Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (95)

Search Parameters:
Keywords = channel access period

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
37 pages, 5345 KiB  
Article
Synthesis of Sources of Common Randomness Based on Keystream Generators with Shared Secret Keys
by Dejan Cizelj, Milan Milosavljević, Jelica Radomirović, Nikola Latinović, Tomislav Unkašević and Miljan Vučetić
Mathematics 2025, 13(15), 2443; https://doi.org/10.3390/math13152443 - 29 Jul 2025
Viewed by 176
Abstract
Secure autonomous secret key distillation (SKD) systems traditionally depend on external common randomness (CR) sources, which often suffer from instability and limited reliability over long-term operation. In this work, we propose a novel SKD architecture that synthesizes CR by combining a keystream of [...] Read more.
Secure autonomous secret key distillation (SKD) systems traditionally depend on external common randomness (CR) sources, which often suffer from instability and limited reliability over long-term operation. In this work, we propose a novel SKD architecture that synthesizes CR by combining a keystream of a shared-key keystream generator KSG(KG) with locally generated binary Bernoulli noise. This construction emulates the statistical properties of the classical Maurer satellite scenario while enabling deterministic control over key parameters such as bit error rate, entropy, and leakage rate (LR). We derive a closed-form lower bound on the equivocation of the shared-secret key  KG from the viewpoint of an adversary with access to public reconciliation data. This allows us to define an admissible operational region in which the system guarantees long-term secrecy through periodic key refreshes, without relying on advantage distillation. We integrate the Winnow protocol as the information reconciliation mechanism, optimized for short block lengths (N=8), and analyze its performance in terms of efficiency, LR, and final key disagreement rate (KDR). The proposed system operates in two modes: ideal secrecy, achieving secret key rates up to 22% under stringent constraints (KDR < 10−5, LR < 10−10), and perfect secrecy mode, which approximately halves the key rate. Notably, these security guarantees are achieved autonomously, without reliance on advantage distillation or external CR sources. Theoretical findings are further supported by experimental verification demonstrating the practical viability of the proposed system under realistic conditions. This study introduces, for the first time, an autonomous CR-based SKD system with provable security performance independent of communication channels or external randomness, thus enhancing the practical viability of secure key distribution schemes. Full article
Show Figures

Figure 1

23 pages, 1297 KiB  
Article
Multi-Granularity and Multi-Modal Feature Fusion for Indoor Positioning
by Lijuan Ye, Yi Wang, Shenglei Pei, Yu Wang, Hong Zhao and Shi Dong
Symmetry 2025, 17(4), 597; https://doi.org/10.3390/sym17040597 - 15 Apr 2025
Viewed by 473
Abstract
Despite the widespread adoption of indoor positioning technology, the existing solutions still face significant challenges. On one hand, Wi-Fi-based positioning struggles to balance accuracy and efficiency in complex indoor environments and architectural layouts formed by pre-existing access points (APs). On the other hand, [...] Read more.
Despite the widespread adoption of indoor positioning technology, the existing solutions still face significant challenges. On one hand, Wi-Fi-based positioning struggles to balance accuracy and efficiency in complex indoor environments and architectural layouts formed by pre-existing access points (APs). On the other hand, vision-based methods, while offering high-precision potential, are hindered by prohibitive costs associated with binocular camera systems required for depth image acquisition, limiting their large-scale deployment. Additionally, channel state information (CSI), containing multi-subcarrier data, maintains amplitude symmetry in ideal free-space conditions but becomes susceptible to periodic positioning errors in real environments due to multipath interference. Meanwhile, image-based positioning often suffers from spatial ambiguity in texture-repeated areas. To address these challenges, we propose a novel hybrid indoor positioning method that integrates multi-granularity and multi-modal features. By fusing CSI data with visual information, the system leverages spatial consistency constraints from images to mitigate CSI error fluctuations while utilizing CSI’s global stability to correct local ambiguities in image-based positioning. In the initial coarse-grained positioning phase, a neural network model is trained using image data to roughly localize indoor scenes. This model adeptly captures the geometric relationships within images, providing a foundation for more precise localization in subsequent stages. In the fine-grained positioning stage, CSI features from Wi-Fi signals and Scale-Invariant Feature Transform (SIFT) features from image data are fused, creating a rich feature fusion fingerprint library that enables high-precision positioning. The experimental results show that our proposed method synergistically combines the strengths of Wi-Fi fingerprints and visual positioning, resulting in a substantial enhancement in positioning accuracy. Specifically, our approach achieves an accuracy of 0.4 m for 45% of positioning points and 0.8 m for 67% of points. Overall, this approach charts a promising path forward for advancing indoor positioning technology. Full article
(This article belongs to the Section Mathematics)
Show Figures

