integrity, traceability, and access control for sensitive safety records. Together, these components form a cohesive and scalable framework aimed at improving transparency, responsiveness, and reliability in school transportation systems.
Additional Links: PMID-41864994
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41864994,
year = {2026},
author = {Hossam, H and Tamer, R and Mohsen, M and Ahmed, O and Alaa, M and Mourad, J and Adel, R and Hatem, A and Sherif, S},
title = {Enhanced smart commuting with artificial intelligence for intelligent health and safety monitoring in school buses.},
journal = {Scientific reports},
volume = {},
number = {},
pages = {},
doi = {10.1038/s41598-026-41628-7},
pmid = {41864994},
issn = {2045-2322},
abstract = {This paper introduces ESC.AI (Enhanced Smart Commuting with Artificial Intelligence), an intelligent and integrated safety framework designed to improve health monitoring, environmental awareness, behavioral detection, driver supervision, and route optimization in school bus transportation systems. The proposed framework combines multimodal sensing, edge-based artificial intelligence, adaptive routing, and secure data management to enable proactive risk detection and real-time decision-making during transit. Although school buses remain one of the safest modes of transportation for students, recent national statistics continue to highlight persistent risks related to health emergencies, behavioral incidents, and environmental hazards. According to data from the National Safety Council (NSC) and the National Highway Traffic Safety Administration (NHTSA), school bus-related crashes resulted in 104 fatalities in the United States in 2022, representing a 3.7% decrease from 2021. Between 2013 and 2022, approximately 71% of fatalities involved occupants of other vehicles, 16% were pedestrians, and only 5% were school bus passengers. Injury statistics show a similar pattern, emphasizing the need for safety solutions that protect both students and surrounding road users. ESC.AI addresses these challenges through a unified platform that integrates Internet of Things (IoT) sensors for physiological and environmental monitoring, computer vision-based behavioral analysis, driver monitoring, and intelligent routing. Edge-cloud computing is employed to ensure low-latency responses, while blockchain-based mechanisms are used selectively to enhance data integrity, traceability, and access control for sensitive safety records. Together, these components form a cohesive and scalable framework aimed at improving transparency, responsiveness, and reliability in school transportation systems.},
}
RevDate: 2026-03-21
Cloud Computing Startup for Data Science- A Tutorial.
The American surgeon [Epub ahead of print].
Cloud computing has revolutionized analysis of large datasets. This tutorial provides a comprehensive, practical guide for research groups seeking to leverage cloud platforms for data analysis. The tutorial covers the foundations of cloud computing, including its history, rationale, and use cases for research, followed by detailed comparisons of the 3 major platforms: Google Cloud Platform (GCP), Amazon Web Services (AWS), and Microsoft Azure. Side-by-side comparisons of services, costs, ease of use, and selection guidelines assist researchers in choosing the most appropriate platform. A complete step-by-step example using hospital price transparency data demonstrates the entire workflow from account creation through results retrieval, enabling researchers to begin productive cloud-based analysis within hours.
Additional Links: PMID-41863225
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41863225,
year = {2026},
author = {Kuo, AC and Hiraldo, L and Wolansky, RL and Sujka, J and Kuo, PC},
title = {Cloud Computing Startup for Data Science- A Tutorial.},
journal = {The American surgeon},
volume = {},
number = {},
pages = {31348261433646},
doi = {10.1177/00031348261433646},
pmid = {41863225},
issn = {1555-9823},
abstract = {Cloud computing has revolutionized analysis of large datasets. This tutorial provides a comprehensive, practical guide for research groups seeking to leverage cloud platforms for data analysis. The tutorial covers the foundations of cloud computing, including its history, rationale, and use cases for research, followed by detailed comparisons of the 3 major platforms: Google Cloud Platform (GCP), Amazon Web Services (AWS), and Microsoft Azure. Side-by-side comparisons of services, costs, ease of use, and selection guidelines assist researchers in choosing the most appropriate platform. A complete step-by-step example using hospital price transparency data demonstrates the entire workflow from account creation through results retrieval, enabling researchers to begin productive cloud-based analysis within hours.},
}
RevDate: 2026-03-20
CmpDate: 2026-03-20
The health informatics centre: a safe haven and trusted research environment enabling world-leading research.
International journal of population data science, 8(6):3320.
INTRODUCTION: The Health Informatics Centre (HIC) is a regional Scottish Safe Haven dedicated to secure data management, ensuring its integrity, confidentiality, and availability through a robust information governance framework.
METHODS: As a data processor, HIC is responsible for the secure curation, storage, and provision of research data extracts. Research-ready data are made available to approved researchers via our customisable cloud Trusted Research Environment (TRE).
RESULTS: The available granular data spans over 20 years, includes 2.1 million of the Scottish population, and HIC offers more than 170 datasets, with the most commonly used published with a digital object identifier. Data sources include clinical, hospital, laboratory, imaging, and research datasets which can be linked to new, and existing datasets. The data is quality-assured and released as project-specific extracts, ensuring robust privacy protection and research readiness. HIC's infrastructure is secure-by-design and supports high-performance computing, advanced data analytics, and is customisable to researcher's needs.
CONCLUSION: HIC has a long history of supporting a wide range of data-led research projects as a trusted and capable partner. At the time of publication 175 projects across academia, the NHS, and public sector organisations are active within HIC. Through adaptability, innovation and investment in people and infrastructure we have established a sustainable model which will continue to meet future needs and demands from world-leading research with sensitive data.
Additional Links: PMID-41858610
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41858610,
year = {2023},
author = {Ward, LM and Johnston, J and Milburn, KR and Hall, C and Jones, C and Guignard-Duff, M and Krueger, S and Milligan, G and Anderson, J and Walls, R and Cole, C},
title = {The health informatics centre: a safe haven and trusted research environment enabling world-leading research.},
journal = {International journal of population data science},
volume = {8},
number = {6},
pages = {3320},
pmid = {41858610},
issn = {2399-4908},
mesh = {Scotland ; *Medical Informatics/organization & administration ; Humans ; Confidentiality ; *Computer Security ; *Data Management ; Biomedical Research ; Research ; },
abstract = {INTRODUCTION: The Health Informatics Centre (HIC) is a regional Scottish Safe Haven dedicated to secure data management, ensuring its integrity, confidentiality, and availability through a robust information governance framework.
