首页 > 最新文献

信息工程最新文献

英文 中文
IF:
Evaluating end-to-end autonomous driving architectures: a proximal policy optimization approach in simulated environments 评估端到端自动驾驶架构:模拟环境中的近端策略优化方法
Pub Date : 2025-07-25 DOI: 10.1007/s43684-025-00102-3
Ângelo Morgado, Kaoru Ota, Mianxiong Dong, Nuno Pombo

Autonomous driving systems (ADS) are at the forefront of technological innovation, promising enhanced safety, efficiency, and convenience in transportation. This study investigates the potential of end-to-end reinforcement learning (RL) architectures for ADS, specifically focusing on a Go-To-Point task involving lane-keeping and navigation through basic urban environments. The study uses the Proximal Policy Optimization (PPO) algorithm within the CARLA simulation environment. Traditional modular systems, which separate driving tasks into perception, decision-making, and control, provide interpretability and reliability in controlled scenarios but struggle with adaptability to dynamic, real-world conditions. In contrast, end-to-end systems offer a more integrated approach, potentially enhancing flexibility and decision-making cohesion.

This research introduces CARLA-GymDrive, a novel framework integrating the CARLA simulator with the Gymnasium API, enabling seamless RL experimentation with both discrete and continuous action spaces. Through a two-phase training regimen, the study evaluates the efficacy of PPO in an end-to-end ADS focused on basic tasks like lane-keeping and waypoint navigation. A comparative analysis with modular architectures is also provided. The findings highlight the strengths of PPO in managing continuous control tasks, achieving smoother and more adaptable driving behaviors than value-based algorithms like Deep Q-Networks. However, challenges remain in generalization and computational demands, with end-to-end systems requiring extensive training time.

While the study underscores the potential of end-to-end architectures, it also identifies limitations in scalability and real-world applicability, suggesting that modular systems may currently be more feasible for practical ADS deployment. Nonetheless, the CARLA-GymDrive framework and the insights gained from PPO-based ADS contribute significantly to the field, laying a foundation for future advancements in AD.

