[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (18,282)

Search Parameters:
Keywords = identity

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
16 pages, 7961 KiB  
Article
Process Optimization and Wear Performance of Plasma-Cladding Fe5 Coatings on Rotary Tillage Blades
by Jiang Zeng, Yinggang Ma, Zhichao Fang, Mingliang Wu, Zhili Wu and Mingkai Lei
Appl. Sci. 2025, 15(1), 77; https://doi.org/10.3390/app15010077 (registering DOI) - 26 Dec 2024
Abstract
Objective: This study was conducted to address the harsh working environment of agricultural machinery and improve the wear resistance of soil-contacting components such as rotary tiller blades, thereby extending their service life. Method: Plasma-cladding technology was employed to prepare an iron-based wear-resistant coating [...] Read more.
Objective: This study was conducted to address the harsh working environment of agricultural machinery and improve the wear resistance of soil-contacting components such as rotary tiller blades, thereby extending their service life. Method: Plasma-cladding technology was employed to prepare an iron-based wear-resistant coating on the surface of rotary tiller blades. The following parameter combination was optimized using response surface methodology (RSM): a cladding current of 144A, a cladding speed of 23 mm/s, a powder feeding rate of 23 g/min, and a cladding distance of 12 mm. The microstructure morphology, phase composition, microhardness, and wear resistance of the wear-resistant cladding layer were investigated. Results: The results indicate that the interface of the cladding layer is clean and free from significant porosity or defects, exhibiting good metallurgical bonding with the substrate. The primary phases identified in the cladding layer include α-Fe, Cr7C3, Cr2Fe14C, and Cr-Ni-Fe-C solid solutions. The average hardness of the cladding layer is 1171 Hv0.5, approximately 2.9 times that of the substrate. In wet sand–rubber wheel wear tests under identical conditions, the weight loss of the cladding layer is only 1/21 that of 65Mn steel, with minimal wear morphology. Field trials showed that the wear of the cladding layer rotary tiller blade was reduced by 24.5% compared with the unclad blade. The presence of the cladding layer significantly protected the integrity of the cutting edge, ensuring the functionality of the rotary tiller blade in cutting and throwing soil; thus, its original appearance was maintained even after prolonged wear. The findings of this study can provide a valuable reference for the enhancement of wear resistance for other soil-contacting components. Full article
(This article belongs to the Section Agricultural Science and Technology)
Show Figures

Figure 1

Figure 1
<p>Plasma-cladding device.</p>
Full article ">Figure 2
<p>Three-dimensional response surface; (<b>a</b>) response surface plot of the powder feed rate and cladding current; (<b>b</b>) response surface plot of cladding distance and cladding speed. Different colors represent varying degrees of wear, indicating the severity of wear, with red denoting the most severe wear and purple representing the least severe. The lines of different colors below indicate projections of various levels of wear.</p>
Full article ">Figure 3
<p>Cross-sectional morphology of the plasma-cladding Fe5 coatings observed by SEM: (<b>a</b>) whole coatings; (<b>b</b>) upper part of the cladding layer; (<b>c</b>) middle part of the cladding layer; (<b>d</b>) lower part of the cladding layer.</p>
Full article ">Figure 4
<p>XRD diffraction pattern of the plasma-cladding Fe5 coatings.</p>
Full article ">Figure 5
<p>Positions of pot scanning for EDS in the SEM image of the plasma-cladding Fe5 coatings.</p>
Full article ">Figure 6
<p>Elemental distribution across the plasma-cladding Fe5 coatings; (<b>a</b>) Scanning Area. (<b>b</b>) Scanning Elements.</p>
Full article ">Figure 7
<p>Hardness distribution of Fe5 coatings depends on the distance from the surface.</p>