METHODS: As a data processor, HIC is responsible for the secure curation, storage, and provision of research data extracts. Research-ready data are made available to approved researchers via our customisable cloud Trusted Research Environment (TRE).
RESULTS: The available granular data spans over 20 years, includes 2.1 million of the Scottish population, and HIC offers more than 170 datasets, with the most commonly used published with a digital object identifier. Data sources include clinical, hospital, laboratory, imaging, and research datasets which can be linked to new, and existing datasets. The data is quality-assured and released as project-specific extracts, ensuring robust privacy protection and research readiness. HIC's infrastructure is secure-by-design and supports high-performance computing, advanced data analytics, and is customisable to researcher's needs.
CONCLUSION: HIC has a long history of supporting a wide range of data-led research projects as a trusted and capable partner. At the time of publication 175 projects across academia, the NHS, and public sector organisations are active within HIC. Through adaptability, innovation and investment in people and infrastructure we have established a sustainable model which will continue to meet future needs and demands from world-leading research with sensitive data.},
}
MeSH Terms:
show MeSH Terms
hide MeSH Terms
Scotland
*Medical Informatics/organization & administration
Humans
Confidentiality
*Computer Security
*Data Management
Biomedical Research
Research
RevDate: 2026-03-19
CmpDate: 2026-03-19
Sant'Andrea della valle dataset: Georeferenced 2D study models of a Theatine Church.
Data in brief, 65:112618.
This article presents a georeferenced dataset of 2D study models of the church of Sant'Andrea della Valle in Rome, a key monument of Theatine architecture. Integrating architectural, historical, and geospatial data, the dataset supports interdisciplinary research, heritage documentation, and digital preservation. It originates from a 3D laser scanning campaign conducted in 2023, combined with archival and bibliographic investigations mapping Theatine settlements in Italy and abroad. Sant'Andrea della Valle was selected for its historical relevance and unresolved questions about its architectural evolution. The dataset includes a CAD file with 2D restitution (bidimensional study model) derived from 3D point clouds, a GIS-compatible shapefile, and a KML file for Google Earth. The point cloud, captured with a Z + F 5016 scanner, was aligned in Z + F LaserControl and processed in AutoCAD to produce plans, elevations, and sections later georeferenced in AutoCAD Map 3D; Georeferencing ensured spatial consistency and integration with other datasets for multi-scale architectural and urban analysis. Archival sources were digitized and linked to the spatial models, enabling reconstruction of construction phases and stylistic evolution. The dataset supports architectural, historical, and urban studies by providing standardized, reusable CAD, GIS, and KML formats. Despite some gaps in archival data and variable point cloud density, it offers a robust, reproducible basis for analyzing Theatine architecture and preserving its heritage through digital documentation. The georeferencing of the plan derived from the surveys can contribute to creating a comprehensive, georeferenced mapping of all Theatine works in Italy and worldwide.
Additional Links: PMID-41852844
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41852844,
year = {2026},
author = {Bianchini, C and De Stefano, F and Giuliani, G and Griffo, M and Porfiri, F},
title = {Sant'Andrea della valle dataset: Georeferenced 2D study models of a Theatine Church.},
journal = {Data in brief},
volume = {65},
number = {},
pages = {112618},
pmid = {41852844},
issn = {2352-3409},
abstract = {This article presents a georeferenced dataset of 2D study models of the church of Sant'Andrea della Valle in Rome, a key monument of Theatine architecture. Integrating architectural, historical, and geospatial data, the dataset supports interdisciplinary research, heritage documentation, and digital preservation. It originates from a 3D laser scanning campaign conducted in 2023, combined with archival and bibliographic investigations mapping Theatine settlements in Italy and abroad. Sant'Andrea della Valle was selected for its historical relevance and unresolved questions about its architectural evolution. The dataset includes a CAD file with 2D restitution (bidimensional study model) derived from 3D point clouds, a GIS-compatible shapefile, and a KML file for Google Earth. The point cloud, captured with a Z + F 5016 scanner, was aligned in Z + F LaserControl and processed in AutoCAD to produce plans, elevations, and sections later georeferenced in AutoCAD Map 3D; Georeferencing ensured spatial consistency and integration with other datasets for multi-scale architectural and urban analysis. Archival sources were digitized and linked to the spatial models, enabling reconstruction of construction phases and stylistic evolution. The dataset supports architectural, historical, and urban studies by providing standardized, reusable CAD, GIS, and KML formats. Despite some gaps in archival data and variable point cloud density, it offers a robust, reproducible basis for analyzing Theatine architecture and preserving its heritage through digital documentation. The georeferencing of the plan derived from the surveys can contribute to creating a comprehensive, georeferenced mapping of all Theatine works in Italy and worldwide.},
}
RevDate: 2026-03-19
CmpDate: 2026-03-19
mHealth Intervention to Promote Nonexercise Physical Activity in Patients With Type 2 Diabetes: Secondary Analysis and Implementation Study.
JMIR formative research, 10:e80304 pii:v10i1e80304.
BACKGROUND: Physical activity (PA) has an important role in the prevention and treatment of type 2 diabetes (T2D). Interventions with mobile-based technology (mobile health [mHealth]) seem promising in PA promotion, but their behavioral framework is often vague, and the implementation is seldom reported.
OBJECTIVE: This paper examines perceived behavior change needs and implementation of an mHealth approach in increasing nonexercise PA in patients with T2D.
