Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (756)

Search Parameters:
Keywords = data leak

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
25 pages, 2349 KiB  
Article
Development of a Method for Determining Password Formation Rules Using Neural Networks
by Leila Rzayeva, Alissa Ryzhova, Merei Zhaparkhanova, Ali Myrzatay, Olzhas Konakbayev, Abilkair Imanberdi, Yussuf Ahmed and Zhaksylyk Kozhakhmet
Information 2025, 16(8), 655; https://doi.org/10.3390/info16080655 (registering DOI) - 31 Jul 2025
Viewed by 250
Abstract
According to the latest Verizon DBIR report, credential abuse, including password reuse and human factors in password creation, remains the leading attack vector. It was revealed that most users change their passwords only when they forget them, and 35% of respondents find mandatory [...] Read more.
According to the latest Verizon DBIR report, credential abuse, including password reuse and human factors in password creation, remains the leading attack vector. It was revealed that most users change their passwords only when they forget them, and 35% of respondents find mandatory password rotation policies inconvenient. These findings highlight the importance of combining technical solutions with user-focused education to strengthen password security. In this research, the “human factor in the creation of usernames and passwords” is considered a vulnerability, as identifying the patterns or rules used by users in password generation can significantly reduce the number of possible combinations that attackers need to try in order to gain access to personal data. The proposed method based on an LSTM model operates at a character level, detecting recurrent structures and generating generalized masks that reflect the most common components in password creation. Open datasets of 31,000 compromised passwords from real-world leaks were used to train the model and it achieved over 90% test accuracy without signs of overfitting. A new method of evaluating the individual password creation habits of users and automatically fetching context-rich keywords from a user’s public web and social media footprint via a keyword-extraction algorithm is developed, and this approach is incorporated into a web application that allows clients to locally fine-tune an LSTM model locally, run it through ONNX, and carry out all inference on-device, ensuring complete data confidentiality and adherence to privacy regulations. Full article
Show Figures

Figure 1

17 pages, 529 KiB  
Article
Coping with Risk: The Three Spheres of Safety in Latin American Investigative Journalism
by Lucia Mesquita, Mathias Felipe de-Lima-Santos and Isabella Gonçalves
Journal. Media 2025, 6(3), 121; https://doi.org/10.3390/journalmedia6030121 - 29 Jul 2025
Viewed by 247
Abstract
Small news media organizations are increasingly reshaping the news media system in Latin America. They are stepping into the role of watchdogs by investigating issues such as corruption scandals that larger outlets sometimes overlook. However, this journalistic work exposes both journalists and their [...] Read more.
Small news media organizations are increasingly reshaping the news media system in Latin America. They are stepping into the role of watchdogs by investigating issues such as corruption scandals that larger outlets sometimes overlook. However, this journalistic work exposes both journalists and their organizations to a range of security threats, including physical violence, legal pressure, and digital attacks. In response, these outlets have developed coping strategies to manage and mitigate such risks. This article presents an exploratory study of the approaches adopted to protect information and data, ensure the safety and well-being of journalists, and maintain organizational continuity. Based on a series of in-depth interviews with leaders of award-winning news organizations for their investigative reporting, the study examines a shift from a competitive newsroom model to a collaborative approach in which information is shared—sometimes across borders—to support investigative reporting and strengthen security practices. We identify strategies implemented by small news organizations to safeguard their journalistic work and propose an integrative model of news safety encompassing the following three areas of security: physical, legal, and digital. This study contributes to the development of the newsafety framework and sheds light on safety practices that support media freedom. Full article
Show Figures