Full article ">Figure 8
<p>Wear loss curves of the substrate and the plasma-cladding Fe5 coatings during the wet sand rubber wheel test.</p>
Full article ">Figure 9
<p>(<b>a</b>) Microstructure of the wear track for the samples observed by SEM: (<b>a</b>) with an Fe5 coating; (<b>b</b>) without the coating.</p>
Full article ">Figure 10
<p>Equipment and environment for the field test.</p>
Full article ">Figure 11
<p>Wear loss curves of the 65Mn rotary tillage blade and the blade with the plasma-cladding Fe5 coatings in the field test.</p>
Full article ">Figure 12
<p>The morphology of rotary tillage blades with and without Fe5 coatings (<b>a</b>) pre-test rotary tillage blades with Fe5 coating; (<b>b</b>) post-test rotary tillage blades with Fe5 coating; (<b>c</b>) pre-test rotary tillage blades without Fe5 coating; (<b>d</b>) post-test rotary tillage blades without Fe5 coating. The red portion indicates the area of the rotary tiller blade that has experienced wear.</p>
Full article ">
18 pages, 1742 KiB  
Article
Tuning of Water Vapor Permeability in 2D Nanocarbon-Based Polypropylene Composite Membranes
by Glykeria A. Visvini, Georgios N. Mathioudakis, Amaia Soto Beobide and George A. Voyiatzis
Nanomaterials 2025, 15(1), 11; https://doi.org/10.3390/nano15010011 - 25 Dec 2024
Abstract
This work focuses on the incorporation of 2D carbon nanomaterials, such as graphene oxide (GO), reduced graphene oxide (rGO) and graphene nanoplatelets (GNPs), into polypropylene (PP) via melt mixing. The addition of these 2D carbon nanostructured networks offers a novel approach to enhancing/controlling [...] Read more.
This work focuses on the incorporation of 2D carbon nanomaterials, such as graphene oxide (GO), reduced graphene oxide (rGO) and graphene nanoplatelets (GNPs), into polypropylene (PP) via melt mixing. The addition of these 2D carbon nanostructured networks offers a novel approach to enhancing/controlling the water vapor permeable capabilities of PP composite membranes, widely used in industrial applications, such as technical (building roof membranes) or medical (surgical gowns) textiles. The study investigates how the dispersion and concentration of these graphene nanomaterials within the PP matrix influence the microstructure and water vapor permeability (WVP) performance. The WVP measurements were conducted via the “wet” cup method. The presence of either GO, rGO or GNPs in the new polyolefin composite membranes revealed 6- to 7-fold enhanced WVP values compared to pristine PP. This improvement is attributed to the nanoindentations created at the interface of the carbon nanoinclusions with the polymer matrix in the form of nanopores that facilitate water vapor diffusion. In the particular case of GO and rGO, residual oxidative groups might contribute to the WVP as well. This is the first study to compare GO, rGO and even GNP inclusions under identical conditions, providing deeper insights into the mechanisms driving the observed improvements in WVP performance. Full article
(This article belongs to the Special Issue Functional Two-Dimensional Materials, Thin Films and Coatings)
15 pages, 2583 KiB  
Article
The Three-Class Annotation Method Improves the AI Detection of Early-Stage Osteosarcoma on Plain Radiographs: A Novel Approach for Rare Cancer Diagnosis
by Joe Hasei, Ryuichi Nakahara, Yujiro Otsuka, Yusuke Nakamura, Kunihiro Ikuta, Shuhei Osaki, Tamiya Hironari, Shinji Miwa, Shusa Ohshika, Shunji Nishimura, Naoaki Kahara, Aki Yoshida, Tomohiro Fujiwara, Eiji Nakata, Toshiyuki Kunisada and Toshifumi Ozaki
Cancers 2025, 17(1), 29; https://doi.org/10.3390/cancers17010029 - 25 Dec 2024
Abstract
Background/Objectives: Developing high-performance artificial intelligence (AI) models for rare diseases is challenging owing to limited data availability. This study aimed to evaluate whether a novel three-class annotation method for preparing training data could enhance AI model performance in detecting osteosarcoma on plain [...] Read more.