METHODS: A 3-arm mHealth intervention was conducted in primary care. Information on perceived behavior change needs was collected with a modified capability, opportunity, motivation-behavior (COM-B) questionnaire before the intervention from a separate sample of patients with T2D (n=25) and at the intervention baseline (n=119). Implementation evaluation focused on the fidelity and acceptability of the main arm of the intervention (n=39), which included 24-hour accelerometer use, a smartphone app with personal feedback, a PA leaflet, a YouTube video on walking, and individual counseling with 3 face-to-face sessions and 4 telephone contacts. Data on fidelity were accumulated during the intervention through counseling cards and cloud computing. Data on acceptability were collected with a questionnaire at the end of the intervention (Likert scale from 1 to 5). Data analysis was mainly descriptive.
RESULTS: The participants' responses revealed 3 items in capability and 2 in motivation, which stood out as perceived behavior change needs. Moreover, the main intervention arm showed good fidelity (eg, face-to-face sessions: 112/117, 96% and telephone contacts completed: 145/156, 93%; mean weekly accelerometer use 54%; ranging from 80% to 17% during the intervention) and acceptability (mean score ranging from 3.8 to 4.8), although some challenges were also experienced, especially in cloud-computed feedback and accelerometer-app use.
CONCLUSIONS: The findings on behavior change needs call for additional research since no comparable studies were found. In addition, the explanatory value of the COM-B model and the psychometric properties of the COM-B questionnaire deserve further attention. The main intervention arm seemed applicable to clinical practice. However, the challenges discovered underscore the importance of pretesting technology-based approaches in patients with T2D.
Additional Links: PMID-41855496
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41855496,
year = {2026},
author = {Aittasalo, M and Tokola, K and Vähä-Ypyä, H and Husu, P and Mänttäri, A and Martiskainen, T and Laatikainen, T and Sievänen, H},
title = {mHealth Intervention to Promote Nonexercise Physical Activity in Patients With Type 2 Diabetes: Secondary Analysis and Implementation Study.},
journal = {JMIR formative research},
volume = {10},
number = {},
pages = {e80304},
doi = {10.2196/80304},
pmid = {41855496},
issn = {2561-326X},
mesh = {Humans ; *Diabetes Mellitus, Type 2/therapy/psychology ; Female ; Male ; Middle Aged ; Telemedicine ; *Exercise/psychology ; Aged ; Surveys and Questionnaires ; *Health Promotion/methods ; Motivation ; Mobile Applications ; Adult ; },
abstract = {BACKGROUND: Physical activity (PA) has an important role in the prevention and treatment of type 2 diabetes (T2D). Interventions with mobile-based technology (mobile health [mHealth]) seem promising in PA promotion, but their behavioral framework is often vague, and the implementation is seldom reported.
OBJECTIVE: This paper examines perceived behavior change needs and implementation of an mHealth approach in increasing nonexercise PA in patients with T2D.
METHODS: A 3-arm mHealth intervention was conducted in primary care. Information on perceived behavior change needs was collected with a modified capability, opportunity, motivation-behavior (COM-B) questionnaire before the intervention from a separate sample of patients with T2D (n=25) and at the intervention baseline (n=119). Implementation evaluation focused on the fidelity and acceptability of the main arm of the intervention (n=39), which included 24-hour accelerometer use, a smartphone app with personal feedback, a PA leaflet, a YouTube video on walking, and individual counseling with 3 face-to-face sessions and 4 telephone contacts. Data on fidelity were accumulated during the intervention through counseling cards and cloud computing. Data on acceptability were collected with a questionnaire at the end of the intervention (Likert scale from 1 to 5). Data analysis was mainly descriptive.
RESULTS: The participants' responses revealed 3 items in capability and 2 in motivation, which stood out as perceived behavior change needs. Moreover, the main intervention arm showed good fidelity (eg, face-to-face sessions: 112/117, 96% and telephone contacts completed: 145/156, 93%; mean weekly accelerometer use 54%; ranging from 80% to 17% during the intervention) and acceptability (mean score ranging from 3.8 to 4.8), although some challenges were also experienced, especially in cloud-computed feedback and accelerometer-app use.
CONCLUSIONS: The findings on behavior change needs call for additional research since no comparable studies were found. In addition, the explanatory value of the COM-B model and the psychometric properties of the COM-B questionnaire deserve further attention. The main intervention arm seemed applicable to clinical practice. However, the challenges discovered underscore the importance of pretesting technology-based approaches in patients with T2D.},
}
MeSH Terms:
show MeSH Terms
hide MeSH Terms
Humans
*Diabetes Mellitus, Type 2/therapy/psychology
Female
Male
Middle Aged
Telemedicine
*Exercise/psychology
Aged
Surveys and Questionnaires
*Health Promotion/methods
Motivation
Mobile Applications
Adult
RevDate: 2026-03-18
Blockchain-driven trust management and AI computing for sensor networks optimization.
Scientific reports pii:10.1038/s41598-026-41302-y [Epub ahead of print].
The Internet of Things (IoT) and emerging technologies have converged to drive the remarkable development of intelligent systems. The interconnection of physical objects, sensors, and tiny communication devices enables data aggregation, which is then forwarded to edge computing for local processing and analysis. Such a system improves response time and enhances network capabilities while managing the massive amount of collected data. On the other hand, existing approaches include cloud-based schemes that leverage edge-level offloading to control and manage demanding traffic. Furthermore, data security and network integrity are ensured by integrating blockchain technology with device identity authentication. However, in a dynamic environment, most approaches still incur interception and data eavesdropping, thereby affecting the reliability of connected communication channels. Therefore, developing trustworthiness and an authenticated system is a significant research challenge for the growth of smart systems. In this research, we introduce a lightweight, trusted AI-driven model to enhance security in complex systems and to ensure a more robust data-forwarding path over the long term. First, optimized methods are introduced that use an adaptive technique to explore network conditions and generate efficient data-transfer decision policies. Secondly, distributed and collaborative interactions are enabled across devices with minimal computing resources, thereby improving the system's response time through load balancing. Ultimately, trust is continuously updated by leveraging real-time parameters and records of neighbours' communication, thereby providing fault tolerance and trusted channels. The proposed model is verified and validated for efficacy through a wide range of simulations, and performance results demonstrate its superiority over existing approaches on realistic scenarios and metrics.