Figure 1

22 pages, 1156 KiB  
Article
An Attribute-Based Proxy Re-Encryption Scheme Supporting Revocable Access Control
by Gangzheng Zhao, Weijie Tan and Changgen Peng
Electronics 2025, 14(15), 2988; https://doi.org/10.3390/electronics14152988 - 26 Jul 2025
Viewed by 243
Abstract
In the deep integration process between digital infrastructure and new economic forms, structural imbalance between the evolution rate of cloud storage technology and the growth rate of data-sharing demands has caused systemic security vulnerabilities such as blurred data sovereignty boundaries and nonlinear surges [...] Read more.
In the deep integration process between digital infrastructure and new economic forms, structural imbalance between the evolution rate of cloud storage technology and the growth rate of data-sharing demands has caused systemic security vulnerabilities such as blurred data sovereignty boundaries and nonlinear surges in privacy leakage risks. Existing academic research indicates current proxy re-encryption schemes remain insufficient for cloud access control scenarios characterized by diversified user requirements and personalized permission management, thus failing to fulfill the security needs of emerging computing paradigms. To resolve these issues, a revocable attribute-based proxy re-encryption scheme supporting policy-hiding is proposed. Data owners encrypt data and upload it to the blockchain while concealing attribute values within attribute-based encryption access policies, effectively preventing sensitive information leaks and achieving fine-grained secure data sharing. Simultaneously, proxy re-encryption technology enables verifiable outsourcing of complex computations. Furthermore, the SM3 (SM3 Cryptographic Hash Algorithm) hash function is embedded in user private key generation, and key updates are executed using fresh random factors to revoke malicious users. Ultimately, the scheme proves indistinguishability under chosen-plaintext attacks for specific access structures in the standard model. Experimental simulations confirm that compared with existing schemes, this solution delivers higher execution efficiency in both encryption/decryption and revocation phases. Full article
(This article belongs to the Topic Recent Advances in Security, Privacy, and Trust)
Show Figures

Figure 1

13 pages, 748 KiB  
Systematic Review
Impact of Anastomotic Leak on Long-Term Survival After Gastrectomy: Results from an Individual Patient Data Meta-Analysis
by Matteo Calì, Davide Bona, Sara De Bernardi, Yoo Min Kim, Ping Li, Emad Aljohani, Giulia Bonavina, Gianluca Bonitta, Quan Wang, Antonio Biondi, Luigi Bonavina and Alberto Aiolfi
Cancers 2025, 17(15), 2471; https://doi.org/10.3390/cancers17152471 - 25 Jul 2025
Viewed by 333
Abstract
Background: Anastomotic leak (AL) is a serious complication after gastrectomy. It is associated with prolonged hospital stay, greater expenses, and increased risk for 90-day mortality. Currently, there is no consensus regarding the effect of AL on OS in patients with GC undergoing gastrectomy. [...] Read more.
Background: Anastomotic leak (AL) is a serious complication after gastrectomy. It is associated with prolonged hospital stay, greater expenses, and increased risk for 90-day mortality. Currently, there is no consensus regarding the effect of AL on OS in patients with GC undergoing gastrectomy. This study was designed to investigate the effect of AL on long-term survival after gastrectomy for gastric cancer. Methods: PubMed, Embase, Scopus, Google Scholar, and Cochrane Library were queried during the search process. The literature search started in January 2025 and was updated in May 2025. The studies analyzed the impact of AL on long-term survival, with the primary outcome being long-term overall survival. Pooled effect size measures included restricted mean survival time difference (RMSTD), hazard ratio (HR), and 95% confidence intervals (CIs). Results: Ten studies (11,862 patients) were included. Overall, 338 (2.9%) patients experienced AL. The RMSTD analysis indicates that at 12, 24, 36, 48, and 60 months, patients with AL tend to live 1.1, 3.1, 5.2, 8.1, and 10.6 months shorter, respectively, compared to those who did not develop AL. All results were statistically significant with p < 0.0001. The time-dependent HRs analysis for AL versus no AL shows a higher mortality hazard in patients with AL at 12 (HR 1.32, 95% CI 1.11–1.58), 24 (HR 1.61, 95% CI 1.34–1.92), 36 (HR 1.55, 95% CI 1.27–1.91), 48 months (HR 1.22, 95% CI 1.02–1.53), and 60 months (HR 0.79, 95% CI 0.59–1.10). Conclusions: This research appears to indicate a clinical impact of AL on long-term OS after gastrectomy. Patients experiencing AL appear to have an increased risk of mortality within the initial four years of follow-up. Full article
(This article belongs to the Section Clinical Research of Cancer)
Show Figures