Background/Objectives: Developing high-performance artificial intelligence (AI) models for rare diseases is challenging owing to limited data availability. This study aimed to evaluate whether a novel three-class annotation method for preparing training data could enhance AI model performance in detecting osteosarcoma on plain radiographs compared to conventional single-class annotation. Methods: We developed two annotation methods for the same dataset of 468 osteosarcoma X-rays and 378 normal radiographs: a conventional single-class annotation (1C model) and a novel three-class annotation method (3C model) that separately labeled intramedullary, cortical, and extramedullary tumor components. Both models used identical U-Net-based architectures, differing only in their annotation approaches. Performance was evaluated using an independent validation dataset. Results: Although both models achieved high diagnostic accuracy (AUC: 0.99 vs. 0.98), the 3C model demonstrated superior operational characteristics. At a standardized cutoff value of 0.2, the 3C model maintained balanced performance (sensitivity: 93.28%, specificity: 92.21%), whereas the 1C model showed compromised specificity (83.58%) despite high sensitivity (98.88%). Notably, at the 25th percentile threshold, both models showed identical false-negative rates despite significantly different cutoff values (3C: 0.661 vs. 1C: 0.985), indicating the ability of the 3C model to maintain diagnostic accuracy at substantially lower thresholds. Conclusions: This study demonstrated that anatomically informed three-class annotation can enhance AI model performance for rare disease detection without requiring additional training data. The improved stability at lower thresholds suggests that thoughtful annotation strategies can optimize the AI model training, particularly in contexts where training data are limited. Full article
(This article belongs to the Topic AI in Medical Imaging and Image Processing)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Radiographic images showing the process of tumor segmentation and annotation using both X-ray and MRI guidance. This figure demonstrates our systematic approach to tumor segmentation, in which MRI images provide crucial guidance for the accurate annotation of tumor boundaries on X-ray images, which alone may not clearly reveal the full extent of the lesion: (<b>a</b>,<b>b</b>) anteroposterior (AP) and lateral X-ray views of the distal femur showing subtle bone changes, demonstrating the challenge of determining tumor boundaries on plain radiographs; (<b>c</b>,<b>d</b>) axial and sagittal T1-weighted fat-suppressed contrast-enhanced MRI images clearly delineating the tumor extent; (<b>e</b>) schematic diagram illustrating how the tumor extent visible on axial MRI correlates with the measurements on AP and lateral X-ray projections; (<b>f</b>,<b>g</b>) annotated AP and lateral X-ray images utilizing the MRI-guided three-class annotation method, where yellow indicates the intramedullary tumor component, orange represents cortical bone involvement, and blue indicates extramedullary tumor extension.</p>
Full article ">Figure 1 Cont.
