Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (32)

Search Parameters:
Keywords = custom permission

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
28 pages, 4438 KiB  
Article
A Cybersecurity Risk Assessment for Enhanced Security in Virtual Reality
by Rebecca Acheampong, Dorin-Mircea Popovici, Titus C. Balan, Alexandre Rekeraho and Ionut-Alexandru Oprea
Information 2025, 16(6), 430; https://doi.org/10.3390/info16060430 - 23 May 2025
Viewed by 1008
Abstract
Our society is becoming increasingly dependent on technology, with immersive virtual worlds such as Extended Reality (XR) transforming how we connect and interact. XR technologies enhance communication and operational efficiency. They have been adopted in sectors such as manufacturing, education, and healthcare. However, [...] Read more.
Our society is becoming increasingly dependent on technology, with immersive virtual worlds such as Extended Reality (XR) transforming how we connect and interact. XR technologies enhance communication and operational efficiency. They have been adopted in sectors such as manufacturing, education, and healthcare. However, the immersive and interconnected nature of XR introduces security risks that span from technical and human to psychological vulnerabilities. In this study, we examined security threats in XR environments through a scenario-driven risk assessment, using a hybrid approach combining Common Vulnerability Scoring System (CVSS) metrics and a custom likelihood model to quantify risks. This methodology provides a comprehensive risk evaluation method, identifying critical vulnerabilities such as Remote Code Execution (RCE), social engineering, excessive permission exploitation, unauthorized access, and data exfiltration. The findings reveal that human vulnerabilities, including users’ susceptibility to deception and excessive trust in familiar interfaces and system prompts, significantly increase attack success rates. Additionally, developer mode, once enabled, remains continuously active, and the lack of authentication requirements for installing applications from unknown sources, coupled with poor permission management on the part of the users, creates security gaps that attackers can exploit. Furthermore, permission management in XR devices is often broad and persistent and lacks real-time notifications, allowing malicious applications to exploit microphone, camera, and location access without the users knowing. By leveraging CVSS scores and a structured likelihood-based risk assessment, we quantified the severity of these threats, with RCE, social engineering, and insecure app installation emerging as the greatest risks. This study highlights the necessity of implementing granular permission controls, formalized developer mode restrictions, and structured user education programs to mitigate XR-specific threats. Full article
(This article belongs to the Special Issue Extended Reality and Cybersecurity)
Show Figures

Figure 1

17 pages, 1378 KiB  
Article
Prototype Instrumentation for the Spatial and Temporal Characterisation of Voltage Supply Based on Two-Dimensional Higher-Order Statistics
by Juan-José González-de-la-Rosa, Olivia Florencias-Oliveros, José-María Sierra-Fernández, Manuel-Jesús Espinosa-Gavira, Agustín Agüera-Pérez, José-Carlos Palomares-Salas, Victor Pallarés-López, Rafael-Jesús Real-Calvo and Isabel Santiago-Chiquero
Energies 2025, 18(1), 175; https://doi.org/10.3390/en18010175 - 3 Jan 2025
Viewed by 706
Abstract
This paper presents a proof-of-concept of a versatile Power Quality (PQ) analyser for tracking the voltage supply in industrial and residential sectors. It implements 2D Higher-Order Statistics (HOS) to assess voltage quality, based more on the sinusoidal waveform than on power fluctuations. Beyond [...] Read more.
This paper presents a proof-of-concept of a versatile Power Quality (PQ) analyser for tracking the voltage supply in industrial and residential sectors. It implements 2D Higher-Order Statistics (HOS) to assess voltage quality, based more on the sinusoidal waveform than on power fluctuations. Beyond the second-order parameters and permissible deviations regulated by the norm, EN 50160, the two-dimensional traces and probability density functions, along with a previously studied differential index, manage to identify different states of the electrical grid. Waveforms were measured in the wall plugs of a public building. In regard to analysing reliability and voltage waveform, the results corroborate that incorporating skewness and kurtosis indicators improves the characterisation, as well as extracting the customers’ supply behaviour under normal and anomalous operations. The instrument showed good behaviour in site characterisation, and the implemented method was considered as a probabilistic approach for the risk assessment of an installation. The prototype was tested in the facilities of a public building of the university, being able to detect deviations in 10 s traces of 3.9% in variance and 0.6% in kurtosis. Full article
(This article belongs to the Special Issue Power Quality Monitoring with Energy Saving Goals)
Show Figures