Figure 1

16 pages, 803 KiB  
Article
Temporal Decline in Intravascular Albumin Mass and Its Association with Fluid Balance and Mortality in Sepsis: A Prospective Observational Study
by Christian J. Wiedermann, Arian Zaboli, Fabrizio Lucente, Lucia Filippi, Michael Maggi, Paolo Ferretto, Alessandro Cipriano, Antonio Voza, Lorenzo Ghiadoni and Gianni Turcato
J. Clin. Med. 2025, 14(15), 5255; https://doi.org/10.3390/jcm14155255 - 24 Jul 2025
Viewed by 372
Abstract
Background: Intravascular albumin mass represents the total quantity of albumin circulating within the bloodstream and may serve as a physiologically relevant marker of vascular integrity and fluid distribution in sepsis. While low serum albumin levels are acknowledged as prognostic indicators, dynamic assessments [...] Read more.
Background: Intravascular albumin mass represents the total quantity of albumin circulating within the bloodstream and may serve as a physiologically relevant marker of vascular integrity and fluid distribution in sepsis. While low serum albumin levels are acknowledged as prognostic indicators, dynamic assessments based on albumin mass remain insufficiently explored in patients outside the intensive care unit. Objectives: To describe the temporal changes in intravascular albumin mass in patients with community-acquired sepsis and to examine its relationship with fluid balance and thirty-day mortality. Methods: This prospective observational study encompassed 247 adults diagnosed with community-acquired sepsis who were admitted to a high-dependency hospital ward specializing in acute medical care. The intravascular albumin mass was calculated daily for a duration of up to five days, utilizing plasma albumin concentration and estimated plasma volume derived from anthropometric and hematologic data. Net albumin leakage was defined as the variation in intravascular albumin mass between consecutive days. Fluid administration and urine output were documented to ascertain cumulative fluid balance. Repeated-measures statistical models were employed to evaluate the associations between intravascular albumin mass, fluid balance, and mortality, with adjustments made for age, comorbidity, and clinical severity scores. Results: The intravascular albumin mass exhibited a significant decrease during the initial five days of hospitalization and demonstrated an inverse correlation with the cumulative fluid balance. A greater net leakage of albumin was associated with a positive fluid balance and elevated mortality rates. Furthermore, a reduced intravascular albumin mass independently predicted an increased risk of mortality at thirty days. Conclusions: A reduction in intravascular albumin mass may suggest ineffective fluid retention and the onset of capillary leak syndrome. This parameter holds promise as a clinically valuable, non-invasive indicator for guiding fluid resuscitation in cases of sepsis. Full article
(This article belongs to the Section Intensive Care)
Show Figures

