Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (32)

Search Parameters:
Keywords = intra-community exploitation

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
23 pages, 769 KB  
Article
Hierarchical and Clustering-Based Timely Information Announcement Mechanism in the Computing Networks
by Ranran Wei and Rui Han
Electronics 2025, 14(19), 3959; https://doi.org/10.3390/electronics14193959 - 8 Oct 2025
Viewed by 201
Abstract
Information announcement is the process of propagating and synchronizing the information of Computing Resource Nodes (CRNs) within the system of the Computing Networks. Accurate and timely acquisition of information is crucial to ensuring the efficiency and quality of subsequent task scheduling. However, existing [...] Read more.
Information announcement is the process of propagating and synchronizing the information of Computing Resource Nodes (CRNs) within the system of the Computing Networks. Accurate and timely acquisition of information is crucial to ensuring the efficiency and quality of subsequent task scheduling. However, existing announcement mechanisms primarily focus on reducing communication overhead, often neglecting the direct impact of information freshness on scheduling accuracy and service quality. To address this issue, this paper proposes a hierarchical and clustering-based announcement mechanism for the wide-area Computing Networks. The mechanism first categorizes the Computing Network Nodes (CNNs) into different layers based on the type of CRNs they interconnect to, and a top-down cross-layer announcement strategy is introduced during this process; within each layer, CNNs are further divided into several domains according to the round-trip time (RTT) to each other; and in each domain, inspired by the “Six Degrees of Separation” concept from social propagation, a RTT-aware fast clustering algorithm canopy is employed to partition CNNs into multiple overlap clusters. Intra-cluster announcements are modeled as a Traveling Salesman Problem (TSP) and optimized to accelerate updates, while inter-cluster propagation leverages overlapping nodes for global dissemination. Experimental results demonstrate that, by exploiting shortest path optimization within clusters and overlapping-node-based inter-cluster transmission, the mechanism is significantly superior to the comparison scheme in key indicators such as convergence time, Age of Information (AoI), and communication data volume per hop. The mechanism exhibits strong scalability and adaptability in large-scale network environments, providing robust support for efficient and rapid information synchronization in the Computing Networks. Full article
(This article belongs to the Section Networks)
Show Figures