Figure 1

30 pages, 2789 KiB  
Article
Construction 5.0 and Sustainable Neuro-Responsive Habitats: Integrating the Brain–Computer Interface and Building Information Modeling in Smart Residential Spaces
by Amjad Almusaed, Ibrahim Yitmen, Asaad Almssad and Jonn Are Myhren
Sustainability 2024, 16(21), 9393; https://doi.org/10.3390/su16219393 - 29 Oct 2024
Cited by 3 | Viewed by 2841
Abstract
This study takes a unique approach by investigating the integration of Brain–Computer Interfaces (BCIs) and Building Information Modeling (BIM) within residential architecture. It explores their combined potential to foster neuro-responsive, sustainable environments within the framework of Construction 5.0. The methodological approach involves real-time [...] Read more.
This study takes a unique approach by investigating the integration of Brain–Computer Interfaces (BCIs) and Building Information Modeling (BIM) within residential architecture. It explores their combined potential to foster neuro-responsive, sustainable environments within the framework of Construction 5.0. The methodological approach involves real-time BCI data and subjective evaluations of occupants’ experiences to elucidate cognitive and emotional states. These data inform BIM-driven alterations that facilitate adaptable, customized, and sustainability-oriented architectural solutions. The results highlight the ability of BCI–BIM integration to create dynamic, occupant-responsive environments that enhance well-being, promote energy efficiency, and minimize environmental impact. The primary contribution of this work is the demonstration of the viability of neuro-responsive architecture, wherein cognitive input from Brain–Computer Interfaces enables real-time modifications to architectural designs. This technique enhances built environments’ flexibility and user-centered quality by integrating occupant preferences and mental states into the design process. Furthermore, integrating BCI and BIM technologies has significant implications for advancing sustainability and facilitating the design of energy-efficient and ecologically responsible residential areas. The study offers practical insights for architects, engineers, and construction professionals, providing a method for implementing BCI–BIM systems to enhance user experience and promote sustainable design practices. The research examines ethical issues concerning privacy, data security, and informed permission, ensuring these technologies adhere to moral and legal requirements. The study underscores the transformational potential of BCI–BIM integration while acknowledging challenges related to data interoperability, integrity, and scalability. As a result, ongoing innovation and rigorous ethical supervision are crucial for effectively implementing these technologies. The findings provide practical insights for architects, engineers, and industry professionals, offering a roadmap for developing intelligent and ethically sound design practices. Full article
(This article belongs to the Special Issue Novel Technologies and Digital Design in Smart Construction)
Show Figures

Figure 1

24 pages, 6604 KiB  
Article
Using Advanced Metering Infrastructure Data from MV/LV Substations to Minimize Reactive Energy Supply Cost to Final Consumers
by Jerzy Andruszkiewicz, Józef Lorenc and Agnieszka Weychan
Energies 2024, 17(16), 4116; https://doi.org/10.3390/en17164116 - 19 Aug 2024
Viewed by 942
Abstract
This article presents an original methodology to determine the optimal level of reactive energy transmission to low-voltage consumers supplied from MV/LV substations that guarantees the lowest total costs of reactive energy transmission through the DSO network and its generation in receiving installations within [...] Read more.
This article presents an original methodology to determine the optimal level of reactive energy transmission to low-voltage consumers supplied from MV/LV substations that guarantees the lowest total costs of reactive energy transmission through the DSO network and its generation in receiving installations within the reactive power compensation process. The average value of the optimal factor tgφ to be maintained by customers depends on the efficiency of the network, the characteristics of the load, and the market costs of energy losses due to the transmission of reactive energy through the network that are covered by the DSO and the costs of reactive energy generation in receiving installations. The results presented for real MV/LV substations operating in the Polish distribution network demonstrate the application of annual measurements of active and reactive energy consumed and generated registered by AMI systems to calculate the optimal reactive power compensation level. They can be applied to verify the permissible levels of reactive energy compensation applied by the DSOs until now within the yearly tariffs for customers. Full article
(This article belongs to the Section F3: Power Electronics)
Show Figures