<p>Radiographic images showing the process of tumor segmentation and annotation using both X-ray and MRI guidance. This figure demonstrates our systematic approach to tumor segmentation, in which MRI images provide crucial guidance for the accurate annotation of tumor boundaries on X-ray images, which alone may not clearly reveal the full extent of the lesion: (<b>a</b>,<b>b</b>) anteroposterior (AP) and lateral X-ray views of the distal femur showing subtle bone changes, demonstrating the challenge of determining tumor boundaries on plain radiographs; (<b>c</b>,<b>d</b>) axial and sagittal T1-weighted fat-suppressed contrast-enhanced MRI images clearly delineating the tumor extent; (<b>e</b>) schematic diagram illustrating how the tumor extent visible on axial MRI correlates with the measurements on AP and lateral X-ray projections; (<b>f</b>,<b>g</b>) annotated AP and lateral X-ray images utilizing the MRI-guided three-class annotation method, where yellow indicates the intramedullary tumor component, orange represents cortical bone involvement, and blue indicates extramedullary tumor extension.</p>
Full article ">Figure 2
<p>Comparison of the performance of the 1C model and the 3C model for image classification tasks: (<b>a</b>) ROC curve comparison between the 1C model (blue line) and the 3C model (green line). The area under the curve (AUC) for the 1C model is 0.99, while the AUC for the 3C model is 0.98. The dashed diagonal line represents the performance of a random classifier (AUC = 0.50); (<b>b</b>) the confusion matrix for the 1C model. The 1C model achieved a sensitivity of 96% and a specificity of 96%. The matrix shows the number of true negatives (457), false positives (18), false negatives (12), and true positives (256); (<b>c</b>) the confusion matrix for the 3C model. The 3C model achieved a sensitivity of 97% and a specificity of 90%. The matrix shows the number of true negatives (428), false positives (47), false negatives (9), and true positives (259).</p>
Full article ">Figure 3
<p>Sensitivity and specificity curves plotted against cutoff values for the 1C and 3C models. The graph displays sensitivity (solid lines) and specificity (dashed lines) values on the <span class="html-italic">y</span>-axis (rate) against cutoff values (0.0 to 1.0) on the <span class="html-italic">x</span>-axis. The blue lines represent the 1C model’s performance metrics (sensitivity: solid blue line; specificity: dashed blue line), while the green lines show the 3C model’s performance metrics (sensitivity: solid green line; specificity: dashed green line). The values range from 0.0 to 1.0 on both axes, with grid lines marking intervals of 0.2.</p>
Full article ">Figure 4
<p>Scatter plots depicting the relationship between the score and DICE coefficient for the 1C and 3C models: (<b>a</b>) the relationship between the score (on the <span class="html-italic">x</span>-axis) and the DICE coefficient (on the <span class="html-italic">y</span>-axis) for the 1C model. The correlation coefficient between the score and the DICE coefficient is 0.682; (<b>b</b>) the relationship between the score (on the <span class="html-italic">x</span>-axis) and the DICE coefficient (on the <span class="html-italic">y</span>-axis) for the 3C model. The correlation coefficient between the score and the DICE coefficient is 0.594.</p>
Full article ">Figure 5
<p>Comparison of lesion detection performance between 1C and 3C AI models in identifying osteosarcoma on X-ray images: (<b>a</b>,<b>b</b>) anteroposterior radiographs showing osteosarcoma detection results of (<b>a</b>) 1C model and (<b>b</b>) 3C model outcomes, where the red line represents the osteosarcoma area (as determined by expert human annotation), and the green line indicates the lesion area identified by the AI model; (<b>c</b>,<b>d</b>) lateral radiographs showing the same comparison, namely (<b>c</b>) 1C model and (<b>d</b>) 3C model outcomes, with red lines representing expert human annotation and green lines showing AI model detection. “L” indicates the left side of the patient.</p>
Full article ">
8 pages, 232 KiB  
Article
A Class of Potentials in Weighted Hardy-Type Inequalities with a Finite Number of Poles
by Anna Canale and Ciro Tarantino
Mathematics 2025, 13(1), 21; https://doi.org/10.3390/math13010021 - 25 Dec 2024
Abstract
In this paper, we discuss potentials for which we obtain multipolar weighted Hardy-type inequalities for a class of weights that are wide enough. Examples of such potentials are shown. The weighted estimates are more general than those stated in previous papers. To obtain [...] Read more.