Figure 1

21 pages, 275 KB  
Article
When Help Hurts: Moral Disengagement and the Myth of the Supportive Migrant Network
by Abdelaziz Abdalla Alowais and Abubakr Suliman
Soc. Sci. 2025, 14(6), 386; https://doi.org/10.3390/socsci14060386 - 17 Jun 2025
Viewed by 806
Abstract
This study aimed to uncover how harm is normalised in migrant communities using rationalisations, power imbalances, and emotional distancing. This research counters the dominant discourse that migrant communities are cohesive, altruistic, and protective by critically analysing the psychological and moral mechanisms of intra-community [...] Read more.
This study aimed to uncover how harm is normalised in migrant communities using rationalisations, power imbalances, and emotional distancing. This research counters the dominant discourse that migrant communities are cohesive, altruistic, and protective by critically analysing the psychological and moral mechanisms of intra-community harm. Migration scholarship has long extolled the contribution of migrant networks to settlement, employment, and integration. Using a qualitative ethnographic approach, data were gathered using participant observation and semi-structured interviews with twelve purposively sampled migrants. The aim of applying a primary qualitative study was to capture a detailed, first-hand understanding of participants’ lived experiences and social relations. It permitted the in-depth examination of how people rationalise and navigate intra-community harm in the actual contexts of their lives. Thematic analysis yielded four significant findings: one, injustices in the community are frequently met with silence and inaction due to fear and moral disengagement; two, assistance is extraordinarily situational and gendered, often falling disproportionately on women or being mediated by institutions; three, internal exploitation—like rent gouging and manipulation of aid—is justified through community narratives; and four, people increasingly feel isolation, emotional burnout, and only symbolic unity at communal events. The research suggests that, although migrant networks can offer critical resources, they are not invulnerable to internal hierarchies and moral collapses. To create effectively inclusive and nurturing settings, future interventions must account for more than mere structural barriers, intra-group processes, and psychological rationalisations allowing intra-community injury. Full article
(This article belongs to the Section International Migration)
23 pages, 2938 KB  
Article
An Improved Expeditious Meta-Heuristic Clustering Method for Classifying Student Psychological Issues with Homogeneous Characteristics
by Muhammad Suhail Shaikh, Xiaoqing Dong, Gengzhong Zheng, Chang Wang and Yifan Lin
Mathematics 2024, 12(11), 1620; https://doi.org/10.3390/math12111620 - 22 May 2024
Cited by 10 | Viewed by 1691
Abstract
Nowadays, cluster analyses are widely used in mental health research to categorize student stress levels. However, conventional clustering methods experience challenges with large datasets and complex issues, such as converging to local optima and sensitivity to initial random states. To address these limitations, [...] Read more.
Nowadays, cluster analyses are widely used in mental health research to categorize student stress levels. However, conventional clustering methods experience challenges with large datasets and complex issues, such as converging to local optima and sensitivity to initial random states. To address these limitations, this research work introduces an Improved Grey Wolf Clustering Algorithm (iGWCA). This improved approach aims to adjust the convergence rate and mitigate the risk of being trapped in local optima. The iGWCA algorithm provides a balanced technique for exploration and exploitation phases, alongside a local search mechanism around the optimal solution. To assess its efficiency, the proposed algorithm is verified on two different datasets. The dataset-I comprises 1100 individuals obtained from the Kaggle database, while dataset-II is based on 824 individuals obtained from the Mendeley database. The results demonstrate the competence of iGWCA in classifying student stress levels. The algorithm outperforms other methods in terms of lower intra-cluster distances, obtaining a reduction rate of 1.48% compared to Grey Wolf Optimization (GWO), 8.69% compared to Mayfly Optimization (MOA), 8.45% compared to the Firefly Algorithm (FFO), 2.45% Particle Swarm Optimization (PSO), 3.65%, Hybrid Sine Cosine with Cuckoo search (HSCCS), 8.20%, Hybrid Firefly and Genetic Algorithm (FAGA) and 8.68% Gravitational Search Algorithm (GSA). This demonstrates the effectiveness of the proposed algorithm in minimizing intra-cluster distances, making it a better choice for student stress classification. This research contributes to the advancement of understanding and managing student well-being within academic communities by providing a robust tool for stress level classification. Full article
(This article belongs to the Special Issue Deep Learning and Adaptive Control, 3rd Edition)
Show Figures

Figure 1

28 pages, 1514 KB  
Article
Intelligent Learning-Based Methods for Determining the Ideal Team Size in Agile Practices
by Rodrigo Olivares, Rene Noel, Sebastián M. Guzmán, Diego Miranda and Roberto Munoz
Biomimetics 2024, 9(5), 292; https://doi.org/10.3390/biomimetics9050292 - 13 May 2024
Cited by 4 | Viewed by 2680
Abstract
One of the significant challenges in scaling agile software development is organizing software development teams to ensure effective communication among members while equipping them with the capabilities to deliver business value independently. A formal approach to address this challenge involves modeling it as [...] Read more.
One of the significant challenges in scaling agile software development is organizing software development teams to ensure effective communication among members while equipping them with the capabilities to deliver business value independently. A formal approach to address this challenge involves modeling it as an optimization problem: given a professional staff, how can they be organized to optimize the number of communication channels, considering both intra-team and inter-team channels? In this article, we propose applying a set of bio-inspired algorithms to solve this problem. We introduce an enhancement that incorporates ensemble learning into the resolution process to achieve nearly optimal results. Ensemble learning integrates multiple machine-learning strategies with diverse characteristics to boost optimizer performance. Furthermore, the studied metaheuristics offer an excellent opportunity to explore their linear convergence, contingent on the exploration and exploitation phases. The results produce more precise definitions for team sizes, aligning with industry standards. Our approach demonstrates superior performance compared to the traditional versions of these algorithms. Full article
(This article belongs to the Special Issue Nature-Inspired Metaheuristic Optimization Algorithms 2024)
Show Figures