自动驾驶系统(ADS)处于技术创新的前沿,有望提高交通运输的安全性、效率和便利性。本研究探讨了端到端强化学习(RL)架构在ADS中的潜力,特别关注涉及车道保持和在基本城市环境中导航的Go-To-Point任务。该研究在CARLA仿真环境中使用了近端策略优化(PPO)算法。传统的模块化系统将驾驶任务分为感知、决策和控制,在受控场景中提供了可解释性和可靠性,但在适应动态的现实世界条件方面存在困难。相比之下,端到端系统提供了一种更综合的方法,潜在地提高了灵活性和决策凝聚力。本研究介绍了CARLA- gymdrive,这是一个将CARLA模拟器与gym API集成在一起的新框架,可以在离散和连续的动作空间中进行无缝的强化学习实验。通过两阶段的训练方案,该研究评估了PPO在端到端ADS中专注于基本任务(如车道保持和航路点导航)的功效。还提供了与模块化体系结构的比较分析。研究结果强调了PPO在管理连续控制任务方面的优势,与Deep Q-Networks等基于值的算法相比,它可以实现更平稳、更适应性的驾驶行为。然而,在泛化和计算需求方面仍然存在挑战,端到端系统需要大量的训练时间。虽然该研究强调了端到端架构的潜力,但它也指出了可扩展性和实际应用的局限性,表明模块化系统目前可能更适合实际的ADS部署。尽管如此,CARLA-GymDrive框架和从基于ppo的ADS中获得的见解对该领域做出了重大贡献,为AD的未来发展奠定了基础。
{"title":"Evaluating end-to-end autonomous driving architectures: a proximal policy optimization approach in simulated environments","authors":"Ângelo Morgado,&nbsp;Kaoru Ota,&nbsp;Mianxiong Dong,&nbsp;Nuno Pombo","doi":"10.1007/s43684-025-00102-3","DOIUrl":"10.1007/s43684-025-00102-3","url":null,"abstract":"<div><p>Autonomous driving systems (ADS) are at the forefront of technological innovation, promising enhanced safety, efficiency, and convenience in transportation. This study investigates the potential of end-to-end reinforcement learning (RL) architectures for ADS, specifically focusing on a Go-To-Point task involving lane-keeping and navigation through basic urban environments. The study uses the Proximal Policy Optimization (PPO) algorithm within the CARLA simulation environment. Traditional modular systems, which separate driving tasks into perception, decision-making, and control, provide interpretability and reliability in controlled scenarios but struggle with adaptability to dynamic, real-world conditions. In contrast, end-to-end systems offer a more integrated approach, potentially enhancing flexibility and decision-making cohesion.</p><p>This research introduces CARLA-GymDrive, a novel framework integrating the CARLA simulator with the Gymnasium API, enabling seamless RL experimentation with both discrete and continuous action spaces. Through a two-phase training regimen, the study evaluates the efficacy of PPO in an end-to-end ADS focused on basic tasks like lane-keeping and waypoint navigation. A comparative analysis with modular architectures is also provided. The findings highlight the strengths of PPO in managing continuous control tasks, achieving smoother and more adaptable driving behaviors than value-based algorithms like Deep Q-Networks. However, challenges remain in generalization and computational demands, with end-to-end systems requiring extensive training time.</p><p>While the study underscores the potential of end-to-end architectures, it also identifies limitations in scalability and real-world applicability, suggesting that modular systems may currently be more feasible for practical ADS deployment. Nonetheless, the CARLA-GymDrive framework and the insights gained from PPO-based ADS contribute significantly to the field, laying a foundation for future advancements in AD.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2025-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-025-00102-3.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145169256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Zero trust-driven access control delegation using blockchain 零信任驱动访问控制委托使用区块链
IF 5.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-20 DOI: 10.1016/j.bcra.2025.100319
Rahma Mukta , Shantanu Pal , Kowshik Chowdhury , Michael Hitchens , Hye-young Paik , Salil S. Kanhere
As digital ecosystems become more complex with decentralized technologies like the Internet of Things (IoT) and blockchain, traditional access control models fail to meet the security needs of dynamic, high-risk environments. The need for dynamic, fine-grained access control mechanisms has become critical, particularly in environments where trust must be continuously evaluated, and access decisions must adapt to real-time conditions. Traditional models often rely on static identity management and centralized trust assumptions, which are inadequate for modern, decentralized, and highly dynamic environments such as IoT ecosystems. Consequently, existing solutions lack fine-grained identity management, flexible delegation, and continuous trust evaluation, highlighting the need for a more robust, adaptive, and decentralized access control architecture. To address these gaps, this paper presents a novel access control architecture that integrates self-sovereign identity (SSI) and decentralized identifier (DID)-based access control with zero trust principles, enhanced by a flexible capability-based access control (CapBAC) approach. Leveraging SSI and DID allows entities to manage their identities without relying on a central authority, aligning with zero-trust principles. The integration of CapBAC ensures flexible, context-aware, and attribute-based access control, where access rights are dynamically granted based on the requester's capabilities. This enables fine-grained delegation of access rights, allowing trusted entities to delegate specific privileges to others without compromising overall security. Continuous trust evaluation is employed to assess the authenticity of access requests, mitigating the risks posed by compromised devices or users. The proposed architecture also incorporates blockchain technology to ensure transparent, immutable, and secure management of access logs, providing traceability and accountability for all access events. We demonstrate the feasibility and effectiveness of this solution through performance evaluations and comparisons with existing access control schemes, showing its superior security, scalability, and adaptability in real-world scenarios. Our work demonstrates a comprehensive, decentralized, and scalable solution for secure access control delegation using zero trust-driven principles.
随着物联网(IoT)和区块链等分散技术的发展,数字生态系统变得更加复杂,传统的访问控制模型已无法满足动态、高风险环境的安全需求。对动态、细粒度访问控制机制的需求已经变得至关重要,特别是在必须持续评估信任和访问决策必须适应实时条件的环境中。传统模型通常依赖于静态身份管理和集中式信任假设,这对于现代、分散和高度动态的环境(如物联网生态系统)是不够的。因此,现有的解决方案缺乏细粒度的身份管理、灵活的委托和持续的信任评估,这突出了对更健壮、自适应和分散的访问控制体系结构的需求。为了解决这些差距,本文提出了一种新的访问控制体系结构,该体系结构集成了基于零信任原则的自主身份(SSI)和基于分散标识符(DID)的访问控制,并通过灵活的基于能力的访问控制(CapBAC)方法进行了增强。利用SSI和DID允许实体在不依赖中央权威的情况下管理其身份,符合零信任原则。CapBAC的集成确保了灵活、上下文感知和基于属性的访问控制,其中访问权限是根据请求者的能力动态授予的。这支持细粒度的访问权限委托,允许受信任实体将特定特权委托给其他实体,而不会损害整体安全性。通过持续信任评估来评估访问请求的真实性,降低设备或用户被入侵带来的风险。所建议的体系结构还集成了区块链技术,以确保访问日志的透明、不可变和安全管理,为所有访问事件提供可跟踪性和责任。我们通过性能评估和与现有访问控制方案的比较,证明了该解决方案的可行性和有效性,展示了其在现实场景中优越的安全性、可扩展性和适应性。我们的工作展示了一个全面的、分散的、可扩展的解决方案,用于使用零信任驱动原则的安全访问控制委托。
{"title":"Zero trust-driven access control delegation using blockchain","authors":"Rahma Mukta ,&nbsp;Shantanu Pal ,&nbsp;Kowshik Chowdhury ,&nbsp;Michael Hitchens ,&nbsp;Hye-young Paik ,&nbsp;Salil S. Kanhere","doi":"10.1016/j.bcra.2025.100319","DOIUrl":"10.1016/j.bcra.2025.100319","url":null,"abstract":"<div><div>As digital ecosystems become more complex with decentralized technologies like the Internet of Things (IoT) and blockchain, traditional access control models fail to meet the security needs of dynamic, high-risk environments. The need for dynamic, fine-grained access control mechanisms has become critical, particularly in environments where trust must be continuously evaluated, and access decisions must adapt to real-time conditions. Traditional models often rely on static identity management and centralized trust assumptions, which are inadequate for modern, decentralized, and highly dynamic environments such as IoT ecosystems. Consequently, existing solutions lack fine-grained identity management, flexible delegation, and continuous trust evaluation, highlighting the need for a more robust, adaptive, and decentralized access control architecture. To address these gaps, this paper presents a novel access control architecture that integrates self-sovereign identity (SSI) and decentralized identifier (DID)-based access control with zero trust principles, enhanced by a flexible capability-based access control (CapBAC) approach. Leveraging SSI and DID allows entities to manage their identities without relying on a central authority, aligning with zero-trust principles. The integration of CapBAC ensures flexible, context-aware, and attribute-based access control, where access rights are dynamically granted based on the requester's capabilities. This enables fine-grained delegation of access rights, allowing trusted entities to delegate specific privileges to others without compromising overall security. Continuous trust evaluation is employed to assess the authenticity of access requests, mitigating the risks posed by compromised devices or users. The proposed architecture also incorporates blockchain technology to ensure transparent, immutable, and secure management of access logs, providing traceability and accountability for all access events. We demonstrate the feasibility and effectiveness of this solution through performance evaluations and comparisons with existing access control schemes, showing its superior security, scalability, and adaptability in real-world scenarios. Our work demonstrates a comprehensive, decentralized, and scalable solution for secure access control delegation using zero trust-driven principles.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"7 1","pages":"Article 100319"},"PeriodicalIF":5.6,"publicationDate":"2025-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146024719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hybrid Bi-LSTM model for data-driven maintenance planning 用于数据驱动的维护计划的混合Bi-LSTM模型。
Pub Date : 2025-06-06 DOI: 10.1007/s43684-025-00099-9
Alexandros Noussis, Ryan O’Neil, Ahmed Saif, Abdelhakim Khatab, Claver Diallo

