[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (2,021)

Search Parameters:
Keywords = defensibility model

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
16 pages, 704 KiB  
Review
The Invertebrate Immunocyte: A Complex and Versatile Model for Immunological, Developmental, and Environmental Research
by Sandro Sacchi, Davide Malagoli and Nicola Franchi
Cells 2024, 13(24), 2106; https://doi.org/10.3390/cells13242106 (registering DOI) - 19 Dec 2024
Abstract
The knowledge of comparative and developmental immunobiology has grown over the years and has been strengthened by the contributions of multi-omics research. High-performance microscopy, flow cytometry, scRNA sequencing, and the increased capacity to handle complex data introduced by machine learning have allowed the [...] Read more.
The knowledge of comparative and developmental immunobiology has grown over the years and has been strengthened by the contributions of multi-omics research. High-performance microscopy, flow cytometry, scRNA sequencing, and the increased capacity to handle complex data introduced by machine learning have allowed the uncovering of aspects of great complexity and diversity in invertebrate immunocytes, i.e., immune-related circulating cells, which until a few years ago could only be described in terms of morphology and basic cellular functions, such as phagocytosis or enzymatic activity. Today, invertebrate immunocytes are recognized as sophisticated biological entities, involved in host defense, stress response, wound healing, organ regeneration, but also in numerous functional aspects of organismal life not directly related to host defense, such as embryonic development, metamorphosis, and tissue homeostasis. The multiple functions of immunocytes do not always fit the description of invertebrate organisms as simplified biological systems compared to those represented by vertebrates. However, precisely the increasing complexity revealed by immunocytes makes invertebrate organisms increasingly suitable models for addressing biologically significant and specific questions, while continuing to present the undeniable advantages associated with their ethical and economic sustainability. Full article
(This article belongs to the Section Cellular Immunology)
15 pages, 2951 KiB  
Article
Role of Polyphosphate as an Inorganic Chaperone to Prevent Protein Aggregation Under Copper Stress in Saccharolobus solfataricus
by José Acevedo-López, Gabriela González-Madrid, Claudio A. Navarro and Carlos A. Jerez
Microorganisms 2024, 12(12), 2627; https://doi.org/10.3390/microorganisms12122627 - 18 Dec 2024
Viewed by 169
Abstract
Polyphosphates are biopolymers composed of phosphate monomers linked by high-energy phosphoanhydride bonds. They are present across all life domains, serving as a source of energy, metal chelators, and playing a crucial role in stress defense. In Escherichia coli, polyphosphates also function as [...] Read more.
Polyphosphates are biopolymers composed of phosphate monomers linked by high-energy phosphoanhydride bonds. They are present across all life domains, serving as a source of energy, metal chelators, and playing a crucial role in stress defense. In Escherichia coli, polyphosphates also function as inorganic molecular chaperones. The present study aims to investigate whether polyphosphate serves a similar chaperone function in archaea, using Saccharolobus solfataricus as a model organism. To this end, polyphosphate was extracted and quantified, the ADP/ATP ratio was determined, insoluble protein extracts were analyzed at different time points after copper exposure, and qPCR was performed to measure the expression of stress-related genes. PolyP was extracted after exposing the archaeon S. solfataricus to different copper concentrations. We determined that polyP degradation is directly correlated with metal concentration. At the minimum inhibitory concentration (MIC) of 2 mM Cu2+, polyP degradation stabilized 2 h after exposure and showed no recovery even after 24 h. The ADP/ATP ratio was measured and showed differences in the presence or absence of polyP. The analysis of proteins precipitated under copper stress showed a higher proportion of insoluble proteins at an elevated metal concentration. On the other hand, increased protein precipitation was detected in the absence of polyP. Gene expression analysis via qPCR was conducted to assess the expression of genes involved in chaperone and chaperonin production, copper resistance, oxidative stress response, and phosphate metabolism under prolonged copper exposure, both in the presence and absence of polyP. The results indicated an upregulation of all the chaperonins measured in the presence of polyP. Interestingly, just some of these genes were upregulated in polyP’s absence. Despite copper stress, there was no upregulation of superoxide dismutase in our conditions. These results highlight the role of polyP in the copper stress response in S. solfataricus, particularly to prevent protein precipitation, likely due to its function as an inorganic chaperone. Additionally, the observed protein precipitation could be attributable to interactions between copper and some amino acids on the protein structures rather than oxidative stress induced by copper exposure, as previously described in E. coli. Our present findings provide new insights into the protective role of polyP as an inorganic chaperone in S. solfataricus and emphasize its importance in maintaining cellular homeostasis under metal stress conditions. Full article
(This article belongs to the Section Microbial Biotechnology)
Show Figures

Figure 1

Figure 1
<p>Polyphosphate degradation in <span class="html-italic">S. solfataricus</span> M16 (polyP+) and ADP/ATP ratio during copper stress in the presence (M16) or absence of polyP (M16-PPX). (<b>A</b>) Colored lines represent polyP levels measured at different time points following exposure to varying Cu<sup>2+</sup> concentrations. Measurements represent the average of three biological replicates, with error bars indicating standard deviations. (<b>B</b>) In gray and pink is the ADP/ATP ratio for <span class="html-italic">S. solfataricus</span> M16 (polyP+) under 0.5 and 2 mM Cu<sup>2+</sup> stress, respectively. In light blue is the ADP/ATP ratio for <span class="html-italic">S. solfataricus</span> M16-PPX strain (polyP–). Measurements represent the average of three biological replicates, with error bars indicating standard deviations. Data were analyzed using a two-way ANOVA, followed by post hoc multiple comparison tests: Bonferroni’s test was applied for paired comparisons, while Tukey’s test was used for independent group comparisons. Statistical significance is indicated as follows: * = <span class="html-italic">p</span> ≤ 0.05, ** = <span class="html-italic">p</span> ≤ 0.01 (Bonferroni’s test); # = <span class="html-italic">p</span> ≤ 0.05, ## = <span class="html-italic">p</span> ≤ 0.01 (Tukey’s test).</p>
Full article ">Figure 2
<p>Ratio of insoluble proteins in <span class="html-italic">S. solfataricus</span> at different copper concentrations in the presence or absence of polyP. In gray and pink is the ADP/ATP ratio for <span class="html-italic">S. solfataricus</span> M16 (polyP+) under 0.5 and 2 mM Cu<sup>2+</sup> stress, respectively. In light blue is the ADP/ATP ratio for <span class="html-italic">S. solfataricus</span> M16-PPX strain (polyP−). Measurements represent the average of three biological replicates, with error bars indicating standard deviations. Data were analyzed using a two-way ANOVA, followed by post hoc multiple comparison tests: Bonferroni’s test was applied for paired comparisons, while Tukey’s test was used for independent group comparisons. Statistical significance is indicated as follows: * = <span class="html-italic">p</span> ≤ 0.05, ** = <span class="html-italic">p</span> ≤ 0.01 (Bonferroni’s test); # = <span class="html-italic">p</span> ≤ 0.05, ## = <span class="html-italic">p</span> ≤ 0.01 (Tukey’s test).</p>
Full article ">Figure 3
<p>Protein precipitation by the presence of copper is more intense in polyP (−) strain. SDS-PAGE gel with insoluble protein extracted from <span class="html-italic">S. solfataricus</span> M16 (polyP+) compared with 0.5 and 2 mM Cu<sup>2+</sup> stress, and <span class="html-italic">S. solfataricus</span> (polyP−) in the presence of 2 mM Cu<sup>2+</sup>. In total, 10 µL of protein suspensions was loaded in each line and stained with Coomassie blue.</p>
Full article ">Figure 4
<p>The growth of both strains is not affected by 4 h stress at the MIC of copper. Blue curve for M16 (polyP+) strain; the orange curve for M16-PPX (polyP−) strain. Measurements are the average of three biological replicates. The error bars represent the standard deviations.</p>
Full article ">Figure 5
<p>Changes in the transcriptional expression of stress-related genes after 4 h of copper stress in <span class="html-italic">S. solfataricus</span> M16 (polyP+) and M16-PPX (polyP−) via qPCR. Measurements represent the average of three biological replicates, with error bars indicating standard deviations. Data were analyzed using a two-way ANOVA, followed by post hoc multiple comparison tests: Bonferroni’s test was applied for paired comparisons, while Tukey’s test was used for independent group comparisons. Statistical significance is indicated as follows: ns = not significant; * = <span class="html-italic">p</span> ≤ 0.05 (Bonferroni’s test) and ns = not significant; # = <span class="html-italic">p</span> ≤ 0.05 (Tukey’s test).</p>
Full article ">
16 pages, 672 KiB  
Article
Risk Factors for Love Addiction in a Sample of Young Adult Students: A Multiple Mediation Model Exploring the Role of Adult Attachment, Separation Anxiety, and Defense Mechanisms
by Eleonora Topino, Marco Cacioppo, Shady Dell’Amico and Alessio Gori
Behav. Sci. 2024, 14(12), 1222; https://doi.org/10.3390/bs14121222 - 18 Dec 2024
Viewed by 286
Abstract
In certain situations, romantic engagement with a partner can have detrimental effects on an individual’s well-being and overall health, exhibiting features attributable to addictive behaviors. Considering the clinical significance of this phenomenon and its prevalence among adolescents and young adults, the objective of [...] Read more.
In certain situations, romantic engagement with a partner can have detrimental effects on an individual’s well-being and overall health, exhibiting features attributable to addictive behaviors. Considering the clinical significance of this phenomenon and its prevalence among adolescents and young adults, the objective of this study was to investigate the potential associations between some risk factors for love addiction in a sample of university students, with a specific focus on adult attachment, separation anxiety, and defense mechanisms. A total of 332 participants (Mage = 23 years; SD = 2.462) completed a survey consisting of the Love Addiction Inventory—Short Form, Relationship Questionnaire, Seven Domains Addiction Scale (Separation Anxiety domain), and Forty Item Defense Style Questionnaire. The data were analyzed using Pearson’s correlation, and a multiple mediation model was also implemented. Results showed that fearful attachment was significantly and positively associated with love addiction. Furthermore, this relationship was mediated by separation anxiety and neurotic/immature defense mechanisms too. These findings contribute to the existing literature on love addiction and provide valuable insights for future research and clinical practice. Full article
(This article belongs to the Special Issue Wellbeing and Mental Health among Students)
Show Figures

