Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (59)

Search Parameters:
Keywords = resource-guarding

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
52 pages, 3006 KB  
Article
Empirical Performance Analysis of WireGuard vs. OpenVPN in Cloud and Virtualised Environments Under Simulated Network Conditions
by Joel Anyam, Rajiv Ranjan Singh, Hadi Larijani and Anand Philip
Computers 2025, 14(8), 326; https://doi.org/10.3390/computers14080326 - 13 Aug 2025
Viewed by 882
Abstract
With the rise in cloud computing and virtualisation, secure and efficient VPN solutions are essential for network connectivity. We present a systematic performance comparison of OpenVPN (v2.6.12) and WireGuard (v1.0.20210914) across Azure and VMware environments, evaluating throughput, latency, jitter, packet loss, and resource [...] Read more.
With the rise in cloud computing and virtualisation, secure and efficient VPN solutions are essential for network connectivity. We present a systematic performance comparison of OpenVPN (v2.6.12) and WireGuard (v1.0.20210914) across Azure and VMware environments, evaluating throughput, latency, jitter, packet loss, and resource utilisation. Testing revealed that the protocol performance is highly context dependent. In VMware environments, WireGuard demonstrated a superior TCP throughput (210.64 Mbps vs. 110.34 Mbps) and lower packet loss (12.35% vs. 47.01%). In Azure environments, both protocols achieved a similar baseline throughput (~280–290 Mbps), though OpenVPN performed better under high-latency conditions (120 Mbps vs. 60 Mbps). Resource utilisation showed minimal differences, with WireGuard maintaining slightly better memory efficiency. Security Efficiency Index calculations revealed environment-specific trade-offs: WireGuard showed marginal advantages in Azure, while OpenVPN demonstrated better throughput efficiency in VMware, though WireGuard remained superior for latency-sensitive applications. Our findings indicate protocol selection should be guided by deployment environment and application requirements rather than general superiority claims. Full article
(This article belongs to the Special Issue Cloud Computing and Big Data Mining)
Show Figures

Figure 1

26 pages, 17214 KB  
Article
Polyploid Induction Enhances Secondary Metabolite Biosynthesis in Clausena lansium: Morphological and Metabolomic Insights
by Yu Ding, Liangfang Wu, Hongyao Wei, Zhichun Zhang, Jietang Zhao, Guibing Hu, Yonghua Qin and Zhike Zhang
Agriculture 2025, 15(14), 1566; https://doi.org/10.3390/agriculture15141566 - 21 Jul 2025
Viewed by 515
Abstract
Polyploidy in plants can enhance stress resistance and secondary metabolite production, offering potential benefits for Clausena lansium (L.) Skeel, a medicinally valuable species. However, systematic studies of polyploidy-induced morphological, anatomical, and metabolic changes in this species are lacking. This study aimed to induce [...] Read more.
Polyploidy in plants can enhance stress resistance and secondary metabolite production, offering potential benefits for Clausena lansium (L.) Skeel, a medicinally valuable species. However, systematic studies of polyploidy-induced morphological, anatomical, and metabolic changes in this species are lacking. This study aimed to induce and characterize polyploid C. lansium lines, assess ploidy-dependent variations, and evaluate their impact on bioactive metabolite accumulation. Three cultivars were hybridized, treated with colchicine, and bred, yielding 13 stable polyploid lines confirmed by flow cytometry and chromosome counting. The polyploids exhibited distinct traits, including larger pollen grains, altered leaf margins, increased leaflet numbers, enlarged guard cells with reduced stomatal density, and thicker leaf tissues. Metabolomic analysis revealed that tetraploids accumulated significantly higher levels of flavonoids, alkaloids, and phenolic acids compared to diploids, while triploids showed moderate increases. These findings demonstrate that polyploidization, particularly tetraploidy, enhances C. lansium’s medicinal potential by boosting pharmacologically active compounds. The study expands germplasm resources and supports the development of high-quality cultivars for pharmaceutical applications. Full article
(This article belongs to the Special Issue Fruit Germplasm Resource Conservation and Breeding)
Show Figures