Modern industries dependent on reliable asset operation under constrained resources employ intelligent maintenance methods to maximize efficiency. However, classical maintenance methods rely on assumed lifetime distributions and suffer from estimation errors and computational complexity. The advent of Industry 4.0 has increased the use of sensors for monitoring systems, while deep learning (DL) models have allowed for accurate system health predictions, enabling data-driven maintenance planning. Most intelligent maintenance literature has used DL models solely for remaining useful life (RUL) point predictions, and a substantial gap exists in further using predictions to inform maintenance plan optimization. The few existing studies that have attempted to bridge this gap suffer from having used simple system configurations and non-scalable models. Hence, this paper develops a hybrid DL model using Monte Carlo dropout to generate RUL predictions which are used to construct empirical system reliability functions used for the optimization of the selective maintenance problem (SMP). The proposed framework is used to plan maintenance for a mission-oriented series k-out-of-n:G system. Numerical experiments compare the framework’s performance against prior SMP methods and highlight its strengths. When minimizing cost, maintenance plans are frequently produced that result in mission survival while avoiding unnecessary repairs. The proposed method is usable in large-scale, complex scenarios and various industrial contexts. The method finds exact solutions while avoiding the need for computationally-intensive parametric reliability functions.

现代工业依赖于资源受限条件下可靠的资产运行,采用智能维护方法实现效率最大化。然而,传统的维护方法依赖于假设的生命周期分布,并且存在估计误差和计算复杂性。工业4.0的出现增加了传感器用于监控系统的使用,而深度学习(DL)模型允许准确的系统健康预测,从而实现数据驱动的维护计划。大多数智能维护文献仅将深度学习模型用于剩余使用寿命(RUL)点预测,并且在进一步使用预测来通知维护计划优化方面存在实质性差距。现有的一些试图弥合这一差距的研究都使用了简单的系统配置和不可伸缩的模型。因此,本文开发了一种使用蒙特卡罗dropout的混合深度学习模型来生成RUL预测,该预测用于构建用于优化选择性维护问题(SMP)的经验系统可靠性函数。提出的框架用于面向任务的系列k-out- n:G系统的维护计划。数值实验将该框架的性能与先前的SMP方法进行了比较,并突出了其优点。在成本最小化的情况下,经常制定维护计划,从而在避免不必要的维修的同时保证任务的生存。该方法适用于大规模、复杂场景和各种工业环境。该方法可以找到精确的解,同时避免了需要大量计算的参数可靠性函数。
{"title":"A hybrid Bi-LSTM model for data-driven maintenance planning","authors":"Alexandros Noussis,&nbsp;Ryan O’Neil,&nbsp;Ahmed Saif,&nbsp;Abdelhakim Khatab,&nbsp;Claver Diallo","doi":"10.1007/s43684-025-00099-9","DOIUrl":"10.1007/s43684-025-00099-9","url":null,"abstract":"<div><p>Modern industries dependent on reliable asset operation under constrained resources employ intelligent maintenance methods to maximize efficiency. However, classical maintenance methods rely on assumed lifetime distributions and suffer from estimation errors and computational complexity. The advent of Industry 4.0 has increased the use of sensors for monitoring systems, while deep learning (DL) models have allowed for accurate system health predictions, enabling data-driven maintenance planning. Most intelligent maintenance literature has used DL models solely for remaining useful life (RUL) point predictions, and a substantial gap exists in further using predictions to inform maintenance plan optimization. The few existing studies that have attempted to bridge this gap suffer from having used simple system configurations and non-scalable models. Hence, this paper develops a hybrid DL model using Monte Carlo dropout to generate RUL predictions which are used to construct empirical system reliability functions used for the optimization of the selective maintenance problem (SMP). The proposed framework is used to plan maintenance for a mission-oriented series k-out-of-n:G system. Numerical experiments compare the framework’s performance against prior SMP methods and highlight its strengths. When minimizing cost, maintenance plans are frequently produced that result in mission survival while avoiding unnecessary repairs. The proposed method is usable in large-scale, complex scenarios and various industrial contexts. The method finds exact solutions while avoiding the need for computationally-intensive parametric reliability functions.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2025-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12175739/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144327926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scientometric analysis of research on deliberate biosecurity threats reveals North-Transatlantic dominance 对蓄意生物安全威胁研究的科学计量学分析揭示了北大西洋的主导地位
Q1 Social Sciences Pub Date : 2025-06-01 DOI: 10.1016/j.jobb.2025.04.002
Suryesh Kumar Namdeo, Chandan GN
Academic research is crucial to understanding and preparing for the fight against deliberate biological threats; yet, existing efforts have been fragmented, necessitating a more comprehensive examination of the field’s evolution. This study presents a scientometric analysis of deliberate biosecurity threats over the last 20 years, focusing on publication patterns, collaboration dynamics, research priorities, and leading publication venues. We analyzed 791 articles published between 2004 and 2023 using the Web of Science and Scopus databases. Results indicate a notable increase in publications dominated by North-Transatlantic countries, particularly the United States and the United Kingdom, which prioritize such areas as dual-use technology, synthetic biology, and virus-related biosecurity challenges. A comparative analysis of G7 and BRICS collaborations underscores substantial disparities in research output, with the G7 leading in international biosecurity research collaborations. Furthermore, the study reveals limited biosecurity research and collaboration in the Global South. Therefore, we encourage further exploration of biosecurity research to promote inclusive and collaborative global efforts. This study provides valuable insights for researchers and policymakers regarding biosecurity research priorities related to deliberate threats, and it highlights the need to address global disparities.
学术研究对于理解和准备打击蓄意的生物威胁至关重要;然而,现有的努力是分散的,需要对该领域的演变进行更全面的审查。本研究对过去20年蓄意的生物安全威胁进行了科学计量分析,重点关注出版模式、合作动态、研究重点和主要出版场所。我们使用Web of Science和Scopus数据库分析了2004年至2023年间发表的791篇文章。结果表明,以北大西洋国家,特别是美国和联合王国为主导的出版物显著增加,这些国家优先考虑军民两用技术、合成生物学和与病毒有关的生物安全挑战等领域。对七国集团和金砖国家合作的比较分析表明,七国集团在国际生物安全研究合作方面处于领先地位,在研究产出方面存在巨大差距。此外,该研究还揭示了发展中国家在生物安全方面的研究和合作有限。因此,我们鼓励进一步探索生物安全研究,以促进包容和合作的全球努力。这项研究为研究人员和政策制定者提供了有关蓄意威胁的生物安全研究重点的宝贵见解,并强调了解决全球差异的必要性。