Additional Links: PMID-41844731
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41844731,
year = {2026},
author = {Alharbi, M and Haseeb, K and Jhanjhi, NZ and Khan, A and Humayun, M and Khan, MA},
title = {Blockchain-driven trust management and AI computing for sensor networks optimization.},
journal = {Scientific reports},
volume = {},
number = {},
pages = {},
doi = {10.1038/s41598-026-41302-y},
pmid = {41844731},
issn = {2045-2322},
support = {DGSSR-2025-NF-02-068//Al Jouf University/ ; },
abstract = {The Internet of Things (IoT) and emerging technologies have converged to drive the remarkable development of intelligent systems. The interconnection of physical objects, sensors, and tiny communication devices enables data aggregation, which is then forwarded to edge computing for local processing and analysis. Such a system improves response time and enhances network capabilities while managing the massive amount of collected data. On the other hand, existing approaches include cloud-based schemes that leverage edge-level offloading to control and manage demanding traffic. Furthermore, data security and network integrity are ensured by integrating blockchain technology with device identity authentication. However, in a dynamic environment, most approaches still incur interception and data eavesdropping, thereby affecting the reliability of connected communication channels. Therefore, developing trustworthiness and an authenticated system is a significant research challenge for the growth of smart systems. In this research, we introduce a lightweight, trusted AI-driven model to enhance security in complex systems and to ensure a more robust data-forwarding path over the long term. First, optimized methods are introduced that use an adaptive technique to explore network conditions and generate efficient data-transfer decision policies. Secondly, distributed and collaborative interactions are enabled across devices with minimal computing resources, thereby improving the system's response time through load balancing. Ultimately, trust is continuously updated by leveraging real-time parameters and records of neighbours' communication, thereby providing fault tolerance and trusted channels. The proposed model is verified and validated for efficacy through a wide range of simulations, and performance results demonstrate its superiority over existing approaches on realistic scenarios and metrics.},
}
RevDate: 2026-03-14
A Lightweight Net with Dual-Path Feature Enhancer and Bidirectional Gated Fusion for Cloud Detection.
Sensors (Basel, Switzerland), 26(5): pii:s26051727.
Cloud detection serves as a critical preprocessing step in remote sensing image processing and quantitative applications. However, prevailing deep learning-based models often depend on computationally intensive backbone networks to achieve high accuracy, which hinders their deployment in resource-constrained scenarios such as on-board processing or edge computing. To bridge the trade-off between accuracy and efficiency, this paper introduces a lightweight network for cloud detection. The core innovations of our network are twofold: (1) a dual-path feature enhancer that operates at the front end to extract and fuse multi-scale features through a parallel architecture, significantly enriching feature diversity and representational capacity, thereby alleviating the need for a complex backbone, and (2) a bidirectional gated fusion module, which adaptively integrates multi-scale features from the dual-path feature enhancer with deep semantic features from the backbone decoder through a gated attention mechanism and dynamic convolution, thereby enhancing feature discriminability. Comprehensive experiments on the public HRC_WHU dataset demonstrate that the proposed model achieves a high overall accuracy of 96.31% and a mean intersection-over-union of 92.82%, with only 12.04 GFLOPs of computational cost, outperforming several state-of-the-art methods. These results validate that our approach effectively balances high detection performance with computational efficiency, offering a practical solution for real-time, lightweight cloud detection in high-resolution remote sensing imagery.
Additional Links: PMID-41829688
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41829688,
year = {2026},
author = {Mo, Y and Chen, P and Bai, S and Xiao, E},
title = {A Lightweight Net with Dual-Path Feature Enhancer and Bidirectional Gated Fusion for Cloud Detection.},
journal = {Sensors (Basel, Switzerland)},
volume = {26},
number = {5},
pages = {},
doi = {10.3390/s26051727},
pmid = {41829688},
issn = {1424-8220},
support = {62261038//the National Natural Science Foundation of China/ ; },
abstract = {Cloud detection serves as a critical preprocessing step in remote sensing image processing and quantitative applications. However, prevailing deep learning-based models often depend on computationally intensive backbone networks to achieve high accuracy, which hinders their deployment in resource-constrained scenarios such as on-board processing or edge computing. To bridge the trade-off between accuracy and efficiency, this paper introduces a lightweight network for cloud detection. The core innovations of our network are twofold: (1) a dual-path feature enhancer that operates at the front end to extract and fuse multi-scale features through a parallel architecture, significantly enriching feature diversity and representational capacity, thereby alleviating the need for a complex backbone, and (2) a bidirectional gated fusion module, which adaptively integrates multi-scale features from the dual-path feature enhancer with deep semantic features from the backbone decoder through a gated attention mechanism and dynamic convolution, thereby enhancing feature discriminability. Comprehensive experiments on the public HRC_WHU dataset demonstrate that the proposed model achieves a high overall accuracy of 96.31% and a mean intersection-over-union of 92.82%, with only 12.04 GFLOPs of computational cost, outperforming several state-of-the-art methods. These results validate that our approach effectively balances high detection performance with computational efficiency, offering a practical solution for real-time, lightweight cloud detection in high-resolution remote sensing imagery.},
}
RevDate: 2026-03-14
Risks Related to Advanced Bridge Monitoring Technologies.
Sensors (Basel, Switzerland), 26(5): pii:s26051603.
Bridge monitoring has undergone a significant transformation with the integration of advanced technologies, including structural health monitoring systems, Internet of Things sensors, unmanned aerial vehicles, artificial intelligence, and cloud computing. These technologies enable continuous real-time data acquisition, processing, and early detection of structural degradation. However, their deployment also introduces a range of emerging risks that require careful consideration. This paper presents descriptive risk listings and proposes a comprehensive risk-governance framework for advanced bridge monitoring using the SWOT analysis. The framework integrates a unified risk taxonomy and assessment that links sensor and AI performance with cyber threat modeling and data governance requirements. The application of two real deployments, the Jindo Bridge SHM program and the Stava Bridge digital-twin implementation, shows how the framework converts heterogeneous measurements for improving bridge lifecycle management with the implementation of advanced monitoring technologies. Compared with prior studies that primarily catalog risks, the contribution of the paper is an interdisciplinary, operationalizable method that couples reliability, security, and governance into a single process, thereby ensuring that advanced technologies enhance, rather than erode, the safety and resilience of bridge infrastructure.