Figure 1

Figure 1
<p>The Multiple Mediation Model. <b><span class="html-italic">Note</span></b>: * &lt; 0.05; ** &lt; 0.01; *** &lt; 0.001. Dashed lines represent non-significant associations; non-dashed lines represent significant associations.</p>
Full article ">
21 pages, 1063 KiB  
Article
Multi-Stage Dual-Perturbation Attack Targeting Transductive SVMs and the Corresponding Adversarial Training Defense Mechanism
by Li Liu, Haiyan Chen, Changchun Yin and Yirui Fu
Electronics 2024, 13(24), 4984; https://doi.org/10.3390/electronics13244984 - 18 Dec 2024
Viewed by 215
Abstract
The Transductive Support Vector Machine (TSVM) is an effective semi-supervised learning algorithm vulnerable to adversarial sample attacks. This paper proposes a new adversarial attack method called the Multi-Stage Dual-Perturbation Attack (MSDPA), specifically targeted at TSVMs. The MSDPA has two phases: initial adversarial samples [...] Read more.
The Transductive Support Vector Machine (TSVM) is an effective semi-supervised learning algorithm vulnerable to adversarial sample attacks. This paper proposes a new adversarial attack method called the Multi-Stage Dual-Perturbation Attack (MSDPA), specifically targeted at TSVMs. The MSDPA has two phases: initial adversarial samples are generated by an arbitrary range attack, and finer attacks are performed on critical features to induce the TSVM to generate false predictions. To improve the TSVM’s defense against MSDPAs, we incorporate adversarial training into the TSVM’s loss function to minimize the loss of both standard and adversarial samples during the training process. The improved TSVM loss function considers the adversarial samples’ effect and enhances the model’s adversarial robustness. Experimental results on several standard datasets show that our proposed adversarial defense-enhanced TSVM (adv-TSVM) performs better in classification accuracy and adversarial robustness than the native TSVM and other semi-supervised baseline algorithms, such as S3VM. This study provides a new solution to improve the defense capability of kernel methods in an adversarial setting. Full article
(This article belongs to the Special Issue Novel Methods Applied to Security and Privacy Problems, Volume II)
Show Figures

Figure 1

Figure 1
<p>Proposed method framework: The process of training adv-TSVM using MSDPA. Black dots represent raw data points, colored dots represent perturbed data points, and arrows represent the data flow after MSDPA attack.</p>
Full article ">Figure 2
<p>Schematic of Multi-Stage Dual-Perturbation Attack (MSDPA) strategy. Training data feeds into Machine learning model (red rectangle). MSDPA attack module (purple rectangle) has two stages, colored dots represent different data categories.</p>
Full article ">Figure 3
<p>Illustration of adv-TSVM. Different colored dots in “Generating Adversarial Examples” denote original and perturbed data. Arrows, like from “Classification DataSet” to “Machine Learning Model” and from “MSDPA Attack” to it, show data flow and attack application.</p>
Full article ">Figure 4
<p>Analysis of the impact of adversarial sample ratio and loss weight on model performance in the Credit Card Fraud dataset. (<b>a</b>) depicts how the proportion of adversarial samples affects the model’s standard and adversarial accuracy. As the proportion rises, standard accuracy falls while adversarial accuracy rises, peaking at a certain proportion. (<b>b</b>) shows the influence of adversarial loss weights <math display="inline"><semantics> <msub> <mi>λ</mi> <mn>1</mn> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>λ</mi> <mn>2</mn> </msub> </semantics></math> on the model’s adversarial accuracy. Different values of <math display="inline"><semantics> <msub> <mi>λ</mi> <mn>1</mn> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>λ</mi> <mn>2</mn> </msub> </semantics></math> lead to varying levels of accuracy.</p>
Full article ">Figure 5
<p>Algorithm convergence behavior and efficiency analysis. (<b>a</b>) shows the convergence curves of different losses during training. Initially, the adv-TSVM losses are higher due to additional terms, but they converge faster than the TSVM standard loss in the first 200 iterations. After that, the losses decrease slowly, with the adversarial loss converging slightly slower. (<b>b</b>) compares the average training time and memory usage of various algorithms. The adv-TSVM’s training time is only about 18% longer than the original TSVM, and the memory usage is nearly the same, indicating its efficiency.</p>
Full article ">
22 pages, 4238 KiB  
Article
A Rule-Based Agent for Unmanned Systems with TDGG and VGD for Online Air Target Intention Recognition
by Li Chen, Jing Yang, Yuzhen Zhou, Yanxiang Ling and Jialong Zhang
Drones 2024, 8(12), 765; https://doi.org/10.3390/drones8120765 - 18 Dec 2024
Viewed by 198
Abstract
Air target intention recognition (ATIR) is critical for unmanned systems in modern air defense operations. Through the analysis of typical air defense combat scenarios, first, the paper defines the intention space and intention parameters of air units based on military experience and domain [...] Read more.
Air target intention recognition (ATIR) is critical for unmanned systems in modern air defense operations. Through the analysis of typical air defense combat scenarios, first, the paper defines the intention space and intention parameters of air units based on military experience and domain knowledge. Then, a rule-based agent for unmanned systems for online intention recognition is proposed, with no training, no tagging, and no big data support, which is not only for intention recognition and parameter prediction, but also for formation identification of air targets. The most critical point of the agent is the introduction and application of a thermal distribution grid graph (TDGG) and virtual grid dictionary (VGD), where the former is used to identify the formation information of air targets, and the latter is used to optimize the storage space and simplify the access process for the large-scale and real-time combat information. Finally, to have a performance evaluation and application analysis for the algorithm, we carried out a data instance analysis of ATIR for unmanned systems and an air defense warfare simulation experiment based on a Wargame platform; the comparative experiments with the classical k-means, FCNIRM, and the sector-based forward search method verified the effectiveness and feasibility of the proposed agent, which characterizes it as a promising tool or baseline model for the battlefield situational awareness tasks of unmanned systems. Full article
Show Figures