Figure 1

20 pages, 3386 KiB  
Article
Evaluating Acoustic vs. AI-Based Satellite Leak Detection in Aging US Water Infrastructure: A Cost and Energy Savings Analysis
by Prashant Nagapurkar, Naushita Sharma, Susana Garcia and Sachin Nimbalkar
Smart Cities 2025, 8(4), 122; https://doi.org/10.3390/smartcities8040122 - 22 Jul 2025
Viewed by 415
Abstract
The aging water distribution system in the United States, constructed mainly during the 1970s with some pipes dating back 125 years, is experiencing significant deterioration leading to substantial water losses. Along with the potential for water loss savings, improvements in the distribution system [...] Read more.
The aging water distribution system in the United States, constructed mainly during the 1970s with some pipes dating back 125 years, is experiencing significant deterioration leading to substantial water losses. Along with the potential for water loss savings, improvements in the distribution system by using leak detection technologies can create net energy and cost savings. In this work, a new framework has been presented to calculate the economic level of leakage within water supply and distribution systems for two primary leak detection technologies (acoustic vs. satellite). In this work, a new framework is presented to calculate the economic level of leakage (ELL) within water supply and distribution systems to support smart infrastructure in smart cities. A case study focused using water audit data from Atlanta, Georgia, compared the costs of two leak mitigation technologies: conventional acoustic leak detection and artificial intelligence–assisted satellite leak detection technology, which employs machine learning algorithms to identify potential leak signatures from satellite imagery. The ELL results revealed that conducting one survey would be optimum for an acoustic survey, whereas the method suggested that it would be expensive to utilize satellite-based leak detection technology. However, results for cumulative financial analysis over a 3-year period for both technologies revealed both to be economically favorable with conventional acoustic leak detection technology generating higher net economic benefits of USD 2.4 million, surpassing satellite detection by 50%. A broader national analysis was conducted to explore the potential benefits of US water infrastructure mirroring the exemplary conditions of Germany and The Netherlands. Achieving similar infrastructure leakage index (ILI) values could result in annual cost savings of $4–$4.8 billion and primary energy savings of 1.6–1.9 TWh. These results demonstrate the value of combining economic modeling with advanced leak detection technologies to support sustainable, cost-efficient water infrastructure strategies in urban environments, contributing to more sustainable smart living outcomes. Full article
Show Figures

Figure 1

19 pages, 626 KiB  
Article
A Strong Anonymous Privacy Protection Authentication Scheme Based on Certificateless IOVs
by Xiaohu He, Shan Gao, Hua Wang and Chuyan Wang
Symmetry 2025, 17(7), 1163; https://doi.org/10.3390/sym17071163 - 21 Jul 2025
Viewed by 162
Abstract
The Internet of Vehicles (IoVs) uses vehicles as the main carrier to communicate with other entities, promoting efficient transmission and sharing of traffic data. Using real identities for communication may leak private data, so pseudonyms are commonly used as identity credentials. However, existing [...] Read more.
The Internet of Vehicles (IoVs) uses vehicles as the main carrier to communicate with other entities, promoting efficient transmission and sharing of traffic data. Using real identities for communication may leak private data, so pseudonyms are commonly used as identity credentials. However, existing anonymous authentication schemes have limitations, including large vehicle storage demands, information redundancy, time-dependent pseudonym updates, and public–private key updates coupled with pseudonym changes. To address these issues, we propose a certificateless strong anonymous privacy protection authentication scheme that allows vehicles to autonomously generate and dynamically update pseudonyms. Additionally, the trusted authority transmits each entity’s partial private key via a session key, eliminating reliance on secure channels during transmission. Based on the elliptic curve discrete logarithm problem, the scheme’s existential unforgeability is proven in the random oracle model. Performance analysis shows that it outperforms existing schemes in computational cost and communication overhead, with the total computational cost reduced by 70.29–91.18% and communication overhead reduced by 27.75–82.55%, making it more suitable for privacy-sensitive and delay-critical IoV environments. Full article
(This article belongs to the Special Issue Applications Based on Symmetry in Applied Cryptography)
Show Figures