Figure 1

20 pages, 1987 KB  
Article
A Hybrid-Cryptography Engine for Securing Intra-Vehicle Communications
by Walter Tiberti, Roberto Civino, Norberto Gavioli, Marco Pugliese and Fortunato Santucci
Appl. Sci. 2023, 13(24), 13024; https://doi.org/10.3390/app132413024 - 6 Dec 2023
Cited by 7 | Viewed by 2483
Abstract
While technological advancements and their deep integration in connected and automated vehicles is a central aspect in the evolving trend of automotive industry, they also depict a growing size attack surface for malicious actors: the latter ones typically aim at exploiting known and [...] Read more.
While technological advancements and their deep integration in connected and automated vehicles is a central aspect in the evolving trend of automotive industry, they also depict a growing size attack surface for malicious actors: the latter ones typically aim at exploiting known and unknown security vulnerabilities, with potentially disastrous consequences on the safety of vehicles, people, and infrastructures. In recent years, remarkable efforts have been spent to mitigate security vulnerabilities in intelligent and connected vehicles, in particular in the inside of vehicles, the so-called intra-vehicle networks. Despite those efforts, securing intra-vehicle networks remains a non-trivial task due to their heterogeneous and increasingly complex context. Starting from the above remarks and motivated by the industrial research and innovation project EMERGE, in this paper we report on a novel cryptographic hardware-software solution that we have designed and developed for securing the intra-vehicle network of intelligent connected vehicles: the Crypto-Engine. The Crypto-Engine relies on a lightweight hybrid-key cryptographic scheme to provide confidentiality and authentication without compromising the normal communication performance. We tested the Crypto-Engine and demonstrated that, once configured according to application-defined performance requirements, it can authenticate parties and secure the communications with a negligible overhead. Full article
(This article belongs to the Special Issue Advanced Technologies in Automated Driving)
Show Figures

Figure 1

29 pages, 1188 KB  
Review
The Two Faces of Bacterial Membrane Vesicles: Pathophysiological Roles and Therapeutic Opportunities
by Himadri B. Thapa, Stephan P. Ebenberger and Stefan Schild
Antibiotics 2023, 12(6), 1045; https://doi.org/10.3390/antibiotics12061045 - 14 Jun 2023
Cited by 9 | Viewed by 5557
Abstract
Bacterial membrane vesicles (MVs) are nanosized lipid particles secreted by lysis or blebbing mechanisms from Gram-negative and -positive bacteria. It is becoming increasingly evident that MVs can promote antimicrobial resistance but also provide versatile opportunities for therapeutic exploitation. As non-living facsimiles of parent [...] Read more.
Bacterial membrane vesicles (MVs) are nanosized lipid particles secreted by lysis or blebbing mechanisms from Gram-negative and -positive bacteria. It is becoming increasingly evident that MVs can promote antimicrobial resistance but also provide versatile opportunities for therapeutic exploitation. As non-living facsimiles of parent bacteria, MVs can carry multiple bioactive molecules such as proteins, lipids, nucleic acids, and metabolites, which enable them to participate in intra- and interspecific communication. Although energetically costly, the release of MVs seems beneficial for bacterial fitness, especially for pathogens. In this review, we briefly discuss the current understanding of diverse MV biogenesis routes affecting MV cargo. We comprehensively highlight the physiological functions of MVs derived from human pathogens covering in vivo adaptation, colonization fitness, and effector delivery. Emphasis is given to recent findings suggesting a vicious cycle of MV biogenesis, pathophysiological function, and antibiotic therapy. We also summarize potential therapeutical applications, such as immunotherapy, vaccination, targeted delivery, and antimicrobial potency, including their experimental validation. This comparative overview identifies common and unique strategies for MV modification used along diverse applications. Thus, the review summarizes timely aspects of MV biology in a so far unprecedented combination ranging from beneficial function for bacterial pathogen survival to future medical applications. Full article
(This article belongs to the Special Issue Membranes to Fight Drug-Resistant Microbes)
Show Figures

