Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (883)

Search Parameters:
Keywords = information management protocol

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
21 pages, 2746 KiB  
Article
The Social Side of Internet of Things: Introducing Trust-Augmented Social Strengths for IoT Service Composition
by Jooik Jung and Ihnsik Weon
Sensors 2025, 25(15), 4794; https://doi.org/10.3390/s25154794 - 4 Aug 2025
Abstract
The integration of Internet of Things (IoT) systems with social networking concepts has opened new business and social opportunities, particularly by allowing smart objects to autonomously establish social relationships with each other and exchange information. However, these relations must be properly quantified and [...] Read more.
The integration of Internet of Things (IoT) systems with social networking concepts has opened new business and social opportunities, particularly by allowing smart objects to autonomously establish social relationships with each other and exchange information. However, these relations must be properly quantified and integrated with trust in order to proliferate the provisioning of IoT composite services. Therefore, this proposed work focuses on quantitatively computing social strength and trust among smart objects in IoT for the purpose of aiding efficient service composition with reasonable accuracy. In particular, we propose a trust-augmented social strength (TASS) management protocol that can cope with the heterogeneity of IoT and demonstrate high scalability and resiliency against various malicious attacks. Afterward, we show how the TASS measurements can be applied to service planning in IoT service composition. Based on the experimental results, we conclude that the proposed protocol is, in fact, capable of exhibiting the above-mentioned characteristics in real-world settings. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

12 pages, 278 KiB  
Article
A Series of Severe and Critical COVID-19 Cases in Hospitalized, Unvaccinated Children: Clinical Findings and Hospital Care
by Vânia Chagas da Costa, Ulisses Ramos Montarroyos, Katiuscia Araújo de Miranda Lopes and Ana Célia Oliveira dos Santos
Epidemiologia 2025, 6(3), 40; https://doi.org/10.3390/epidemiologia6030040 - 4 Aug 2025
Abstract
Background/Objective: The COVID-19 pandemic profoundly transformed social life worldwide, indiscriminately affecting individuals across all age groups. Children have not been exempted from the risk of severe illness and death caused by COVID-19. Objective: This paper sought to describe the clinical findings, laboratory and [...] Read more.
Background/Objective: The COVID-19 pandemic profoundly transformed social life worldwide, indiscriminately affecting individuals across all age groups. Children have not been exempted from the risk of severe illness and death caused by COVID-19. Objective: This paper sought to describe the clinical findings, laboratory and imaging results, and hospital care provided for severe and critical cases of COVID-19 in unvaccinated children, with or without severe asthma, hospitalized in a public referral service for COVID-19 treatment in the Brazilian state of Pernambuco. Methods: This was a case series study of severe and critical COVID-19 in hospitalized, unvaccinated children, with or without severe asthma, conducted in a public referral hospital between March 2020 and June 2021. Results: The case series included 80 children, aged from 1 month to 11 years, with the highest frequency among those under 2 years old (58.8%) and a predominance of males (65%). Respiratory diseases, including severe asthma, were present in 73.8% of the cases. Pediatric multisystem inflammatory syndrome occurred in 15% of the children, some of whom presented with cardiac involvement. Oxygen therapy was required in 65% of the cases, mechanical ventilation in 15%, and 33.7% of the children required intensive care in a pediatric intensive care unit. Pulmonary infiltrates and ground-glass opacities were common findings on chest X-rays and CT scans; inflammatory markers were elevated, and the most commonly used medications were antibiotics, bronchodilators, and corticosteroids. Conclusions: This case series has identified key characteristics of children with severe and critical COVID-19 during a period when vaccines were not yet available in Brazil for the study age group. However, the persistence of low vaccination coverage, largely due to parental vaccine hesitancy, continues to leave children vulnerable to potentially severe illness from COVID-19. These findings may inform the development of public health emergency contingency plans, as well as clinical protocols and care pathways, which can guide decision-making in pediatric care and ensure appropriate clinical management, ultimately improving the quality of care provided. Full article
24 pages, 1294 KiB  
Article
Confidential Smart Contracts and Blockchain to Implement a Watermarking Protocol
by Franco Frattolillo
Future Internet 2025, 17(8), 352; https://doi.org/10.3390/fi17080352 - 1 Aug 2025
Viewed by 109
Abstract
Watermarking protocols represent a possible solution to the problem of digital copyright protection of content distributed on the Internet. Their implementations, however, continue to be a complex problem due to the difficulties researchers encounter in proposing secure, easy-to-use and, at the same time, [...] Read more.
Watermarking protocols represent a possible solution to the problem of digital copyright protection of content distributed on the Internet. Their implementations, however, continue to be a complex problem due to the difficulties researchers encounter in proposing secure, easy-to-use and, at the same time, “trusted third parties” (TTPs)-free solutions. In this regard, implementations based on blockchain and smart contracts are among the most advanced and promising, even if they are affected by problems regarding the performance and privacy of the information exchanged and processed by smart contracts and managed by blockchains. This paper presents a watermarking protocol implemented by smart contracts and blockchain. The protocol uses a “layer-2” blockchain execution model and performs the computation in “trusted execution environments” (TEEs). Therefore, its implementation can guarantee efficient and confidential execution without compromising ease of use or resorting to TTPs. The protocol and its implementation can, thus, be considered a valid answer to the “trilemma” that afflicts the use of blockchains, managing to guarantee decentralization, security, and scalability. Full article
Show Figures