Figure 1

28 pages, 2783 KB  
Article
Blockchain-Enhanced Security for 5G Edge Computing in IoT
by Manuel J. C. S. Reis
Computation 2025, 13(4), 98; https://doi.org/10.3390/computation13040098 - 18 Apr 2025
Cited by 1 | Viewed by 2130
Abstract
The rapid expansion of 5G networks and edge computing has amplified security challenges in Internet of Things (IoT) environments, including unauthorized access, data tampering, and DDoS attacks. This paper introduces EdgeChainGuard, a hybrid blockchain-based authentication framework designed to secure 5G-enabled IoT systems through [...] Read more.
The rapid expansion of 5G networks and edge computing has amplified security challenges in Internet of Things (IoT) environments, including unauthorized access, data tampering, and DDoS attacks. This paper introduces EdgeChainGuard, a hybrid blockchain-based authentication framework designed to secure 5G-enabled IoT systems through decentralized identity management, smart contract-based access control, and AI-driven anomaly detection. By combining permissioned and permissionless blockchain layers with Layer-2 scaling solutions and adaptive consensus mechanisms, the framework enhances both security and scalability while maintaining computational efficiency. Using synthetic datasets that simulate real-world adversarial behaviour, our evaluation shows an average authentication latency of 172.50 s and a 50% reduction in gas fees compared to traditional Ethereum-based implementations. The results demonstrate that EdgeChainGuard effectively enforces tamper-resistant authentication, reduces unauthorized access, and adapts to dynamic network conditions. Future research will focus on integrating zero-knowledge proofs (ZKPs) for privacy preservation, federated learning for decentralized AI retraining, and lightweight anomaly detection models to enable secure, low-latency authentication in resource-constrained IoT deployments. Full article
Show Figures

Figure 1

16 pages, 225 KB  
Article
Anthropomorphizing with Critical Reflexivity: The Danger and Potential of Anthropomorphizing in Equine-Facilitated Learning and Psychotherapy
by Kelsey Dayle John, Aviva L. Vincent, Leanne O. Nieforth and Jamie Schafroth
Animals 2025, 15(4), 605; https://doi.org/10.3390/ani15040605 - 19 Feb 2025
Cited by 1 | Viewed by 1722
Abstract
This article used an intersectional feminist analytic framework to theorize the role of anthropomorphizing human–equine interactions in the HERD Institute’s modality for practitioners of Equine-facilitated learning and equine-facilitated psychotherapy (EFL/P). EFL/P is a traditionally human-centered activity which leverages anthropomorphizing equine behavior and emotions [...] Read more.
This article used an intersectional feminist analytic framework to theorize the role of anthropomorphizing human–equine interactions in the HERD Institute’s modality for practitioners of Equine-facilitated learning and equine-facilitated psychotherapy (EFL/P). EFL/P is a traditionally human-centered activity which leverages anthropomorphizing equine behavior and emotions to better understand human selves and dynamics by assigning human emotions to equids and human–equine interactions. Intersectional feminist theories were used to interpret 11 in-depth interviews with EFL/P practitioners. The data analysis identified anthropomorphizing behaviors which were used as the foundation for the creation of two vignettes. The vignettes present different ethical dilemmas of anthropomorphizing that may impact equine welfare in EFL/P explicitly discussed by interlocutors. One vignette examines interpreting and assigning human injustices within equine behavior (e.g., resource guarding) and the second engages with human interpretations of equine choice versus consent in an EFL/P session. The vignettes demonstrate how anthropomorphizing may be used to develop an understanding of human dynamics or equine welfare. The researchers suggest that the use of critical reflexivity when anthropomorphizing may increase attention toward equine welfare in EFL/P settings. As such, it may be beneficial to consider the development and refinement of EFL/P training/certification and continuing education. Full article
(This article belongs to the Special Issue Understanding the "Human Dimension" of Animal Health and Welfare)
24 pages, 529 KB  
Article
Analysis and Evaluation of Intel Software Guard Extension-Based Trusted Execution Environment Usage in Edge Intelligence and Internet of Things Scenarios
by Zhiyuan Wang and Yuezhi Zhou
Future Internet 2025, 17(1), 32; https://doi.org/10.3390/fi17010032 - 13 Jan 2025
Cited by 1 | Viewed by 1962
Abstract
With the extensive deployment and application of the Internet of Things (IoT), 5G and 6G technologies and edge intelligence, the volume of data generated by IoT and the number of intelligence applications derived from these data are rapidly growing. However, the absence of [...] Read more.
With the extensive deployment and application of the Internet of Things (IoT), 5G and 6G technologies and edge intelligence, the volume of data generated by IoT and the number of intelligence applications derived from these data are rapidly growing. However, the absence of effective mechanisms to safeguard the vast data generated by IoT, along with the security and privacy of edge intelligence applications, hinders their further development and adoption. In recent years, Trusted Execution Environment (TEE) has emerged as a promising technology for securing cloud data storage and cloud processing, demonstrating significant potential for ensuring data and application confidentiality in more scenarios. Nevertheless, applying TEE technology to enhance security in IoT and edge intelligence scenarios still presents several challenges. This paper investigates the technical challenges faced by current TEE solutions, such as performance overhead and I/O security issues, in the context of the resource constraints and data mobility that are inherent to IoT and edge intelligence applications. Using Intel Software Guard Extensions (SGX) technology as a case study, this paper validates these challenges through extensive experiments. The results provide critical assessments and analyses essential for advancing the development and usage of TEE in IoT and edge intelligence scenarios. Full article
(This article belongs to the Special Issue Edge Intelligence: Edge Computing for 5G and the Internet of Things)
Show Figures