Figure 1

19 pages, 2791 KB  
Article
Secure Data Transfer Based on a Multi-Level Blockchain for Internet of Vehicles
by Hua Yi Lin
Sensors 2023, 23(5), 2664; https://doi.org/10.3390/s23052664 - 28 Feb 2023
Cited by 13 | Viewed by 2891
Abstract
Because of the decentralized trait of the blockchain and the Internet of vehicles, both are very suitable for the architecture of the other. This study proposes a multi-level blockchain framework to secure information security on the Internet of vehicles. The main motivation of [...] Read more.
Because of the decentralized trait of the blockchain and the Internet of vehicles, both are very suitable for the architecture of the other. This study proposes a multi-level blockchain framework to secure information security on the Internet of vehicles. The main motivation of this study is to propose a new transaction block and ensure the identity of traders and the non-repudiation of transactions through the elliptic curve digital signature algorithm ECDSA. The designed multi-level blockchain architecture distributes the operations within the intra_cluster blockchain and the inter_cluster blockchain to improve the efficiency of the entire block. On the cloud computing platform, we exploit the threshold key management protocol, and the system can recover the system key as long as the threshold partial key is collected. This avoids the occurrence of PKI single-point failure. Thus, the proposed architecture ensures the security of OBU-RSU-BS-VM. The proposed multi-level blockchain framework consists of a block, intra-cluster blockchain and inter-cluster blockchain. The roadside unit RSU is responsible for the communication of vehicles in the vicinity, similar to a cluster head on the Internet of vehicles. This study exploits RSU to manage the block, and the base station is responsible for managing the intra-cluster blockchain named intra_clusterBC, and the cloud server at the back end is responsible for the entire system blockchain named inter_clusterBC. Finally, RSU, base stations and cloud servers cooperatively construct the multi-level blockchain framework and improve the security and the efficiency of the operation of the blockchain. Overall, in order to protect the security of the transaction data of the blockchain, we propose a new transaction block structure and adopt the elliptic curve cryptographic signature ECDSA to ensure that the Merkle tree root value is not changed and also make sure the transaction identity and non-repudiation of transaction data. Finally, this study considers information security in a cloud environment, and therefore we propose a secret-sharing and secure-map-reducing architecture based on the identity confirmation scheme. The proposed scheme with decentralization is very suitable for distributed connected vehicles and can also improve the execution efficiency of the blockchain. Full article
(This article belongs to the Special Issue Security and Communication Networks)
Show Figures