Figure 1

19 pages, 1072 KiB  
Article
Efficient and Reliable Identification of Probabilistic Cloning Attacks in Large-Scale RFID Systems
by Chu Chu, Rui Wang, Nanbing Deng and Gang Li
Micromachines 2025, 16(8), 894; https://doi.org/10.3390/mi16080894 (registering DOI) - 31 Jul 2025
Viewed by 152
Abstract
Radio Frequency Identification (RFID) technology is widely applied in various scenarios, including logistics tracking, supply chain management, and target monitoring. In these contexts, the malicious cloning of legitimate tag information can lead to sensitive data leakage and disrupt the normal acquisition of tag [...] Read more.
Radio Frequency Identification (RFID) technology is widely applied in various scenarios, including logistics tracking, supply chain management, and target monitoring. In these contexts, the malicious cloning of legitimate tag information can lead to sensitive data leakage and disrupt the normal acquisition of tag information by readers, thereby threatening personal privacy and corporate security and incurring significant economic losses. Although some efforts have been made to detect cloning attacks, the presence of missing tags in RFID systems can obscure cloned ones, resulting in a significant reduction in identification efficiency and accuracy. To address these problems, we propose the block-based cloned tag identification (BCTI) protocol for identifying cloning attacks in the presence of missing tags. First, we introduce a block indicator to sort all tags systematically and design a block mechanism that enables tags to respond repeatedly within a block with minimal time overhead. Then, we design a superposition strategy to further reduce the number of verification times, thereby decreasing the execution overhead. Through an in-depth analysis of potential tag response patterns, we develop a precise method to identify cloning attacks and mitigate interference from missing tags in probabilistic cloning attack scenarios. Moreover, we perform parameter optimization of the BCTI protocol and validate its performance across diverse operational scenarios. Extensive simulation results demonstrate that the BCTI protocol meets the required identification reliability threshold and achieves an average improvement of 24.01% in identification efficiency compared to state-of-the-art solutions. Full article
Show Figures

Figure 1

16 pages, 1920 KiB  
Review
Time-Restricted Eating Improves Glycemic Control in Patients with Type 2 Diabetes: A Meta-Analysis and Systematic Review
by Taegwang Nam, Hyeongbin Oh, Anna Kim and Yongtaek Oh
Int. J. Mol. Sci. 2025, 26(15), 7310; https://doi.org/10.3390/ijms26157310 - 29 Jul 2025
Viewed by 593
Abstract
Time-restricted eating (TRE), a dietary strategy that aligns food intake with circadian rhythms, has emerged as a promising non-pharmacological approach for improving glycemic control in patients with type 2 diabetes. This systematic review and meta-analysis evaluated the effects of TRE on glycemic outcomes [...] Read more.
Time-restricted eating (TRE), a dietary strategy that aligns food intake with circadian rhythms, has emerged as a promising non-pharmacological approach for improving glycemic control in patients with type 2 diabetes. This systematic review and meta-analysis evaluated the effects of TRE on glycemic outcomes by analyzing eight randomized controlled trials involving 312 participants with type 2 diabetes or impaired fasting glucose. Meta-analyses of six eligible studies demonstrated that TRE significantly reduced fasting glucose (mean difference [MD]: −0.74 mmol/L; 95% CI: −1.13 to −0.36) and glycated hemoglobin (ΔHbA1c) (MD: −0.11%; 95% CI: −0.15 to −0.07) and increased time in range (TIR) for blood glucose (MD: +10.51%; 95% CI: 6.81 to 14.21). Improvements in fasting glucose and HbA1c were modest but consistent, while the increase in TIR showed no between-study heterogeneity, suggesting a robust and reproducible benefit of TRE on glycemic stability. These findings support the clinical feasibility and effectiveness of TRE as a dietary intervention in diabetes management. However, further high-quality trials with standardized protocols and longer follow-up are needed to confirm long-term efficacy and inform guidelines. Full article
Show Figures