{"title":"Scientometric analysis of research on deliberate biosecurity threats reveals North-Transatlantic dominance","authors":"Suryesh Kumar Namdeo,&nbsp;Chandan GN","doi":"10.1016/j.jobb.2025.04.002","DOIUrl":"10.1016/j.jobb.2025.04.002","url":null,"abstract":"<div><div>Academic research is crucial to understanding and preparing for the fight against deliberate biological threats; yet, existing efforts have been fragmented, necessitating a more comprehensive examination of the field’s evolution. This study presents a scientometric analysis of deliberate biosecurity threats over the last 20 years, focusing on publication patterns, collaboration dynamics, research priorities, and leading publication venues. We analyzed 791 articles published between 2004 and 2023 using the Web of Science and Scopus databases. Results indicate a notable increase in publications dominated by North-Transatlantic countries, particularly the United States and the United Kingdom, which prioritize such areas as dual-use technology, synthetic biology, and virus-related biosecurity challenges. A comparative analysis of G7 and BRICS collaborations underscores substantial disparities in research output, with the G7 leading in international biosecurity research collaborations. Furthermore, the study reveals limited biosecurity research and collaboration in the Global South. Therefore, we encourage further exploration of biosecurity research to promote inclusive and collaborative global efforts. This study provides valuable insights for researchers and policymakers regarding biosecurity research priorities related to deliberate threats, and it highlights the need to address global disparities.</div></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":"7 2","pages":"Pages 69-78"},"PeriodicalIF":0.0,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144196420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault tolerance testing and tuning for consortium blockchain 财团区块链的容错测试和调优
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.bcra.2024.100267
Taiwu Pang , Zheming Ye , Zhao Zhang , Cheqing Jin
While the potential applications of the consortium blockchain are becoming increasingly evident, the fault tolerance of systems in complex and changeable real environments has become an increasingly important factor. In recent years, many blockchain-oriented fault tolerance testing tools have been proposed. However, the selected fault sets cannot cover all kinds of problems that the consortium blockchain may encounter in real scenarios. Moreover, a rationality analysis of test results is often missing from these tools. In addition, it is also worth considering how to optimize system performance in the fault continuous stage. In this paper, we propose a general full-stack fault injection platform that can support the orderly injection of different kinds of Byzantine and non-Byzantine failures in a distributed scenario. Regarding the unclear underlying principles affecting system performance due to faults, we conduct an attribution analysis of various faults' influences on the consortium blockchain. Based on conclusions drawn form the attribution analysis, we design and implement the test-driven optimization strategy. The experimental results show that the optimization strategy can shorten the system average delay to less than one-third of that before optimization by reducing the throughput by about 15% in most fault scenarios.
随着区块链的潜在应用日益明显,系统在复杂多变的真实环境中的容错能力也日益成为一个重要的因素。近年来,人们提出了许多面向区块链的容错测试工具。然而,所选择的故障集并不能涵盖财团区块链在实际场景中可能遇到的所有问题。此外,这些工具往往缺少对测试结果的合理性分析。此外,如何在故障连续阶段优化系统性能也是值得考虑的问题。在本文中,我们提出了一个通用的全栈故障注入平台,该平台可以支持分布式场景中不同类型的拜占庭和非拜占庭故障的有序注入。针对故障影响系统性能的基本原理不明确的问题,我们对各种故障对联合体区块链的影响进行了归因分析。基于归因分析得出的结论,设计并实现了测试驱动优化策略。实验结果表明,在大多数故障场景下,该优化策略可将吞吐量降低15%左右,使系统平均延迟缩短到优化前的三分之一以下。
{"title":"Fault tolerance testing and tuning for consortium blockchain","authors":"Taiwu Pang ,&nbsp;Zheming Ye ,&nbsp;Zhao Zhang ,&nbsp;Cheqing Jin","doi":"10.1016/j.bcra.2024.100267","DOIUrl":"10.1016/j.bcra.2024.100267","url":null,"abstract":"<div><div>While the potential applications of the consortium blockchain are becoming increasingly evident, the fault tolerance of systems in complex and changeable real environments has become an increasingly important factor. In recent years, many blockchain-oriented fault tolerance testing tools have been proposed. However, the selected fault sets cannot cover all kinds of problems that the consortium blockchain may encounter in real scenarios. Moreover, a rationality analysis of test results is often missing from these tools. In addition, it is also worth considering how to optimize system performance in the fault continuous stage. In this paper, we propose a general full-stack fault injection platform that can support the orderly injection of different kinds of Byzantine and non-Byzantine failures in a distributed scenario. Regarding the unclear underlying principles affecting system performance due to faults, we conduct an attribution analysis of various faults' influences on the consortium blockchain. Based on conclusions drawn form the attribution analysis, we design and implement the test-driven optimization strategy. The experimental results show that the optimization strategy can shorten the system average delay to less than one-third of that before optimization by reducing the throughput by about 15% in most fault scenarios.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 2","pages":"Article 100267"},"PeriodicalIF":6.9,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144470083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cardano shared send transactions untangling in numbers 卡尔达诺共享发送交易的数量
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.bcra.2024.100269
Mostafa Chegenizadeh , Nickolay Larionov , Sina Rafati Niya , Yury Yanovich , Claudio J. Tessone
In this paper, we analyze shared send mixers (SSMs) within Cardano's extended unspent transaction output (EUTXO) model, presenting significant contributions to the understanding of UTXO-based blockchains. Firstly, we define the EUTXO SSM untangling problem and propose an algorithm to address it, along with providing an open-source implementation of the solution. Utilizing real transaction examples, we formulate and solve this problem in a systematic manner, shedding light on the intricacies of coin circulation within the Cardano blockchain. Through our analysis, we reveal some insights into the usage of SSMs, including statistics on their frequency and effectiveness in untangling transactions. With this method, our findings show that 11% of transactions seem to involve SSMs, 83% of which enable unique untangling. Moreover, we discuss the potential application of our algorithm in enhancing the address clustering results of transaction-level heuristics. Overall, our work contributes to a deeper understanding of transactional dynamics within UTXO cryptocurrencies, particularly within the context of Cardano's EUTXO model.
在本文中,我们分析了卡尔达诺扩展未花费交易输出(EUTXO)模型中的共享发送混合器(ssm),为理解基于utxo的区块链做出了重大贡献。首先,我们定义了EUTXO SSM解缠问题,并提出了一种算法来解决该问题,同时提供了该解决方案的开源实现。利用真实的交易实例,我们以系统的方式制定和解决这个问题,揭示了卡尔达诺区块链内硬币流通的复杂性。通过我们的分析,我们揭示了ssm使用的一些见解,包括它们在解开交易中的频率和有效性的统计数据。通过这种方法,我们的研究结果表明,11%的交易似乎涉及ssm,其中83%能够独特地解开缠结。此外,我们还讨论了该算法在增强事务级启发式的地址聚类结果方面的潜在应用。总的来说,我们的工作有助于更深入地了解UTXO加密货币中的交易动态,特别是在卡尔达诺的EUTXO模型的背景下。