Figure 1

26 pages, 29211 KB  
Article
Performance Evaluation of Deep Learning Image Classification Modules in the MUN-ABSAI Ice Risk Management Architecture
by Ravindu G. Thalagala, Oscar De Silva, Dan Oldford and David Molyneux
Sensors 2025, 25(2), 326; https://doi.org/10.3390/s25020326 - 8 Jan 2025
Viewed by 1268
Abstract
The retreat of Arctic sea ice has opened new maritime routes, offering faster shipping opportunities; however, these routes present significant navigational challenges due to the harsh ice conditions. To address these challenges, this paper proposes a deep learning-based Arctic ice risk management architecture [...] Read more.
The retreat of Arctic sea ice has opened new maritime routes, offering faster shipping opportunities; however, these routes present significant navigational challenges due to the harsh ice conditions. To address these challenges, this paper proposes a deep learning-based Arctic ice risk management architecture with multiple modules, including ice classification, risk assessment, ice floe tracking, and ice load calculations. A comprehensive dataset of 15,000 ice images was created using public sources and contributions from the Canadian Coast Guard, and it was used to support the development and evaluation of the system. The performance of the YOLOv8n-cls model was assessed for the ice classification modules due to its fast inference speed, making it suitable for resource-constrained onboard systems. The training and evaluation were conducted across multiple platforms, including Roboflow, Google Colab, and Compute Canada, allowing for a detailed comparison of their capabilities in image preprocessing, model training, and real-time inference generation. The results demonstrate that Image Classification Module I achieved a validation accuracy of 99.4%, while Module II attained 98.6%. Inference times were found to be less than 1 s in Colab and under 3 s on a stand-alone system, confirming the architecture’s efficiency in real-time ice condition monitoring. Full article
(This article belongs to the Special Issue AI-Based Computer Vision Sensors & Systems)
Show Figures