Figure 1

25 pages, 10205 KiB  
Article
RTLS-Enabled Bidirectional Alert System for Proximity Risk Mitigation in Tunnel Environments
by Fatima Afzal, Farhad Ullah Khan, Ayaz Ahmad Khan, Ruchini Jayasinghe and Numan Khan
Buildings 2025, 15(15), 2667; https://doi.org/10.3390/buildings15152667 - 28 Jul 2025
Viewed by 256
Abstract
Tunnel construction poses significant safety challenges due to confined spaces, limited visibility, and the dynamic movement of labourers and machinery. This study addresses a critical gap in real-time, bidirectional proximity monitoring by developing and validating a prototype early-warning system that integrates real-time location [...] Read more.
Tunnel construction poses significant safety challenges due to confined spaces, limited visibility, and the dynamic movement of labourers and machinery. This study addresses a critical gap in real-time, bidirectional proximity monitoring by developing and validating a prototype early-warning system that integrates real-time location systems (RTLS) with long-range (LoRa) wireless communication and ultra-wideband (UWB) positioning. The system comprises Arduino nano microcontrollers, organic light-emitting diode (OLED) displays, and piezo buzzers to detect and signal proximity breaches between workers and equipment. Using an action research approach, three pilot case studies were conducted in a simulated tunnel environment to test the system’s effectiveness in both static and dynamic risk scenarios. The results showed that the system accurately tracked proximity and generated timely alerts when safety thresholds were crossed, although minor delays of 5–8 s and slight positional inaccuracies were noted. These findings confirm the system’s capacity to enhance situational awareness and reduce reliance on manual safety protocols. The study contributes to the tunnel safety literature by demonstrating the feasibility of low-cost, real-time monitoring solutions that simultaneously track labour and machinery. The proposed RTLS framework offers practical value for safety managers and informs future research into automated safety systems in complex construction environments. Full article
(This article belongs to the Special Issue AI in Construction: Automation, Optimization, and Safety)
Show Figures

Figure 1

33 pages, 1238 KiB  
Article
Crisis Response Modes in Collaborative Business Ecosystems: A Mathematical Framework from Plasticity to Antifragility
by Javaneh Ramezani, Luis Gomes and Paula Graça
Mathematics 2025, 13(15), 2421; https://doi.org/10.3390/math13152421 - 27 Jul 2025
Viewed by 387
Abstract
Collaborative business ecosystems (CBEs) are increasingly exposed to disruptive events (e.g., pandemics, supply chain breakdowns, cyberattacks) that challenge organizational adaptability and value creation. Traditional approaches to resilience and robustness often fail to capture the full range of systemic responses. This study introduces a [...] Read more.
Collaborative business ecosystems (CBEs) are increasingly exposed to disruptive events (e.g., pandemics, supply chain breakdowns, cyberattacks) that challenge organizational adaptability and value creation. Traditional approaches to resilience and robustness often fail to capture the full range of systemic responses. This study introduces a unified mathematical framework to evaluate four crisis response modes—plasticity, resilience, transformative resilience, and antifragility—within complex adaptive networks. Grounded in complex systems and collaborative network theory, our model formalizes both internal organizational capabilities (e.g., adaptability, learning, innovation, structural flexibility) and strategic interventions (e.g., optionality, buffering, information sharing, fault-injection protocols), linking them to pre- and post-crisis performance via dynamic adjustment functions. A composite performance score is defined across four dimensions (Innovation, Contribution, Prestige, and Responsiveness to Business Opportunities), using capability–strategy interaction matrices, weighted performance change functions, and structural transformation modifiers. The sensitivity analysis and scenario simulations enable a comparative evaluation of organizational configurations, strategy impacts, and phase-transition thresholds under crisis. This indicator-based formulation provides a quantitative bridge between resilience theory and practice, facilitating evidence-based crisis management in networked business environments. Full article
(This article belongs to the Special Issue Optimization Models for Supply Chain, Planning and Scheduling)
Show Figures