{"title":"Cardano shared send transactions untangling in numbers","authors":"Mostafa Chegenizadeh ,&nbsp;Nickolay Larionov ,&nbsp;Sina Rafati Niya ,&nbsp;Yury Yanovich ,&nbsp;Claudio J. Tessone","doi":"10.1016/j.bcra.2024.100269","DOIUrl":"10.1016/j.bcra.2024.100269","url":null,"abstract":"<div><div>In this paper, we analyze shared send mixers (SSMs) within Cardano's extended unspent transaction output (EUTXO) model, presenting significant contributions to the understanding of UTXO-based blockchains. Firstly, we define the EUTXO SSM untangling problem and propose an algorithm to address it, along with providing an open-source implementation of the solution. Utilizing real transaction examples, we formulate and solve this problem in a systematic manner, shedding light on the intricacies of coin circulation within the Cardano blockchain. Through our analysis, we reveal some insights into the usage of SSMs, including statistics on their frequency and effectiveness in untangling transactions. With this method, our findings show that 11% of transactions seem to involve SSMs, 83% of which enable unique untangling. Moreover, we discuss the potential application of our algorithm in enhancing the address clustering results of transaction-level heuristics. Overall, our work contributes to a deeper understanding of transactional dynamics within UTXO cryptocurrencies, particularly within the context of Cardano's EUTXO model.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 2","pages":"Article 100269"},"PeriodicalIF":6.9,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144470085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of GO and ITO nanostructures’ performance on the nanostructure and optical behavior of a newly fabricated blended-PPY conductive polymer for antibacterial applications 氧化石墨烯和ITO纳米结构对新型聚吡咯导电聚合物纳米结构和光学性能的影响
Q1 Social Sciences Pub Date : 2025-06-01 DOI: 10.1016/j.jobb.2025.06.002
Rand Waleed, Ehssan Al-Bermany
Hybrid nanomaterials are attracting growing attention for their ability to improve the functional performance of polymer-based systems, making them strong contenders for advanced applications in the electronics and biomedical fields. In this study, novel hybrid nanocomposites were developed based on a polyvinylpyrrolidone (PVP) K30 matrix blended with the conductive polymer polypyrrole (PPy) and reinforced with graphene oxide (GO) and indium tin oxide (ITO) nanoparticles. The nanocomposites were fabricated using a solution-casting technique, with improved dispersion achieved through mechanical stirring and ultrasonication. Field emission scanning electron microscope (FESEM) images revealed a smooth surface morphology and an homogeneous distribution of nanomaterials within the polymer matrix. Meanwhile, Fourier transform infrared spectroscopy (FTIR) indicated strong physical interactions between the composite components, with X-ray diffraction confirming the semicrystalline behavior of PVP, which was strongly impacted by the contribution of the nanomaterials. UV–Vis spectroscopy showed significantly enhanced optical behavior, with a notable reduction in the optical band gap from ∼3.43 to 1.63 eV, indicating improved electronic transition efficiency. Furthermore, the well-dried solid films exhibited superior antibacterial activity, with inhibition zones increasing by 53.8% against Staphylococcus aureus and 46.1% against Escherichia coli. These findings highlight the novelty and multifunctionality of the developed nanocomposites, demonstrating their strong potential for use in flexible optical-electronics devices, antibacterial coatings, tissue engineering, and sensor applications and addressing current societal needs in the health, environmental, and medical sectors.
杂化纳米材料因其改善聚合物基体系功能性能的能力而受到越来越多的关注,使其成为电子和生物医学领域先进应用的有力竞争者。在这项研究中,基于聚乙烯吡咯烷酮(PVP) K30基体与导电聚合物聚吡咯(PPy)共混,并以氧化石墨烯(GO)和氧化铟锡(ITO)纳米颗粒增强,开发了新型杂化纳米复合材料。采用溶液铸造技术制备纳米复合材料,并通过机械搅拌和超声波改善了分散效果。场发射扫描电镜(FESEM)图像显示,聚合物基体表面形貌光滑,纳米材料分布均匀。同时,傅里叶变换红外光谱(FTIR)表明复合组分之间存在强烈的物理相互作用,x射线衍射证实PVP的半晶行为,这受到纳米材料的贡献的强烈影响。UV-Vis光谱显示出明显增强的光学行为,光学带隙从~ 3.43 eV显著减小到1.63 eV,表明电子跃迁效率提高。干燥后的固体膜对金黄色葡萄球菌和大肠杆菌的抑制面积分别提高了53.8%和46.1%。这些发现突出了所开发的纳米复合材料的新颖性和多功能性,展示了它们在柔性光电器件、抗菌涂层、组织工程和传感器应用以及解决当前健康、环境和医疗领域的社会需求方面的强大潜力。
{"title":"Impact of GO and ITO nanostructures’ performance on the nanostructure and optical behavior of a newly fabricated blended-PPY conductive polymer for antibacterial applications","authors":"Rand Waleed,&nbsp;Ehssan Al-Bermany","doi":"10.1016/j.jobb.2025.06.002","DOIUrl":"10.1016/j.jobb.2025.06.002","url":null,"abstract":"<div><div>Hybrid nanomaterials are attracting growing attention for their ability to improve the functional performance of polymer-based systems, making them strong contenders for advanced applications in the electronics and biomedical fields. In this study, novel hybrid nanocomposites were developed based on a polyvinylpyrrolidone (PVP) K30 matrix blended with the conductive polymer polypyrrole (PPy) and reinforced with graphene oxide (GO) and indium tin oxide (ITO) nanoparticles. The nanocomposites were fabricated using a solution-casting technique, with improved dispersion achieved through mechanical stirring and ultrasonication. Field emission scanning electron microscope (FESEM) images revealed a smooth surface morphology and an homogeneous distribution of nanomaterials within the polymer matrix. Meanwhile, Fourier transform infrared spectroscopy (FTIR) indicated strong physical interactions between the composite components, with X-ray diffraction confirming the semicrystalline behavior of PVP, which was strongly impacted by the contribution of the nanomaterials. UV–Vis spectroscopy showed significantly enhanced optical behavior, with a notable reduction in the optical band gap from ∼3.43 to 1.63 eV, indicating improved electronic transition efficiency. Furthermore, the well-dried solid films exhibited superior antibacterial activity, with inhibition zones increasing by 53.8% against <em>Staphylococcus aureus</em> and 46.1% against <em>Escherichia coli</em>. These findings highlight the novelty and multifunctionality of the developed nanocomposites, demonstrating their strong potential for use in flexible optical-electronics devices, antibacterial coatings, tissue engineering, and sensor applications and addressing current societal needs in the health, environmental, and medical sectors.</div></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":"7 2","pages":"Pages 79-90"},"PeriodicalIF":0.0,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144522501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unlocking potential of open source model training in decentralized federated learning environment 在分散的联邦学习环境中释放开源模型训练的潜力
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.bcra.2024.100264
Ekaterina Pavlova , Grigorii Melnikov , Yury Yanovich , Alexey Frolov
