Items where Author is "Bautista Thompson, Ernesto"
![]() | Up a level |
2025
Article
Subjects > Engineering
Europe University of Atlantic > Research > Scientific Production
Ibero-american International University > Research > Scientific Production
Ibero-american International University > Research > Articles and Books
Universidad Internacional do Cuanza > Research > Scientific Production
University of La Romana > Research > Scientific Production
Open
English
In the rapidly advanced and evolving information technology industry, adequate client engagement plays a critical role as it is very important to understand the client’s concerns, and requirements, have the records, authorizations, and go-ahead of previously agreed requirements, and provide the feasible solution accordingly. Previously multiple solutions have been proposed to enhance the efficiency of client engagement, but they lack traceability, trust, transparency, and conflict in agreements of previous contracts. Due to the lack of these shortcomings, the client requirement is getting delayed which is causing client escalations, integrity issues, project failure, and penalties. In this study, we proposed the UniferCollab framework to overcome the issues of collaboration between various teams, transparency, the record of client authorizations, and the go-ahead on previous developments by implementing blockchain technology. We store the data on the permissible network in the proposed approach. It allows us to compile all the requirements and information shared by clients on permissible blockchain to secure a large amount of data which enhances the traceability of all the requirements. All the authorizations from the client generate push notifications for any changes in their current system executed through smart contracts. It removes the ambiguity between various development teams if the client has only shared the requirement with one team. The data is stored in the decentralized network from where information is gathered which resolves the traceability, transparency, and trust issues. Lastly, evaluations involved a total of 800 hypertext transfer protocol (HTTP) requests tested using Postman with blockchain block sizes ranging from 0.568 KB to 550 KB and an average size increase of 280 KB was observed as new blocks were added. The longest chain in the network was observed during 800 repetitions of blockchain operations. Latency analysis revealed that delays in processing HTTP requests were influenced by decentralized node processing, local machine response times, and internet bandwidth through various experiments. Results show that the proposed framework resolves all client engagement issues in implementation between all stakeholders which enhances trust, and transparency improves client experience and helps us manage disputes effectively.
metadata
Farooq, Muhammad Shoaib; Irshad, Khurram; Riaz, Danish; Abdel Samee, Nagwan; Bautista Thompson, Ernesto; Gavilanes Aray, Daniel and Ashraf, Imran
mail
UNSPECIFIED, UNSPECIFIED, UNSPECIFIED, UNSPECIFIED, ernesto.bautista@unini.edu.mx, daniel.gavilanes@uneatlantico.es, UNSPECIFIED
(2025)
Client engagement solution for post implementation issues in software industry using blockchain.
Scientific Reports, 15 (1).
ISSN 2045-2322
2023
Article
Subjects > Engineering
Europe University of Atlantic > Research > Scientific Production
Fundación Universitaria Internacional de Colombia > Research > Scientific Production
Ibero-american International University > Research > Scientific Production
Ibero-american International University > Research > Articles and Books
Universidad Internacional do Cuanza > Research > Scientific Production
Open
English
UNSPECIFIED
metadata
Ali, Omer; Abbas, Qamar; Mahmood, Khalid; Bautista Thompson, Ernesto; Arambarri, Jon and Ashraf, Imran
mail
UNSPECIFIED, UNSPECIFIED, UNSPECIFIED, ernesto.bautista@unini.edu.mx, jon.arambarri@uneatlantico.es, UNSPECIFIED
(2023)
Competitive Coevolution-Based Improved Phasor Particle Swarm Optimization Algorithm for Solving Continuous Problems.
Mathematics, 11 (21).
p. 4406.