Figure 1

19 pages, 4618 KB  
Article
V-SOC4AS: A Vehicle-SOC for Improving Automotive Security
by Vita Santa Barletta, Danilo Caivano, Mirko De Vincentiis, Azzurra Ragone, Michele Scalera and Manuel Ángel Serrano Martín
Algorithms 2023, 16(2), 112; https://doi.org/10.3390/a16020112 - 14 Feb 2023
Cited by 30 | Viewed by 5710
Abstract
Integrating embedded systems into next-generation vehicles is proliferating as they increase safety, efficiency, and driving comfort. These functionalities are provided by hundreds of electronic control units (ECUs) that communicate with each other using various protocols that, if not properly designed, may be vulnerable [...] Read more.
Integrating embedded systems into next-generation vehicles is proliferating as they increase safety, efficiency, and driving comfort. These functionalities are provided by hundreds of electronic control units (ECUs) that communicate with each other using various protocols that, if not properly designed, may be vulnerable to local or remote attacks. The paper presents a vehicle-security operation center for improving automotive security (V-SOC4AS) to enhance the detection, response, and prevention of cyber-attacks in the automotive context. The goal is to monitor in real-time each subsystem of intra-vehicle communication, that is controller area network (CAN), local interconnect network (LIN), FlexRay, media oriented systems transport (MOST), and Ethernet. Therefore, to achieve this goal, security information and event management (SIEM) was used to monitor and detect malicious attacks in intra-vehicle and inter-vehicle communications: messages transmitted between vehicle ECUs; infotainment and telematics systems, which provide passengers with entertainment capabilities and information about the vehicle system; and vehicular ports, which allow vehicles to connect to diagnostic devices, upload content of various types. As a result, this allows the automation and improvement of threat detection and incident response processes. Furthermore, the V-SOC4AS allows the classification of the received message as malicious and non-malicious and acquisition of additional information about the type of attack. Thus, this reduces the detection time and provides more support for response activities. Experimental evaluation was conducted on two state-of-the-art attacks: denial of service (DoS) and fuzzing. An open-source dataset was used to simulate the vehicles. V-SOC4AS exploits security information and event management to analyze the packets sent by a vehicle using a rule-based mechanism. If the payload contains a CAN frame attack, it is notified to the SOC analysts. Full article
(This article belongs to the Section Evolutionary Algorithms and Machine Learning)
Show Figures

Figure 1

17 pages, 2684 KB  
Article
Energy-Efficient Cluster Head Selection in Wireless Sensor Networks Using an Improved Grey Wolf Optimization Algorithm
by Mandli Rami Reddy, M. L. Ravi Chandra, P. Venkatramana and Ravilla Dilli
Computers 2023, 12(2), 35; https://doi.org/10.3390/computers12020035 - 6 Feb 2023
Cited by 115 | Viewed by 7023
Abstract
The internet of things (IoT) and industrial IoT (IIoT) play a major role in today’s world of intelligent networks, and they essentially use a wireless sensor network (WSN) as a perception layer to collect the intended data. This data is processed as information [...] Read more.
The internet of things (IoT) and industrial IoT (IIoT) play a major role in today’s world of intelligent networks, and they essentially use a wireless sensor network (WSN) as a perception layer to collect the intended data. This data is processed as information and send to cloud servers through a base station, the challenge here is the consumption of minimum energy for processing and communication. The dynamic formation of cluster heads and energy aware clustering schemes help in improving the lifetime of WSNs. In recent years, grey wolf optimization (GWO) became the most popular feature selection optimizing, swarm intelligent, and robust metaheuristics algorithm that gives competitive results with impressive characteristics. In spite of several studies in the literature to enhance the performance of the GWO algorithm, there is a need for further improvements in terms of feature selection, accuracy, and execution time. In this paper, we have proposed an energy-efficient cluster head selection using an improved version of the GWO (EECHIGWO) algorithm to alleviate the imbalance between exploitation and exploration, lack of population diversity, and premature convergence of the basic GWO algorithm. The primary goal of this paper is to enhance the energy efficiency, average throughput, network stability, and the network lifetime in WSNs with an optimal selection of cluster heads using the EECHIGWO algorithm. It considers sink distance, residual energy, cluster head balancing factor, and average intra-cluster distance as the parameters in selecting the cluster head. The proposed EECHIGWO-based clustering protocol has been tested in terms of the number of dead nodes, energy consumption, number of operating rounds, and the average throughput. The simulation results have confirmed the optimal selection of cluster heads with minimum energy consumption, resolved premature convergence, and enhanced the network lifetime by using minimum energy levels in WSNs. Using the proposed algorithm, there is an improvement in network stability of 169.29%, 19.03%, 253.73%, 307.89%, and 333.51% compared to the SSMOECHS, FGWSTERP, LEACH-PRO, HMGWO, and FIGWO protocols, respectively. Full article
Show Figures