The field of Artificial Intelligence (AI) is rapidly evolving, creating a demand for sophisticated models that rely on substantial data and computational resources for training. However, the high costs associated with training these models have limited accessibility, leading to concerns about transparency, biases, and hidden agendas within AI systems. As AI becomes more integrated into governmental services and the pursuit of Artificial General Intelligence (AGI) advances, the necessity for transparent and reliable AI models becomes increasingly critical. Decentralized Federated Learning (DFL) offers decentralized approaches to model training while safeguarding data privacy and ensuring resilience against adversarial participants. Nonetheless, the guarantees provided are not absolute, and even open-weight AI models do not qualify as truly open source. This paper suggests using blockchain technology, smart contracts, and publicly verifiable secret sharing in DFL environments to bolster trust, cooperation, and transparency in model training processes. Our numerical experiments illustrate that the overhead required to offer robust assurances to all peers regarding the correctness of the training process is relatively small. By incorporating these tools, participants can trust that trained models adhere to specified procedures, addressing accountability issues within AI systems and promoting the development of more ethical and dependable applications of AI.
人工智能(AI)领域正在迅速发展,对依赖大量数据和计算资源进行训练的复杂模型产生了需求。然而,与训练这些模型相关的高成本限制了可访问性,导致人们担心人工智能系统中的透明度、偏见和隐藏议程。随着人工智能越来越多地融入政府服务,以及对通用人工智能(AGI)的追求不断进步,透明、可靠的人工智能模型的必要性变得越来越重要。去中心化联邦学习(DFL)提供去中心化的模型训练方法,同时保护数据隐私并确保对敌对参与者的弹性。尽管如此,所提供的保证并不是绝对的,甚至开放权重的AI模型也不符合真正的开源标准。本文建议在DFL环境中使用区块链技术、智能合约和可公开验证的秘密共享,以加强模型训练过程中的信任、合作和透明度。我们的数值实验表明,向所有同伴提供关于训练过程正确性的鲁棒保证所需的开销相对较小。通过整合这些工具,参与者可以相信经过训练的模型遵守指定的程序,解决人工智能系统内的问责问题,并促进人工智能更道德、更可靠应用的发展。
{"title":"Unlocking potential of open source model training in decentralized federated learning environment","authors":"Ekaterina Pavlova ,&nbsp;Grigorii Melnikov ,&nbsp;Yury Yanovich ,&nbsp;Alexey Frolov","doi":"10.1016/j.bcra.2024.100264","DOIUrl":"10.1016/j.bcra.2024.100264","url":null,"abstract":"<div><div>The field of Artificial Intelligence (AI) is rapidly evolving, creating a demand for sophisticated models that rely on substantial data and computational resources for training. However, the high costs associated with training these models have limited accessibility, leading to concerns about transparency, biases, and hidden agendas within AI systems. As AI becomes more integrated into governmental services and the pursuit of Artificial General Intelligence (AGI) advances, the necessity for transparent and reliable AI models becomes increasingly critical. Decentralized Federated Learning (DFL) offers decentralized approaches to model training while safeguarding data privacy and ensuring resilience against adversarial participants. Nonetheless, the guarantees provided are not absolute, and even open-weight AI models do not qualify as truly open source. This paper suggests using blockchain technology, smart contracts, and publicly verifiable secret sharing in DFL environments to bolster trust, cooperation, and transparency in model training processes. Our numerical experiments illustrate that the overhead required to offer robust assurances to all peers regarding the correctness of the training process is relatively small. By incorporating these tools, participants can trust that trained models adhere to specified procedures, addressing accountability issues within AI systems and promoting the development of more ethical and dependable applications of AI.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 2","pages":"Article 100264"},"PeriodicalIF":6.9,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144298441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient Bitcoin network topology discovery algorithm for dynamic display 一种高效的比特币网络拓扑动态显示算法
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.bcra.2024.100260
Zening Zhao , Jinsong Wang , Miao Yang , Haitao Wang
The Bitcoin network comprises numerous nodes, necessitating users to invest significant network requests and time in comprehending its network topology. In this paper, we propose a Bitcoin network topology discovery algorithm that uses lightweight probe nodes to facilitate rapid transmission of network protocols. Building upon this, we introduce a node layer clustering algorithm based on filtering stable network nodes, enabling parallel discovery of the network topology. Additionally, we present an adaptive method for dynamically displaying the layered structure of the network topology. Experimental results demonstrate that our proposed method reduces communication overhead by approximately 72.16% when achieving a 95% similarity in network topology. Furthermore, the algorithm is applicable for discovering the network topology in other blockchain networks with similar structures.
比特币网络由众多节点组成,用户需要投入大量的网络请求和时间来理解其网络拓扑。在本文中,我们提出了一种比特币网络拓扑发现算法,该算法使用轻量级探测节点来促进网络协议的快速传输。在此基础上,引入了一种基于过滤稳定网络节点的节点层聚类算法,实现了网络拓扑的并行发现。此外,我们还提出了一种动态显示网络拓扑分层结构的自适应方法。实验结果表明,该方法在网络拓扑相似性达到95%的情况下,通信开销降低了约72.16%。此外,该算法也适用于其他结构相似的区块链网络的拓扑发现。
{"title":"An efficient Bitcoin network topology discovery algorithm for dynamic display","authors":"Zening Zhao ,&nbsp;Jinsong Wang ,&nbsp;Miao Yang ,&nbsp;Haitao Wang","doi":"10.1016/j.bcra.2024.100260","DOIUrl":"10.1016/j.bcra.2024.100260","url":null,"abstract":"<div><div>The Bitcoin network comprises numerous nodes, necessitating users to invest significant network requests and time in comprehending its network topology. In this paper, we propose a Bitcoin network topology discovery algorithm that uses lightweight probe nodes to facilitate rapid transmission of network protocols. Building upon this, we introduce a node layer clustering algorithm based on filtering stable network nodes, enabling parallel discovery of the network topology. Additionally, we present an adaptive method for dynamically displaying the layered structure of the network topology. Experimental results demonstrate that our proposed method reduces communication overhead by approximately 72.16% when achieving a 95% similarity in network topology. Furthermore, the algorithm is applicable for discovering the network topology in other blockchain networks with similar structures.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 2","pages":"Article 100260"},"PeriodicalIF":6.9,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144307968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing social immersive virtual environments for the Metaverse: The case study of MetaLibrary 为虚拟世界设计社交沉浸式虚拟环境:以metabrary为例
Q1 Computer Science Pub Date : 2025-06-01 DOI: 10.1016/j.vrih.2025.04.002
Alberto CANNAVÒ, Giorgio ARRIGO, Alessandro VISCONTI, Federico De LORENZIS, Fabrizio LAMBERTI