Figure 1

21 pages, 2042 KB  
Article
EdgeGuard: Decentralized Medical Resource Orchestration via Blockchain-Secured Federated Learning in IoMT Networks
by Sakshi Patni and Joohyung Lee
Future Internet 2025, 17(1), 2; https://doi.org/10.3390/fi17010002 - 25 Dec 2024
Cited by 3 | Viewed by 1259
Abstract
The development of medical data and resources has become essential for enhancing patient outcomes and operational efficiency in an age when digital innovation in healthcare is becoming more important. The rapid growth of the Internet of Medical Things (IoMT) is changing healthcare data [...] Read more.
The development of medical data and resources has become essential for enhancing patient outcomes and operational efficiency in an age when digital innovation in healthcare is becoming more important. The rapid growth of the Internet of Medical Things (IoMT) is changing healthcare data management, but it also brings serious issues like data privacy, malicious attacks, and service quality. In this study, we present EdgeGuard, a novel decentralized architecture that combines blockchain technology, federated learning, and edge computing to address those challenges and coordinate medical resources across IoMT networks. EdgeGuard uses a privacy-preserving federated learning approach to keep sensitive medical data local and to promote collaborative model training, solving essential issues. To prevent data modification and unauthorized access, it uses a blockchain-based access control and integrity verification system. EdgeGuard uses edge computing to improve system scalability and efficiency by offloading computational tasks from IoMT devices with limited resources. We have made several technological advances, including a lightweight blockchain consensus mechanism designed for IoMT networks, an adaptive edge resource allocation method based on reinforcement learning, and a federated learning algorithm optimized for medical data with differential privacy. We also create an access control system based on smart contracts and a secure multi-party computing protocol for model updates. EdgeGuard outperforms existing solutions in terms of computational performance, data value, and privacy protection across a wide range of real-world medical datasets. This work enhances safe, effective, and privacy-preserving medical data management in IoMT ecosystems while maintaining outstanding standards for data security and resource efficiency, enabling large-scale collaborative learning in healthcare. Full article
(This article belongs to the Special Issue Edge Intelligence: Edge Computing for 5G and the Internet of Things)
Show Figures

Figure 1

29 pages, 11145 KB  
Article
Total Power Factor Smart Contract with Cyber Grid Guard Using Distributed Ledger Technology for Electrical Utility Grid with Customer-Owned Wind Farm
by Emilio C. Piesciorovsky, Gary Hahn, Raymond Borges Hink and Aaron Werth
Electronics 2024, 13(20), 4055; https://doi.org/10.3390/electronics13204055 - 15 Oct 2024
Cited by 1 | Viewed by 1632
Abstract
In modern electrical grids, the numbers of customer-owned distributed energy resources (DERs) have increased, and consequently, so have the numbers of points of common coupling (PCC) between the electrical grid and customer-owned DERs. The disruptive operation of and out-of-tolerance outputs from DERs, especially [...] Read more.
In modern electrical grids, the numbers of customer-owned distributed energy resources (DERs) have increased, and consequently, so have the numbers of points of common coupling (PCC) between the electrical grid and customer-owned DERs. The disruptive operation of and out-of-tolerance outputs from DERs, especially owned DERs, present a risk to power system operations. A common protective measure is to use relays located at the PCC to isolate poorly behaving or out-of-tolerance DERs from the grid. Ensuring the integrity of the data from these relays at the PCC is vital, and blockchain technology could enhance the security of modern electrical grids by providing an accurate means to translate operational constraints into actions/commands for relays. This study demonstrates an advanced power system application solution using distributed ledger technology (DLT) with smart contracts to manage the relay operation at the PCC. The smart contract defines the allowable total power factor (TPF) of the DER output, and the terms of the smart contract are implemented using DLT with a Cyber Grid Guard (CGG) system for a customer-owned DER (wind farm). This article presents flowcharts for the TPF smart contract implemented by the CGG using DLT. The test scenarios were implemented using a real-time simulator containing a CGG system and relay in-the-loop. The data collected from the CGG system were used to execute the TPF smart contract. The desired TPF limits on the grid-side were between +0.9 and +1.0, and the operation of the breakers in the electrical grid and DER sides was controlled by the relay consistent with the provisions of the smart contract. The events from the real-time simulator, CGG, and relay showed a successful implementation of the TPF smart contract with CGG using DLT, proving the efficacy of this approach in general for implementing electrical grid applications for utilities with connections to customer-owned DERs. Full article
Show Figures