Figure 1

Figure 1
<p>Online intention recognition task setup for unmanned system. The task mainly consists of the following four parts: (1) The input: including our situation information and enemy’s intelligence information; (2) information access: firstly, the adversarial space is divided into grids, then a TDGG is constructed to process situation information, and finally a VGD is generated for situation access; (3) intention recognition: including the formation identification, intention recognition, and parameter prediction; and (4) the output: the inferred intention and intention parameters of all detected enemy air targets are output.</p>
Full article ">Figure 2
<p>Example of identification process of suspected formation based on the thermal distribution graph. Assuming formation decision threshold <math display="inline"><semantics> <mrow> <msub> <mi>f</mi> <mrow> <mi>t</mi> <mi>h</mi> <mi>r</mi> </mrow> </msub> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math>, first, at current time, (<b>a</b>) point <span class="html-italic">A</span> is one of the maximum thermal value points. Since the grid increment of empirical radius <math display="inline"><semantics> <msub> <mi>R</mi> <mrow> <mi>e</mi> <mi>m</mi> <mi>p</mi> </mrow> </msub> </semantics></math> for the formation area is taken as 2 (<math display="inline"><semantics> <mrow> <mo>Δ</mo> <msub> <mi>N</mi> <mrow> <mi>l</mi> <mi>a</mi> <mi>t</mi> </mrow> </msub> <mo>=</mo> <mo>Δ</mo> <msub> <mi>N</mi> <mrow> <mi>l</mi> <mi>o</mi> <mi>n</mi> </mrow> </msub> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>), the four air targets [F16-01, F16-02, F16-03, F16-04] in the red square centered on point <span class="html-italic">A</span> form the first suspected formation. Then, save the first group of suspected formation members and update the thermal distribution graph (the members of this group are deleted). And (<b>b</b>) the maximum value point is recorded as <span class="html-italic">A</span> on the new graph; similarly, we can obtain the second suspected formation [F16-05, F16-06, F16-07].</p>
Full article ">Figure 3
<p>Schematic diagram of flight trajectory and spherical angle solution. If the angle <math display="inline"><semantics> <msub> <mi>h</mi> <mi>B</mi> </msub> </semantics></math> between <math display="inline"><semantics> <mover accent="true"> <mrow> <mi>A</mi> <mi>B</mi> </mrow> <mo>^</mo> </mover> </semantics></math> and due north, <math display="inline"><semantics> <msub> <mi>h</mi> <mi>C</mi> </msub> </semantics></math> between arc <math display="inline"><semantics> <mover accent="true"> <mrow> <mi>B</mi> <mi>C</mi> </mrow> <mo>^</mo> </mover> </semantics></math> and due north, and the heading angle <math display="inline"><semantics> <msub> <mi>h</mi> <mn>0</mn> </msub> </semantics></math> at the current time on the sphere are less than the threshold value <math display="inline"><semantics> <msub> <mi>h</mi> <mrow> <mi>t</mi> <mi>h</mi> <mi>r</mi> <mi>d</mi> </mrow> </msub> </semantics></math>, the aircraft can be considered to be in the direct flight mode.</p>
Full article ">Figure 4
<p>Clustering results of k-means.</p>
Full article ">Figure 5
<p>TDGG of air targets at current time <span class="html-italic">t</span>. The larger the number is, the darker the color is, and the more likely the air targets in the square area <math display="inline"><semantics> <mrow> <mo>(</mo> <mo>Δ</mo> <msub> <mi>N</mi> <mrow> <mi>l</mi> <mi>a</mi> <mi>t</mi> </mrow> </msub> <mo>=</mo> <mo>Δ</mo> <msub> <mi>N</mi> <mrow> <mi>l</mi> <mi>o</mi> <mi>n</mi> </mrow> </msub> <mo>=</mo> <mn>3</mn> <mo>)</mo> </mrow> </semantics></math> are to fight in groups.</p>
Full article ">Figure 6
<p>The current overall situation with visual information of TDGG and VGD for intention recognition.</p>
Full article ">Figure 7
<p>Intention recognition results of the model FCNIRM.</p>
Full article ">Figure 8
<p>Illustration of aircraft J16-04E and S25-03E forward search based on a 60-degree-angle sector.</p>
Full article ">Figure 9
<p>Recognition of the blue side’s intention—combat support—by the game agent of the red side.</p>
Full article ">Figure 10
<p>Recognition of the blue side’s intention—maneuvering—by the game agent of the red side.</p>
Full article ">Figure 11
<p>Recognition of the blue side’s intention—assemble for standby—by the game agent of the red side.</p>
Full article ">
23 pages, 1238 KiB  
Article
Leveraging Multiple Adversarial Perturbation Distances for Enhanced Membership Inference Attack in Federated Learning
by Fan Xia, Yuhao Liu, Bo Jin, Zheng Yu, Xingwei Cai, Hao Li, Zhiyong Zha, Dai Hou and Kai Peng
Symmetry 2024, 16(12), 1677; https://doi.org/10.3390/sym16121677 - 18 Dec 2024
Viewed by 195
Abstract
In recent years, federated learning (FL) has gained significant attention for its ability to protect data privacy during distributed training. However, it also introduces new privacy leakage risks. Membership inference attacks (MIAs), which aim to determine whether a specific sample is part of [...] Read more.
In recent years, federated learning (FL) has gained significant attention for its ability to protect data privacy during distributed training. However, it also introduces new privacy leakage risks. Membership inference attacks (MIAs), which aim to determine whether a specific sample is part of the training dataset, pose a significant threat to federated learning. Existing research on membership inference attacks in federated learning has primarily focused on leveraging intrinsic model parameters or manipulating the training process. However, the widespread adoption of privacy-preserving frameworks in federated learning has significantly diminished the effectiveness of traditional attack methods. To overcome this limitation, this paper aims to explore an efficient Membership Inference Attack algorithm tailored for encrypted federated learning scenarios, providing new perspectives for optimizing privacy-preserving technologies. Specifically, this paper proposes a novel Membership Inference Attack algorithm based on multiple adversarial perturbation distances (MAPD_MIA) by leveraging the asymmetry in adversarial perturbation distributions near decision boundaries between member and non-member samples. By analyzing these asymmetric perturbation characteristics, the algorithm achieves accurate membership identification. Experimental results demonstrate that the proposed algorithm achieves accuracy rates of 63.0%, 68.7%, and 59.5%, and precision rates of 59.0%, 65.9%, and 55.8% on CIFAR10, CIFAR100, and MNIST datasets, respectively, outperforming three mainstream Membership Inference Attack methods. Furthermore, the algorithm exhibits robust attack performance against two common defense mechanisms, MemGuard and DP-SGD. This study provides new benchmarks and methodologies for evaluating membership privacy leakage risks in federated learning scenarios. Full article
(This article belongs to the Section Engineering and Materials)
Show Figures