Figure 1

22 pages, 351 KiB  
Article
Association Between the Information Environment, Knowledge, Perceived Lack of Information, and Uptake of the HPV Vaccine in Female and Male Undergraduate Students in Belgrade, Serbia
by Stefan Mandić-Rajčević, Vida Jeremić Stojković, Mila Paunić, Snežana Stojanović Ristić, Marija Obradović, Dejana Vuković and Smiljana Cvjetković
Eur. J. Investig. Health Psychol. Educ. 2025, 15(2), 21; https://doi.org/10.3390/ejihpe15020021 - 7 Feb 2025
Viewed by 1471
Abstract
The aim of this study was to assess the association between the use of and trust in sources of information, knowledge about human papillomavirus (HPV) and vaccines against it, perceived lack of information, and the decision to receive the HPV vaccine in undergraduate [...] Read more.
The aim of this study was to assess the association between the use of and trust in sources of information, knowledge about human papillomavirus (HPV) and vaccines against it, perceived lack of information, and the decision to receive the HPV vaccine in undergraduate students in Belgrade. The sample of this cross-sectional study included students aged 18 to 27 who received the second dose of the HPV vaccine or used other services of the general medicine department at the Institute for Students’ Health of Belgrade during the period June–July 2024. The research instrument was a questionnaire consisting of socio-demographic data, information environment (sources of information, trust in sources of information, as well as questions related to perceived lack of information), knowledge about HPV and HPV vaccines, and vaccination status. Participants filled out an online questionnaire created on the RedCap platform of the Faculty of Medicine, University of Belgrade, which they accessed via a QR code. Hierarchical logistic regression was used to assess the association between vaccine status and socio-demographic characteristics, use and trust in information sources, knowledge, and perceived lack of information. Of the 603 participants who filled out the questionnaire completely, 78.6% were vaccinated against HPV. Key factors associated with vaccine uptake were female gender (OR = 2.33, p < 0.05), use of scientific literature (OR = 1.40, p < 0.05) and family as a source of information (OR = 1.37, p < 0.01), less frequent use of regional TV channels (OR = 0.76, p < 0.05), higher level of knowledge (OR = 1.43, p < 0.01), and lower perceived lack of information (OR = 0.50, p < 0.01). These variables explained 41% of variability in vaccine uptake in the multivariate hierarchical logistic regression model. Exposure to and trust in sources of information were significantly associated with knowledge about HPV and HPV vaccination, as well as with the perceived lack of information regarding HPV vaccination, and were the most significant determinants of the decision to accept HPV vaccine in the student population. Full article
(This article belongs to the Special Issue The Impact of Social Media on Public Health and Education)
36 pages, 2688 KiB  
Article
StegoEDCA: An Efficient Covert Channel for Smart Grids Based on IEEE 802.11e Standard
by Marek Natkaniec and Paweł Kępowicz
Energies 2025, 18(2), 330; https://doi.org/10.3390/en18020330 - 13 Jan 2025
Cited by 1 | Viewed by 961
Abstract
Smart grids are continuously evolving, incorporating modern technologies such as Wi-Fi, Zigbee, LoRaWAN or BLE. Wi-Fi are commonly used to transmit data from measurement systems, distribution control and monitoring systems, as well as network protection systems. However, since Wi-Fi networks primarily operate on [...] Read more.
Smart grids are continuously evolving, incorporating modern technologies such as Wi-Fi, Zigbee, LoRaWAN or BLE. Wi-Fi are commonly used to transmit data from measurement systems, distribution control and monitoring systems, as well as network protection systems. However, since Wi-Fi networks primarily operate on unlicensed frequency bands, this introduces significant security risks for sensitive data transmission. In this paper, we propose a novel and highly efficient covert channels that utilize IEEE 802.11 Enhanced Distributed Channel Access (EDCA) for data transmission. It is also the first ever covert channel that employ three or four independent covert mechanisms to enhance operational efficiency. The proposed mechanism is also the first to exploit the Transmission Opportunity (TXOP) period and the access categories of the EDCA function. The protocol was developed and tested using the ns-3 simulator, achieving excellent performance results. Its efficiency remains consistent even under heavy network load with additional background traffic. These covert channels provide an innovative solution for securely transmitting large volumes of data within the smart grid. Full article
(This article belongs to the Special Issue Research on Security and Data Protection for Energy Systems)
Show Figures