Additional Links: PMID-41829563
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41829563,
year = {2026},
author = {Miške, M and Daponte, P and De Vito, L and Figuli, L},
title = {Risks Related to Advanced Bridge Monitoring Technologies.},
journal = {Sensors (Basel, Switzerland)},
volume = {26},
number = {5},
pages = {},
doi = {10.3390/s26051603},
pmid = {41829563},
issn = {1424-8220},
support = {SPS G6140 Advanced Technologies for Physical ResIlience Of cRitical Infrastructure (APRIORI)//North Atlantic Treaty Organization/ ; APVV-22-0562, Strengthening the REsilience MAnagement of Key infrastructue El-ements using advances in 3D modeling//Slovak Research and Development Agency/ ; },
abstract = {Bridge monitoring has undergone a significant transformation with the integration of advanced technologies, including structural health monitoring systems, Internet of Things sensors, unmanned aerial vehicles, artificial intelligence, and cloud computing. These technologies enable continuous real-time data acquisition, processing, and early detection of structural degradation. However, their deployment also introduces a range of emerging risks that require careful consideration. This paper presents descriptive risk listings and proposes a comprehensive risk-governance framework for advanced bridge monitoring using the SWOT analysis. The framework integrates a unified risk taxonomy and assessment that links sensor and AI performance with cyber threat modeling and data governance requirements. The application of two real deployments, the Jindo Bridge SHM program and the Stava Bridge digital-twin implementation, shows how the framework converts heterogeneous measurements for improving bridge lifecycle management with the implementation of advanced monitoring technologies. Compared with prior studies that primarily catalog risks, the contribution of the paper is an interdisciplinary, operationalizable method that couples reliability, security, and governance into a single process, thereby ensuring that advanced technologies enhance, rather than erode, the safety and resilience of bridge infrastructure.},
}
RevDate: 2026-03-14
LITO: Lemur-Inspired Task Offloading for Edge-Fog-Cloud Continuum Systems.
Sensors (Basel, Switzerland), 26(5): pii:s26051497.
Edge, fog, and cloud continuum architectures that interconnect resource-constrained devices, intermediate edge servers, and remote cloud data centers face persistent challenges in handling heterogeneous and latency-sensitive workloads while reducing energy consumption and improving resource utilization. Classical task offloading approaches either rely on static heuristics, which lack adaptability to dynamic conditions, or on metaheuristic optimizers, which often incur high computational overhead and centralized coordination. This paper proposes LITO, a lemur-inspired task offloading algorithm for edge, fog, and cloud continuum systems that models the infrastructure as a social system in which computing nodes assume distinct roles that mirror lemur social hierarchies. Building on an abstracted model of lemur group behavior, LITO incorporates two key lemur-inspired mechanisms: an energy-aware task assignment mechanism based on sun basking, a thermoregulation behavior in which lemurs seek favorable warm spots, mapped here to selecting energetically efficient execution nodes, and a cooperative scheduling policy based on huddling, group clustering under stress, mapped here to sharing load among overloaded nodes. These mechanisms are combined with a continual supervised policy-learning layer with contextual bandit feedback that refines offloading decisions from online feedback. The resulting multi-objective formulation jointly minimizes energy consumption and deadline violations while maximizing resource utilization and throughput under high-load conditions in the edge and fog segment of the continuum. Simulations under diverse workload regimes and task complexities show that LITO outperforms representative multi-objective offloading baselines in terms of energy consumption, resource utilization, latency, Service Level Agreement (SLA) violations, and throughput in congested scenarios.
Additional Links: PMID-41829461
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41829461,
year = {2026},
author = {Almulifi, A and Kurdi, H},
title = {LITO: Lemur-Inspired Task Offloading for Edge-Fog-Cloud Continuum Systems.},
journal = {Sensors (Basel, Switzerland)},
volume = {26},
number = {5},
pages = {},
doi = {10.3390/s26051497},
pmid = {41829461},
issn = {1424-8220},
abstract = {Edge, fog, and cloud continuum architectures that interconnect resource-constrained devices, intermediate edge servers, and remote cloud data centers face persistent challenges in handling heterogeneous and latency-sensitive workloads while reducing energy consumption and improving resource utilization. Classical task offloading approaches either rely on static heuristics, which lack adaptability to dynamic conditions, or on metaheuristic optimizers, which often incur high computational overhead and centralized coordination. This paper proposes LITO, a lemur-inspired task offloading algorithm for edge, fog, and cloud continuum systems that models the infrastructure as a social system in which computing nodes assume distinct roles that mirror lemur social hierarchies. Building on an abstracted model of lemur group behavior, LITO incorporates two key lemur-inspired mechanisms: an energy-aware task assignment mechanism based on sun basking, a thermoregulation behavior in which lemurs seek favorable warm spots, mapped here to selecting energetically efficient execution nodes, and a cooperative scheduling policy based on huddling, group clustering under stress, mapped here to sharing load among overloaded nodes. These mechanisms are combined with a continual supervised policy-learning layer with contextual bandit feedback that refines offloading decisions from online feedback. The resulting multi-objective formulation jointly minimizes energy consumption and deadline violations while maximizing resource utilization and throughput under high-load conditions in the edge and fog segment of the continuum. Simulations under diverse workload regimes and task complexities show that LITO outperforms representative multi-objective offloading baselines in terms of energy consumption, resource utilization, latency, Service Level Agreement (SLA) violations, and throughput in congested scenarios.},
}
RevDate: 2026-03-14
CmpDate: 2026-03-14
Edge-AI Enabled Acoustic Monitoring and Spatial Localisation for Sow Oestrus Detection.
Animals : an open access journal from MDPI, 16(5): pii:ani16050804.