Figure 1

18 pages, 2960 KiB  
Article
Early Leak and Burst Detection in Water Pipeline Networks Using Machine Learning Approaches
by Kiran Joseph, Jyoti Shetty, Rahul Patnaik, Noel S. Matthew, Rudi Van Staden, Wasantha P. Liyanage, Grant Powell, Nathan Bennett and Ashok K. Sharma
Water 2025, 17(14), 2164; https://doi.org/10.3390/w17142164 - 21 Jul 2025
Viewed by 454
Abstract
Leakages in water distribution networks pose a formidable challenge, often leading to substantial water wastage and escalating operational costs. Traditional methods for leak detection often fall short, particularly when dealing with complex or subtle data patterns. To address this, a comprehensive comparison of [...] Read more.
Leakages in water distribution networks pose a formidable challenge, often leading to substantial water wastage and escalating operational costs. Traditional methods for leak detection often fall short, particularly when dealing with complex or subtle data patterns. To address this, a comprehensive comparison of fourteen machine learning algorithms was conducted, with evaluation based on key performance metrics such as multi-class classification metrics, micro and macro averages, accuracy, precision, recall, and F1-score. The data, collected from an experimental site under leak, major leak, and no-leak scenarios, was used to perform multi-class classification. The results highlight the superiority of models such as Random Forest, K-Nearest Neighbours, and Decision Tree in detecting leaks with high accuracy and robustness. Multiple models effectively captured the nuances in the data and accurately predicted the presence of a leak, burst, or no leak, thus automating leak detection and contributing to water conservation efforts. This research demonstrates the practical benefits of applying machine learning models in water distribution systems, offering scalable solutions for real-time leak detection. Furthermore, it emphasises the role of machine learning in modernising infrastructure management, reducing water losses, and promoting the sustainability of water resources, while laying the groundwork for future advancements in predictive maintenance and resilience of water infrastructure. Full article
(This article belongs to the Special Issue Urban Water Resources: Sustainable Management and Policy Needs)
Show Figures

Figure 1

22 pages, 7778 KiB  
Article
Gas Leak Detection and Leakage Rate Identification in Underground Utility Tunnels Using a Convolutional Recurrent Neural Network
by Ziyang Jiang, Canghai Zhang, Zhao Xu and Wenbin Song
Appl. Sci. 2025, 15(14), 8022; https://doi.org/10.3390/app15148022 - 18 Jul 2025
Viewed by 272
Abstract
An underground utility tunnel (UUT) is essential for the efficient use of urban underground space. However, current maintenance systems rely on patrol personnel and professional equipment. This study explores industrial detection methods for identifying and monitoring natural gas leaks in UUTs. Via infrared [...] Read more.
An underground utility tunnel (UUT) is essential for the efficient use of urban underground space. However, current maintenance systems rely on patrol personnel and professional equipment. This study explores industrial detection methods for identifying and monitoring natural gas leaks in UUTs. Via infrared thermal imaging gas experiments, data were acquired and a dataset established. To address the low-resolution problem of existing imaging devices, video super-resolution (VSR) was used to improve the data quality. Based on a convolutional recurrent neural network (CRNN), the image features at each moment were extracted, and the time series data were modeled to realize the risk-level classification mechanism based on the automatic classification of the leakage rate. The experimental results show that when the sliding window size was set to 10 frames, the classification accuracy of the CRNN was the highest, which could reach 0.98. This method improves early warning precision and response efficiency, offering practical technical support for UUT maintenance management. Full article
(This article belongs to the Special Issue Applications of Artificial Intelligence in Industrial Engineering)
Show Figures

Figure 1

39 pages, 784 KiB  
Review
A Review of Research on Secure Aggregation for Federated Learning
by Xing Zhang, Yuexiang Luo and Tianning Li
Future Internet 2025, 17(7), 308; https://doi.org/10.3390/fi17070308 - 17 Jul 2025
Viewed by 376
Abstract
Federated learning (FL) is an advanced distributed machine learning method that effectively solves the data silo problem. With the increasing popularity of federated learning and the growing importance of privacy protection, federated learning methods that can securely aggregate models have received widespread attention. [...] Read more.
Federated learning (FL) is an advanced distributed machine learning method that effectively solves the data silo problem. With the increasing popularity of federated learning and the growing importance of privacy protection, federated learning methods that can securely aggregate models have received widespread attention. Federated learning enables clients to train models locally and share their model updates with the server. While this approach allows collaborative model training without exposing raw data, it still risks leaking sensitive information. To enhance privacy protection in federated learning, secure aggregation is considered a key enabling technology that requires further in-depth investigation. This paper summarizes the definition, classification, and applications of federated learning; reviews secure aggregation protocols proposed to address privacy and security issues in federated learning; extensively analyzes the selected protocols; and concludes by highlighting the significant challenges and future research directions in applying secure aggregation in federated learning. The purpose of this paper is to review and analyze prior research, evaluate the advantages and disadvantages of various secure aggregation schemes, and propose potential future research directions. This work aims to serve as a valuable reference for researchers studying secure aggregation in federated learning. Full article
Show Figures