Figure 1

20 pages, 2177 KiB  
Article
Beyond the Hype: Ten Lessons from Co-Creating and Implementing Digital Innovation in a Rwandan Smallholder Banana Farming System
by Julius Adewopo, Mariette McCampbell, Charles Mwizerwa and Marc Schut
Agriculture 2025, 15(2), 119; https://doi.org/10.3390/agriculture15020119 - 7 Jan 2025
Viewed by 1783
Abstract
The fourth agricultural revolution (or Agriculture 4.0) promises to lead the way to an agricultural sector that is smarter, more efficient, and more environmentally and socially responsible. Digital and data generating tools are seen as critical enablers for this transformation and are expected [...] Read more.
The fourth agricultural revolution (or Agriculture 4.0) promises to lead the way to an agricultural sector that is smarter, more efficient, and more environmentally and socially responsible. Digital and data generating tools are seen as critical enablers for this transformation and are expected to make farming more planned, predictive, productive, and efficient. To make this vision a reality, agricultural producers will first adopt and use the technologies, but this is easier said than done. Barriers such as limited digital infrastructure, low (digital) literacy, low incomes, and socio-cultural norms are major factors causing sub-optimal access to and use of digital technologies among smallholder farmers. Beyond these use challenges of access and usage, limited evidence exists to support the notion that extant digital technologies add enough value to provide substantial benefits for targeted farmers. In this paper, we unravel insights from a six-year digital agriculture innovation project which was implemented to develop and deploy multi-modal digital tools for the control of a major banana disease. By reaching over 272,200 smallholder farmers in Rwanda through a smartphone app, unstructured supplementary service data, a chatbot, and other ancillary channels, we assessed various assumptions regarding intrinsic motivation, incentives, and skills retention among the target digital tool users. These insights suggest that embedding digital innovation requires intentional user-engagement, proper incentivization of next-users, and targeted communication to foster adoption. We present ten (10) salient, but non-exhaustive, lessons to showcase the realities of developing and delivering digital tools to farmers over an extended period, spanning from ideation, development, and testing to scaling stages. The lessons are relevant for a broad audience, including stakeholders across the digital innovation space who can utilize our experiential notes to guide the development and deployment of similar digital innovations for improved outcomes in smallholder farming systems. Full article
(This article belongs to the Special Issue Applications of Data Analysis in Agriculture—2nd Edition)
Show Figures

Figure 1

18 pages, 2011 KiB  
Article
Demographic and Geographic Characteristics Associated with the Type of Prescription and Drug Expenditure: Real World Evidence for Greece During 2015–2021
by Georgios Mavridoglou and Nikolaos Polyzos
Healthcare 2024, 12(22), 2312; https://doi.org/10.3390/healthcare12222312 - 19 Nov 2024
Viewed by 1523
Abstract
Aim: Electronic prescribing has allowed for the collection of prescription data in real time in Greece for the first time. Hence, the aim of the current study was to present the characteristics of prescriptions for the Greek population during the period from 2015 [...] Read more.
Aim: Electronic prescribing has allowed for the collection of prescription data in real time in Greece for the first time. Hence, the aim of the current study was to present the characteristics of prescriptions for the Greek population during the period from 2015 to 2021. Methods: This retrospective study was based on data extracted from the nationwide Greek electronic prescription database between January 2015 and December 2021. Descriptive statistics methods were used for the needs of the study. As the basic figures examined depend on the size of the population, in order for the results to be comparable, we estimated the corresponding measures per inhabitant, using population data from the Greek Statistical Authority. Appropriate indicators for the comparison of consumption and expenditure over time were estimated. A study of the trend was also carried out using time series and linear regression models. In order to facilitate the design and implementation of specialized policies, it is useful to identify the drug categories with the highest consumption and expenditure, as well as the geographical areas that present similar characteristics. For the first, ABC analysis was used, which helps to identify the most popular categories of drugs, while for the second, cluster analysis was carried out. Agglomerative clustering was used to divide the regions into similar groups. This hierarchical clustering algorithm classifies the population into several clusters, with areas in the same cluster being more similar, and areas in different clusters being dissimilar. The Ward linkage method with Euclidean distance was used. Results: The analysis of prescription drug consumption and expenditure from 2015 to 2021 revealed significant fluctuations and trends across various drug categories, age groups, and geographical areas. Notably, the quantity of prescriptions increased by 20% since 2015, while expenditure surged by over 30%, with significant spikes following the end of the MoU in 2019 and the onset of the pandemic in 2020. In terms of expenditure, antineoplastic and immunomodulation agents (category L) held the largest share, driven by the introduction of new, costly drugs. The expenditure per inhabitant revealed gender and age disparities, with older populations, particularly women, incurring higher costs. Geographically, drug expenditure, and consumption varied significantly, with distinct regional clusters identified. These clusters, while showing some overlap in consumption and expenditure patterns, also highlighted unique regional characteristics. Conclusions: The insights into prescription drug consumption and expenditure trends offer a valuable basis for developing targeted interventions aimed at optimizing healthcare resource allocation. Moreover, the findings underscore the importance of addressing regional and demographic disparities in pharmaceutical use, thereby contributing to more equitable and cost-effective healthcare strategies. More specifically, the age distribution of prescriptions shows the increase in younger ages, which, as a result, anticipates the overall increase in prescriptions. The knowledge of the most convex categories of medicine, as well as the percentages of the use of generic drugs, shows where interventions should be made, with financial incentives and information through new information channels. The geographic disparities recorded should lead to policies that help the residents of hard-to-reach areas to access prescriptions. In addition, the present study provides a strategic framework for policymakers and healthcare managers to guide future studies and inform decision-making processes. Full article
(This article belongs to the Special Issue Efficiency, Innovation, and Sustainability in Healthcare Systems)
Show Figures