Figure 1

Figure 1
<p>(<b>a</b>) The minimum perturbation distances of training and testing samples near the decision boundary in CIFAR10; (<b>b</b>) Boxplot of multiple adversarial perturbation distances for training and testing samples in CIFAR10 with similar minimum perturbation distances (difference less than 0.02) near the decision boundary. The figure shows five groups of adversarial perturbations, with each group containing 100 adversarial points. The adversarial points in the same group have the same Euclidean distance from the minimum adversarial sample, and the Euclidean distances between adjacent groups differ by 1.5.</p>
Full article ">Figure 2
<p>Flowchart of the attack algorithm.</p>
Full article ">Figure 3
<p>Generate multiple adversarial perturbations near the boundary.</p>
Full article ">Figure 4
<p>Binary search algorithm.</p>
Full article ">Figure 5
<p>The effect of random noise magnitude on attack performance.</p>
Full article ">Figure 6
<p>Comparison of multiple adversarial perturbation variations in MNIST and CIFAR10 datasets. The figure shows five groups of adversarial perturbations with noise magnitudes of 1.5, 3.0, 4.5, 6.0, and 7.5. Each group contains 100 perturbation values.</p>
Full article ">Figure 7
<p>The effect of perturbation quantity within an adversarial perturbation group on attack performance.</p>
Full article ">Figure 8
<p>The effect of the number of adversarial perturbation groups on attack performance. When the number of groups is 1, it represents the perturbation group corresponding to a noise magnitude of 7.5; when the number of groups is 2, it represents the groups corresponding to noise magnitudes of 7.5 and 6.0, and so on.</p>
Full article ">
22 pages, 9927 KiB  
Article
Understanding User Behavior for Enhancing Cybersecurity Training with Immersive Gamified Platforms
by Nikitha Donekal Chandrashekar, Anthony Lee, Mohamed Azab and Denis Gracanin
Information 2024, 15(12), 814; https://doi.org/10.3390/info15120814 - 18 Dec 2024
Viewed by 245
Abstract
In modern digital infrastructure, cyber systems are foundational, making resilience against sophisticated attacks essential. Traditional cybersecurity defenses primarily address technical vulnerabilities; however, the human element, particularly decision-making during cyber attacks, adds complexities that current behavioral studies fail to capture adequately. Existing approaches, including [...] Read more.
In modern digital infrastructure, cyber systems are foundational, making resilience against sophisticated attacks essential. Traditional cybersecurity defenses primarily address technical vulnerabilities; however, the human element, particularly decision-making during cyber attacks, adds complexities that current behavioral studies fail to capture adequately. Existing approaches, including theoretical models, game theory, and simulators, rely on retrospective data and static scenarios. These methods often miss the real-time, context-specific nature of user responses during cyber threats. To address these limitations, this work introduces a framework that combines Extended Reality (XR) and Generative Artificial Intelligence (Gen-AI) within a gamified platform. This framework enables continuous, high-fidelity data collection on user behavior in dynamic attack scenarios. It includes three core modules: the Player Behavior Module (PBM), Gamification Module (GM), and Simulation Module (SM). Together, these modules create an immersive, responsive environment for studying user interactions. A case study in a simulated critical infrastructure environment demonstrates the framework’s effectiveness in capturing realistic user behaviors under cyber attack, with potential applications for improving response strategies and resilience across critical sectors. This work lays the foundation for adaptive cybersecurity training and user-centered development across critical infrastructure. Full article
(This article belongs to the Special Issue Extended Reality and Cybersecurity)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>An interaction diagram of the integrated framework depicting the services being offered by each module.</p>
Full article ">Figure 2
<p>Classification of the various methodologies used in the literature to study user behavior during cybersecurity attacks.</p>
Full article ">Figure 3
<p>The image depicts the three modules of our proposed framework: Player Behavior Module, Gamification Module, and Simulator Module.</p>
Full article ">Figure 4
<p>A case study design implementing the proposed framework.</p>
Full article ">Figure 5
<p>(<b>Top</b>) An aerial view of a water treatment facility in Wisconsin [<a href="#B79-information-15-00814" class="html-bibr">79</a>]. (<b>Bottom Left</b>) The hardware of the developed digital twin wastewater treatment facility. (<b>Bottom Right</b>) The VR interface of the developed digital twin wastewater treatment facility.</p>
Full article ">
15 pages, 6279 KiB  
Article
Pasteurella multocida Serotype D Infection Induces Activation of the IL-17 Signaling Pathway in Goat Lymphocytes
by Yujing Fu, Yong Meng, Hejie Qian, Taoyu Chen, Xiangying Chen, Qiaoling Chen, Hongyan Gao, Churiga Man, Li Du, Si Chen and Fengyang Wang
Microorganisms 2024, 12(12), 2618; https://doi.org/10.3390/microorganisms12122618 - 18 Dec 2024
Viewed by 294
Abstract
(1) Background: Pasteurellosis is a global zoonotic bacterial disease, which has caused significant economic impacts in animal husbandry. Nevertheless, there is limited understanding of the immune response between goat peripheral blood lymphocytes (PBLs) and goat-derived Pasteurella multocida (P. multocida). (2) Methods: [...] Read more.
(1) Background: Pasteurellosis is a global zoonotic bacterial disease, which has caused significant economic impacts in animal husbandry. Nevertheless, there is limited understanding of the immune response between goat peripheral blood lymphocytes (PBLs) and goat-derived Pasteurella multocida (P. multocida). (2) Methods: To investigate the immune response of host PBLs during infection with P. multocida type D, we established an in vitro cell model utilizing isolated primary goat PBLs. Utilizing this in vitro infection model, we employed an enzyme-linked immunosorbent assay (ELISA) to assess the cytokine profile variation in goat PBLs following infection. Meanwhile, RNA sequencing and quantitative PCR (qPCR) methods were employed to analyze the gene expression profile. (3) Results: The ELISA test results indicated that the expression levels of pro-inflammatory cytokines, such as IL-6, IFN-γ, CXCL10, and IL-17A, were significantly elevated within 12 h after infection with P. multocida. In contrast, the levels of the anti-inflammatory cytokine IL-10 were found to be reduced. RNA sequencing and functional enrichment analysis identified 2114 differentially expressed genes (DEGs) that were primarily associated with cytokine-cytokine receptor interactions, viral protein-cytokine interactions, and the IL-17 signaling pathway. Furthermore, protein-protein interaction (PPI) network analysis and qPCR highlighted CD86, CCL5, CD8A, CXCL8, CTLA4, TNF, CD274, IL-10, IL-6, CXCL10, IFNG, and IL-17A that were crucial for the response of PBLs to P. multocida infection. (4) Conclusions: This study systematically revealed the characteristics of PBLs in goats following infection with goat-derived P. multocida type D through the analysis of cytokines and gene expression, providing important theoretical insights for a deeper understanding of the defense mechanisms in goats against P. multocida. Full article
Show Figures