ISSN 2227-7390
Article
Subjects > Engineering
Europe University of Atlantic > Research > Scientific Production
Fundación Universitaria Internacional de Colombia > Research > Scientific Production
Ibero-american International University > Research > Scientific Production
Ibero-american International University > Research > Articles and Books
Universidad Internacional do Cuanza > Research > Scientific Production
Open
English
Non-word and real-word errors are generally two types of spelling errors. Non-word errors are misspelled words that are nonexistent in the lexicon while real-word errors are misspelled words that exist in the lexicon but are used out of context in a sentence. Lexicon-based lookup approach is widely used for non-word errors but it is incapable of handling real-word errors as they require contextual information. Contrary to the English language, real-word error detection and correction for low-resourced languages like Urdu is an unexplored area. This paper presents a real-word spelling error detection and correction approach for the Urdu language. We develop an extensive lexicon of 593,738 words and use this lexicon to develop a dataset for real-word errors comprising 125562 sentences and 2,552,735 words. Based on the developed lexicon and dataset, we then develop a contextual spell checker that detects and corrects real-word errors. For the real-word error detection phase, word-gram features are used along with five machine learning classifiers, achieving a precision, recall, and F1-score of 0.84,0.79, and 0.81 respectively. We also test the proposed approach with a 40% error density. For real-word error correction, the Damerau-Levenshtein distance is used along with the n-gram model for further ranking of the suggested candidate words, achieving an accuracy of up to 83.67%.
metadata
Aziz, Romila; Anwar, Muhammad Waqas; Jamal, Muhammad Hasan; Bajwa, Usama Ijaz; Kuc Castilla, Ángel Gabriel; Uc-Rios, Carlos; Bautista Thompson, Ernesto and Ashraf, Imran
mail
UNSPECIFIED, UNSPECIFIED, UNSPECIFIED, UNSPECIFIED, UNSPECIFIED, carlos.uc@unini.edu.mx, ernesto.bautista@unini.edu.mx, UNSPECIFIED
(2023)
Real Word Spelling Error Detection and Correction for Urdu Language.
IEEE Access.
p. 1.
ISSN 2169-3536
Article
Subjects > Engineering
Europe University of Atlantic > Research > Scientific Production
Ibero-american International University > Research > Scientific Production
Ibero-american International University > Research > Articles and Books
Universidad Internacional do Cuanza > Research > Scientific Production
University of La Romana > Research > Scientific Production
Open
English
Software cost and effort estimation is one of the most significant tasks in the area of software engineering. Research conducted in this field has been evolving with new techniques that necessitate periodic comparative analyses. Software project success largely depends on accurate software cost estimation as it gives an idea of the challenges and risks involved in the development. The great diversity of ML and Non-ML techniques has generated a comparison and progressed into the integration of these techniques. Based on varying advantages it has become imperative to work out preferred estimation techniques to improve the project development process. This study aims to present a systematic literature review (SLR) to investigate the trends of the articles published in the recent one and a half decades and to propose a way forward. This systematic literature review has proposed a three-stage approach to plan (Tollgate approach), conduct (Likert type scale), and report the results from five renowned digital libraries. For the selected 52 articles, artificial neural network model (ANN) and constructive cost model (COCOMO) based approaches have been the favored techniques. The mean magnitude of relative error (MMRE) has been the preferred accuracy metric, software engineering, and project management are the most relevant fields, and the promise repository has been identified as the widely accessed database. This review is likely to be of value for the development, cost, and effort estimations.
metadata
Rashid, Chaudhary Hamza; Shafi, Imran; Ahmad, Jamil; Bautista Thompson, Ernesto; Masías Vergara, Manuel; Diez, Isabel De La Torre and Ashraf, Imran
mail
UNSPECIFIED, UNSPECIFIED, UNSPECIFIED, ernesto.bautista@unini.edu.mx, manuel.masias@uneatlantico.es, UNSPECIFIED, UNSPECIFIED
(2023)
Software Cost and Effort Estimation: Current Approaches and Future Trends.
IEEE Access.
p. 1.