Background

Over the last few years, the rapid advancement of technology has led to the development of many approaches to digitalization. In this respect, metaverse provides 3D persistent virtual environments that can be used to access digital content, meet virtually, and perform several professional and leisure tasks. Among the numerous technologies supporting the metaverse, immersive Virtual Reality (VR) plays a primary role and offers highly interactive social experiences. Despite growing interest in this area, there are no clear design guidelines for creating environments tailored to the metaverse.

Methods

This study seeks to advance research in this area by moving from state-of-the-art studies on the design of immersive virtual environments in the context of metaverse and proposing how to integrate cutting-edge technologies within this context. Specifically, the best practices were identified by i) analyzing literature studies focused on human behavior in immersive virtual environments, ii) extracting common features of existing social VR platforms, and iii) conducting interviews with experts in a specific application domain. Specifically, this study considered the creation of a new virtual environment for MetaLibrary, a VR-based social platform aimed at integrating public libraries into metaverse. Several implementation challenges and additional requirements have been identified for the development of virtual environments (VEs). These elements were considered in the selection of specific cutting-edge technologies and their integration into the development process. A user study was also conducted to investigate some design aspects (namely lighting conditions and richness of the scene layout) for which deriving clear indications from the above analysis was not possible because different alternative configurations could be chosen.

Results

The work reported in this paper seeks to bridge the gap between existing VR platforms and related literature in the field, on the one hand, and requirements regarding immersive virtual environments for the metaverse, on the other hand, by reporting a set of best practices which were used to build a social virtual environment that meets users' expectations and needs.