Figure 1

17 pages, 583 KiB  
Article
Cross-Domain Feature Enhancement-Based Password Guessing Method for Small Samples
by Cheng Liu, Junrong Li, Xiheng Liu, Bo Li, Mengsu Hou, Wei Yu, Yujun Li and Wenjun Liu
Entropy 2025, 27(7), 752; https://doi.org/10.3390/e27070752 - 15 Jul 2025
Viewed by 222
Abstract
As a crucial component of account protection system evaluation and intrusion detection, the advancement of password guessing technology encounters challenges due to its reliance on password data. In password guessing research, there is a conflict between the traditional models’ need for large training [...] Read more.
As a crucial component of account protection system evaluation and intrusion detection, the advancement of password guessing technology encounters challenges due to its reliance on password data. In password guessing research, there is a conflict between the traditional models’ need for large training samples and the limitations on accessing password data imposed by privacy protection regulations. Consequently, security researchers often struggle with the issue of having a very limited password set from which to guess. This paper introduces a small-sample password guessing technique that enhances cross-domain features. It analyzes the password set using probabilistic context-free grammar (PCFG) to create a list of password structure probabilities and a dictionary of password fragment probabilities, which are then used to generate a password set structure vector. The method calculates the cosine similarity between the small-sample password set B from the target area and publicly leaked password sets Ai using the structure vector, identifying the set Amax with the highest similarity. This set is then utilized as a training set, where the features of the small-sample password set are enhanced by modifying the structure vectors of the training set. The enhanced training set is subsequently employed for PCFG password generation. The paper uses hit rate as the evaluation metric, and Experiment I reveals that the similarity between B and Ai can be reliably measured when the size of B exceeds 150. Experiment II confirms the hypothesis that a higher similarity between Ai and B leads to a greater hit rate of Ai on the test set of B, with potential improvements of up to 32% compared to training with B alone. Experiment III demonstrates that after enhancing the features of Amax, the hit rate for the small-sample password set can increase by as much as 10.52% compared to previous results. This method offers a viable solution for small-sample password guessing without requiring prior knowledge. Full article
(This article belongs to the Section Information Theory, Probability and Statistics)
Show Figures

Figure 1

21 pages, 17071 KiB  
Article
Elevation Models, Shadows, and Infrared: Integrating Datasets for Thermographic Leak Detection
by Loran Call, Remington Dasher, Ying Xu, Andy W. Johnson, Zhongwang Dou and Michael Shafer
Remote Sens. 2025, 17(14), 2399; https://doi.org/10.3390/rs17142399 - 11 Jul 2025
Viewed by 318
Abstract
Underground cast-in-place pipes (CIPP, Diameter of 2–5) are used to transport water for the Phoenix, AZ area. These pipes have developed leaks due to their age and changes in the environment, resulting in a significant waste of water. Currently, [...] Read more.
Underground cast-in-place pipes (CIPP, Diameter of 2–5) are used to transport water for the Phoenix, AZ area. These pipes have developed leaks due to their age and changes in the environment, resulting in a significant waste of water. Currently, leaks can only be identified when water pools above ground occur and are then manually confirmed through the inside of the pipe, requiring the shutdown of the water system. However, many leaks may not develop a puddle of water, making them even harder to identify. The primary objective of this research was to develop an inspection method utilizing drone-based infrared imagery to remotely and non-invasively sense thermal signatures of abnormal soil moisture underneath urban surface treatments caused by the leakage of water pipelines during the regular operation of water transportation. During the field tests, five known leak sites were evaluated using an intensive experimental procedure that involved conducting multiple flights at each test site and a stringent filtration process for the measured temperature data. A detectable thermal signal was observed at four of the five known leak sites, and these abnormal thermal signals directly overlapped with the location of the known leaks provided by the utility company. A strong correlation between ground temperature and shading before sunset was observed in the temperature data collected at night. Thus, a shadow and solar energy model was implemented to estimate the position of shadows and energy flux at given times based on the elevation of the surrounding structures. Data fusion between the metrics of shadow time, solar energy, and the temperature profile was utilized to filter the existing points of interest further. When shadows and solar energy were considered, the final detection rate of drone-based infrared imaging was determined to be 60%. Full article
(This article belongs to the Section Urban Remote Sensing)
Show Figures