Timely and accurate detection of sow oestrus is crucial for enhancing reproductive efficiency and reducing non-productive days (NPDs) in large-scale pig farms. However, traditional manual observation is labour-intensive and subjective, while cloud-based deep learning solutions face challenges such as high latency and privacy risks when applied in intensive housing environments. This study developed an edge-intelligent monitoring system that integrates deep temporal modelling with sound source localisation technology. A three-stage hierarchical screening strategy was utilised to select and deploy a lightweight Stacked-LSTM model on the resource-constrained ESP32-S3 hardware platform. This model was trained and calibrated using a high-quality acoustic dataset validated against serum reproductive hormones, specifically follicle-stimulating hormone (FSH), luteinising hormone (LH), and progesterone (P4). Experimental results demonstrate that the optimised model achieved a classification accuracy of 96.17%, with an inference latency of only 41 ms, thereby fully satisfying the stringent real-time monitoring requirements while maintaining a minimal memory footprint. Furthermore, the system integrates a localisation algorithm based on Generalised Cross-Correlation with Phase Transform (GCC-PHAT). Through spatial geometric modelling, the system successfully implements the functional mapping of vocalisation events to individual gestation stalls (Stall IDs). Laboratory pressure tests validated the robustness and low-cost deployment advantages of the "edge recognition-cloud synchronization" architecture, providing a reliable technical framework for the precision management of smart livestock farming.
Additional Links: PMID-41829012
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41829012,
year = {2026},
author = {Liu, H and Li, H and Cao, Y and Cao, R and Hu, G and Liu, Z},
title = {Edge-AI Enabled Acoustic Monitoring and Spatial Localisation for Sow Oestrus Detection.},
journal = {Animals : an open access journal from MDPI},
volume = {16},
number = {5},
pages = {},
doi = {10.3390/ani16050804},
pmid = {41829012},
issn = {2076-2615},
support = {2023-092//Shanxi Scholarship Council of China/ ; 202302010101002//Key R&D Program of Shanxi Province/ ; },
abstract = {Timely and accurate detection of sow oestrus is crucial for enhancing reproductive efficiency and reducing non-productive days (NPDs) in large-scale pig farms. However, traditional manual observation is labour-intensive and subjective, while cloud-based deep learning solutions face challenges such as high latency and privacy risks when applied in intensive housing environments. This study developed an edge-intelligent monitoring system that integrates deep temporal modelling with sound source localisation technology. A three-stage hierarchical screening strategy was utilised to select and deploy a lightweight Stacked-LSTM model on the resource-constrained ESP32-S3 hardware platform. This model was trained and calibrated using a high-quality acoustic dataset validated against serum reproductive hormones, specifically follicle-stimulating hormone (FSH), luteinising hormone (LH), and progesterone (P4). Experimental results demonstrate that the optimised model achieved a classification accuracy of 96.17%, with an inference latency of only 41 ms, thereby fully satisfying the stringent real-time monitoring requirements while maintaining a minimal memory footprint. Furthermore, the system integrates a localisation algorithm based on Generalised Cross-Correlation with Phase Transform (GCC-PHAT). Through spatial geometric modelling, the system successfully implements the functional mapping of vocalisation events to individual gestation stalls (Stall IDs). Laboratory pressure tests validated the robustness and low-cost deployment advantages of the "edge recognition-cloud synchronization" architecture, providing a reliable technical framework for the precision management of smart livestock farming.},
}
RevDate: 2026-03-13
Web-based cloud-computing Asthma Control Test differentiates uncontrolled asthma.
Respiratory investigation, 64(3):101398 pii:S2212-5345(26)00032-8 [Epub ahead of print].
BACKGROUND: Mobile health technologies have been shown to improve asthma control. However, the effect on web-based Asthma Control Test (ACT) with cloud computing on asthma control status remains unknown. We aimed to examine how predictions of ACT scores based on self-perceived symptoms and cloud computing influence asthma control levels defined by Global Initiative for Asthma (GINA).
METHODS: We created an interactive web-based application providing automated calculations of frequencies of asthma symptoms and reliever medication used in the past month, traditional ACT, and cloud-computing ACT (ccACT). Adult asthma patients aged between 20- and 65-year-old were included in the study. Participants were encouraged to input perceived asthma symptoms and reliever medication use and to perform monthly assessment of web-based traditional ACT. The ccACT scores were calculated by the application when monthly assessments have been completed. The receiver operating characteristic (ROC) curves were used to compare the performance of traditional ACT and ccACT. Asthma control levels defined by GINA were used as outcome variables.
RESULTS: Eighty-five qualified records obtained from 28 participants were included for analysis. To differentiate well- and partly-controlled asthma from uncontrolled asthma, the better cutoff was ≥21 for both traditional ACT and ccACT scores. The area under the ROC curve for ccACT was greater than traditional ACT (0.99 vs. 0.91). The performance of both tests was statistically different (P = 0.01).
CONCLUSIONS: ccACT may differentiate well- and partly-controlled asthma from uncontrolled asthma better than traditional ACT. This potentially leads to the development of a more effective method in asthma control.
Additional Links: PMID-41825338
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41825338,
year = {2026},
author = {Wu, TJ and Wu, JH and Ko, YC and Huang, MS and Wu, JT},
title = {Web-based cloud-computing Asthma Control Test differentiates uncontrolled asthma.},
journal = {Respiratory investigation},
volume = {64},
number = {3},
pages = {101398},
doi = {10.1016/j.resinv.2026.101398},
pmid = {41825338},
issn = {2212-5353},
abstract = {BACKGROUND: Mobile health technologies have been shown to improve asthma control. However, the effect on web-based Asthma Control Test (ACT) with cloud computing on asthma control status remains unknown. We aimed to examine how predictions of ACT scores based on self-perceived symptoms and cloud computing influence asthma control levels defined by Global Initiative for Asthma (GINA).