ISSN 2169-3536
Article
Subjects > Engineering
Europe University of Atlantic > Research > Scientific Production
Fundación Universitaria Internacional de Colombia > Research > Scientific Production
Ibero-american International University > Research > Scientific Production
Ibero-american International University > Research > Articles and Books
Universidad Internacional do Cuanza > Research > Scientific Production
Open
English
An Internet of Things (IoT) network is prone to many ways of threatening individuals. IoT sensors are lightweight, lack complicated security protocols, and face threats to privacy and confidentiality. Hackers can attack the IoT network and access personal information and confidential data for blackmailing, and negatively manipulate data. This study aims to propose an IoT threat protection system (IoTTPS) to protect the IoT network from threats using an ensemble model RKSVM, comprising a random forest (RF), K nearest neighbor (KNN), and support vector machine (SVM) model. The software-defined networks (SDN)-based IoT network datasets such as KDD cup 99, NSL-KDD, and CICIDS are used for threat detection based on machine learning. The experimental phase is conducted by using a decision tree (DT), logistic regression (LR), Naive Bayes (NB), RF, SVM, gradient boosting machine (GBM), KNN, and the proposed ensemble RKSVM model. Furthermore, performance is optimized by adding a grid search hyperparameter optimization technique with K-Fold cross-validation. As well as the NSL-KDD dataset, two other datasets, KDD and CIC-IDS 2017, are used to validate the performance. Classification accuracies of 99.7%, 99.3%, 99.7%, and 97.8% are obtained for DoS, Probe, U2R, and R2L attacks using the proposed ensemble RKSVM model using grid search and cross-fold validation. Experimental results demonstrate the superior performance of the proposed model for IoT threat detection.
metadata
Akram, Urooj; Sharif, Wareesa; Shahroz, Mobeen; Mushtaq, Muhammad Faheem; Gavilanes Aray, Daniel; Bautista Thompson, Ernesto; Diez, Isabel de la Torre; Djuraev, Sirojiddin and Ashraf, Imran
mail
UNSPECIFIED, UNSPECIFIED, UNSPECIFIED, UNSPECIFIED, daniel.gavilanes@uneatlantico.es, ernesto.bautista@unini.edu.mx, UNSPECIFIED, UNSPECIFIED, UNSPECIFIED
(2023)
IoTTPS: Ensemble RKSVM Model-Based Internet of Things Threat Protection System.
Sensors, 23 (14).
p. 6379.
ISSN 1424-8220
Article
Subjects > Engineering
Europe University of Atlantic > Research > Scientific Production
Ibero-american International University > Research > Scientific Production
Ibero-american International University > Research > Articles and Books
Universidad Internacional do Cuanza > Research > Scientific Production
Open
English
Recent developments in quantum computing have shed light on the shortcomings of the conventional public cryptosystem. Even while Shor’s algorithm cannot yet be implemented on quantum computers, it indicates that asymmetric key encryption will not be practicable or secure in the near future. The National Institute of Standards and Technology (NIST) has started looking for a post-quantum encryption algorithm that is resistant to the development of future quantum computers as a response to this security concern. The current focus is on standardizing asymmetric cryptography that should be impenetrable by a quantum computer. This has become increasingly important in recent years. Currently, the process of standardizing asymmetric cryptography is coming very close to being finished. This study evaluated the performance of two post-quantum cryptography (PQC) algorithms, both of which were selected as NIST fourth-round finalists. The research assessed the key generation, encapsulation, and decapsulation operations, providing insights into their efficiency and suitability for real-world applications. Further research and standardization efforts are required to enable secure and efficient post-quantum encryption. When selecting appropriate post-quantum encryption algorithms for specific applications, factors such as security levels, performance requirements, key sizes, and platform compatibility should be taken into account. This paper provides helpful insight for post-quantum cryptography researchers and practitioners, assisting in the decision-making process for selecting appropriate algorithms to protect confidential data in the age of quantum computing.
metadata
Farooq, Sana; Altaf, Ayesha; Iqbal, Faiza; Bautista Thompson, Ernesto; Ramírez-Vargas, Debora L.; Díez, Isabel de la Torre and Ashraf, Imran
mail
UNSPECIFIED, UNSPECIFIED, UNSPECIFIED, ernesto.bautista@unini.edu.mx, debora.ramirez@unini.edu.mx, UNSPECIFIED, UNSPECIFIED
(2023)
Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms.
Sensors, 23 (12).
p. 5379.