Figure 1

10 pages, 729 KiB  
Review
A Literature Review on Pain Management in Women During Medical Procedures: Gaps, Challenges, and Recommendations
by Keren Grinberg and Yael Sela
Medicina 2025, 61(8), 1352; https://doi.org/10.3390/medicina61081352 - 26 Jul 2025
Viewed by 322
Abstract
Background and Objectives: Gender disparities in pain management persist, with women frequently receiving inadequate analgesia despite reporting similar or higher pain levels compared with men. This issue is particularly evident across various medical and gynecological procedures. Materials and Methods: This integrative [...] Read more.
Background and Objectives: Gender disparities in pain management persist, with women frequently receiving inadequate analgesia despite reporting similar or higher pain levels compared with men. This issue is particularly evident across various medical and gynecological procedures. Materials and Methods: This integrative literature review synthesizes recent empirical studies examining gender biases in pain perception and management, focusing specifically on procedural pain in women. It includes an analysis of clinical research, patient-reported outcomes, and healthcare provider behaviors. Results: The findings indicate that unconscious biases, a lack of gender-specific clinical protocols, and prevailing cultural stereotypes contribute to the undertreatment of pain in women during procedures such as intrauterine device insertion and diagnostic hysteroscopy. Additionally, communication gaps between patients and healthcare providers exacerbate these disparities. Conclusions: Addressing gender disparities in pain management necessitates systemic reforms, including the implementation of gender-sensitive clinical guidelines, enhanced provider education, and targeted policy changes. Personalized, gender-informed approaches are essential to improving equity and quality of care in pain treatment. Full article
(This article belongs to the Section Epidemiology & Public Health)
Show Figures

Figure 1

12 pages, 248 KiB  
Article
Effectiveness of Targeted Advisory Interventions in Enhancing Welfare on Dairy Farms
by Susy Creatini, Cristina Roncoroni, Federica Salari, Iolanda Altomonte, Giovanni Brajon and Mina Martini
Animals 2025, 15(15), 2197; https://doi.org/10.3390/ani15152197 - 25 Jul 2025
Viewed by 117
Abstract
Animal welfare assessments have raised farmers’ awareness of their management practices, contributing to measurable improvements. However, these protocols often highlight critical points without providing clear guidance on the prioritization of corrective actions. To address this gap, qualified advisory support may play a pivotal [...] Read more.
Animal welfare assessments have raised farmers’ awareness of their management practices, contributing to measurable improvements. However, these protocols often highlight critical points without providing clear guidance on the prioritization of corrective actions. To address this gap, qualified advisory support may play a pivotal role in translating assessments into effective and sustainable interventions. This study evaluates the impact of direct and continuous expert support on improving animal welfare in dairy farms. Data were collected from 21 dairy farms in southeastern Tuscany (Italy) using the Classyfarm (CReNBA) protocol. Each farm underwent two assessments at a three-month interval (T0 and T1), during which tailored support was provided to address specific criticalities. At T0, over 60% of the farms obtained only marginally acceptable welfare scores (mean 67.48 ± 4.75), with major deficiencies in farm management practices, particularly regarding hygiene and space management. At T1, all farms showed substantial improvements, with an average increase of 22% in total welfare scores (mean 82.05 ± 5.71) and a mean of nine improved parameters per farm. These findings underscore the effectiveness of structured, continuous consultancy in not only resolving critical issues but also in fostering more informed, proactive, and sustainable farm management. The direct involvement of experts appears to be a key driver in enhancing both animal welfare and operational outcomes in dairy farming. Full article
(This article belongs to the Section Animal System and Management)
20 pages, 4403 KiB  
Review
Digital Twins’ Application for Geotechnical Engineering: A Review of Current Status and Future Directions in China
by Wenhui Tan, Siying Wu, Yan Li and Qifeng Guo
Appl. Sci. 2025, 15(15), 8229; https://doi.org/10.3390/app15158229 - 24 Jul 2025
Viewed by 355
Abstract
The digital wave, represented by new technologies such as big data, IoT, and artificial intelligence, is sweeping the globe, driving all industries toward digitalization and intelligent transformation. Digital twins are becoming an indispensable opportunity for new infrastructure initiatives. As geotechnical engineering constitutes a [...] Read more.
The digital wave, represented by new technologies such as big data, IoT, and artificial intelligence, is sweeping the globe, driving all industries toward digitalization and intelligent transformation. Digital twins are becoming an indispensable opportunity for new infrastructure initiatives. As geotechnical engineering constitutes a critical component of new infrastructure, its corresponding digital transformation is essential to align with these initiatives. However, due to the difficulty of modeling, the demand for computing resources, interdisciplinary integration, and other issues, current digital twin applications in geotechnical engineering remain in their nascent stage. This paper delineates the developmental status of geotechnical digital twin technology in China, and it focuses on the advantages and disadvantages of digital twins in five application fields, identifying key challenges, including intelligent sensing and interconnectivity of multi-source heterogeneous physical entities, integrated sharing of 3D geological models and structural models, unified platforms for lifecycle information management, standardization of digital twin data protocols, and theoretical frameworks for digital twin modeling. Furthermore, this study systematically expounds future research priorities across four dimensions: intelligent sensing and interoperability technologies for geotechnical engineering; knowledge graph development and model-based systems engineering; integrated digital twin entity technologies combining 3D geological bodies with engineering structures; and precision enhancement, temporal extension, and spatial expansion of geotechnical digital twins. This paper systematically reviews the application status of digital twin technology in geotechnical engineering for the first time, reveals the common technical challenges in cross-domain implementation, and proposes a theoretical framework for digital twin accuracy improvement and spatiotemporal expansion for geotechnical engineering characteristics, which fills the knowledge gap in the adaptability of existing research in professional fields. These insights aim to provide references for advancing digitalization, intelligent transformation, and sustainable development of geotechnical engineering. Full article
Show Figures