Figure 1

44 pages, 1352 KB  
Review
Data Locality in High Performance Computing, Big Data, and Converged Systems: An Analysis of the Cutting Edge and a Future System Architecture
by Sardar Usman, Rashid Mehmood, Iyad Katib and Aiiad Albeshri
Electronics 2023, 12(1), 53; https://doi.org/10.3390/electronics12010053 - 23 Dec 2022
Cited by 19 | Viewed by 8854
Abstract
Big data has revolutionized science and technology leading to the transformation of our societies. High-performance computing (HPC) provides the necessary computational power for big data analysis using artificial intelligence and methods. Traditionally, HPC and big data had focused on different problem domains and [...] Read more.
Big data has revolutionized science and technology leading to the transformation of our societies. High-performance computing (HPC) provides the necessary computational power for big data analysis using artificial intelligence and methods. Traditionally, HPC and big data had focused on different problem domains and had grown into two different ecosystems. Efforts have been underway for the last few years on bringing the best of both paradigms into HPC and big converged architectures. Designing HPC and big data converged systems is a hard task requiring careful placement of data, analytics, and other computational tasks such that the desired performance is achieved with the least amount of resources. Energy efficiency has become the biggest hurdle in the realization of HPC, big data, and converged systems capable of delivering exascale and beyond performance. Data locality is a key parameter of HPDA system design as moving even a byte costs heavily both in time and energy with an increase in the size of the system. Performance in terms of time and energy are the most important factors for users, particularly energy, due to it being the major hurdle in high-performance system design and the increasing focus on green energy systems due to environmental sustainability. Data locality is a broad term that encapsulates different aspects including bringing computations to data, minimizing data movement by efficient exploitation of cache hierarchies, reducing intra- and inter-node communications, locality-aware process and thread mapping, and in situ and transit data analysis. This paper provides an extensive review of cutting-edge research on data locality in HPC, big data, and converged systems. We review the literature on data locality in HPC, big data, and converged environments and discuss challenges, opportunities, and future directions. Subsequently, using the knowledge gained from this extensive review, we propose a system architecture for future HPC and big data converged systems. To the best of our knowledge, there is no such review on data locality in converged HPC and big data systems. Full article
(This article belongs to the Special Issue Defining, Engineering, and Governing Green Artificial Intelligence)
Show Figures

Figure 1

17 pages, 307 KB  
Article
Idealist Individualism or Indigenous Cosmology; Finding Entanglement across Species and Strata
by Ruth Irwin
Religions 2022, 13(12), 1193; https://doi.org/10.3390/rel13121193 - 6 Dec 2022
Cited by 4 | Viewed by 2461
Abstract
Science and technology have been associated with modern Enlightenment, in a manner that elevated the rational mind over emotions and the body, a separation of the subjective mind from the object of observation, universal categories, objective observation, and linear causality. These assumptions, consolidated [...] Read more.
Science and technology have been associated with modern Enlightenment, in a manner that elevated the rational mind over emotions and the body, a separation of the subjective mind from the object of observation, universal categories, objective observation, and linear causality. These assumptions, consolidated by Descartes and then Kant, have underpinned the philosophies of science, economics, policy, and political theory. They have shaped the modern world and enabled corporate freedom to exploit all ‘resources’ in the name of consumerism and global trade. Idealism has alienated subjective rationality from an idealised universal created world. In contrast, ancient indigenous ways of knowing are emerging as better exemplars of the interrelationship between individuals, communities, and organic and anorganic life forms. Celtic shapeshifters and praise poems forge an interwoven dance of geology, weather, plants, animals, and humanity with wisdom and politics. The Māori concept of whakapapa is the kin relations of everything, tied into complex claves as a taxonomy of familial ties. Animism was understood as pagan misidentification by modernity, but if the alienation set out by modern linear physics is severed, then the intra and inter-relationship of strata, atmosphere, ocean, and species are better relayed by indigenous philosophy than by outdated, colonial, modern assumptions. Celtic and Māori pantheism show us how entangled we are, and how special relationships are in place that last across generations. Full article
(This article belongs to the Special Issue Religion, Science and Technology in Pantheism, Animism and Paganism)
17 pages, 2801 KB  
Article
Multi-Gbps LDPC Decoder on GPU Devices
by Jingxin Dai, Hang Yin, Yansong Lv, Weizhang Xu and Zhanxin Yang
Electronics 2022, 11(21), 3447; https://doi.org/10.3390/electronics11213447 - 25 Oct 2022
Cited by 5 | Viewed by 3424
Abstract
To meet the high throughput requirement of communication systems, the design of high-throughput low-density parity-check (LDPC) decoders has attracted significant attention. This paper proposes a high-throughput GPU-based LDPC decoder, aiming at the large-scale data process scenario, which optimizes the decoder from the perspectives [...] Read more.
To meet the high throughput requirement of communication systems, the design of high-throughput low-density parity-check (LDPC) decoders has attracted significant attention. This paper proposes a high-throughput GPU-based LDPC decoder, aiming at the large-scale data process scenario, which optimizes the decoder from the perspectives of the decoding parallelism and data scheduling strategy, respectively. For decoding parallelism, the intra-codeword parallelism is fully exploited by combining the characteristics of the flooding-based decoding algorithm and GPU programming model, and the inter-codeword parallelism is improved using the single-instruction multiple-data (SIMD) instructions. For the data scheduling strategy, the utilization of off-chip memory is optimized to satisfy the demands of large-scale data processing. The experimental results demonstrate that the decoder achieves 10 Gbps throughput by incorporating the early termination mechanism on general-purpose GPU (GPGPU) devices and can also achieve a high-throughput and high-power-efficiency performance on low-power embedded GPU (EGPU) devices. Compared with the state-of-the-art work, the proposed decoder had a ×1.787 normalized throughput speedup at the same error correcting performance. Full article
Show Figures