ISSN 1424-8220
Article
Subjects > Engineering
Europe University of Atlantic > Research > Scientific Production
Fundación Universitaria Internacional de Colombia > Research > Scientific Production
Ibero-american International University > Research > Scientific Production
Ibero-american International University > Research > Articles and Books
Universidad Internacional do Cuanza > Research > Scientific Production
Open
English
Classification is a commonly used technique in data mining and is applied in various fields such as sentiment analysis, fraud detection, and fault diagnosis. Multiclass classification, which involves more than two classes, is more complex than binary classification. There are mainly two ways to approach multiclass classification, one is to expand the binary classifier into a multiclass classifier through various strategies and the other is to divide the multiclass classification problem into multiple binary problems (binarization). Two popular approaches for binarization are One vs One (OvO) and One vs All (OvA). It is simpler to aggregate the outputs of all binary classifiers as the number of classifiers decreases. However, it causes an imbalance of positive and negative sample numbers, which affects the classification effect of each binary classifier. In this article, we contribute to the field of ensemble learning and multi-class classification by proposing a new method called Ensemble Partition Sampling (EPS). This article presents a new approach to multiclass classification using an "Ensemble Partition Sampling" method within the "one-vs-all" (OvA) framework. The primary goal of this method is to tackle the problem of data imbalance by incorporating ensemble learning and preprocessing techniques into each binary dataset. The study found that Ensemble Partition Sampling (EPS) is the most effective method for imbalanced and multiclass imbalanced classification, outperforming other methods including OvA, SMOTE, k-means-SMOTE, Bagging-RB, DES-MI, OvO-EASY, and OvO-SMB. The study used CART, Random Forest, and SVM as classifiers, and the results consistently showed that EPS outperformed all other algorithms. The findings suggest that EPS is a highly effective method for improving classification performance in imbalanced and multiclass imbalanced datasets.
metadata
Jabir, Brahim; Díez, Isabel De la Torre; Bautista Thompson, Ernesto; Ramírez-Vargas, Debora L. and Kuc Castilla, Ángel Gabriel
mail
UNSPECIFIED
(2023)
Ensemble Partition Sampling (EPS) for Improved Multi-Class Classification.
IEEE Access.
p. 1.
ISSN 2169-3536
Article
Subjects > Engineering
Europe University of Atlantic > Research > Scientific Production
Ibero-american International University > Research > Scientific Production
Ibero-american International University > Research > Articles and Books
Open
English
In this paper, a novel ultra-wideband UWB antenna element with triple-band notches is proposed. The proposed UWB radiator element operates from 2.03 GHz up to 15.04 GHz with triple rejected bands at the WiMAX band (3.28–3.8 GHz), WLAN band (5.05–5.9 GHz), and X-band (7.78–8.51 GHz). In addition, the radiator supports the Bluetooth band (2.4–2.483 GHz). Three different techniques were utilized to obtain the triple-band notches. An alpha-shaped coupled line with a stub-loaded resonator (SLR) band stop filter was inserted along the main feeding line before the radiator to obtain a WiMAX band notch characteristic. Two identical U-shaped slots were etched on the proposed UWB radiator to achieve WLAN band notch characteristics with a very high degree of selectivity. Two identical metallic frames of an octagon-shaped electromagnetic band gap structure (EBG) were placed along the main feeding line to achieve the notch characteristic with X-band satellite communication with high sharpness edges. A novel UWB multiple-input multiple-output (MIMO) radiator is proposed. The proposed UWB-MIMO radiator was fabricated on FR-4 substrate material and measured. The isolation between every two adjacent ports was below −20 dB over the FCC-UWB spectrum and the Bluetooth band for the four MIMO antennas. The envelope correlation coefficient (ECC) between the proposed antennas in MIMO does not exceed 0.05. The diversity gains (DG) for all the radiators are greater than 9.98 dB.
metadata
El-Gendy, Mohamed S.; Ali, Mohamed Mamdouh M.; Bautista Thompson, Ernesto and Ashraf, Imran
mail
UNSPECIFIED, UNSPECIFIED, ernesto.bautista@unini.edu.mx, UNSPECIFIED
(2023)
Triple-Band Notched Ultra-Wideband Microstrip MIMO Antenna with Bluetooth Band.
Sensors, 23 (9).
p. 4475.