Figure 1

23 pages, 916 KiB  
Article
Fake Base Station Detection and Link Routing Defense
by Sourav Purification, Jinoh Kim, Jonghyun Kim and Sang-Yoon Chang
Electronics 2024, 13(17), 3474; https://doi.org/10.3390/electronics13173474 - 1 Sep 2024
Cited by 1 | Viewed by 4262
Abstract
Fake base stations comprise a critical security issue in mobile networking. A fake base station exploits vulnerabilities in the broadcast message announcing a base station’s presence, which is called SIB1 in 4G LTE and 5G NR, to get user equipment to connect to [...] Read more.
Fake base stations comprise a critical security issue in mobile networking. A fake base station exploits vulnerabilities in the broadcast message announcing a base station’s presence, which is called SIB1 in 4G LTE and 5G NR, to get user equipment to connect to the fake base station. Once connected, the fake base station can deprive the user of connectivity and access to the Internet/cloud. We discovered that a fake base station can disable the victim user equipment’s connectivity for an indefinite period of time, which we validated using our threat prototype against current 4G/5G practices. We designed and built a defense scheme which detects and blacklists a fake base station and then, informed by the detection, avoids it through link routing for connectivity availability. For detection and blacklisting, our scheme uses the real-time information of both the time duration and the number of request transmissions, the features of which are directly impacted by the fake base station’s threat and which have not been studied in previous research. Upon detection, our scheme takes an active measure called link routing, which is a novel concept in mobile/4G/5G networking, where the user equipment routes the connectivity request to another base station. To defend against a Sybil-capable fake base station, we use a history–reputation-based link routing scheme for routing and base station selection. We implemented both the base station and the user on software-defined radios using open-source 5G software (srsRAN v23.10 and Open5GS v2.6.6) for validation. We varied the base station implementation to simulate legitimate vs. faulty but legitimate vs. fake and malicious base stations, where a faulty base station notifies the user of the connectivity disruption and releases the session, while a fake base station continues to hold the session. We empirically analyzed the detection and identification thresholds, which vary with the fake base station’s power and the channel condition. By strategically selecting the threshold parameters, our scheme provides zero errors, including zero false positives, to avoid blacklisting a temporarily faulty base station that cannot provide connectivity at the time. Furthermore, our link routing scheme enables the base station to switch in order to restore the connectivity availability and limit the threat impact. We also discuss future directions to facilitate and encourage R&D in securing telecommunications and base station security. Full article
(This article belongs to the Special Issue Multimedia in Radio Communication and Teleinformatics)
Show Figures