Figure 1

17 pages, 569 KiB  
Article
A Risk Assessment Framework for Mobile Apps in Mobile Cloud Computing Environments
by Noah Oghenefego Ogwara, Krassie Petrova, Mee Loong Yang and Stephen G. MacDonell
Future Internet 2024, 16(8), 271; https://doi.org/10.3390/fi16080271 - 29 Jul 2024
Cited by 1 | Viewed by 2022
Abstract
Mobile devices (MDs) are used by mobile cloud computing (MCC) customers and by other users because of their portability, robust connectivity, and ability to house and operate third-party applications (apps). However, the apps installed on an MD may pose data security risks to [...] Read more.
Mobile devices (MDs) are used by mobile cloud computing (MCC) customers and by other users because of their portability, robust connectivity, and ability to house and operate third-party applications (apps). However, the apps installed on an MD may pose data security risks to the MD owner and to other MCC users, especially when the requested permissions include access to sensitive data (e.g., user’s location and contacts). Calculating the risk score of an app or quantifying its potential harmfulness based on user input or on data gathered while the app is actually running may not provide reliable and sufficiently accurate results to avoid harmful consequences. This study develops and evaluates a risk assessment framework for Android-based MDs that does not depend on user input or on actual app behavior. Rather, an app risk evaluator assigns a risk category to each resident app based on the app’s classification (benign or malicious) and the app’s risk score. The app classifier (a trained machine learning model) evaluates the permissions and intents requested by the app. The app risk score is calculated by applying a probabilistic function based on the app’s use of a set of selected dangerous permissions. The results from testing of the framework on an MD with real-life resident apps indicated that the proposed security solution was effective and feasible. Full article
Show Figures

Figure 1

19 pages, 2473 KiB  
Article
Securing Blockchain-Based Supply Chain Management: Textual Data Encryption and Access Control
by Imran Khan, Qazi Ejaz Ali, Hassan Jalil Hadi, Naveed Ahmad, Gauhar Ali, Yue Cao and Mohammed Ali Alshara
Technologies 2024, 12(7), 110; https://doi.org/10.3390/technologies12070110 - 9 Jul 2024
Cited by 5 | Viewed by 6807
Abstract
A supply chain (SC) encompasses a network of businesses, individuals, events, data, and resources orchestrating the movement of goods or services from suppliers to customers. Leveraging a blockchain-based platform, smart contracts play a pivotal role in aligning business logic and tracking progress within [...] Read more.
A supply chain (SC) encompasses a network of businesses, individuals, events, data, and resources orchestrating the movement of goods or services from suppliers to customers. Leveraging a blockchain-based platform, smart contracts play a pivotal role in aligning business logic and tracking progress within supply chain activities. Employing two distinct ledgers, namely Hyperledger and Ethereum, introduces challenges in handling the escalating volume of data and addressing the technical expertise gap related to supply chain management (SCM) tools in blockchain technology. Within the domain of blockchain-based SCM, the growing volume of data activities introduces challenges in the efficient regulation of data flow and the assurance of privacy. To tackle these challenges, a straightforward approach is recommended to manage data growth and thwart unauthorized entries or spam attempts within blockchain ledgers. The proposed technique focuses on validating hashes to ensure blockchain integrity. Emphasizing the authentication of sensitive data on the blockchain to bolster SCM, this approach compels applications to shoulder increased accountability. The suggested technique involves converting all data into textual format, implementing code encryption, and establishing permission-based access control. This strategy aims to address inherent weaknesses in blockchain within SCM. The results demonstrate the efficacy of the proposed technique in providing security and privacy for various types of data within SCM. Overall, the approach enhances the robustness of blockchain-based SCM, offering a comprehensive solution to navigate evolving challenges in data management and privacy assurance. Full article
Show Figures