ISSN 1424-8220
Article
Subjects > Engineering
Europe University of Atlantic > Research > Scientific Production
Ibero-american International University > Research > Articles and Books
Closed
English
Rice is a staple food for roughly half of the world’s population. Some farmers prefer rice cultivation to other crops because rice can thrive in a wide range of environments. Several studies have found that about 70% of India’s population relies on agriculture in some way and that agribusiness accounts for about 17% of India’s GDP. In India, rice is one of the most important crops, but it is vulnerable to a number of diseases throughout the growing process. Farmers’ manual identification of these diseases is highly inaccurate due to their lack of medical expertise. Recent advances in deep learning models show that automatic image recognition systems can be extremely useful in such situations. In this paper, we propose a suitable and effective system for predicting diseases in rice leaves using a number of different deep learning techniques. Images of rice leaf diseases were gathered and processed to fulfil the algorithmic requirements. Initially, features were extracted by using 32 pre-trained models, and then we classified the images of rice leaf diseases such as bacterial blight, blast, and brown spot with numerous machine learning and ensemble learning classifiers and compared the results. The proposed procedure works better than other methods that are currently used. It achieves 90–91% identification accuracy and other performance parameters such as precision, Recall Rate, F1-score, Matthews Coefficient, and Kappa Statistics on a normal data set. Even after the segmentation process, the value reaches 93–94% for model EfficientNetV2B3 with ET and HGB classifiers. The proposed model efficiently recognises rice leaf diseases with an accuracy of 94%. The experimental results show that the proposed procedure is valid and effective for identifying rice diseases.
metadata
Aggarwal, Meenakshi; Khullar, Vikas; Goyal, Nitin; Singh, Aman; Tolba, Amr; Bautista Thompson, Ernesto and Kumar, Sushil
mail
UNSPECIFIED, UNSPECIFIED, UNSPECIFIED, aman.singh@uneatlantico.es, UNSPECIFIED, ernesto.bautista@unini.edu.mx, UNSPECIFIED
(2023)
Pre-Trained Deep Neural Network-Based Features Selection Supported Machine Learning for Rice Leaf Disease Classification.
Agriculture, 13 (5).
p. 936.
ISSN 2077-0472
Article
Subjects > Engineering
Europe University of Atlantic > Research > Scientific Production
Fundación Universitaria Internacional de Colombia > Research > Scientific Production
Ibero-american International University > Research > Scientific Production
Ibero-american International University > Research > Articles and Books
Universidad Internacional do Cuanza > Research > Scientific Production
Open
English
Safety critical spare parts hold special importance for aviation organizations. However, accurate forecasting of such parts becomes challenging when the data are lumpy or intermittent. This research paper proposes an artificial neural network (ANN) model that is able to observe the recent trends of error surface and responds efficiently to the local gradient for precise spare prediction results marked by lumpiness. Introduction of the momentum term allows the proposed ANN model to ignore small variations in the error surface and to behave like a low-pass filter and thus to avoid local minima. Using the whole collection of aviation spare parts having the highest demand activity, an ANN model is built to predict the failure of aircraft installed parts. The proposed model is first optimized for its topology and is later trained and validated with known historical demand datasets. The testing phase includes introducing input vector comprising influential factors that dictate sporadic demand. The proposed approach is found to provide superior results due to its simple architecture and fast converging training algorithm once evaluated against some other state-of-the-art models from the literature using related benchmark performance criteria. The experimental results demonstrate the effectiveness of the proposed approach. The accurate prediction of the cost-heavy and critical spare parts is expected to result in huge cost savings, reduce downtime, and improve the operational readiness of drones, fixed wing aircraft and helicopters. This also resolves the dead inventory issue as a result of wrong demands of fast moving spares due to human error.
metadata
Shafi, Imran; Sohail, Amir; Ahmad, Jamil; Martínez Espinosa, Julio César; Dzul Lopez, Luis Alonso; Bautista Thompson, Ernesto and Ashraf, Imran
mail
UNSPECIFIED, UNSPECIFIED, UNSPECIFIED, UNSPECIFIED, luis.dzul@unini.edu.mx, ernesto.bautista@unini.edu.mx, UNSPECIFIED
(2023)
Spare Parts Forecasting and Lumpiness Classification Using Neural Network Model and Its Impact on Aviation Safety.
Applied Sciences, 13 (9).
p. 5475.