Figure 1

27 pages, 347 KiB  
Article
Financial Development, Monetary Policy, and the Monetary Transmission Mechanism—An Asymmetric ARDL Analysis
by Olajide O. Oyadeyi
Economies 2024, 12(8), 191; https://doi.org/10.3390/economies12080191 - 24 Jul 2024
Cited by 7 | Viewed by 3201
Abstract
This paper’s objective is to examine the asymmetric cointegration and asymmetric effects of financial development and monetary policy on monetary transmission mechanisms in the Nigerian context using annual data spanning the period from 1986 to 2023. This study pushes the frontiers of knowledge [...] Read more.
This paper’s objective is to examine the asymmetric cointegration and asymmetric effects of financial development and monetary policy on monetary transmission mechanisms in the Nigerian context using annual data spanning the period from 1986 to 2023. This study pushes the frontiers of knowledge by providing information on the nonlinear impacts of monetary policy and financial sector innovations on monetary transmission mechanisms in Nigeria to help policymakers tailor their strategies to local conditions, enhancing the effectiveness of monetary interventions in the economy. To achieve this, this paper adopted nonlinear ARDL models to understand how changes in the direction of monetary policy and developments in the financial system induce changes in the transmission of monetary policy. The findings document the existence of asymmetries in both the short and long run, revealing that the impacts of financial development and monetary policy on the different monetary policy channels are not uniform. These asymmetries indicate that the responses of various economic variables to monetary policy actions differ depending on the level of financial development. These findings underscore the complexity of the monetary transmission mechanism and the necessity for a nuanced understanding of how financial development and monetary policy interact in different contexts. Consequently, this finding is symptomatic of some characteristics of those financial markets on their way toward advanced developments. As the financial system matures, monetary policy may have a greater impact on the cost of short-term funding for banks without having any discernible effect on the rates at which businesses and households access funding. Therefore, this paper recommends focusing on the policies that will foster the financial system across the banking sector, capital market, bond market, and overall financial sector to improve the efficiency of the monetary transmission process. Full article
24 pages, 1104 KiB  
Article
A Learning-Based Energy-Efficient Device Grouping Mechanism for Massive Machine-Type Communication in the Context of Beyond 5G Networks
by Rubbens Boisguene, Ibrahim Althamary and Chih-Wei Huang
J. Sens. Actuator Netw. 2024, 13(3), 33; https://doi.org/10.3390/jsan13030033 - 28 May 2024
Cited by 3 | Viewed by 1862
Abstract
With the increasing demand for high data rates, low delay, and extended battery life, managing massive machine-type communication (mMTC) in the beyond 5G (B5G) context is challenging. MMTC devices, which play a role in developing the Internet of Things (IoT) and smart cities, [...] Read more.
With the increasing demand for high data rates, low delay, and extended battery life, managing massive machine-type communication (mMTC) in the beyond 5G (B5G) context is challenging. MMTC devices, which play a role in developing the Internet of Things (IoT) and smart cities, need to transmit short amounts of data periodically within a specific time frame. Although blockchain technology is utilized for secure data storage and transfer while digital twin technology provides real-time monitoring and management of the devices, issues such as constrained time delays and network congestion persist. Without a proper data transmission strategy, most devices would fail to transmit in time, thus defying their relevance and purpose. This work investigates the problem of massive random access channel (RACH) attempts while emphasizing the energy efficiency and access latency for mMTC devices with critical missions in B5G networks. Using machine learning techniques, we propose an attention-based reinforcement learning model that orchestrates the device grouping strategy to optimize device placement. Thus, the model guarantees a higher probability of success for the devices during data transmission access, eventually leading to more efficient energy consumption. Through thorough quantitative simulations, we demonstrate that the proposed learning-based approach significantly outperforms the other baseline grouping methods. Full article
Show Figures