Figure 1

Figure 1
<p>Identification of the PmHN01 strain. M: D2000 DNA marker; 1: blank control; 2: PCR product of the Pm-specific gene <span class="html-italic">kmt1</span> primer; 3: PCR product of the HN01-specific primer.</p>
Full article ">Figure 2
<p>Giemsa’s stain of PBLs. Panels (<b>A</b>-<b>C</b>) display the staining results of lymphocytes at magnifications of 100×, 200×, and 400×, respectively.</p>
Full article ">Figure 3
<p>Cytokine level detection results. The vertical axis represents cytokine concentration, with the red bar indicating the control group and the blue bar representing the experimental group. (<b>A</b>) IL-6 ELISA Results. (<b>B</b>) IFN-γ ELISA Results. (<b>C</b>) IL-17A ELISA Results. (<b>D</b>) CXCL10 ELISA Results. (<b>E</b>) IL-10 ELISA Results. *** <span class="html-italic">p</span> &lt; 0.001; ** <span class="html-italic">p</span> = 0.001 to &lt; 0.01; * <span class="html-italic">p</span> = 0.01 to 0.05; ns = no significant.</p>
Full article ">Figure 4
<p>Differential expression of DEGs. (<b>A</b>) PCA of DEG transcripts. X−axis: PC1 coordinates denote the first principal component. Y−axis: PC2 coordinates represent the second principal component. The red and blue dots in the figure denote the control group and experimental group, respectively. (<b>B</b>) Heatmaps illustrating the relationships among different samples. The horizontal and vertical axes represent each sample. A closer proximity to red signifies a stronger correlation, whereas a closer proximity to blue indicates a weaker correlation. (<b>C</b>) In the bar chart, blue shows downregulated DEGs and red shows upregulated DEGs. (<b>D</b>) In the differential gene clustering heatmap, each column corresponds to a sample, and each row corresponds to a gene. Red signifies increased gene expression, while blue represents decreased expression levels.</p>
Full article ">Figure 5
<p>GO and KEGG annotation. (<b>A</b>) GO enrichment classification bar chart: X-axis: secondary GO terms; Y-axis: number of differentially expressed genes associated with each term. Red: upregulated genes; blue: downregulated genes. (<b>B</b>) KEGG enrichment bar chart: X-axis: pathways; Y-axis: percentage of DEGs in the pathway compared to the total DEGs. The color of the column represents the degree of enrichment significance of the pathway.</p>
Full article ">Figure 6
<p>GSEA analysis of key pathways. Top figure: Curve illustrating the increases and decreases in the accumulation process of ES values. Middle figure: Positions of target gene set members within the ranking of all genes, indicated by black vertical lines. Red bars: Genes that are positively correlated with the experimental group. Blue bars: Genes that are negatively correlated with the control group. Bottom figure: Actual values of the ranking indicators for genes, arranged from highest to lowest. (<b>A</b>) IL-17 Signaling Pathway. (<b>B</b>) Cytokine-cytokine receptor interactions. (<b>C</b>) Signaling pathway of the interaction between viral proteins and cytokines and cytokine receptors. (<b>D</b>) JAK-STAT signaling pathway. (<b>E</b>) TNF signaling pathway.</p>
Full article ">Figure 7
<p>Important modules and hub genes. (<b>A</b>) The most important modules are evaluated using betweenness centrality. The circles transition from pink to yellow to blue according to the ranking from high to low. The larger the circles and the font, the higher the ranking. (<b>B</b>) The top 15 hub DEGs identified using the MCC algorithm. In the image, genes are colored according to their scores, transitioning from red to yellow as the scores decrease. (<b>C</b>) Correlation analysis of the 15 hub DEGs. where red indicates a positive correlation and blue indicates a negative correlation. The larger the sector, the stronger the correlation it represents. *** indicates <span class="html-italic">p</span> &lt; 0.001; ** indicates <span class="html-italic">p</span> &lt; 0.01; * indicates <span class="html-italic">p</span> &lt; 0.05.</p>
Full article ">Figure 8
<p>qPCR validation of DEGs. The green bars represent qPCR results, while the pink bars indicate RNA sequencing results.</p>
Full article ">
29 pages, 8126 KiB  
Article
Transcriptome and Gene Expression Analysis Revealed CeNA1: A Potential New Marker for Somatic Embryogenesis in Common Centaury (Centaurium erythraea Rafn.)
by Katarina B. Ćuković, Slađana I. Todorović, Jelena M. Savić and Milica D. Bogdanović
Int. J. Mol. Sci. 2024, 25(24), 13531; https://doi.org/10.3390/ijms252413531 - 18 Dec 2024
Viewed by 363
Abstract
Centaurium erythraea Rafn. is a medicinal plant used as a model for studying plant developmental processes due to its developmental plasticity and ease of manipulation in vitro. Identifying the genes involved in its organogenesis and somatic embryogenesis (SE) is the first step toward [...] Read more.
Centaurium erythraea Rafn. is a medicinal plant used as a model for studying plant developmental processes due to its developmental plasticity and ease of manipulation in vitro. Identifying the genes involved in its organogenesis and somatic embryogenesis (SE) is the first step toward unraveling the molecular mechanisms underlying its morphogenic plasticity. Although SE is the most common method of centaury regeneration, the genes involved in this have not yet been identified. The aim of this study was to identify the differentially expressed genes (DEGs) during key stages of SE and organogenesis using transcriptome data, with a focus on novel SE-related genes. The transcriptomic analysis revealed a total of 4040 DEGs during SE and 12,708 during organogenesis. Gene Ontology (GO) annotation showed that the highest number of SE-related genes was involved in defense responses. The expression of fifteen selected SE-related candidate genes was assessed by RT-qPCR across nine centaury developmental stages, including embryogenic tissues. Notably, a newly reported transcript, named CeNA1, was specifically activated during embryogenic callus (ec) induction, making it a potential novel marker for early SE. These findings provide, for the first time, insight into SE-related transcriptional patterns, representing a step closer to uncovering the molecular basis of centaury’s developmental plasticity. Full article
(This article belongs to the Section Molecular Plant Sciences)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Identification of differentially expressed genes (DEGs) during organogenesis and somatic embryogenesis (SE) of centaury within transcriptome data. <b>rl</b>—rosette leaf, <b>rr</b>—rosette root, <b>abl</b>—adventitious bud, <b>ec</b>—embryogenic callus, <b>gse</b>—globular somatic embryo, <b>cse</b>—cotyledonary somatic embryo, and FPKM—fragments per kilobase of transcript per million mapped reads. Transcriptome was published by Ćuković et al., 2020. [<a href="#B23-ijms-25-13531" class="html-bibr">23</a>].</p>
Full article ">Figure 2
<p>Distribution of tissue-specific DEGs involved in organogenesis and somatic embryogenesis in centaury transcriptome. The percentages were calculated in relation to the total number of DEGs (16,748).</p>
Full article ">Figure 3
<p>Number of unique and overlapping DEGs during specific SE stages in centaury across four gene subsets.</p>
Full article ">Figure 4
<p>Number of centaury SE-associated transcripts matching 30 top species according to the NCBI nucleotide (nt) database (<b>A</b>) and UniProt protein database (<b>B</b>).</p>
Full article ">Figure 5
<p>Ten most represented unique Gene Ontology (GO) terms for each phase of SE. All three aspects of GO classification are presented—biological process (blue), cellular component (green), and molecular function (red).</p>
Full article ">Figure 6
<p>Tissues and organs of <span class="html-italic">C. erythraea</span> Rafn. in which the expression of selected gene candidates was evaluated. (<b>a</b>) Flowering plants from nature; (<b>b</b>) three-month-old plant cultured on MS medium without PGRs; (<b>c</b>) leaf explant with <b>oc</b> developed on MS medium supplemented with 0.2 mgL<sup>−1</sup> 2,4-D and 0.5 mgL<sup>−1</sup> CPPU in light; (<b>d</b>) leaf explant with <b>abl</b> developed on MS medium supplemented with 0.2 mgL<sup>−1</sup> 2,4-D and 0.5 mgL<sup>−1</sup> CPPU in light; (<b>e</b>) leaf explant cultured in darkness with <b>ec</b> and <b>gse</b> developed on MS medium supplemented with 2,4-D and 0.5 mgL<sup>−1</sup> CPPU; and (<b>f</b>) leaf explant with <b>cse</b> developed od MS medium supplemented with 2,4-D and 0.5 mgL<sup>−1</sup> CPPU in darkness. <b>oc</b>—organogenic callus, <b>abl</b>—adventitious bud, <b>ec</b>—embryogenic callus, <b>gse</b>—globular somatic embryo, and <b>cse</b>—cotyledonary somatic embryo.</p>
Full article ">Figure 7
<p>FPKM values of potential SE marker genes in six sequenced tissues of <span class="html-italic">C. erythraea</span> Rafn. The color intensity from light beige to dark brown indicates the FPKM expression values for each gene.</p>
Full article ">Figure 8
<p>Phases of SE in which selected centaury genes show differential expression based on differences in FPKM expression values.</p>
Full article ">Figure 9
<p>Expression profiles of selected genes in a collection of nine centaury tissues with a potential role in SE. (<b>A</b>) Genes active during the induction of embryogenic callus (<b>ec</b>) and early formation of somatic embryo (<b>se</b>) and (<b>B</b>) genes active during late stage of SE, specifically in the cotyledonary-stage embryo (<b>cse</b>). In vitro grown rosette leaf tissue (<b>rl</b>) was used as the control sample. The mean values ± SE are shown for three biological replicates, and different letters on the graph indicate statistically significant differences compared to the control (<span class="html-italic">p</span> &lt; 0.05). Green bars on the graphs indicate samples of different tissues and organs obtained in vitro and from nature, while orange bars indicate tissues of different SE stages. Gene and tissue sample abbreviation explanations are given in <a href="#ijms-25-13531-t002" class="html-table">Table 2</a> and <a href="#ijms-25-13531-t003" class="html-table">Table 3</a>.</p>
Full article ">Figure 10
<p>Expression profiles of selected genes in a collection of nine centaury tissues with downregulated gene expression during SE or with expression not significantly altered in most tissues. In vitro grown rosette leaf tissue (<b>rl</b>) was used as the control sample. The mean values ± SE are shown for three biological replicates, and different letters on the graph indicate statistically significant differences compared to the control (<span class="html-italic">p</span> &lt; 0.05). Green bars on the graphs indicate samples of different tissues and organs obtained in vitro and from nature, while orange bars indicate tissues of different SE stages. Gene and tissue sample abbreviation explanations are given in <a href="#ijms-25-13531-t002" class="html-table">Table 2</a> and <a href="#ijms-25-13531-t003" class="html-table">Table 3</a>.</p>
Full article ">Figure 11
<p>Heatmap showing the expression profiles of 15 SE-related genes in nine tissue and organ samples of centaury. The color spectrum from red to blue represents log2-transformed changes in expression compared to the control <b>rl</b> sample; red and blue colors represent decreased and increased levels of expression, respectively. Four main tissue clusters are colored for easier visualization.</p>
Full article ">
19 pages, 11385 KiB  
Article
Mechanism Study on the Intrinsic Damage and Microchemical Interactions of Argillaceous Siltstone Under Different Water Temperatures
by Ning Liang, Tao Jin, Jingjing Zhang and Damin Lu
Appl. Sci. 2024, 14(24), 11747; https://doi.org/10.3390/app142411747 - 16 Dec 2024
Viewed by 383
Abstract
Argillaceous siltstone is prone to deformation and softening when exposed to water, which poses a great threat to practical engineering. There are significant differences in the degrees of damage to this type of rock caused by solutions with different water temperatures. This study [...] Read more.
Argillaceous siltstone is prone to deformation and softening when exposed to water, which poses a great threat to practical engineering. There are significant differences in the degrees of damage to this type of rock caused by solutions with different water temperatures. This study aimed to better understand the effect of temperature on argillaceous siltstone by designing immersion tests at water temperatures of 5, 15, 25, and 35 °C, analyzing the mechanical properties and cation concentration shifts under each condition. A water temperature–force coupled geometric damage model for argillaceous siltstone was developed, incorporating a Weibull distribution function and composite damage factors to derive a statistical damage constitutive model. The findings reveal that, with increasing water temperature, the peak strength and elastic modulus of argillaceous siltstone display a concave trend, initially decreasing and then increasing, while the cation concentration follows a convex trend, first increasing and then decreasing. Between 15 and 25 °C, the stress–strain behavior transitions from a four-phase to a five-phase pattern, with pronounced plasticity. The model’s theoretical curves align closely with experimental data, with the Weibull parameters m and λ effectively capturing the rock’s strength and plastic characteristics. Changes in water temperature notably influence the damage variable D12 in the context of water temperature–peak stress coupling, with D12 initially increasing and then decreasing with higher temperatures. These research results can provide new methods for exploring the paths of soft rock disasters and provide guidance for designing defenses in geotechnical engineering. Full article
(This article belongs to the Section Materials Science and Engineering)
Show Figures