Figure 1

17 pages, 4894 KB  
Article
Multi-Criteria Analysis of Coast Guard Resource Deployment for Improvement of Maritime Safety and Environmental Protection: Case Study of Eastern Adriatic Sea
by Tomislav Sunko, Marko Mladineo, Mirjana Kovačić and Toni Mišković
Sustainability 2024, 16(17), 7531; https://doi.org/10.3390/su16177531 - 30 Aug 2024
Cited by 1 | Viewed by 1653
Abstract
European maritime states are facing increasing challenges that threaten national security, maritime traffic safety, and environmental protection: increasing maritime traffic, increase in nautical tourism, oil spills, migrant boats, drug smuggling, etc. The Coast Guard is one of the most important government agencies to [...] Read more.
European maritime states are facing increasing challenges that threaten national security, maritime traffic safety, and environmental protection: increasing maritime traffic, increase in nautical tourism, oil spills, migrant boats, drug smuggling, etc. The Coast Guard is one of the most important government agencies to respond to these challenges. However, the speed of response to incidents depends on the geographical and geostrategic deployment of Coast Guard resources, especially of its homeports. The main objective is to have the Coast Guard’s homeports as close as possible to the national border at sea so that the response time to an incident is as fast as possible. However, there are many other criteria that affect the selection of the maritime location of the Coast Guard homeport. These other criteria (security issues, logistic issues, hydrographic and oceanographic features, and similar) are often in conflict with geographical locations on small remote islands that are close to the state border at sea. Therefore, this research analyzed and proposed the criteria set used to assess the maritime locations that could be potential Coast Guard homeports. A large sample of experts has been interviewed to evaluate the proposed criteria set and to propose criteria weights, thus creating the multi-criteria analysis model for the improvement of the spatial distribution of Coast Guard resources. The proposed model is based on the PROMETHEE method and provides evaluation and ranking of the maritime locations in order to help the Government prioritize the development of the maritime locations into the homeports for the deployment of Coast Guard resources. The case study of the eastern Adriatic Sea with real-world maritime locations and data was used to test the proposed model. The results have shown that, with proper strategic planning of the deployment of Coast Guard resources, the sustainability, safety, and security of the sea and the coast can be increased. Full article
(This article belongs to the Section Environmental Sustainability and Applications)
Show Figures

Figure 1

16 pages, 3434 KB  
Review
Cellular Stress in Dry Eye Disease—Key Hub of the Vicious Circle
by Gysbert-Botho van Setten
Biology 2024, 13(9), 669; https://doi.org/10.3390/biology13090669 - 28 Aug 2024
Cited by 1 | Viewed by 2344
Abstract
Disturbance or insufficiency of the tear film challenges the regulatory systems of the ocular surfaces. The reaction of the surfaces includes temporary mechanisms engaged in the preservation of homeostasis. However, strong or persisting challenges can lead to the potential exhaustion of the coping [...] Read more.
Disturbance or insufficiency of the tear film challenges the regulatory systems of the ocular surfaces. The reaction of the surfaces includes temporary mechanisms engaged in the preservation of homeostasis. However, strong or persisting challenges can lead to the potential exhaustion of the coping capacity. This again activates the vicious circle with chronic inflammation and autocatalytic deterioration. Hence, the factors challenging the homeostasis should be addressed in time. Amongst them are a varying osmolarity, constant presence of small lesions at the epithelium, acidification, attrition with mechanical irritation, and onset of pain and discomfort. Each of them and, especially when occurring simultaneously, impose stress on the coping mechanisms and lead to a stress response. Many stressors can culminate, leading to an exhaustion of the coping capacity, outrunning normal resilience. Reaching the limits of stress tolerance leads to the manifestation of a lubrication deficiency as the disease we refer to as dry eye disease (DED). To postpone its manifestation, the avoidance or amelioration of stress factors is one key option. In DED, this is the target of lubrication therapy, substituting the missing tear film or its components. The latter options include the management of secondary sequelae such as the inflammation and activation of reparative cascades. Preventive measures include the enhancement in resilience, recovery velocity, and recovery potential. The capacity to handle the external load factors is the key issue. The aim is to guard homeostasis and to prevent intercellular stress responses from being launched, triggering and invigorating the vicious circle. Considering the dilemma of the surface to have to cope with increased time of exposure to stress, with simultaneously decreasing time for cellular recovery, it illustrates the importance of the vicious circle as a hub for ocular surface stress. The resulting imbalance triggers a continuous deterioration of the ocular surface condition. After an initial phase of the reaction and adaption of the ocular surface to the surrounding challenges, the normal coping capacity will be exhausted. This is the time when the integrated stress response (ISR), a protector for cellular survival, will inevitably be activated, and cellular changes such as altered translation and ribosome pausing are initiated. Once activated, this will slow down any recovery, in a phase where apoptosis is imminent. Premature senescence of cells may also occur. The process of prematurization due to permanent stress exposures contributes to the risk for constant deterioration. The illustrated flow of events in the development of DED outlines that the ability to cope, and to recover, has limited resources in the cells at the ocular surface. The reduction in and amelioration of stress hence should be one of the key targets of therapy and begin early. Here, lubrication optimization as well as causal treatment such as the correction of anatomical anomalies (leading to anatomical dry eye) should be a prime intent of any therapy. The features of cellular stress as a key hub for the vicious circle will be outlined and discussed. Full article
(This article belongs to the Special Issue New Horizons in Ocular Surface Biology)
Show Figures