Graphical abstract

25 pages, 2514 KB  
Review
Extracellular Vesicles in Veterinary Medicine
by Valentina Moccia, Alessandro Sammarco, Laura Cavicchioli, Massimo Castagnaro, Laura Bongiovanni and Valentina Zappulli
Animals 2022, 12(19), 2716; https://doi.org/10.3390/ani12192716 - 10 Oct 2022
Cited by 11 | Viewed by 5242
Abstract
Extracellular vesicles (EVs) are cell-derived membrane-bound vesicles involved in many physiological and pathological processes not only in humans but also in all the organisms of the eukaryotic and prokaryotic kingdoms. EV shedding constitutes a fundamental universal mechanism of intra-kingdom and inter-kingdom intercellular communication. [...] Read more.
Extracellular vesicles (EVs) are cell-derived membrane-bound vesicles involved in many physiological and pathological processes not only in humans but also in all the organisms of the eukaryotic and prokaryotic kingdoms. EV shedding constitutes a fundamental universal mechanism of intra-kingdom and inter-kingdom intercellular communication. A tremendous increase of interest in EVs has therefore grown in the last decades, mainly in humans, but progressively also in animals, parasites, and bacteria. With the present review, we aim to summarize the current status of the EV research on domestic and wild animals, analyzing the content of scientific literature, including approximately 220 papers published between 1984 and 2021. Critical aspects evidenced through the veterinarian EV literature are discussed. Then, specific subsections describe details regarding EVs in physiology and pathophysiology, as biomarkers, and in therapy and vaccines. Further, the wide area of research related to animal milk-derived EVs is also presented in brief. The numerous studies on EVs related to parasites and parasitic diseases are excluded, deserving further specific attention. The literature shows that EVs are becoming increasingly addressed in veterinary studies and standardization in protocols and procedures is mandatory, as in human research, to maximize the knowledge and the possibility to exploit these naturally produced nanoparticles. Full article
(This article belongs to the Section Animal Physiology)
Show Figures