Figure 1

Figure 1
<p>Engineering disaster map. (<b>a</b>) Mine collapse. (<b>b</b>) Mountain landslide.</p>
Full article ">Figure 2
<p>Argillaceous siltstone samples.</p>
Full article ">Figure 3
<p>Diagram of the experimental scheme.</p>
Full article ">Figure 4
<p>Physical parameters of clay powder under different water temperatures. (<b>a</b>) Peak strength. (<b>b</b>) Elastic modulus.</p>
Full article ">Figure 5
<p>Stress–strain curve of argillaceous siltstone. Soaked for (<b>a</b>) 1 day, (<b>b</b>) 3 days, (<b>c</b>) 7 days, and (<b>d</b>) 14 days.</p>
Full article ">Figure 5 Cont.
<p>Stress–strain curve of argillaceous siltstone. Soaked for (<b>a</b>) 1 day, (<b>b</b>) 3 days, (<b>c</b>) 7 days, and (<b>d</b>) 14 days.</p>
Full article ">Figure 6
<p>Failure modes of argillaceous siltstone under different water temperatures: (<b>a</b>) 5 °C. (<b>b</b>) 15 °C. (<b>c</b>) 25 °C. (<b>d</b>) 35 °C.</p>
Full article ">Figure 6 Cont.
<p>Failure modes of argillaceous siltstone under different water temperatures: (<b>a</b>) 5 °C. (<b>b</b>) 15 °C. (<b>c</b>) 25 °C. (<b>d</b>) 35 °C.</p>
Full article ">Figure 7
<p>Microstructural images of argillaceous siltstone under the influence of different water temperatures. (<b>a</b>) Water temperature at 5 °C. (<b>b</b>) Water temperature at 15 °C. (<b>c</b>) Water temperature at 25 °C. (<b>d</b>) Water temperature at 35 °C.</p>
Full article ">Figure 7 Cont.
<p>Microstructural images of argillaceous siltstone under the influence of different water temperatures. (<b>a</b>) Water temperature at 5 °C. (<b>b</b>) Water temperature at 15 °C. (<b>c</b>) Water temperature at 25 °C. (<b>d</b>) Water temperature at 35 °C.</p>
Full article ">Figure 8
<p>Geometric damage model. (<b>a</b>) Damage under different water temperatures without reaching the yield point. (<b>b</b>) Load-induced damage beyond the yield point.</p>
Full article ">Figure 9
<p>Comparison of experimental and theoretical curves. Soaked for (<b>a</b>) 1 day, (<b>b</b>) 3 days, (<b>c</b>) 7 days, and (<b>d</b>) 14 days.</p>
Full article ">Figure 9 Cont.
<p>Comparison of experimental and theoretical curves. Soaked for (<b>a</b>) 1 day, (<b>b</b>) 3 days, (<b>c</b>) 7 days, and (<b>d</b>) 14 days.</p>
Full article ">Figure 10
<p>The variation patterns of the constitutive model parameters <span class="html-italic">m</span> and <span class="html-italic">λ</span>. (<b>a</b>) The variation pattern of parameter <span class="html-italic">m</span>. (<b>b</b>) The variation pattern of parameter <span class="html-italic">λ</span>.</p>
Full article ">Figure 11
<p>Bar chart representing damage variables <span class="html-italic">D</span><sub>1</sub> and <span class="html-italic">D</span><sub>12</sub>. Soaked for (<b>a</b>) 1 day, (<b>b</b>) 3 days, (<b>c</b>) 7 days, and (<b>d</b>) 14 days.</p>
Full article ">Figure 12
<p>Chemical reactions and adsorption processes at the water–rock interface.</p>
Full article ">Figure 13
<p>Change curves of cation concentrations in solutions at different temperatures. (<b>a</b>) Na<sup>+</sup>. (<b>b</b>) Ca<sup>+</sup>. (<b>c</b>) K<sup>+</sup>. (<b>d</b>) Total cations.</p>
Full article ">
25 pages, 6393 KiB  
Article
Re-Evaluating Deep Learning Attacks and Defenses in Cybersecurity Systems
by Meaad Ahmed, Qutaiba Alasad, Jiann-Shiun Yuan and Mohammed Alawad
Big Data Cogn. Comput. 2024, 8(12), 191; https://doi.org/10.3390/bdcc8120191 - 16 Dec 2024
Viewed by 401
Abstract
Cybersecurity attacks pose a significant threat to the security of network systems through intrusions and illegal communications. Measuring the vulnerability of cybersecurity is crucial for refining the overall system security to further mitigate potential security risks. Machine learning (ML)-based intrusion detection systems (IDSs) [...] Read more.
Cybersecurity attacks pose a significant threat to the security of network systems through intrusions and illegal communications. Measuring the vulnerability of cybersecurity is crucial for refining the overall system security to further mitigate potential security risks. Machine learning (ML)-based intrusion detection systems (IDSs) are mainly designed to detect malicious network traffic. Unfortunately, ML models have recently been demonstrated to be vulnerable to adversarial perturbation, and therefore enable potential attackers to crash the system during normal operation. Among different attacks, generative adversarial networks (GANs) have been known as one of the most powerful threats to cybersecurity systems. To address these concerns, it is important to explore new defense methods and understand the nature of different types of attacks. In this paper, we investigate four serious attacks, GAN, Zeroth-Order Optimization (ZOO), kernel density estimation (KDE), and DeepFool attacks, on cybersecurity. Deep analysis was conducted on these attacks using three different cybersecurity datasets, ADFA-LD, CSE-CICIDS2018, and CSE-CICIDS2019. Our results have shown that KDE and DeepFool attacks are stronger than GANs in terms of attack success rate and impact on system performance. To demonstrate the effectiveness of our approach, we develop a defensive model using adversarial training where the DeepFool method is used to generate adversarial examples. The model is evaluated against GAN, ZOO, KDE, and DeepFool attacks to assess the level of system protection against adversarial perturbations. The experiment was conducted by leveraging a deep learning model as a classifier with the three aforementioned datasets. The results indicate that the proposed defensive model refines the resilience of the system and mitigates the presented serious attacks. Full article
Show Figures