Figure 1

24 pages, 2384 KB  
Article
Optimized Decisions for Smart Tourism Destinations: A Cross-Generational Perspective Using an Improved Importance–Performance Analysis
by Elena-Aurelia Botezat, Olimpia-Iuliana Ban, Adela Laura Popa, Dorin-Cristian Coita and Teodora Mihaela Tarcza
Systems 2024, 12(8), 297; https://doi.org/10.3390/systems12080297 - 12 Aug 2024
Cited by 4 | Viewed by 2728
Abstract
Our study introduces an enhanced version of the Importance–Performance Analysis (IPA) method, a powerful tool that can be applied across various domains. This method plays a crucial role in our research, aiding in making well-informed decisions about smart tourism destination attributes. We achieved [...] Read more.
Our study introduces an enhanced version of the Importance–Performance Analysis (IPA) method, a powerful tool that can be applied across various domains. This method plays a crucial role in our research, aiding in making well-informed decisions about smart tourism destination attributes. We achieved this by evaluating how 911 consumers from four different generations (Baby Boomers, Generation X, Millennials, and Generation Z) rated these attributes based on their most recent tourist destination visit. Unlike traditional methods that often rely on subjective opinions or complex statistical models, the Improved IPA (IIPA) method offers a clear approach to decision-making. It enables decision-makers to focus on the most crucial attributes that drive consumer interest, thereby optimizing resource allocation and marketing efforts. Specifically, to remain competitive, decision-makers for smart tourist destinations should focus on queuing-time forecast and applications, websites, and content accessible for travelers with disabilities for Baby Boomers; e-complaint handling for Generation X; smart emergency response system for Millennials; and tourist-flow forecast, real-time traffic broadcast, electronic-entrance guard systems, and accessible data about physical design features of accommodation, restaurants, and tourist attractions for Generation Z. Theoretically, this study advances the research on managerial decision-making by demonstrating the effectiveness of the IIPA as a clear and straightforward method for making optimal decisions about product or service attributes. In practice, the study provides decision-makers with valuable insights into the importance of different categories of smart attributes in shaping the overall holiday experience at a tourist destination for Baby Boomers, Generation X, Millennials, and Generation Z tourism consumers. Full article
Show Figures