ISSN 2076-3417
Article
Subjects > Engineering
Europe University of Atlantic > Research > Scientific Production
Fundación Universitaria Internacional de Colombia > Research > Scientific Production
Ibero-american International University > Research > Scientific Production
Ibero-american International University > Research > Articles and Books
Universidad Internacional do Cuanza > Research > Scientific Production
Open
English
In the field of natural language processing, machine translation is a colossally developing research area that helps humans communicate more effectively by bridging the linguistic gap. In machine translation, normalization and morphological analyses are the first and perhaps the most important modules for information retrieval (IR). To build a morphological analyzer, or to complete the normalization process, it is important to extract the correct root out of different words. Stemming and lemmatization are techniques commonly used to find the correct root words in a language. However, a few studies on IR systems for the Urdu language have shown that lemmatization is more effective than stemming due to infixes found in Urdu words. This paper presents a lemmatization algorithm based on recurrent neural network models for the Urdu language. However, lemmatization techniques for resource-scarce languages such as Urdu are not very common. The proposed model is trained and tested on two datasets, namely, the Urdu Monolingual Corpus (UMC) and the Universal Dependencies Corpus of Urdu (UDU). The datasets are lemmatized with the help of recurrent neural network models. The Word2Vec model and edit trees are used to generate semantic and syntactic embedding. Bidirectional long short-term memory (BiLSTM), bidirectional gated recurrent unit (BiGRU), bidirectional gated recurrent neural network (BiGRNN), and attention-free encoder–decoder (AFED) models are trained under defined hyperparameters. Experimental results show that the attention-free encoder-decoder model achieves an accuracy, precision, recall, and F-score of 0.96, 0.95, 0.95, and 0.95, respectively, and outperforms existing models
metadata
Hafeez, Rabab; Anwar, Muhammad Waqas; Jamal, Muhammad Hasan; Fatima, Tayyaba; Martínez Espinosa, Julio César; Dzul López, Luis Alonso; Bautista Thompson, Ernesto and Ashraf, Imran
mail
UNSPECIFIED, UNSPECIFIED, UNSPECIFIED, UNSPECIFIED, ulio.martinez@unini.edu.mx, luis.dzul@uneatlantico.es, ernesto.bautista@unini.edu.mx, UNSPECIFIED
(2023)
Contextual Urdu Lemmatization Using Recurrent Neural Network Models.
Mathematics, 11 (2).
p. 435.
ISSN 2227-7390
<a href="/27825/1/s41598-026-39196-x_reference.pdf" class="ep_document_link"><img class="ep_doc_icon" alt="[img]" src="/style/images/fileicons/text.png" border="0"/></a>
en
open
Histopathological evaluation is necessary for the diagnosis and grading of prostate cancer, which is still one of the most common cancers in men globally. Traditional evaluation is time-consuming, prone to inter-observer variability, and challenging to scale. The clinical usefulness of current AI systems is limited by the need for comprehensive pixel-level annotations. The objective of this research is to develop and evaluate a large-scale benchmarking study on a weakly supervised deep learning framework that minimizes the need for annotation and ensures interpretability for automated prostate cancer diagnosis and International Society of Urological Pathology (ISUP) grading using whole slide images (WSIs). This study rigorously tested six cutting-edge multiple instance learning (MIL) architectures (CLAM-MB, CLAM-SB, ILRA-MIL, AC-MIL, AMD-MIL, WiKG-MIL), three feature encoders (ResNet50, CTransPath, UNI2), and four patch extraction techniques (varying sizes and overlap) using the PANDA dataset (10,616 WSIs), yielding 72 experimental configurations. The methodology used distributed cloud computing to process over 31 million tissue patches, implementing advanced attention mechanisms to ensure clinical interpretability through Grad-CAM visualizations. The optimum configuration (UNI2 encoder with ILRA-MIL, 256 256 patches, 50% overlap) achieved 78.75% accuracy and 90.12% quadratic weighted kappa (QWK), outperforming traditional methods and approaching expert pathologist-level diagnostic capability. Overlapping smaller patches offered the best balance of spatial resolution and contextual information, while domain-specific foundation models performed noticeably better than generic encoders. This work is the first large-scale, comprehensive comparison of weekly supervised MIL methods for prostate cancer diagnosis and grading. The proposed approach has excellent clinical diagnostic performance, scalability, practical feasibility through cloud computing, and interpretability using visualization tools.