Figure 1

13 pages, 1305 KiB  
Article
Fine-Tuning BirdNET for the Automatic Ecoacoustic Monitoring of Bird Species in the Italian Alpine Forests
by Giacomo Schiavo, Alessia Portaccio and Alberto Testolin
Information 2025, 16(8), 628; https://doi.org/10.3390/info16080628 - 23 Jul 2025
Viewed by 287
Abstract
The ongoing decline in global biodiversity constitutes a critical challenge for environmental science, necessitating the prompt development of effective monitoring frameworks and conservation protocols to safeguard the structure and function of natural ecosystems. Recent progress in ecoacoustic monitoring, supported by advances in artificial [...] Read more.
The ongoing decline in global biodiversity constitutes a critical challenge for environmental science, necessitating the prompt development of effective monitoring frameworks and conservation protocols to safeguard the structure and function of natural ecosystems. Recent progress in ecoacoustic monitoring, supported by advances in artificial intelligence, might finally offer scalable tools for systematic biodiversity assessment. In this study, we evaluate the performance of BirdNET, a state-of-the-art deep learning model for avian sound recognition, in the context of selected bird species characteristic of the Italian Alpine region. To this end, we assemble a comprehensive, manually annotated audio dataset targeting key regional species, and we investigate a variety of strategies for model adaptation, including fine-tuning with data augmentation techniques to enhance recognition under challenging recording conditions. As a baseline, we also develop and evaluate a simple Convolutional Neural Network (CNN) trained exclusively on our domain-specific dataset. Our findings indicate that BirdNET performance can be greatly improved by fine-tuning the pre-trained network with data collected within the specific regional soundscape, outperforming both the original BirdNET and the baseline CNN by a significant margin. These findings underscore the importance of environmental adaptation and data variability for the development of automated ecoacoustic monitoring devices while highlighting the potential of deep learning methods in supporting conservation efforts and informing soundscape management in protected areas. Full article
(This article belongs to the Special Issue Signal Processing Based on Machine Learning Techniques)
Show Figures