Figure 1

32 pages, 8824 KB  
Article
Trust Management and Resource Optimization in Edge and Fog Computing Using the CyberGuard Framework
by Ahmed M. Alwakeel and Abdulrahman K. Alnaim
Sensors 2024, 24(13), 4308; https://doi.org/10.3390/s24134308 - 2 Jul 2024
Cited by 5 | Viewed by 2024
Abstract
The growing importance of edge and fog computing in the modern IT infrastructure is driven by the rise of decentralized applications. However, resource allocation within these frameworks is challenging due to varying device capabilities and dynamic network conditions. Conventional approaches often result in [...] Read more.
The growing importance of edge and fog computing in the modern IT infrastructure is driven by the rise of decentralized applications. However, resource allocation within these frameworks is challenging due to varying device capabilities and dynamic network conditions. Conventional approaches often result in poor resource use and slowed advancements. This study presents a novel strategy for enhancing resource allocation in edge and fog computing by integrating machine learning with the blockchain for reliable trust management. Our proposed framework, called CyberGuard, leverages the blockchain’s inherent immutability and decentralization to establish a trustworthy and transparent network for monitoring and verifying edge and fog computing transactions. CyberGuard combines the Trust2Vec model with conventional machine-learning models like SVM, KNN, and random forests, creating a robust mechanism for assessing trust and security risks. Through detailed optimization and case studies, CyberGuard demonstrates significant improvements in resource allocation efficiency and overall system performance in real-world scenarios. Our results highlight CyberGuard’s effectiveness, evidenced by a remarkable accuracy, precision, recall, and F1-score of 98.18%, showcasing the transformative potential of our comprehensive approach in edge and fog computing environments. Full article
Show Figures

Figure 1

17 pages, 2509 KB  
Review
In Situ and Ex Situ Conservation of Ornamental Geophytes in Poland
by Dariusz Sochacki, Przemysław Marciniak, Małgorzata Zajączkowska, Jadwiga Treder and Patrycja Kowalicka
Sustainability 2024, 16(13), 5375; https://doi.org/10.3390/su16135375 - 25 Jun 2024
Cited by 4 | Viewed by 1891
Abstract
The protection of biological diversity in nature and in agriculture, including the production of ornamental crops, has become increasingly important in Poland as well as worldwide. The Convention on Biological Diversity, signed in 1992 at the Earth Summit of the UN in Rio [...] Read more.
The protection of biological diversity in nature and in agriculture, including the production of ornamental crops, has become increasingly important in Poland as well as worldwide. The Convention on Biological Diversity, signed in 1992 at the Earth Summit of the UN in Rio de Janeiro and ratified by the Polish government in 1995, imposed new regulations related to the protection of nature and the genetic resources of cultivated crops in Poland. The conservation of the genera, varieties and cultivars of ornamental geophytes—a group of plants of great interest from a botanical and physiological, but also a horticultural point of view—takes place in situ (both in nature and in the places of cultivation) and through the establishment of ex situ gene banks and collections. The natural genetic resources of ornamental geophytes include species from the genera Allium, Fritillaria, Gladiolus, Iris, Leucojum, Lilium and Muscari, among others, and more than a dozen species are protected by law due to varying degrees of threats. Botanical gardens play an essential role in the conservation of endangered species. Their activities focus on genus monitoring, managing ex situ gene banks (including National Collections), developing propagation methods and carrying out their reintroduction. In order to protect the national genetic resources of cultivated plants, the National Centre for Plant Genetic Resources at the Plant Breeding and Acclimatisation Institute—National Research Institute, under the auspices of the Ministry of Agriculture and Rural Development, was established. Concerning ornamental geophytes, the National Centre coordinates two field collections of cultivars of the genera Gladiolus, Lilium, Narcissus and Tulipa, which are of great economic importance and have a long tradition of breeding in Poland. The first one is located at the National Institute of Horticultural Research in Skierniewice (central Poland), and the second one is at the Experimental Substation of Variety Testing in Lisewo (northern Poland). The history of tulip collections in Poland dates back to the 1960s. At that time, the first breeding work for this species began. The collection of bulbous crops in Skierniewice is currently one of the largest in Poland, with a total of 934 accessions. Most of them are tulips (522) and lilies (222). Other plants in the collection in Skierniewice are gladiolus and narcissus. The most valuable accessions are grown under special protection (tunnels with dense nets) to guard against insects and maintain a mild climate inside. The genetic resources of the ornamental bulb plant collection in Lisewo currently consist of 611 accessions, mainly tulips (358), daffodils (121) and gladioli (132). All bulbous crops in both collections (Skierniewice and Lisewo) are grown in accordance with all principles of agrotechnics (negative field selection, fertilisation, soil maintenance). A particularly important task of botanical gardens, universities, research institutes and the National Centre is leading research on the methods of storage for survival organs, in vitro cultures and cryopreservation. We have discovered that the various activities for the species conservation of ornamental geophytes require a great deal of constantly deepening knowledge and extraordinary measures, including frequent monitoring of the effects of the applied measures. Full article
(This article belongs to the Section Sustainability, Biodiversity and Conservation)
Show Figures