Conclusions

Results suggest that carefully designed virtual environments can positively affect user experience and interaction within metaverse. The insights gained from this study offer valuable cues for developing immersive virtual environments for the metaverse to deliver more effective and engaging experiences.
在过去的几年里,技术的快速进步导致了许多数字化方法的发展。在这方面,metaverse提供了3D持久的虚拟环境,可用于访问数字内容,虚拟会面,并执行一些专业和休闲任务。在支持虚拟世界的众多技术中,沉浸式虚拟现实(VR)发挥着主要作用,提供了高度互动的社交体验。尽管人们对这个领域的兴趣越来越浓厚,但是对于创建适合于虚拟世界的环境,还没有明确的设计指导方针。方法:本研究旨在通过对虚拟世界背景下沉浸式虚拟环境设计的最新研究,并提出如何在此背景下整合尖端技术,来推进这一领域的研究。具体而言,通过i)分析专注于沉浸式虚拟环境中人类行为的文献研究,ii)提取现有社交VR平台的共同特征,以及iii)与特定应用领域的专家进行访谈,确定了最佳实践。具体来说,本研究考虑为MetaLibrary创建一个新的虚拟环境,这是一个基于vr的社交平台,旨在将公共图书馆整合到虚拟世界中。对于虚拟环境(ve)的开发,已经确定了几个实现挑战和额外需求。在选择具体的尖端技术并将其纳入开发过程时考虑了这些因素。我们还进行了一项用户研究,以调查一些设计方面(即照明条件和场景布局的丰富性),因为可以选择不同的替代配置,因此无法从上述分析中得出明确的指示。本文报告的工作旨在弥合现有VR平台与该领域相关文献之间的差距,一方面,另一方面,通过报告一组用于构建满足用户期望和需求的社交虚拟环境的最佳实践,满足虚拟世界对沉浸式虚拟环境的需求。结果表明,精心设计的虚拟环境可以对用户体验和虚拟世界中的交互产生积极影响。从这项研究中获得的见解为为虚拟世界开发沉浸式虚拟环境提供了有价值的线索,以提供更有效和更吸引人的体验。
{"title":"Designing social immersive virtual environments for the Metaverse: The case study of MetaLibrary","authors":"Alberto CANNAVÒ,&nbsp;Giorgio ARRIGO,&nbsp;Alessandro VISCONTI,&nbsp;Federico De LORENZIS,&nbsp;Fabrizio LAMBERTI","doi":"10.1016/j.vrih.2025.04.002","DOIUrl":"10.1016/j.vrih.2025.04.002","url":null,"abstract":"<div><h3>Background</h3><div>Over the last few years, the rapid advancement of technology has led to the development of many approaches to digitalization. In this respect, metaverse provides 3D persistent virtual environments that can be used to access digital content, meet virtually, and perform several professional and leisure tasks. Among the numerous technologies supporting the metaverse, immersive Virtual Reality (VR) plays a primary role and offers highly interactive social experiences. Despite growing interest in this area, there are no clear design guidelines for creating environments tailored to the metaverse.</div></div><div><h3>Methods</h3><div>This study seeks to advance research in this area by moving from state-of-the-art studies on the design of immersive virtual environments in the context of metaverse and proposing how to integrate cutting-edge technologies within this context. Specifically, the best practices were identified by i) analyzing literature studies focused on human behavior in immersive virtual environments, ii) extracting common features of existing social VR platforms, and iii) conducting interviews with experts in a specific application domain. Specifically, this study considered the creation of a new virtual environment for MetaLibrary, a VR-based social platform aimed at integrating public libraries into metaverse. Several implementation challenges and additional requirements have been identified for the development of virtual environments (VEs). These elements were considered in the selection of specific cutting-edge technologies and their integration into the development process. A user study was also conducted to investigate some design aspects (namely lighting conditions and richness of the scene layout) for which deriving clear indications from the above analysis was not possible because different alternative configurations could be chosen.</div></div><div><h3>Results</h3><div>The work reported in this paper seeks to bridge the gap between existing VR platforms and related literature in the field, on the one hand, and requirements regarding immersive virtual environments for the metaverse, on the other hand, by reporting a set of best practices which were used to build a social virtual environment that meets users' expectations and needs.</div></div><div><h3>Conclusions</h3><div>Results suggest that carefully designed virtual environments can positively affect user experience and interaction within metaverse. The insights gained from this study offer valuable cues for developing immersive virtual environments for the metaverse to deliver more effective and engaging experiences.</div></div>","PeriodicalId":33538,"journal":{"name":"Virtual Reality Intelligent Hardware","volume":"7 3","pages":"Pages 279-298"},"PeriodicalIF":0.0,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144491438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
全部 科技通报 计算机与应用化学 电子工业专用设备 河北工业科技 Journal of Applied Sciences 中国科学技术大学学报 印制电路信息 Wuhan University Journal of Natural Sciences Virtual Reality Intelligent Hardware 模式识别与人工智能 控制与决策 电机与控制学报 南京邮电大学学报(自然科学版) 计算机研究与发展 计算机学报 自动化学报 电子科技大学学报 华南理工大学学报(自然科学版) 中国图象图形学报 雷达学报 信息与控制 无线传感网络(英文) 高性能计算技术 中文信息学报 通信技术政策研究 Tsinghua Sci. Technol. 天线与传播(英文) 物联网技术 离散数学期刊(英文) 计算机应用 ZTE Communications 软件工程与应用(英文) 航空计算技术 无线通信 现代电子技术(英文) Journal of Systems Science and Information 电脑和通信(英文) 无线工程与技术(英文) 无线互联科技 人工智能与机器人研究 计算机工程与设计 电路与系统学报 软件 通讯和计算机:中英文版 智能学习系统与应用(英文) 图像与信号处理 软件工程与应用 电力电子 现代非线性理论与应用(英文) 计算机科学 计算机科学与应用 物联网(英文) 数据与计算发展前沿 电信科学 自主智能(英文) 人工智能杂志(英文) 信号处理 人工智能技术学报(英文) 自主智能系统(英文) 数据采集与处理 机器人 西北工业大学学报 High Technology Letters Journal of Cybersecurity 中国科学:信息科学 Big Data Mining and Analytics Visual Computing for Industry, Biomedicine, and Art 清华大学学报(自然科学版) 计算机辅助设计与图形学学报 电波科学学报 Journal of Biosafety and Biosecurity Blockchain-Research and Applications 建模与仿真(英文) 建模与仿真 Soc Netw 单片机与嵌入式系统应用 信息安全(英文) 数据挖掘 指挥信息系统与技术 通信世界 智能与融合网络(英文) 电磁分析与应用期刊(英文) 资源环境与信息工程(英文) 信息通信技术 数据分析和信息处理(英文) 智能控制与自动化(英文) 电路与系统(英文) 计算机工程 天线学报 仪表技术与传感器 海军航空工程学院学报 Comput Technol Appl 军事通信技术 计算机仿真
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1