Graphical abstract

24 pages, 921 KiB  
Article
Towards Empowering Stakeholders Through Decentralized Trust and Secure Livestock Data Sharing
by Abdul Ghafoor, Iraklis Symeonidis, Anna Rydberg, Cecilia Lindahl and Abdul Qadus Abbasi
Cryptography 2025, 9(3), 52; https://doi.org/10.3390/cryptography9030052 - 23 Jul 2025
Viewed by 301
Abstract
Cybersecurity represents a critical challenge for data-sharing platforms involving multiple stakeholders, particularly within complex and decentralized systems such as livestock supply chain networks. These systems demand novel approaches, robust security protocols, and advanced data management strategies to address key challenges such as data [...] Read more.
Cybersecurity represents a critical challenge for data-sharing platforms involving multiple stakeholders, particularly within complex and decentralized systems such as livestock supply chain networks. These systems demand novel approaches, robust security protocols, and advanced data management strategies to address key challenges such as data consistency, transparency, ownership, controlled access or exposure, and privacy-preserving analytics for value-added services. In this paper, we introduced the Framework for Livestock Empowerment and Decentralized Secure Data eXchange (FLEX), as a comprehensive solution grounded on five core design principles: (i) enhanced security and privacy, (ii) human-centric approach, (iii) decentralized and trusted infrastructure, (iv) system resilience, and (v) seamless collaboration across the supply chain. FLEX integrates interdisciplinary innovations, leveraging decentralized infrastructure-based protocols to ensure trust, traceability, and integrity. It employs secure data-sharing protocols and cryptographic techniques to enable controlled information exchange with authorized entities. Additionally, the use of data anonymization techniques ensures privacy. FLEX is designed and implemented using a microservices architecture and edge computing to support modularity and scalable deployment. These components collectively serve as a foundational pillar of the development of a digital product passport. The FLEX architecture adopts a layered design and incorporates robust security controls to mitigate threats identified using the STRIDE threat modeling framework. The evaluation results demonstrate the framework’s effectiveness in countering well-known cyberattacks while fulfilling its intended objectives. The performance evaluation of the implementation further validates its feasibility and stability, particularly as the volume of evidence associated with animal identities increases. All the infrastructure components, along with detailed deployment instructions, are publicly available as open-source libraries on GitHub, promoting transparency and community-driven development for wider public benefit. Full article
(This article belongs to the Special Issue Emerging Trends in Blockchain and Its Applications)
Show Figures

Figure 1

11 pages, 1617 KiB  
Article
Parental Knowledge and Preventive Strategies in Pediatric IgE-Mediated Food Allergy—Results from a Cross-Sectional Survey
by Francesca Galletta, Angela Klain, Sara Manti, Francesca Mori, Carolina Grella, Leonardo Tomei, Antonio Andrea Senatore, Amelia Licari, Michele Miraglia del Giudice and Cristiana Indolfi
Nutrients 2025, 17(15), 2387; https://doi.org/10.3390/nu17152387 - 22 Jul 2025
Viewed by 260
Abstract
Background/Objectives: Food allergy (FA) is a growing concern in pediatric care, requiring effective avoidance strategies and timely emergency responses. The role of caregivers is central to the daily management of FA. This study aimed to assess parental knowledge, preparedness, and behaviors regarding [...] Read more.
Background/Objectives: Food allergy (FA) is a growing concern in pediatric care, requiring effective avoidance strategies and timely emergency responses. The role of caregivers is central to the daily management of FA. This study aimed to assess parental knowledge, preparedness, and behaviors regarding pediatric FA management, focusing on both prevention and emergency readiness. Methods: A cross-sectional survey was conducted from December 2024 to April 2025 through the SurveyMonkey® platform, promoted by the Italian Society of Pediatric Allergology and Immunology (SIAIP). The anonymous, structured questionnaire was distributed online and in two Italian university hospitals. A total of 129 fully completed responses from caregivers of children with FA were analyzed. The survey explored self-perceived knowledge, symptom recognition, preventive actions, emergency preparedness, and communication practices. Results: Only 9.3% of parents considered themselves “very informed,” while 54.3% reported limited or no knowledge. Just 16.0% recognized all symptoms of an allergic reaction, and only 24.0% could distinguish mild reactions from anaphylaxis. Notably, 67.4% reported not knowing how to respond to anaphylaxis, and 83.7% did not possess an epinephrine auto-injector. Preventive measures at home were inconsistently applied, and 41.1% took no precautions when eating out. Communication with external caregivers was often informal or absent. Only 33% updated physicians regularly. Conclusions: The findings reveal significant gaps in parental preparedness and highlight critical areas for educational intervention. Enhanced caregiver training, standardized communication protocols, and improved clinical follow-up are essential to strengthen pediatric FA management and safety. Full article
(This article belongs to the Special Issue Nutrition and Quality of Life for Patients with Chronic Disease)
Show Figures