Figure 1

20 pages, 4918 KB  
Article
Reducing Artisanal Fishery Impact on Marine Community: New Data from Comparison of Innovative and Traditional Gear
by Manfredi Madia, Massimiliano Bottaro, Tiziana Cillari, Andrea Li Vorsi, Luca Castriota, Maria Rita Amico, Sergio Bizzarri, Teresa Maggio, Manuela Falautano, Michele Gristina, Ilaria Di Lauro, Floriana Trova, Patrizia Perzia, Roberto D’Ambra, Enrico Casola and Mauro Sinopoli
Fishes 2024, 9(5), 171; https://doi.org/10.3390/fishes9050171 - 8 May 2024
Viewed by 1932
Abstract
Fishery resources overexploitation, together with bycatch and discards, have an impact on marine ecosystems. The adoption of technologically innovative gears is a possible solution to reduce the discard and to enhance the sustainability of fishery, mainly in artisanal fisheries that represent about 80% [...] Read more.
Fishery resources overexploitation, together with bycatch and discards, have an impact on marine ecosystems. The adoption of technologically innovative gears is a possible solution to reduce the discard and to enhance the sustainability of fishery, mainly in artisanal fisheries that represent about 80% of the EU Mediterranean fleet. In the perspective of fishery sustainability, it is necessary to study and test alternative gears to the traditional ones, also with collaboration of fishers. In the present study, results of experimental fishing activities carried out in two Mediterranean areas with traditional and innovative gears of small-scale fishing are reported. Thirty-four hauls were carried out to compare the catch of two types of trammel nets: a traditional one and experimental guarding net. Additionally, 12 hauls were carried out to compare collapsible pots and traditional pots. No significant differences were recorded between trammel nets in terms of commercial catch and discard. However, interesting differences in discard composition were recorded, with higher Elasmobranchs presence in trammel nets, including species assessed as critically endangered and vulnerable. The use of trapula pots in place of traditional ones showed a lower discard of specific resources and an advantage for fishers in terms of space occupied on board. Full article
(This article belongs to the Section Fishery Facilities, Equipment, and Information Technology)
Show Figures

Figure 1

17 pages, 5318 KB  
Article
Orchestrating Isolated Network Slices in 5G Networks
by Ali Esmaeily and Katina Kralevska
Electronics 2024, 13(8), 1548; https://doi.org/10.3390/electronics13081548 - 18 Apr 2024
Cited by 4 | Viewed by 1761
Abstract
Sharing resources through network slicing in a physical infrastructure facilitates service delivery to various sectors and industries. Nevertheless, ensuring security of the slices remains a significant hurdle. In this paper, we investigate the utilization of State-of-the-Art (SoA) Virtual Private Network (VPN) solutions in [...] Read more.
Sharing resources through network slicing in a physical infrastructure facilitates service delivery to various sectors and industries. Nevertheless, ensuring security of the slices remains a significant hurdle. In this paper, we investigate the utilization of State-of-the-Art (SoA) Virtual Private Network (VPN) solutions in 5G networks to enhance security and performance when isolating slices. We deploy and orchestrate cloud-native network functions to create multiple scenarios that emulate real-life cellular networks. We evaluate the performance of the WireGuard, IPSec, and OpenVPN solutions while ensuring confidentiality and data protection within 5G network slices. The proposed architecture provides secure communication tunnels and performance isolation. Evaluation results demonstrate that WireGuard provides slice isolation in the control and data planes with higher throughput for enhanced Mobile Broadband (eMBB) and lower latency for Ultra-Reliable Low-Latency Communications (URLLC) slices compared to IPSec and OpenVPN. Our developments show the potential of implementing WireGuard isolation, as a promising solution, for providing secure and efficient network slicing, which fulfills the 5G key performance indicator values. Full article
Show Figures

Figure 1

Back to TopTop