Figure 1

Figure 1
<p>Attack framework of our technique.</p>
Full article ">Figure 2
<p>Defensive framework technique.</p>
Full article ">Figure 3
<p>Comparing the accuracy of the DNN before and after applying the four attacks using ADFA-LD with a 1% rate.</p>
Full article ">Figure 4
<p>Comparing the accuracy of the DNN before and after applying the four attacks using ADFA-LD with a 5% rate.</p>
Full article ">Figure 5
<p>Comparing the accuracy of the DNN before and after applying the four attacks using CSE-CICIDS2018 with a 1% rate.</p>
Full article ">Figure 6
<p>Comparing the accuracy of the DNN before and after applying the four attacks using CSE-CICIDS2018 with a 5% rate.</p>
Full article ">Figure 7
<p>Comparing the accuracy of the DNN before and after applying the four attacks using CICIDS2019 with a 1% rate.</p>
Full article ">Figure 8
<p>Comparing the accuracy of the DNN before and after applying the four attacks using CICIDS2019 with a 5% rate.</p>
Full article ">Figure 9
<p>Comparing the accuracy of the DNN before and after applying the four attacks using ADFA-LD with a 5% rate.</p>
Full article ">Figure 10
<p>Comparing the accuracy of the DNN before and after applying the four attacks using ADFA-LD with a 25% rate.</p>
Full article ">Figure 11
<p>Comparing the accuracy of the DNN before and after applying the four attacks using CSE-CICIDS2018 with a 5% rate.</p>
Full article ">Figure 12
<p>Comparing the accuracy of the DNN before and after applying the four attacks using CSE-CICIDS2018 with a 25% rate.</p>
Full article ">Figure 13
<p>Comparing the accuracy of the DNN before and after applying the four attacks using CICIDS2019 with a 5% rate.</p>
Full article ">Figure 14
<p>Comparing the accuracy of the DNN before and after applying the four attacks using CICIDS2019 with a 25% rate.</p>
Full article ">
21 pages, 7763 KiB  
Article
The Antioxidant and Anti-Inflammatory Activities of the Methanolic Extract, Fractions, and Isolated Compounds from Eriosema montanum Baker f. (Fabaceae)
by Gaétan Tchangou Tabakam, Emmanuel Mfotie Njoya, Chika Ifeanyi Chukwuma, Samson Sitheni Mashele, Yves Martial Mba Nguekeu, Mathieu Tene, Maurice Ducret Awouafack and Tshepiso Jan Makhafola
Molecules 2024, 29(24), 5885; https://doi.org/10.3390/molecules29245885 - 13 Dec 2024
Viewed by 350
Abstract
Background: Inflammation is a natural body’s defense mechanism against harmful stimuli such as pathogens, chemicals, or irradiation. But when the inflammatory response becomes permanent, it can lead to serious health problems. In the present study, the antioxidant and anti-inflammatory potentials of the Eriosema [...] Read more.
Background: Inflammation is a natural body’s defense mechanism against harmful stimuli such as pathogens, chemicals, or irradiation. But when the inflammatory response becomes permanent, it can lead to serious health problems. In the present study, the antioxidant and anti-inflammatory potentials of the Eriosema montanum methanolic extract (EMME), as well as its isolated fractions (FA-FJ) and compounds (17), were evaluated by using in vitro and cellular models. Methods: The total phenolic and flavonoid contents were determined using, respectively, Folin–Ciocalteu and aluminum chloride colorimetric methods, while 2,2′-azinobis-(3-ethylbenzothiazoline-6-sulfonic acid (ABTS), 2,2′-diphenyl-1-picrylhy-drazyl (DPPH), and ferric ion reducing antioxidant power (FRAP) were used to determine the antioxidant activity. Thin Layer Chromatography (TLC) and column chromatography (CC) were used to isolate and purify the compounds and their elucidation using their NMR spectroscopic data. Results: EMME had moderate antioxidant and anti-inflammatory activities, while fraction FF showed much higher efficacy with IC50 values of 34.64, 30.60, 16.43, and 77.29 μg/mL against DPPH, ABTS, NO, and 15-LOX inhibitory activities, respectively. The EMME fraction was found to be very rich in flavonoids and phenolic compounds, with 82.11 mgQE/g and 86.77 mgGAE/g of dry extract, respectively. Its LC-MS profiling allowed us to identify genistin (5) as the most concentrated constituent in this plant species, which was further isolated together with six other known compounds, namely, n-hexadecane (1), heptacosanoic acid (2), tricosan-1-ol (3), lupinalbin A (4), d-pinitol (6), and stigmasterol glucoside (7). Given these compounds, genistin (5) showed moderate activity against reactive oxygen species (ROS) and NO production in LPS-stimulated RAW264.7 cells compared to EMME, which suggested a synergy of (5) with other compounds. To the best of our knowledge, compounds (1), (2), and (3) were isolated for the first time from this plant species. Full article
Show Figures

Figure 1

Figure 1
<p>Extraction protocol, fractionation, and isolation of compounds from <span class="html-italic">E. montanum</span>.</p>
Full article ">Figure 2
<p>Chemical structures of compounds identified in <span class="html-italic">E. montanum</span>.</p>
Full article ">Figure 3
<p>Liquid chromatography–mass spectrometric (LC-MS) profile of <span class="html-italic">E. montanum</span> methanolic extract (<span class="html-italic">EMME</span>). Major compounds detected: Anopyranosylapigenin (t<sub>R</sub>: 7.585 min), genistin (t<sub>R</sub>: 7.902 min), and genistein (t<sub>R</sub>: 11.055 min).</p>
Full article ">Figure 4
<p>Nitric oxide (NO) production and cell viability in LPS-stimulated RAW 264.7 cells pre-treated with extract, fractions, and purified compounds. (<b>A</b>) The cytotoxic effect of tested samples was evaluated using MTT assay; (<b>B</b>) RAW 264.7 cells were pre-treated with tested samples at 100 µg/mL for 2 h, followed by exposure to 500 ng/mL of LPS for 24 h to quantify NO in cell supernatants. Each bar depicts the mean ± SD of three replicates (n = 3). One-way ANOVA combined Dunnett or Student–Newman–Keuls’s tests were used for data analysis. * <span class="html-italic">p</span> &lt; 0.05 vs. Ctrl. # <span class="html-italic">p</span> &lt; 0.05 vs. LPS, ns: non-significant.</p>
Full article ">Figure 5
<p>Bioactive samples’ concentration-dependent NO inhibitory action. The means ± SD of duplicate (n = 2) studies are shown for each bar. One-way ANOVA and either Dunnett’s or Student–Newman–Keuls tests were used to evaluate the data. # <span class="html-italic">p</span> &lt; 0.01 versus Ctrl. * <span class="html-italic">p</span> &lt; 0.01 about LPS.</p>
Full article ">Figure 6
<p>Reactive oxygen species (ROS) production in LPS-stimulated RAW 264.7 cells. RAW 264.7 cells were pre-treated with different concentrations (25, 50, and 100 µg/mL) of <span class="html-italic">E. montanum</span> methanolic extract (<span class="html-italic">EMME</span>), genistin, and ascorbic acid (AA) for two hours, then exposed to 200 ng/mL of LPS for twenty-four hours. Cell fluorescence was monitored at 485 nm (excitation) and 535 nm (emission) (<b>A</b>), and intracellular ROS levels were assessed using the DCFH-DA probe (10 µM). Percentages of negative control cells (<b>B</b>) are used to represent intracellular ROS levels. The means ± SD of three studies in triplicate are shown by each bar. One-way ANOVA and either Dunnett’s or Student–Newman–Keuls tests were used to evaluate the data. * <span class="html-italic">p</span> &lt; 0.05 vs. LPS, # <span class="html-italic">p</span> &lt; 0.05 vs. Ctrl.</p>
Full article ">
22 pages, 4886 KiB  
Article
A Fuzzy-Control Anti-Cybersickness Intelligent System (FCACIS) Designed for Multiple Inducing Factors in a 3D Virtual Store
by Cheng-Li Liu and Shiaw-Tsyr Uang
Appl. Sci. 2024, 14(24), 11609; https://doi.org/10.3390/app142411609 - 12 Dec 2024
Viewed by 325
Abstract
As online shopping has increased, the business models of online stores have diversified. When consumers cannot experience an actual product, merchants will promote products through a display to attract customers. Virtual reality (VR) provides an immersive platform for consumers to interact with virtual [...] Read more.
As online shopping has increased, the business models of online stores have diversified. When consumers cannot experience an actual product, merchants will promote products through a display to attract customers. Virtual reality (VR) provides an immersive platform for consumers to interact with virtual scenarios. Unfortunately, cybersickness remains a problem in VR. The uncomfortable effects of VR hinder its commercial expansion and the broader adoption of 3D virtual stores. Cybersickness has many causes, including personal characteristics, hardware interfaces, and operation behavior. This study develops a fuzzy-control anti-cybersickness intelligent system (FCACIS) with these factors dynamically and actively. The system retrieves the operation value and inferences the cybersickness symptom value (CSSV). When the CSSV exceeds the alarm value, a dialog mode is introduced to remind users to be aware of possible cybersickness. If the CSSV continues to increase, a cybersickness defense mechanism is activated, such as decreasing the field of view and freezing the screen. The experimental results revealed a significant difference in SSQ scores between subjects who navigated a 3D virtual store with and without the FCACIS. The SSQ scores of subjects with the FCACIS (SSQ = 20.570) were significantly lower than those of subjects without the FCACIS (SSQ = 32.880). The FCACIS effectively alleviated cybersickness for subjects over 40 years old. Additionally, the FCACIS effectively slowed the onset of cybersickness in men and women. The anti-cybersickness effect of the FCACIS on flat-panel displays was greater than that on HMDs. The symptoms of cybersickness for a 3DOF controller were also reduced. Full article
(This article belongs to the Special Issue Human–Computer Interaction and Virtual Environments)
Show Figures