Figure 1

14 pages, 2045 KiB  
Case Report
Fast Evolving Glioblastoma in a Pregnant Woman: Diagnostic and Therapeutic Challenges
by Ivan Bogdanovic, Rosanda Ilic, Aleksandar Kostic, Aleksandar Miljkovic, Filip Milisavljevic, Marija M. Janjic, Ivana M. Bjelobaba, Danijela Savic and Vladimir Bascarevic
Diagnostics 2025, 15(15), 1836; https://doi.org/10.3390/diagnostics15151836 - 22 Jul 2025
Viewed by 367
Abstract
Background and Clinical Significance: Gliomas diagnosed during pregnancy are rare, and there are no established guidelines for their management. Effective treatment requires a multidisciplinary approach to balance maternal health and pregnancy preservation. Case Presentation: We here present a case of rapidly progressing glioma [...] Read more.
Background and Clinical Significance: Gliomas diagnosed during pregnancy are rare, and there are no established guidelines for their management. Effective treatment requires a multidisciplinary approach to balance maternal health and pregnancy preservation. Case Presentation: We here present a case of rapidly progressing glioma in a 33-year-old pregnant woman. The patient initially presented with a generalized tonic–clonic seizure at 21 weeks’ gestation. Imaging revealed a tumor in the right cerebral lobe, involving both cortical and subcortical structures, while magnetic resonance spectroscopy suggested a low-grade glioma. The patient remained clinically stable for two months but then developed severe headaches; MRI showed a worsening mass effect. At 34 weeks’ gestation, an emergency and premature caesarean section was performed under general anesthesia. The patient then underwent a craniotomy for maximal tumor resection, which was histologically and molecularly diagnosed as IDH wild-type glioblastoma (GB). Using qPCR, we found that the GB tissue showed upregulated expression of genes involved in cell structure (GFAP, VIM) and immune response (SSP1, TSPO), as well as increased expression of genes related to potential hormone response (AR, CYP19A1, ESR1, GPER1). After surgery, the patient showed resistance to Stupp protocol therapy, which was substituted with lomustine and bevacizumab combination therapy. Conclusions: This case illustrates that glioma may progress rapidly during pregnancy, but a favorable obstetric outcome is achievable. Management of similar cases should respect both the need for timely treatment and the patient’s informed decision. Full article
(This article belongs to the Special Issue Brain/Neuroimaging 2025)
Show Figures

Figure 1

20 pages, 459 KiB  
Article
Post-Quantum Secure Multi-Factor Authentication Protocol for Multi-Server Architecture
by Yunhua Wen, Yandong Su and Wei Li
Entropy 2025, 27(7), 765; https://doi.org/10.3390/e27070765 - 18 Jul 2025
Viewed by 231
Abstract
The multi-factor authentication (MFA) protocol requires users to provide a combination of a password, a smart card and biometric data as verification factors to gain access to the services they need. In a single-server MFA system, users accessing multiple distinct servers must register [...] Read more.
The multi-factor authentication (MFA) protocol requires users to provide a combination of a password, a smart card and biometric data as verification factors to gain access to the services they need. In a single-server MFA system, users accessing multiple distinct servers must register separately for each server, manage multiple smart cards, and remember numerous passwords. In contrast, an MFA system designed for multi-server architecture allows users to register once at a registration center (RC) and then access all associated servers with a single smart card and one password. MFA with an offline RC addresses the computational bottleneck and single-point failure issues associated with the RC. In this paper, we propose a post-quantum secure MFA protocol for a multi-server architecture with an offline RC. Our MFA protocol utilizes the post-quantum secure Kyber key encapsulation mechanism and an information-theoretically secure fuzzy extractor as its building blocks. We formally prove the post-quantum semantic security of our MFA protocol under the real or random (ROR) model in the random oracle paradigm. Compared to related protocols, our protocol achieves higher efficiency and maintains reasonable communication overhead. Full article
Show Figures

Figure 1

Back to TopTop