Figure 1

13 pages, 2124 KiB  
Article
Smart Partitioned Blockchain
by Basem Assiri and Hani Alnami
Sensors 2024, 24(13), 4033; https://doi.org/10.3390/s24134033 - 21 Jun 2024
Cited by 2 | Viewed by 1104
Abstract
Blockchain is a developing technology that promises advancements when it is applied to other fields. Applying blockchain to other systems requires a customized blockchain model to satisfy the requirements of different application fields. One important area is to integrate blockchain with smart spaces [...] Read more.
Blockchain is a developing technology that promises advancements when it is applied to other fields. Applying blockchain to other systems requires a customized blockchain model to satisfy the requirements of different application fields. One important area is to integrate blockchain with smart spaces and the Internet of Things to process, manage, and store data. Actually, smart spaces and Internet of Things systems include various types of transactions in terms of sensitivity. The sensitivity can be considered as correctness sensitivity, time sensitivity, and specialization sensitivity. Correctness sensitivity means that the systems should accept precise or approximated data in some cases, whereas time sensitivity means that there are time bounds for each type of transaction, and specialization sensitivity applies when some transactions are processed only by specialized people. Therefore, this work introduces the smart partitioned blockchain model, where we use machine learning and deep learning models to classify transactions into different pools according to their sensitivity levels. Then, each pool is mapped to a specific part of the smart partitioned blockchain model. The parts can be permissioned or permissionless. The permissioned parts can have different sub-parts if needed. Consequently, the smart partitioned blockchain can be customized to meet application-field requirements. In the experimental results, we use bank and medical datasets with a predefined sensitivity threshold for classification accuracy in each system. The bank transactions are critical, whereas the classification of the medical dataset is speculative and less critical. The Random Forest model is used for bank-dataset classification, and its accuracy reaches 100%, whereas Sequential Deep Learning is used for the medical dataset, which reaches 91%. This means that all bank transactions are correctly mapped to the corresponding parts of the blockchain, whereas accuracy is lower for the medical dataset. However, acceptability is determined based on the predefined sensitivity threshold. Full article
Show Figures

Figure 1

18 pages, 6612 KiB  
Article
Investigation of Heat Transfer Performance in Deionized Water–Ethylene Glycol Binary Mixtures during Nucleate Pool Boiling
by Chen Xu, Jie Ren, Zuoqin Qian and Lumei Zhao
Processes 2024, 12(2), 368; https://doi.org/10.3390/pr12020368 - 10 Feb 2024
Cited by 2 | Viewed by 1716
Abstract
Pool boiling heat transfer is recognized as an exceptionally effective method, widely applied across various industries. The adoption of non-azeotropic binary mixtures aligns with the environmental objectives of modern industrial development and enhances the coefficient of performance (COP) in numerous systems. Therefore, investigating [...] Read more.
Pool boiling heat transfer is recognized as an exceptionally effective method, widely applied across various industries. The adoption of non-azeotropic binary mixtures aligns with the environmental objectives of modern industrial development and enhances the coefficient of performance (COP) in numerous systems. Therefore, investigating the boiling heat transfer characteristics of these mixtures is crucial to improving their industrial usability. In this study, mixtures of ethylene glycol and deionized water (EG/DW) in varying concentrations were chosen as the working fluids. A comprehensive experimental setup was developed, followed by a series of experiments to assess their pool boiling performance. Simultaneously, the thermophysical parameters of these mixtures underwent detailed examination and analysis. The research revealed that the concentration of EG in the mixture markedly affects its thermal properties and temperature glide, both of which are crucial in influencing the heat transfer coefficient. Additionally, six established heat transfer coefficient prediction correlations, primarily designed for pure fluids, have been employed. However, their application to non-azeotropic mixtures under experimental conditions revealed significant deviations. To address this issue, the present study modified existing correlations with the temperature slip characteristics of non-azeotropic mixtures. This process involved recalibrating the wall superheat values in the correlations to reflect the local temperature differential at the boiling point, thereby customizing them for application to non-azeotropic mixtures. The modified correlations highlighted the unique behaviors of non-azeotropic mixtures in boiling heat transfer, demonstrating improved compatibility with these mixtures in a deviation within a permissible 20% range compared with experimental results. Full article
(This article belongs to the Topic Applied Heat Transfer)
Show Figures