Graphical abstract

12 pages, 486 KiB  
Article
Five-Year Retrospective Analysis of Traumatic and Non-Traumatic Pneumothorax in 2797 Patients
by Ayhan Tabur and Alper Tabur
Healthcare 2025, 13(14), 1660; https://doi.org/10.3390/healthcare13141660 - 10 Jul 2025
Viewed by 324
Abstract
Objectives: Pneumothorax is a critical condition frequently encountered in emergency departments (EDs), with spontaneous pneumothorax (SP) and traumatic pneumothorax (TP) presenting distinct clinical challenges. This study aimed to evaluate the epidemiological characteristics, clinical outcomes, and treatment strategies for SP and TP across different [...] Read more.
Objectives: Pneumothorax is a critical condition frequently encountered in emergency departments (EDs), with spontaneous pneumothorax (SP) and traumatic pneumothorax (TP) presenting distinct clinical challenges. This study aimed to evaluate the epidemiological characteristics, clinical outcomes, and treatment strategies for SP and TP across different age groups and provide insights for optimizing emergency management protocols. Methods: This retrospective cohort study analyzed 2797 cases of pneumothorax over five years (2018–2023) at a tertiary care center. Patients were stratified by age (18–39, 40–64, and >65 years) and pneumothorax type (SP vs. TP). Data on demographics, clinical presentation, treatment, hospital stay, recurrence, and complications were extracted from medical records. Comparative statistical analyses were also conducted. Results: The mean age of patients with SP was 32.5 ± 14.7 years, whereas patients with TP were older (37.8 ± 16.2 years, p < 0.001). Male predominance was observed in both groups: 2085 (87.0%) in the SP group and 368 (92.0%) in the TP group (p = 0.01). The right lung was more frequently affected in the SP (64.2%) and TP (56.0%) groups (p < 0.001). Age-related differences were evident in both groups of patients. In the SP group, younger patients (18–39 years) represented the majority of cases, whereas older patients (≥65 years) were more likely to present with SSP and required more invasive management (p < 0.01). In the TP group, younger patients often had pneumothorax due to high-energy trauma, whereas older individuals developed pneumothorax due to falls or iatrogenic causes (p < 0.01). SP predominantly affected younger patients, with a history of smoking and male predominance associated with younger age (p < 0.01). TP is more frequent in older patients, often because of falls or iatrogenic injuries. Management strategies varied by age group; younger patients were often managed conservatively, whereas older patients underwent more invasive procedures (p < 0.01). Surgical intervention was more common in younger patients in the TP group, whereas conservative management was more frequent in elderly patients (p < 0.01). The clinical outcomes differed significantly, with older patients having longer hospital stays and higher rates of persistent air leaks (p < 0.01). Recurrence was more common in younger patients with SP, whereas TP recurrence rates were lower across all age groups (p < 0.01). No significant differences were observed in re-expansion pulmonary edema, empyema, or mortality rates between the age groups, suggesting that age alone was not an independent predictor of these complications when adjusted for pneumothorax severity and management strategy (p = 0.22). Conclusions: Age, pneumothorax subtype, and underlying pulmonary comorbidities were identified as key predictors of clinical outcomes. Advanced age, secondary spontaneous pneumothorax, and COPD were independently associated with recurrence, prolonged hospitalization, and in-hospital mortality, respectively. These findings highlight the need for risk-adapted management strategies to improve triaging and treatment decisions for spontaneous and traumatic pneumothorax. Full article
Show Figures