Figure 1

22 pages, 2605 KiB  
Article
Trade and Water Pollution: Evidence from China
by Wenhao Yang, Yuanzhe Huang, Jinsong Ye and Changbiao Zhong
Sustainability 2024, 16(9), 3600; https://doi.org/10.3390/su16093600 - 25 Apr 2024
Cited by 1 | Viewed by 2042
Abstract
China’s economy has achieved significant success by integrating itself into the globalized production system over an extended period. However, it is crucial to address the environmental consequences that accompany rapid economic progress. The correlation between trade and environmental pollution is still controversial in [...] Read more.
China’s economy has achieved significant success by integrating itself into the globalized production system over an extended period. However, it is crucial to address the environmental consequences that accompany rapid economic progress. The correlation between trade and environmental pollution is still controversial in the existing literature, with a lack of research specifically investigating this relationship using detailed data at the firm level. Based on the quasi-natural experiment of China’s accession to the WTO, this study uses the DID method to evaluate the causal relationship between trade and the environment experimentally. It is found that trade liberalization significantly increases firms’ industrial wastewater emissions, and the empirical results remain robust after parallel trend tests, placebo tests, and replacement variables. The mechanism of action suggests that trade expansion enhances corporate pollution emissions through two channels: attracting foreign investment into the country and intensifying energy consumption. A heterogeneity analysis reveals that the pollution-enhancing effect of trade expansion on enterprises is mainly concentrated in export-oriented enterprises, labor-intensive industries, and coastal regions. Additionally, further analysis shows that trade liberalization not only has local impacts but also spatial spillover effects on enterprise pollution. It is found that enhancing environmental governance and reducing corruption can effectively mitigate the adverse environmental consequences caused by trade liberalization. Full article
Show Figures

Figure 1

13 pages, 979 KiB  
Article
Congenital Hyperinsulinism in Humans and Insulin Secretory Dysfunction in Mice Caused by Biallelic DNAJC3 Variants
by Alena Welters, Oliver Nortmann, Laura Wörmeyer, Clemens Freiberg, Daniel Eberhard, Nadine Bachmann, Carsten Bergmann, Ertan Mayatepek, Thomas Meissner and Sebastian Kummer
Int. J. Mol. Sci. 2024, 25(2), 1270; https://doi.org/10.3390/ijms25021270 - 20 Jan 2024
Viewed by 2201
Abstract
The BiP co-chaperone DNAJC3 protects cells during ER stress. In mice, the deficiency of DNAJC3 leads to beta-cell apoptosis and the gradual onset of hyperglycemia. In humans, biallelic DNAJC3 variants cause a multisystem disease, including early-onset diabetes mellitus. Recently, hyperinsulinemic hypoglycemia (HH) has [...] Read more.
The BiP co-chaperone DNAJC3 protects cells during ER stress. In mice, the deficiency of DNAJC3 leads to beta-cell apoptosis and the gradual onset of hyperglycemia. In humans, biallelic DNAJC3 variants cause a multisystem disease, including early-onset diabetes mellitus. Recently, hyperinsulinemic hypoglycemia (HH) has been recognized as part of this syndrome. This report presents a case study of an individual with HH caused by DNAJC3 variants and provides an overview of the metabolic phenotype of individuals with HH and DNAJC3 variants. The study demonstrates that HH may be a primary symptom of DNAJC3 deficiency and can persist until adolescence. Additionally, glycemia and insulin release were analyzed in young DNACJ3 knockout (K.O.) mice, which are equivalent to human infants. In the youngest experimentally accessible age group of 4-week-old mice, the in vivo glycemic phenotype was already dominated by a reduced total insulin secretion capacity. However, on a cellular level, the degree of insulin release of DNAJC3 K.O. islets was higher during periods of increased synthetic activity (high-glucose stimulation). We propose that calcium leakage from the ER into the cytosol, due to disrupted DNAJC3-controlled gating of the Sec61 channel, is the most likely mechanism for HH. This is the first genetic mechanism explaining HH solely by the disruption of intracellular calcium homeostasis. Clinicians should screen for HH in DNAJC3 deficiency and consider DNAJC3 variants in the differential diagnosis of congenital hyperinsulinism. Full article
(This article belongs to the Special Issue Diabetes: Regulation of Insulin Secretion in Pancreatic Beta Cells)
Show Figures