Figure 1

23 pages, 660 KiB  
Article
A Reference Design Model to Manage Consent in Data Subjects-Centered Internet of Things Devices
by Pankaj Khatiwada, Bian Yang, Jia-Chun Lin, Godfrey Mugurusi and Stian Underbekken
IoT 2024, 5(1), 100-122; https://doi.org/10.3390/iot5010006 - 6 Feb 2024
Cited by 1 | Viewed by 3293
Abstract
Internet of Things (IoT) devices have changed how billions of people in the world connect and interact with each other. But, as more people use IoT devices, many questions arise about how these devices handle private data and whether they properly ask for [...] Read more.
Internet of Things (IoT) devices have changed how billions of people in the world connect and interact with each other. But, as more people use IoT devices, many questions arise about how these devices handle private data and whether they properly ask for permission when using it. Due to information privacy regulations such as the EU’s General Data Protection Regulation (GDPR), which requires companies to seek permission from data subjects (DS) before using their data, it is crucial for IoT companies to obtain this permission correctly. However, this can be really challenging in the IoT world because people often find it difficult to interact with and manage multiple IoT devices under their control. Also, the rules about privacy are not always clear. As such, this paper proposes a new model to improve how consent is managed in the world of IoT. The model seeks to minimize “consent fatigue” (when people get tired of always being asked for permission) and give DS more control over how their data are shared. This includes having default permission settings, being able to compare similar devices, and, in the future, using AI to give personalized advice. The model allows users to easily review and change their IoT device permissions if previous conditions are not met. It also emphasizes the need for easily understandable privacy rules, clear communication with users, and robust tracking of consent for data usage. By using this model, companies that provide IoT services can do a better job of protecting user privacy and managing DS consent. In addition, companies can more easily comply with data protection laws and build stronger relationships with their customers. Full article
Show Figures

Figure 1

17 pages, 4661 KiB  
Article
Vehicle to Everything (V2X) and Edge Computing: A Secure Lifecycle for UAV-Assisted Vehicle Network and Offloading with Blockchain
by Abdullah Ayub Khan, Asif Ali Laghari, Muhammad Shafiq, Shafique Ahmed Awan and Zhaoquan Gu
Drones 2022, 6(12), 377; https://doi.org/10.3390/drones6120377 - 25 Nov 2022
Cited by 34 | Viewed by 4804
Abstract
Due to globalization and advances in network technology, the Internet of Vehicles (IoV) with edge computing has gained increasingly more attention over the last few years. The technology provides a new paradigm to design interconnected distributed nodes in Unmanned Aerial Vehicle (UAV)-assisted vehicle [...] Read more.
Due to globalization and advances in network technology, the Internet of Vehicles (IoV) with edge computing has gained increasingly more attention over the last few years. The technology provides a new paradigm to design interconnected distributed nodes in Unmanned Aerial Vehicle (UAV)-assisted vehicle networks for communications between vehicles in smart cities. The process hierarchy of the current UAV-assisted networks is also becoming more multifaceted as more vehicles are connected, requiring accessing and exchanging information, performing tasks, and updating information securely. This poses serious issues and limitations to centralized UAV-assisted vehicle networks, directly affecting computing-intensive tasks and data offloading. This paper bridges these gaps by providing a novel, transparent, and secure lifecycle for UAV-assisted distributed vehicle communication using blockchain hyperledger technology. A modular infrastructure for Vehicle-to-Everything (V2X) is designed and ‘B-UV2X’, a blockchain hyperledger fabric-enabled distributed permissioned network-based consortium structure, is proposed. The participating nodes of the vehicle are interconnected with others in the chain of smart cities and exchange different information such as movement, etc., preserving operational logs on the blockchain-enabled immutable ledger. This automates IoV transactions over the proposed UAV-assisted vehicle-enabled consortium network with doppler spread. Thus, for this purpose, there are four different chain codes that are designed and deployed for IoV registration, adding new transactions, updating the ledger, monitoring resource management, and customized multi-consensus of proof-of-work. For lightweight IoV authentication, B-UV2X uses a two-way verification method with the defined hyperledger fabric consensus mechanism. Transaction protection from acquisition to deliverance and storage uses the NuCypher threshold proxy re-encryption mechanism. Simulation results for the proposed B-UV2X show a reduction in network consumption by 12.17% compared to a centralized network system, an increase in security features of up to 9.76%, and a reduction of 7.93% in the computational load for computed log storage. Full article
(This article belongs to the Special Issue UAV-Assisted Intelligent Vehicular Networks)
Show Figures