Naveed Anwer Butt mail , Dilawaiz Sarwat mail , Irene Delgado Noya mail irene.delgado@uneatlantico.es, Kilian Tutusaus mail kilian.tutusaus@uneatlantico.es, Nagwan Abdel Samee mail , Imran Ashraf mail ,
Butt
<a class="ep_document_link" href="/27915/1/csbj.0023.pdf"><img class="ep_doc_icon" alt="[img]" src="/style/images/fileicons/text.png" border="0"/></a>
en
open
This systematic literature review (SLR) investigates the integration of deep learning (DL), vision-language models(VLMs), and multi-agent systems in the analysis of pathology images and automated report generation. The rapidadvancement of whole-slide imaging (WSI) technologies has posed new challenges in pathology, especially due to thescale and complexity of the data. DL techniques in general and convolutional neural networks (CNNs) and transform-ers in particular have significantly enhanced image analysis tasks including segmentation, classification, and detection.However, these models often lack generalizability to generate coherent, clinically relevant text, thus necessitating theintegration of VLMs and large language models (LLMs). This review examines the effectiveness of VLMs and LLMsin bridging the gap between visual data and clinical text, focusing on their potential for automating the generationof pathology reports. Additionally, multi-agent systems, which leverage specialized artificial intelligence (AI) agentsto collaboratively perform diagnostic tasks, are explored for their contributions to improving diagnostic accuracy andscalability. Through a synthesis of recent studies, this review highlights the successes, challenges, and future direc-tions of these AI technologies in pathology diagnostics, offering a comprehensive foundation for the development ofintegrated, AI-driven diagnostic workflows.
Usama Ali mail , Imran Shafi mail , Jamil Ahmad mail , Arlette Zárate Cáceres mail , Thania Chio Montero mail , Hafiz Muhammad Raza ur Rehman mail , Imran Ashraf mail ,
Ali
<a href="/27970/1/s11357-026-02188-w.pdf" class="ep_document_link"><img class="ep_doc_icon" alt="[img]" src="/style/images/fileicons/text.png" border="0"/></a>
en
open
Fish consumption and cognitive function in aging: a systematic review of observational studies
Epidemiological studies consistently link higher fish intake with slower rates of cognitive decline and lower dementia incidence. The aim of the present study was to systematically review existing observational studies investigating the association between fish consumption and cognitive function in older adults. A total of 25 studies (8 cross-sectional and 17 prospective including mainly healthy older adults, age range of participants ranging from 18 to 30 years at baseline in prospective studies to 65 to 91 years, representing the upper limit of the age spectrum) were reviewed. Cognitive functions currently investigated in most published studies included various domains, such as global cognition, memory (episodic, working), executive function (planning, inhibition, flexibility), attention and processing speed. Existing studies greatly vary in terms of design (cross-sectional and prospective), geographical area, number of participants involved, and tools used to assess the outcomes of interest. The main findings across studies are not univocal, with some studies reporting stronger evidence of association between fish consumption and various cognitive domains, while others addressed rather null findings. The most consistently responsive domains were processing speed, executive functioning, semantic memory, and global cognitive ability among individuals consuming fish at least weekly, which are highly relevant to both neurodegenerative and vascular forms of cognitive impairment. Positive associations were also observed for verbal memory and general memory, though these were less uniform and often attenuated after multivariable adjustment. In contrast, associations with reaction time, verbal-numerical reasoning, and broad composite scores were inconsistent, and several fully adjusted models showed null results. In conclusion, the evidence suggests that regular fish intake (typically ≥1–2 servings per week) is linked to preserved cognitive performance, although some inconsistent findings require further investigations.