Figure 1

25 pages, 8511 KB  
Article
Evaluating Plant Disease Detection Mobile Applications: Quality and Limitations
by Ayesha Siddiqua, Muhammad Ashad Kabir, Tanzina Ferdous, Israt Bintea Ali and Leslie A. Weston
Agronomy 2022, 12(8), 1869; https://doi.org/10.3390/agronomy12081869 - 8 Aug 2022
Cited by 47 | Viewed by 32948
Abstract
In this technologically advanced era, with the proliferation of artificial intelligence, many mobile apps are available for plant disease detection, diagnosis, and treatment, each with a variety of features. These apps need to be categorized and reviewed following a proper framework that ensures [...] Read more.
In this technologically advanced era, with the proliferation of artificial intelligence, many mobile apps are available for plant disease detection, diagnosis, and treatment, each with a variety of features. These apps need to be categorized and reviewed following a proper framework that ensures their quality. This study aims to present an approach to evaluating plant disease detection mobile apps, which includes providing ratings of distinct features of the apps and insights into the exploitation of artificial intelligence used in plant disease detection. The applicability of these apps for pathogen or disease detection, identification, and treatment will be assessed along with significant insights garnered. For this purpose, plant disease detection apps were searched in three prominent app stores (the Google Play store, Apple App store, and Microsoft store) using a set of keywords. A total of 606 apps were found and from them, 17 relevant apps were identified based on inclusion and exclusion criteria. The selected apps were reviewed by three raters using our devised app rating scale. To validate the rater agreements on the ratings, inter-rater reliability is computed alongside their intra-rater reliability, ensuring their rating consistency. Also, the internal consistency of our rating scale was evaluated against all selected apps. User comments from the app stores are collected and analyzed to understand their expectations and views. Following the rating procedure, most apps earned acceptable ratings in software quality characteristics such as aesthetics, usability, and performance but gained poor ratings in AI-based advanced functionality, which is the key aspect of this study. However, most of the apps cannot be used as a complete solution to plant disease detection, diagnosis, and treatment. Only one app, Plantix–your crop doctor, could successfully identify plants from images, detect diseases, maintain a rich plant database, and suggest potential treatments for the disease presented. It also provides a community where plant lovers can communicate with each other to gain additional benefits. In general, all existing apps need to improve functionalities, user experience, and software quality. Therefore, a set of design considerations has been proposed for future app improvements. Full article
Show Figures

Figure 1

18 pages, 2413 KB  
Review
Nutritional Interactions between Bacterial Species Colonising the Human Nasal Cavity: Current Knowledge and Future Prospects
by Lea A. Adolf and Simon Heilbronner
Metabolites 2022, 12(6), 489; https://doi.org/10.3390/metabo12060489 - 27 May 2022
Cited by 11 | Viewed by 3600
Abstract
The human nasal microbiome can be a reservoir for several pathogens, including Staphylococcus aureus. However, certain harmless nasal commensals can interfere with pathogen colonisation, an ability that could be exploited to prevent infection. Although attractive as a prophylactic strategy, manipulation of nasal [...] Read more.
The human nasal microbiome can be a reservoir for several pathogens, including Staphylococcus aureus. However, certain harmless nasal commensals can interfere with pathogen colonisation, an ability that could be exploited to prevent infection. Although attractive as a prophylactic strategy, manipulation of nasal microbiomes to prevent pathogen colonisation requires a better understanding of the molecular mechanisms of interaction that occur between nasal commensals as well as between commensals and pathogens. Our knowledge concerning the mechanisms of pathogen exclusion and how stable community structures are established is patchy and incomplete. Nutrients are scarce in nasal cavities, which makes competitive or mutualistic traits in nutrient acquisition very likely. In this review, we focus on nutritional interactions that have been shown to or might occur between nasal microbiome members. We summarise concepts of nutrient release from complex host molecules and host cells as well as of intracommunity exchange of energy-rich fermentation products and siderophores. Finally, we discuss the potential of genome-based metabolic models to predict complex nutritional interactions between members of the nasal microbiome. Full article
(This article belongs to the Special Issue Metabolic Modeling of the Human Nasal Microbiome)
Show Figures

Graphical abstract

Back to TopTop