Figure 1

27 pages, 8871 KiB  
Article
Towards a Realistic Data-Driven Leak Localization in Water Distribution Networks
by Arvin Ajoodani, Sara Nazif and Pouria Ramazi
Water 2025, 17(13), 1988; https://doi.org/10.3390/w17131988 - 2 Jul 2025
Viewed by 332
Abstract
Current data-driven methods for leak localization (LL) in water distribution networks (WDNs) rely on two unrealistic assumptions: they frame LL as a node-classification task, requiring leak examples for every node—which rarely exists in practice—and they validate models using random data splits, ignoring the [...] Read more.
Current data-driven methods for leak localization (LL) in water distribution networks (WDNs) rely on two unrealistic assumptions: they frame LL as a node-classification task, requiring leak examples for every node—which rarely exists in practice—and they validate models using random data splits, ignoring the temporal structure inherent in hydraulic time-series data. To address these limitations, we propose a temporal, regression-based alternative that directly predicts the leak coordinates, training exclusively on past observations and evaluating performance strictly on future data. By comparing five machine-learning techniques—k-nearest neighbors, linear regression, decision trees, support vector machines, and multilayer perceptrons—in both classification and regression modes, and using both random and temporal splits, we show that conventional evaluation methods can misleadingly inflate model accuracy by up to four-fold. Our results highlight the importance and suitability of a temporally consistent, regression-based approach for realistic and reliable leak localization in WDNs. Full article
(This article belongs to the Special Issue Sustainable Management of Water Distribution Systems)
Show Figures

Figure 1

17 pages, 463 KiB  
Review
PDE9A Promotes Calcium-Handling Dysfunction in Right Heart Failure via cGMP–PKG Pathway Suppression: A Mechanistic and Therapeutic Review
by Spencer Thatcher, Arbab Khalid, Abu-Bakr Ahmed, Randeep Gill and Ali Kia
Int. J. Mol. Sci. 2025, 26(13), 6361; https://doi.org/10.3390/ijms26136361 - 1 Jul 2025
Viewed by 414
Abstract
Right heart failure (RHF) is a major cause of morbidity and mortality, often resulting from pulmonary arterial hypertension and characterized by impaired calcium (Ca2+) handling and maladaptive remodeling. Phosphodiesterase 9A (PDE9A), a cGMP-specific phosphodiesterase, has been proposed as a potential contributor [...] Read more.
Right heart failure (RHF) is a major cause of morbidity and mortality, often resulting from pulmonary arterial hypertension and characterized by impaired calcium (Ca2+) handling and maladaptive remodeling. Phosphodiesterase 9A (PDE9A), a cGMP-specific phosphodiesterase, has been proposed as a potential contributor to RHF pathogenesis by suppressing the cardioprotective cGMP–PKG signaling pathway—a conclusion largely extrapolated from left-sided heart failure models. This review examines existing evidence regarding PDE9A’s role in RHF, focusing on its effects on intracellular calcium cycling, fibrosis, hypertrophy, and contractile dysfunction. Data from preclinical models demonstrate that pathological stress upregulates PDE9A expression in cardiomyocytes, leading to diminished PKG activation, impaired SERCA2a function, RyR2 instability, and increased arrhythmogenic Ca2+ leak. Pharmacological or genetic inhibition of PDE9A restores cGMP signaling, improves calcium handling, attenuates hypertrophic and fibrotic remodeling, and enhances ventricular compliance. Early-phase clinical studies in heart failure populations suggest that PDE9A inhibitors are well tolerated and effectively augment cGMP levels, although dedicated trials in RHF are still needed. Overall, these findings indicate that targeting PDE9A may represent a promising therapeutic strategy to improve outcomes in RHF by directly addressing the molecular mechanisms underlying calcium mishandling and myocardial remodeling. Full article
(This article belongs to the Special Issue Editorial Board Members’ Collection Series: "Enzyme Inhibition")
Show Figures

Figure 1

Back to TopTop