METHODS: We created an interactive web-based application providing automated calculations of frequencies of asthma symptoms and reliever medication used in the past month, traditional ACT, and cloud-computing ACT (ccACT). Adult asthma patients aged between 20- and 65-year-old were included in the study. Participants were encouraged to input perceived asthma symptoms and reliever medication use and to perform monthly assessment of web-based traditional ACT. The ccACT scores were calculated by the application when monthly assessments have been completed. The receiver operating characteristic (ROC) curves were used to compare the performance of traditional ACT and ccACT. Asthma control levels defined by GINA were used as outcome variables.
RESULTS: Eighty-five qualified records obtained from 28 participants were included for analysis. To differentiate well- and partly-controlled asthma from uncontrolled asthma, the better cutoff was ≥21 for both traditional ACT and ccACT scores. The area under the ROC curve for ccACT was greater than traditional ACT (0.99 vs. 0.91). The performance of both tests was statistically different (P = 0.01).
CONCLUSIONS: ccACT may differentiate well- and partly-controlled asthma from uncontrolled asthma better than traditional ACT. This potentially leads to the development of a more effective method in asthma control.},
}
RevDate: 2026-03-13
CmpDate: 2026-03-13
Surgery for interplanetary space missions.
The British journal of surgery, 113(3):.
As human spaceflight expands beyond low Earth orbit, the ability to deliver advanced surgical care in space becomes critical. Current medical provisions on board the International Space Station (ISS) are geared towards treating low-risk conditions, with a 'stabilize-and-evacuate' principle for more complex cases-an approach that is not viable for extended missions to the Moon and Mars. This review summarizes research conducted around space surgery, with a particular focus on surgical robotics. Experiments in parabolic flight and analogue environments demonstrate that, provided the operator, patient, and instruments are restrained, surgical skill is largely unaffected by reduced gravity. Robotic surgery has primarily been explored in remote undersea habitats and in limited flight studies. There are several challenges to the implementation of surgical systems in space, including size, weight, and power constraints, communication latency, and crew training. Means of fluid and debris containment, provision of anaesthesia, and postoperative recovery in altered physiology must also be considered. The key features of an ideal space surgery robotic set-up are outlined. It should be compact, multifunctional, adaptable, reliable, and optimized in technical design and material composition for use in habitable volumes. Such systems should incorporate artificial intelligence (AI)-driven decision-making support, variable autonomy, and human-in-the-loop control. Crew members must be trained and supported to deliver and recover from surgical care in space. Cloud and edge computing will mitigate latency while expanding on-board data processing capabilities. Although not yet operationally mature, robotic surgery is a critical capability for future exploratory space missions, but requires continued multidisciplinary development.
Additional Links: PMID-41823369
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41823369,
year = {2026},
author = {Khanna, R and Li, Y and Cook, M and Sawant, P and Hounon, R and Carroll, D and Lowe, L and Lindenroth, L and Mahmoodi, T and Raison, N and Granados, A and Ojha, A and Bergeles, C and Breda, A and Ourselin, S and Dasgupta, P},
title = {Surgery for interplanetary space missions.},
journal = {The British journal of surgery},
volume = {113},
number = {3},
pages = {},
doi = {10.1093/bjs/znag005},
pmid = {41823369},
issn = {1365-2168},
mesh = {*Space Flight ; Humans ; *Robotic Surgical Procedures/methods ; Robotics ; },
abstract = {As human spaceflight expands beyond low Earth orbit, the ability to deliver advanced surgical care in space becomes critical. Current medical provisions on board the International Space Station (ISS) are geared towards treating low-risk conditions, with a 'stabilize-and-evacuate' principle for more complex cases-an approach that is not viable for extended missions to the Moon and Mars. This review summarizes research conducted around space surgery, with a particular focus on surgical robotics. Experiments in parabolic flight and analogue environments demonstrate that, provided the operator, patient, and instruments are restrained, surgical skill is largely unaffected by reduced gravity. Robotic surgery has primarily been explored in remote undersea habitats and in limited flight studies. There are several challenges to the implementation of surgical systems in space, including size, weight, and power constraints, communication latency, and crew training. Means of fluid and debris containment, provision of anaesthesia, and postoperative recovery in altered physiology must also be considered. The key features of an ideal space surgery robotic set-up are outlined. It should be compact, multifunctional, adaptable, reliable, and optimized in technical design and material composition for use in habitable volumes. Such systems should incorporate artificial intelligence (AI)-driven decision-making support, variable autonomy, and human-in-the-loop control. Crew members must be trained and supported to deliver and recover from surgical care in space. Cloud and edge computing will mitigate latency while expanding on-board data processing capabilities. Although not yet operationally mature, robotic surgery is a critical capability for future exploratory space missions, but requires continued multidisciplinary development.},
}
MeSH Terms:
show MeSH Terms
hide MeSH Terms
*Space Flight
Humans
*Robotic Surgical Procedures/methods
Robotics
RevDate: 2026-03-13
Quantum-Inspired Adaptive Meta-Heuristic-Machine Learning framework for resilient and energy-efficient task scheduling in multi-cloud ecosystems.
Scientific reports pii:10.1038/s41598-026-43125-3 [Epub ahead of print].
Additional Links: PMID-41820483
Publisher:
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41820483,
year = {2026},
author = {Divya, N and Kiranbabu, MNV and Babu, GC},
title = {Quantum-Inspired Adaptive Meta-Heuristic-Machine Learning framework for resilient and energy-efficient task scheduling in multi-cloud ecosystems.},
journal = {Scientific reports},
volume = {},
number = {},
pages = {},
doi = {10.1038/s41598-026-43125-3},
pmid = {41820483},
issn = {2045-2322},
}
RevDate: 2026-03-12
Hybrid prediction system for reliable multi-seasonal sustainable energy generation under meteorological and environmental volatility.
Scientific reports, 16(1):.