Figure 1

29 pages, 11882 KiB  
Article
Mid-Term Monitoring of Suspended Sediment Plumes of Greek Rivers Using Moderate Resolution Imaging Spectroradiometer (MODIS) Imagery
by Sotirios Karalis, Efthimios Karymbalis and Konstantinos Tsanakas
Remote Sens. 2023, 15(24), 5702; https://doi.org/10.3390/rs15245702 - 12 Dec 2023
Cited by 1 | Viewed by 2024
Abstract
This study focuses on the suspended sediment delivery of 17 rivers and streams of various sizes to the sea over a wide geographical area covering most of the Greek peninsula, utilizing two Moderate Resolution Imaging Spectroradiometer (MODIS) products. Equal-area polygons (“plume” polygons), were [...] Read more.
This study focuses on the suspended sediment delivery of 17 rivers and streams of various sizes to the sea over a wide geographical area covering most of the Greek peninsula, utilizing two Moderate Resolution Imaging Spectroradiometer (MODIS) products. Equal-area polygons (“plume” polygons), were delineated at the mouths of each selected river. These polygons were utilized to estimate the suspended sediment load of each river through the application of suspended sediment indices, ratios, and masks. To achieve this, 669 Level 1B MODIS images (MOD02) and their corresponding MODIS cloud products (MOD35) were downloaded and processed for a 10-water-year period (2004–2014). During this period of 669 days, there were 58 flood events (episodes) ranging in duration from 5 to 45 days. Relative atmospheric correction was applied to the images based on four selected bright invariant areas (PIFs) scattered along mainland Greece. The second product used in this study was MOD09Q1, an atmospherically corrected 8-day composite processed for the entire record period (2000–2019). Suspended sediment indices, ratios, and masks were developed using all three visible channels and near-infrared (NIR) for the MOD02 dataset, while only Red and Near-InfraRed (NIR) channels were available from the MOD09Q dataset. The resulting rankings from the remote sensing analysis were compared with the predictions of soil loss models, and the outcomes were largely consistent. While the remote sensing results can be considered as a type of experimental data or measurements, they come with inherent limitations. These include infrequent access to cloud-free data on stormy days, the influence of wind and currents, and the potential impact of dust storms originating from Africa, among others. On the other hand, soil loss models are sensitive to the parameter values used, and in some cases, the uncertainties are significant. Hence, the ranking derived from remote sensing can serve as a calibration of the models, particularly for the BQART model, which provides information on the catchment’s sink capacity. An index of “sediment productivity per square kilometer and mm of rainfall” was developed. This index can be considered a “sediment delivery ratio” and is crucial for accurately quantifying the phenomenon. Full article
(This article belongs to the Section Remote Sensing in Geology, Geomorphology and Hydrology)
Show Figures

Figure 1

23 pages, 6656 KiB  
Article
Remote Sensing-Based Outdoor Thermal Comfort Assessment in Local Climate Zones in the Rural–Urban Continuum of eThekwini Municipality, South Africa
by Terence Darlington Mushore, John Odindi, Rob Slotow and Onisimo Mutanga
Remote Sens. 2023, 15(23), 5461; https://doi.org/10.3390/rs15235461 - 22 Nov 2023
Cited by 8 | Viewed by 2515
Abstract
Due to the need to continuously monitor and understand the thermal environment and its socioeconomic implications, this study used remotely sensed data to analyze thermal comfort variation in LCZs, including along the rural to urban gradient of the eThekwini Municipality in KwaZulu-Natal province [...] Read more.
Due to the need to continuously monitor and understand the thermal environment and its socioeconomic implications, this study used remotely sensed data to analyze thermal comfort variation in LCZs, including along the rural to urban gradient of the eThekwini Municipality in KwaZulu-Natal province of South Africa. LCZs were mapped using multi-temporal and multi-spectral Landsat 8 and Landsat 9 data using the approach by World Urban Database and Access Portal Tools (WUDAPT), while thermal data were used to retrieve land surface temperatures (LSTs). Data for training classification of LCZs and accuracy assessment were digitized from GoogleEarth guided by knowledge gained and data collected during a field survey in March 2022 as well as pre-existing maps. LCZs were mapped using the random forest classifier in SAGA GIS software while a single channel algorithm based on band 10 was used to compute LST for different scenes. The LSTs were adjusted and further used to derive thermal comfort based on the Universal Thermal Comfort Index (UTCI) categories as an indicator for outdoor thermal comfort on the extremely low- and extremely high-temperature periods in the cool and hot seasons, respectively. LCZs were mapped with high accuracy (overall accuracy of 90.1% and kappa of 0.88) while inter-class separability was high (>1.5) for all LCZ pairs. Built-up LCZs dominate the eastern parts of the municipality, signifying the influence of the sea on development within the area. Average LST was coolest in the dense forest, open low-rise and water LCZs in the cool and hot seasons, respectively. The compact high-rise LCZ was the warmest in both the hot (36 °C) and the cool (23 °C) seasons. The sea sands were among coolest regions in both seasons due to their high water content, attributed to their high water table and close proximity to the ocean. There was no thermal stress during the cool season, while most areas recorded moderate to strong heat stress in the hot season. Some areas in the densely built-up LCZs recorded very strong heat stress in the hot season. The findings suggest that policies and strategies should enhance heat mitigation capacities in strong-heat-stress areas during the hot season. Municipal authorities and citizens must work together to build strategies to minimize temperature extremes and associated socioeconomic pressures. Urban development policies, plans and strategies should consider implications on the thermal environment as well as the value of conservation of LCZs with high-heat mitigation value such as dense forests and expansion of built-up LCZs with low-heat absorption levels such as open low-rise. The study was based mainly on remotely sensed temperatures with some ground data used to validate results, which may limit the assessment. Overall, the study provides insights towards achievement of global sustainable and climate-smart development targets. Full article
Show Figures