Justyna Godos mail , Giuseppe Caruso mail , Agnieszka Micek mail , Alberto Dolci mail , Carmen Lilí Rodríguez Velasco mail carmen.rodriguez@uneatlantico.es, Evelyn Frias-Toral mail , Jason Di Giorgio mail , Nicola Veronese mail , Andrea Lehoczki mail , Mario Siervo mail , Zoltan Ungvari mail , Giuseppe Grosso mail ,
Godos
<a href="/27554/1/s41598-026-37541-8_reference.pdf" class="ep_document_link"><img class="ep_doc_icon" alt="[img]" src="/style/images/fileicons/text.png" border="0"/></a>
en
open
A scalable and secure federated learning authentication scheme for IoT
Secure and scalable authentication remains a fundamental challenge in Internet of Things (IoT) networks due to constrained device resources, dynamic topology, and the absence of centralized trust infrastructures. Conventional password-based and certificate-driven authentication schemes incur high computation, storage, and communication overhead, limiting their suitability for large-scale deployments. To address these limitations, this paper proposes ScLBS, a federated learning (FL)–based self-certified authentication scheme for distributed and sustainable IoT environments. ScLBS integrates self-certified public key cryptography with FL-driven trust adaptation, enabling decentralized public key derivation without reliance on third-party certificate authorities or exposure of private credentials. A zero-knowledge mechanism combined with location-aware authentication strengthens resistance to impersonation, Sybil, and replay attacks. Hierarchical key management supported by a -tree enables efficient group rekeying and preserves forward and backward secrecy under dynamic membership. Formal security verification is conducted under the Dolev–Yao adversary model using ProVerif, confirming secrecy of private and session keys (SKs) and correctness of authentication. Extensive NS-3 simulations and ablation analysis demonstrate that ScLBS achieves lower authentication delay, reduced message overhead, improved network utilization, and decreased energy consumption compared to representative IoT authentication schemes, while maintaining bounded FL overhead. These results indicate that ScLBS provides a balanced trade-off between security strength, scalability, and resource efficiency for constrained IoT networks.
Premkumar Chithaluru mail , B. Veera Jyothi mail , Fahd S. Alharithi mail , Wojciech Ksiazek mail , M. Ramchander mail , Aman Singh mail aman.singh@uneatlantico.es, Ravi Kumar Rachavaram mail ,
Chithaluru
<a class="ep_document_link" href="/27968/1/sensors-26-01516-v2.pdf"><img class="ep_doc_icon" alt="[img]" src="/style/images/fileicons/text.png" border="0"/></a>
en
open
Human Activity Recognition in Domestic Settings Based on Optical Techniques and Ensemble Models
Human activity recognition (HAR) is essential in many applications, such as smart homes, assisted living, healthcare monitoring, rehabilitation, physiotherapy, and geriatric care. Conventional methods of HAR use wearable sensors, e.g., acceleration sensors and gyroscopes. However, they are limited by issues such as sensitivity to position, user inconvenience, and potential health risks with long-term use. Optical camera systems that are vision-based provide an alternative that is not intrusive; however, they are susceptible to variations in lighting, intrusions, and privacy issues. The paper uses an optical method of recognizing human domestic activities based on pose estimation and deep learning ensemble models. The skeletal keypoint features proposed in the current methodology are extracted from video data using PoseNet to generate a privacy-preserving representation that captures key motion dynamics without being sensitive to changes in appearance. A total of 30 subjects (15 male and 15 female) were sampled across 2734 activity samples, including nine daily domestic activities. There were six deep learning architectures, namely, the Transformer (Transformer), Long Short-Term Memory (LSTM), Gated Recurrent Unit (GRU), Multilayer Perceptron (MLP), One-Dimensional Convolutional Neural Network (1D CNN), and a hybrid Convolutional Neural Network–Long Short-Term Memory (CNN–LSTM) architecture. The results on the hold-out test set show that the CNN–LSTM architecture achieves an accuracy of 98.78% within our experimental setting. Leave-One-Subject-Out cross-validation further confirms robust generalization across unseen individuals, with CNN–LSTM achieving a mean accuracy of 97.21% ± 1.84% across 30 subjects. The results demonstrate that vision-based pose estimation with deep learning is a useful, precise, and non-intrusive approach to HAR in smart healthcare and home automation systems.
Muhammad Amjad Raza mail , Nasir Mehmood mail , Hafeez Ur Rehman Siddiqui mail , Adil Ali Saleem mail , Roberto Marcelo Álvarez mail roberto.alvarez@uneatlantico.es, Yini Airet Miró Vera mail yini.miro@uneatlantico.es, Isabel de la Torre Díez mail ,
Raza