Amid escalating climate change and energy crises, wind energy, as a pivotal renewable resource, poses significant challenges to grid stability and energy management due to its inherent stochastic intermittency and nonlinear dynamics. Consequently, this research presents a hybrid prediction system, ICEEMDAN-NCRBMO-AELM, integrating data decomposition with intelligent computing to reveal spatiotemporal coupling patterns in climatic variables for reliable wind power forecasting. This system utilizes Improved Complete Ensemble Empirical Mode Decomposition with Adaptive Noise (ICEEMDAN) to dissect sequences into several modes, addressing time–frequency features and alleviating mode mixing through a dynamic noise-weighting scheme. To further optimize Adaptive Extreme Learning Machine (AELM) performance, this research proposes a novel Normal Cloud Red-billed Blue Magpie Intelligent Optimization (NCRBMO) algorithm, motivated by cloud model theory and the swarm behavior of Red-billed Blue Magpie. NCRBMO employs a multiphase mapping inverse generation strategy for initializing individuals and designs five heuristic search strategies for global optimization. Regarding hyperparameter tuning, NCRBMO optimizes the weight matrix and bias vector in the output layer of a single-hidden-layer feedforward network, enhancing prediction accuracy and stability. The interseasonal wind power prediction results from Jiangsu region, China, indicate that this system surpasses competing representative techniques in addressing complex seasonal trends and meteorological abrupt changes.
Additional Links: PMID-41794986
PubMed:
Citation:
show bibtex listing
hide bibtex listing
@article {pmid41794986,
year = {2026},
author = {Liu, H and Cai, C and Li, P and Wang, Y and Zhao, M and Tang, C and Tu, B and Li, Y and Zheng, X and Ma, Y and Liang, H and Chen, M},
title = {Hybrid prediction system for reliable multi-seasonal sustainable energy generation under meteorological and environmental volatility.},
journal = {Scientific reports},
volume = {16},
number = {1},
pages = {},
pmid = {41794986},
issn = {2045-2322},
support = {11975177//Natural Science Foundation of China/ ; },
abstract = {Amid escalating climate change and energy crises, wind energy, as a pivotal renewable resource, poses significant challenges to grid stability and energy management due to its inherent stochastic intermittency and nonlinear dynamics. Consequently, this research presents a hybrid prediction system, ICEEMDAN-NCRBMO-AELM, integrating data decomposition with intelligent computing to reveal spatiotemporal coupling patterns in climatic variables for reliable wind power forecasting. This system utilizes Improved Complete Ensemble Empirical Mode Decomposition with Adaptive Noise (ICEEMDAN) to dissect sequences into several modes, addressing time–frequency features and alleviating mode mixing through a dynamic noise-weighting scheme. To further optimize Adaptive Extreme Learning Machine (AELM) performance, this research proposes a novel Normal Cloud Red-billed Blue Magpie Intelligent Optimization (NCRBMO) algorithm, motivated by cloud model theory and the swarm behavior of Red-billed Blue Magpie. NCRBMO employs a multiphase mapping inverse generation strategy for initializing individuals and designs five heuristic search strategies for global optimization. Regarding hyperparameter tuning, NCRBMO optimizes the weight matrix and bias vector in the output layer of a single-hidden-layer feedforward network, enhancing prediction accuracy and stability. The interseasonal wind power prediction results from Jiangsu region, China, indicate that this system surpasses competing representative techniques in addressing complex seasonal trends and meteorological abrupt changes.},
}
▼ ▼ LOAD NEXT 100 CITATIONS
RJR Experience and Expertise
Researcher
Robbins holds BS, MS, and PhD degrees in the life sciences. He served as a tenured faculty member in the Zoology and Biological Science departments at Michigan State University. He is currently exploring the intersection between genomics, microbial ecology, and biodiversity — an area that promises to transform our understanding of the biosphere.
Educator
Robbins has extensive experience in college-level education: At MSU he taught introductory biology, genetics, and population genetics. At JHU, he was an instructor for a special course on biological database design. At FHCRC, he team-taught a graduate-level course on the history of genetics. At Bellevue College he taught medical informatics.
Administrator
Robbins has been involved in science administration at both the federal and the institutional levels. At NSF he was a program officer for database activities in the life sciences, at DOE he was a program officer for information infrastructure in the human genome project. At the Fred Hutchinson Cancer Research Center, he served as a vice president for fifteen years.
Technologist
Robbins has been involved with information technology since writing his first Fortran program as a college student. At NSF he was the first program officer for database activities in the life sciences. At JHU he held an appointment in the CS department and served as director of the informatics core for the Genome Data Base. At the FHCRC he was VP for Information Technology.
Publisher
While still at Michigan State, Robbins started his first publishing venture, founding a small company that addressed the short-run publishing needs of instructors in very large undergraduate classes. For more than 20 years, Robbins has been operating The Electronic Scholarly Publishing Project, a web site dedicated to the digital publishing of critical works in science, especially classical genetics.
Speaker
Robbins is well-known for his speaking abilities and is often called upon to provide keynote or plenary addresses at international meetings. For example, in July, 2012, he gave a well-received keynote address at the Global Biodiversity Informatics Congress, sponsored by GBIF and held in Copenhagen. The slides from that talk can be seen HERE.
Facilitator
Robbins is a skilled meeting facilitator. He prefers a participatory approach, with part of the meeting involving dynamic breakout groups, created by the participants in real time: (1) individuals propose breakout groups; (2) everyone signs up for one (or more) groups; (3) the groups with the most interested parties then meet, with reports from each group presented and discussed in a subsequent plenary session.
Designer
Robbins has been engaged with photography and design since the 1960s, when he worked for a professional photography laboratory. He now prefers digital photography and tools for their precision and reproducibility. He designed his first web site more than 20 years ago and he personally designed and implemented this web site. He engages in graphic design as a hobby.
RJR Picks from Around the Web (updated 11 MAY 2018 )
Old Science
Weird Science
Treating Disease with Fecal Transplantation
Fossils of miniature humans (hobbits) discovered in Indonesia
Paleontology
Dinosaur tail, complete with feathers, found preserved in amber.
Astronomy
Mysterious fast radio burst (FRB) detected in the distant universe.
Big Data & Informatics
Big Data: Buzzword or Big Deal?
Hacking the genome: Identifying anonymized human subjects using publicly available data.