Figure 1

17 pages, 4236 KiB  
Article
Implementation of a Distributed Framework for Permissioned Blockchain-Based Secure Automotive Supply Chain Management
by Saima Zafar, Syed Faseeh Ul Hassan, AlSharef Mohammad, Ahmad Aziz Al-Ahmadi and Nasim Ullah
Sensors 2022, 22(19), 7367; https://doi.org/10.3390/s22197367 - 28 Sep 2022
Cited by 23 | Viewed by 4181
Abstract
An automotive supply chain includes a range of activities from the concept of the product to its final transfer to a customer and subsequent vehicle maintenance. The three distinct stages of this chain are production, sales, and maintenance. In many countries, automobile records [...] Read more.
An automotive supply chain includes a range of activities from the concept of the product to its final transfer to a customer and subsequent vehicle maintenance. The three distinct stages of this chain are production, sales, and maintenance. In many countries, automobile records are not available to the public and anyone who has access to the central database or government systems can tamper with these records. In addition, used vehicle maintenance and transfer histories remain unavailable or inaccessible. These issues can be overcome by incorporating state-of-the-art blockchain technology into automotive supply chain management. Blockchain technology uses a chain of blocks for distributed transfer and storage of information, creating a decentralized data register that makes records of any digital asset tamper-proof and transparent. In this paper, we implement a permissioned blockchain-based framework for secure and efficient supply chain management of the automobile industry. We employed Hyperledger Fabric; an enterprise-grade distributed ledger platform for developing solutions. In our solution, the blockchain is customized and private in order to ensure system security. We evaluated our system in terms of memory cost, monetary cost, and speed of execution. Our results demonstrate that only 346 MB of extra memory space is required for storing the automotive data of 1 million users, thus rendering the memory cost negligible. The monetary cost is insignificant as all open source blockchain resources are employed, and the speed of record update is also fast. Our results also show that the decentralization of the automotive supply chain using blockchain can implement system security with minor modifications in the established configuration of the web application database. Full article
Show Figures

Figure 1

17 pages, 5274 KiB  
Article
On the Design and Implementation of a Blockchain-Based Data Management System for ETO Manufacturing
by Zhengjun Jing, Niuping Hu, Yurong Song, Bo Song, Chunsheng Gu and Lei Pan
Appl. Sci. 2022, 12(18), 9184; https://doi.org/10.3390/app12189184 - 13 Sep 2022
Cited by 5 | Viewed by 2740
Abstract
Engineer-to-order (ETO) is a currently popular production model that can meet customers’ individual needs, for which the orders are primarily non-standard parts or small batches. This production model has caused many management challenges, including the difficulty of tracing the production process data of [...] Read more.
Engineer-to-order (ETO) is a currently popular production model that can meet customers’ individual needs, for which the orders are primarily non-standard parts or small batches. This production model has caused many management challenges, including the difficulty of tracing the production process data of products and the inability to monitor order status in real-time. In this paper, by analyzing the steps of ETO manufacturing and the business process between departments in the manufacturing industry, a blockchain-based process data management system (BPDMS) is proposed. The immutable nature of the blockchain data ensures the data’s validity and consistency in each production step. Furthermore, by embedding the sequential aggregate signature in the system, the sequence verification of discrete process steps can be completed in time. Finally, an electrical equipment assembly production platform is used to discuss the specific implementation on top of the Hyperledger Fabric, a permissioned blockchain. The experiment results show that the proposed system effectively manages the process data of ETO-type production, and the real-time querying of the production status of the orders. Full article
(This article belongs to the Special Issue Advances in Blockchain-enabled Internet of Things (IoT))
Show Figures

Figure 1

19 pages, 1900 KiB  
Article
A Method for In Situ Reverse Genetic Analysis of Proteins Involved mtDNA Replication
by Natalya Kozhukhar, Domenico Spadafora, Yelitza A. R. Rodriguez and Mikhail F. Alexeyev
Cells 2022, 11(14), 2168; https://doi.org/10.3390/cells11142168 - 11 Jul 2022
Cited by 11 | Viewed by 2687
Abstract
The unavailability of tractable reverse genetic analysis approaches represents an obstacle to a better understanding of mitochondrial DNA replication. Here, we used CRISPR-Cas9 mediated gene editing to establish the conditional viability of knockouts in the key proteins involved in mtDNA replication. This observation [...] Read more.
The unavailability of tractable reverse genetic analysis approaches represents an obstacle to a better understanding of mitochondrial DNA replication. Here, we used CRISPR-Cas9 mediated gene editing to establish the conditional viability of knockouts in the key proteins involved in mtDNA replication. This observation prompted us to develop a set of tools for reverse genetic analysis in situ, which we called the GeneSwap approach. The technique was validated by identifying 730 amino acid (aa) substitutions in the mature human TFAM that are conditionally permissive for mtDNA replication. We established that HMG domains of TFAM are functionally independent, which opens opportunities for engineering chimeric TFAMs with customized properties for studies on mtDNA replication, mitochondrial transcription, and respiratory chain function. Finally, we present evidence that the HMG2 domain plays the leading role in TFAM species-specificity, thus indicating a potential pathway for TFAM-mtDNA evolutionary co-adaptations. Full article
Show Figures