Figure 1

Figure 1
<p>Architecture of the virtual store’s intelligent anti-cybersickness design.</p>
Full article ">Figure 2
<p>Emotion assessment system: (<b>a</b>) happy mood: the user checks the optimal state corresponding to the current happiness level; (<b>b</b>) excited mood: the user evaluates the excitement level before entering the 3D virtual store; (<b>c</b>) control desire: the user indicates the extent to which he or she wants to control store navigation after entering the 3D virtual store.</p>
Full article ">Figure 3
<p>Depth perception ability assessment: The user judges the distance between the two pillars that appear in the window and uses the control keys “↑” and “↓” to adjust their front and rear positions for confirmation. When the positions of the two pillars appear equidistant, the confirm button is pressed. (<b>a</b>) shows that the left pillar is closer to the subject; (<b>b</b>) shows that the right pillar is closer to the subject. The top image is the image shown to the subject, and the bottom image shows the actual locations.</p>
Full article ">Figure 4
<p>The fuzzy membership functions No, Slight, Mild, Moderate, and Serious for the output fuzzy set <span class="html-italic">μR<sub>k</sub></span> (<span class="html-italic">r</span>).</p>
Full article ">Figure 5
<p>Scene of the 3D virtual store: (<b>a</b>) layout of the 3D virtual store; (<b>b</b>) part of the scene.</p>
Full article ">Figure 6
<p>An alarm signal appears in the 3D virtual store for approximately 10 s to warn the user when the CSSV exceeds 7.5.</p>
Full article ">Figure 7
<p>When the CSSV reaches 15, a blur filter appears on the 3D virtual store display to narrow the field of view. (<b>a</b>) When the CSSV is 15, a filter with 50% transparency appears; (<b>b</b>) when the CSSV reaches 18, the filter transparency decreases to 25%; (<b>c</b>) when the CSSV reaches 21, the filter transparency decreases to 10%.</p>
Full article ">Figure 8
<p>(<b>a</b>) Proportions of SSQ scores obtained by subjects in the three major categories with and without the FCACIS. (<b>b</b>) The average SSQ scores in the three major categories obtained by the subjects with and without the FCACIS.</p>
Full article ">Figure 9
<p>The average SSQ scores in the three major categories obtained for different sexes with and without the FCACIS.</p>
Full article ">Figure 10
<p>Average SSQ scores in three major categories obtained by subjects of different age groups with and without the FCACIS.</p>
Full article ">Figure 11
<p>The average SSQ scores in the three major categories obtained by subjects of different ages with and without the FCACIS.</p>
Full article ">Figure 12
<p>The average SSQ scores in the three major categories obtained by different displays with and without the FCACIS.</p>
Full article ">
34 pages, 10226 KiB  
Article
The Improved Network Intrusion Detection Techniques Using the Feature Engineering Approach with Boosting Classifiers
by Hari Mohan Rai, Joon Yoo and Saurabh Agarwal
Mathematics 2024, 12(24), 3909; https://doi.org/10.3390/math12243909 - 11 Dec 2024
Viewed by 451
Abstract
In the domain of cybersecurity, cyber threats targeting network devices are very crucial. Because of the exponential growth of wireless devices, such as smartphones and portable devices, cyber risks are becoming increasingly frequent and common with the emergence of new types of threats. [...] Read more.
In the domain of cybersecurity, cyber threats targeting network devices are very crucial. Because of the exponential growth of wireless devices, such as smartphones and portable devices, cyber risks are becoming increasingly frequent and common with the emergence of new types of threats. This makes the automatic and accurate detection of network-based intrusion very essential. In this work, we propose a network-based intrusion detection system utilizing the comprehensive feature engineering approach combined with boosting machine-learning (ML) models. A TCP/IP-based dataset with 25,192 data samples from different protocols has been utilized in our work. To improve the dataset, we used preprocessing methods such as label encoding, correlation analysis, custom label encoding, and iterative label encoding. To improve the model’s accuracy for prediction, we then used a unique feature engineering methodology that included novel feature scaling and random forest-based feature selection techniques. We used three conventional models (NB, LR, and SVC) and four boosting classifiers (CatBoostGBM, LightGBM, HistGradientBoosting, and XGBoost) for classification. The 10-fold cross-validation methods were employed to train each model. After an assessment using numerous metrics, the best-performing model emerged as XGBoost. With mean metric values of 99.54 ± 0.0007 for accuracy, 99.53 ± 0.0013 for precision, 99.54 ± 0.001 for recall, and an F1-score of 99.53 ± 0.0014, the XGBoost model produced the best performance overall. Additionally, we showed the ROC curve for evaluating the model, which demonstrated that all boosting classifiers obtained a perfect AUC value of one. Our suggested methodologies show effectiveness and accuracy in detecting network intrusions, setting the stage for the model to be used in real time. Our method provides a strong defensive measure against malicious intrusions into network infrastructures while cyber threats keep varying. Full article
Show Figures

Figure 1

Figure 1
<p>The schematic diagram of (<b>a</b>) signature-based NIDSs and (<b>b</b>) anomaly-based NIDSs.</p>
Full article ">Figure 2
<p>The schematic diagram of (<b>a</b>) Hybrid NIDSs and (<b>b</b>) AI-powered NIDSs.</p>
Full article ">Figure 3
<p>The block diagram of the proposed methodology utilized for the NIDS using the ML approach.</p>
Full article ">Figure 4
<p>Comparative distribution of dataset in (<b>a</b>) normal and anomaly classes and (<b>b</b>) protocol types.</p>
Full article ">Figure 5
<p>Distribution patterns of destination, host, and service count in the dataset.</p>
Full article ">Figure 6
<p>Visualization of feature importance in NIDSs using the proposed approach.</p>
Full article ">Figure 7
<p>Training performance using 10-fold cross-validation of the NB classifier.</p>
Full article ">Figure 8
<p>Training performance using 10-fold cross-validation of the LR classifier.</p>
Full article ">Figure 9
<p>Training performance using 10-fold cross-validation of the SVC classifier.</p>
Full article ">Figure 10
<p>Training performance with 10-fold cross-validation using CatBoost classifier.</p>
Full article ">Figure 11
<p>Training performance with 10-fold cross-validation using LightGBM classifier.</p>
Full article ">Figure 12
<p>Training performance with 10-fold cross-validation using HistGradientBoosting classifier.</p>
Full article ">Figure 13
<p>Training performance with 10-fold cross-validation using XGBoost classifier.</p>
Full article ">Figure 14
<p>Confusion matrix for testing results: (<b>a</b>) NB classifier and (<b>b</b>) LR classifier.</p>
Full article ">Figure 15
<p>Confusion matrix for testing results: (<b>a</b>) SVC classifier and (<b>b</b>) CatBoost classifier.</p>
Full article ">Figure 16
<p>Confusion matrix for testing results: (<b>a</b>) LightGBM classifier and (<b>b</b>) HistGradientBoosing classifier.</p>
Full article ">Figure 17
<p>Confusion matrix for testing results with XGBoost classifier.</p>
Full article ">Figure 18
<p>ROC-AUC curves comparing the performance of utilized models.</p>
Full article ">
20 pages, 885 KiB  
Article
Risk Prioritizing with Weighted Failure Mode and Effects Analysis and Fuzzy Step-Wise Weight Assessment Ratio Analysis: An Application Software Service Provider Company in the Defense Industry
by Tulay Korkusuz Polat and Işılay Pamuk Candan
Appl. Sci. 2024, 14(24), 11573; https://doi.org/10.3390/app142411573 - 11 Dec 2024
Viewed by 381
Abstract
With the development of technology, the need for software and software products to manage, control, and develop activities in many sectors is increasing daily. In order to create suitable software that will meet the needs of businesses and customers, the software application must [...] Read more.
With the development of technology, the need for software and software products to manage, control, and develop activities in many sectors is increasing daily. In order to create suitable software that will meet the needs of businesses and customers, the software application must be tested in detail before reaching the end user. For this reason, software testing processes are gaining importance in software development activities. This article discusses which errors are critical to solve in complex situations for the reliability and quality of the software product and the relationship between errors. In this study, the classical FMEA method was primarily used to identify and prioritize errors in an ongoing project of a company that provides software services in the defense industry. Later, to eliminate the shortcomings of the classical FMEA method, a new model, the weighted FMEA method (which calculates the risk priority score with five sub-severity components), was developed and applied. In the newly developed weighted FMEA method, the weights were determined by the fuzzy SWARA (Step-Wise Weight Assessment Ratio Analysis) method since the weights of the severity subcomponents were not the same. The risk priority number (RPN) of error types was calculated using classical FMEA and weighted FMEA. Since the RPNs calculated with weighted FMEA are calculated with more subcomponents, the chances of the RPNs’ errors appearing the same are much less than the RPNs calculated with classical FMEA. This situation indicates that the RPNs calculated with weighted FMEA are obtained from a more profound analysis. Full article
(This article belongs to the Special Issue Applications of Fuzzy Systems and Fuzzy Decision Making)
Show Figures

Figure 1

Figure 1
<p>Flow chart of the study.</p>
Full article ">
Back to TopTop