Graphical abstract

12 pages, 610 KiB  
Article
New Construction of Asynchronous Channel Hopping Sequences in Cognitive Radio Networks
by Yaoxuan Wang, Xianhua Niu, Chao Qi, Zhihang He and Bosen Zeng
Entropy 2023, 25(10), 1473; https://doi.org/10.3390/e25101473 - 22 Oct 2023
Viewed by 1601
Abstract
The channel-hopping-based rendezvous is essential to alleviate the problem of under-utilization and scarcity of the spectrum in cognitive radio networks. It dynamically allows unlicensed secondary users to schedule rendezvous channels using the assigned hopping sequence to guarantee the self-organization property in a limited [...] Read more.
The channel-hopping-based rendezvous is essential to alleviate the problem of under-utilization and scarcity of the spectrum in cognitive radio networks. It dynamically allows unlicensed secondary users to schedule rendezvous channels using the assigned hopping sequence to guarantee the self-organization property in a limited time. In this paper, we use the interleaving technique to cleverly construct a set of asynchronous channel-hopping sequences consisting of d sequences of period xN2 with flexible parameters, which can generate sequences of different lengths. By this advantage, the new designed CHSs can be used to adapt to the demands of various communication scenarios. Furthermore, we focus on the improved maximum-time-to-rendezvous and maximum-first-time-to-rendezvous performance of the new construction compared to the prior research at the same sequence length. The new channel-hopping sequences ensure that rendezvous occurs between any two sequences and the rendezvous times are random and unpredictable when using licensed channels under asynchronous access, although the full degree-of-rendezvous is not satisfied. Our simulation results show that the new construction is more balanced and unpredictable between the maximum-time-to-rendezvous and the mean and variance of time-to-rendezvous. Full article
(This article belongs to the Special Issue Coding and Entropy)
Show Figures

Figure 1

16 pages, 1911 KiB  
Article
Machine Learning for APT Detection
by Abdullah Said AL-Aamri, Rawad Abdulghafor, Sherzod Turaev, Imad Al-Shaikhli, Akram Zeki and Shuhaili Talib
Sustainability 2023, 15(18), 13820; https://doi.org/10.3390/su151813820 - 16 Sep 2023
Cited by 13 | Viewed by 7997
Abstract
Nowadays, countries face a multitude of electronic threats that have permeated almost all business sectors, be it private corporations or public institutions. Among these threats, advanced persistent threats (APTs) stand out as a well-known example. APTs are highly sophisticated and stealthy computer network [...] Read more.
Nowadays, countries face a multitude of electronic threats that have permeated almost all business sectors, be it private corporations or public institutions. Among these threats, advanced persistent threats (APTs) stand out as a well-known example. APTs are highly sophisticated and stealthy computer network attacks meticulously designed to gain unauthorized access and persist undetected threats within targeted networks for extended periods. They represent a formidable cybersecurity challenge for governments, corporations, and individuals alike. Recognizing the gravity of APTs as one of the most critical cybersecurity threats, this study aims to reach a deeper understanding of their nature and propose a multi-stage framework for automated APT detection leveraging time series data. Unlike previous models, the proposed approach has the capability to detect real-time attacks based on stored attack scenarios. This study conducts an extensive review of existing research, identifying its strengths, weaknesses, and opportunities for improvement. Furthermore, standardized techniques have been enhanced to enhance their effectiveness in detecting APT attacks. The learning process relies on datasets sourced from various channels, including journal logs, traceability audits, and systems monitoring statistics. Subsequently, an efficient APT detection and prevention system, known as the composition-based decision tree (CDT), has been developed to operate in complex environments. The obtained results demonstrate that the proposed approach consistently outperforms existing algorithms in terms of detection accuracy and effectiveess. Full article
Show Figures

Figure 1

Back to TopTop