Graphical abstract

11 pages, 2924 KiB  
Article
A Secure Blockchain Framework for Storing Historical Text: A Case Study of the Holy Hadith
by Khaled M. Awad, Mustafa ElNainay, Mohammad Abdeen, Marwan Torki, Omar Saif and Emad Nabil
Computers 2022, 11(3), 42; https://doi.org/10.3390/computers11030042 - 14 Mar 2022
Cited by 1 | Viewed by 5971
Abstract
Historical texts are one of the main pillars for understanding current civilization and are used to reference different aspects. Hadiths are an example of one of the historical texts that should be securely preserved. Due to the expansion of the online resources, fabrications [...] Read more.
Historical texts are one of the main pillars for understanding current civilization and are used to reference different aspects. Hadiths are an example of one of the historical texts that should be securely preserved. Due to the expansion of the online resources, fabrications and alterations of fake Hadiths are easily feasible. Therefore, it has become more challenging to authenticate the online available Hadith contents and much harder to keep these authenticated results secure and unmanipulated. In this research, we are using the capabilities of the distributed blockchain technology to securely archive the Hadith and its level of authenticity in a blockchain. We selected a permissioned blockchain customized model in which the main entities approving the level of authenticity of the Hadith are well-established and specialized institutions in the main Islamic countries that can apply their own Hadith validation model. The proposed solution guarantees its integrity using the crowd wisdom represented in the selected nodes in the blockchain, which uses voting algorithms to decide the insertion of any new Hadiths into the database. This technique secures data integrity at any given time. If any organization’s credentials are compromised and used to update the data maliciously, 50% + 1 approval from the whole network nodes will be required. In case of any malicious or misguided information during the state of reaching consensus, the system will self-heal using practical Byzantine Fault Tolerance (pBFT). We evaluated the proposed framework’s read/write performance and found it adequate for the operational requirements. Full article
(This article belongs to the Section Blockchain Infrastructures and Enabled Applications)
Show Figures

Figure 1

20 pages, 1376 KiB  
Article
Three-Phase Feeder Load Balancing Based Optimized Neural Network Using Smart Meters
by Lina Alhmoud, Qosai Nawafleh and Waled Merrji
Symmetry 2021, 13(11), 2195; https://doi.org/10.3390/sym13112195 - 17 Nov 2021
Cited by 10 | Viewed by 4414
Abstract
The electricity distribution system is the coupling point between the utility and the end-user. Typically, these systems have unbalanced feeders due to the variety of customers’ behaviors. Some significant problems occur; the unbalanced loads increase the operational cost and system investment. In radial [...] Read more.
The electricity distribution system is the coupling point between the utility and the end-user. Typically, these systems have unbalanced feeders due to the variety of customers’ behaviors. Some significant problems occur; the unbalanced loads increase the operational cost and system investment. In radial distribution systems, swapping loads between the three phases is the most effective method for phase balancing. It is performed manually and subjected to load flow equations, capacity, and voltage constraints. Recently, due to smart grids and automated networks, dynamic phase balancing received more attention, thus swapping the loads between the three phases automatically when unbalance exceeds permissible limits by using a remote-controlled phase switch selector/controller. Automatic feeder reconfiguration and phase balancing eliminates the service interruption, enhances energy restoration, and minimize losses. In this paper, a case study from the Irbid district electricity company (IDECO) is presented. Optimal reconfiguration of phase balancing using three techniques: feed-forward back-propagation neural network (FFBPNN), radial basis function neural network (RBFNN), and a hybrid are proposed to control the switching sequence for each connected load. The comparison shows that the hybrid technique yields the best performance. This work is simulated using MATLAB and C programming language. Full article
(This article belongs to the Topic Dynamical Systems: Theory and Applications)
Show Figures

Figure 1

Back to TopTop