In this paper, we discuss potentials for which we obtain multipolar weighted Hardy-type inequalities for a class of weights that are wide enough. Examples of such potentials are shown. The weighted estimates are more general than those stated in previous papers. To obtain the inequalities, we prove an integral identity by introducing a suitable vector-valued function. Full article
16 pages, 3550 KiB  
Article
The Presence of Two Distinct Lineages of the Foot-And-Mouth Disease Virus Type A in Russia in 2013–2014 Has Significant Implications for the Epidemiology of the Virus in the Region
by Victor V. Nikiforov, Sergey A. Noskov, Alexander V. Sprygin, Mohammad Abed Alhussen, Anastasia S. Krylova, Taisia V. Erofeeva, Svetlana N. Fomina, Svetlana R. Kremenchugskaya, Fedor I. Korennoy, Maxim V. Patrushev, Ilya A. Chvala, Tamara K. Mayorova and Stepan V. Toshchakov
Viruses 2025, 17(1), 8; https://doi.org/10.3390/v17010008 - 25 Dec 2024
Abstract
Molecular surveillance of FMD epidemiology is a fundamental tool for advancing our understanding of virus biology, monitoring virus evolution, and guiding vaccine design. The accessibility of genetic data will facilitate a more comprehensive delineation of FMDV phylogeny on a global scale. In this [...] Read more.
Molecular surveillance of FMD epidemiology is a fundamental tool for advancing our understanding of virus biology, monitoring virus evolution, and guiding vaccine design. The accessibility of genetic data will facilitate a more comprehensive delineation of FMDV phylogeny on a global scale. In this study, we investigated the FMDV strains circulating in Russia during the 2013–2014 period in geographically distant regions utilizing whole genome sequencing followed by maximum-likelihood phylogenetic reconstruction of whole genome and VP1 gene sequences. Phylogenetic analysis showed congruence in the topology of the phylogenetic trees constructed using the complete genome and VP1 gene sequence, clearly demonstrating that the isolates analyzed belong to two distinct genetic lineages: A/SEA97 in the Far East and Iran-05 in the North Caucasus. The A/SEA97 isolates exhibited a close genetic identity to those from China and Mongolia, whereas the Iran-05 isolates demonstrated clusterization with those from Turkey. The vaccine-matching studies with isolates from the Far East and North Caucasus revealed no antigenic homology with A/SEA-97 (r1 = 0.015–0.29) and A/Iran 05 (r1 = 0.009–0.17). The close genetic relationship of FMDV in the reported outbreak waves to those from neighboring countries indicates that animal movement could contribute to spillover and virus dispersal. The phylogenetic data reported here provide insight into the molecular epidemiology of FMD in the Eurasia region, elucidating the circulation pattern, molecular evolution, and genetic diversity, which is highly valuable for guiding vaccine designs and improving regional eradication policies. Full article
(This article belongs to the Section Animal Viruses)
Show Figures

Figure 1

Figure 1
<p>Map illustrating foot-and-mouth disease outbreaks in Russia over the period 2013–2014. Outbreaks of A serotype are shown as red circles; outbreaks of O serotype are shown as blue circles.</p>
Full article ">Figure 2
<p>Maximum likelihood unrooted phylogenetic tree of the whole genome sequences of 52 serotype A FMDV isolates. The tree was constructed using RAXML-NG software with 1000 bootstraps [<a href="#B26-viruses-17-00008" class="html-bibr">26</a>]. The isolates described in this study are labeled with green. The nodes with bootstrap support less than 50% are marked with red. The topotype distribution is illustrated by light gray sectors. Genetic lineages within topotype ASIA (as referenced by <a href="https://www.wrlfmd.org/" target="_blank">https://www.wrlfmd.org/</a>, accessed on 19 December 2024) are indicated by dark gray arcs.</p>
Full article ">Figure 3
<p>Maximum likelihood unrooted phylogenetic tree of the VP1 gene sequences of 79 FMDV isolates. The tree was constructed using RAXML-NG software with 1000 bootstraps [<a href="#B26-viruses-17-00008" class="html-bibr">26</a>]. The nodes with bootstrap support less than 50% are marked with red. The isolates described in this study are labeled with green. The topotype distribution is illustrated by light gray sectors. Genetic lineages within topotype A (as referenced by <a href="https://www.wrlfmd.org/" target="_blank">https://www.wrlfmd.org/</a>, accessed on 19 December 2024) are indicated by dark gray arcs.</p>
Full article ">Figure 4
<p>The pairwise comparisons of the whole genome FMDV serotype A sequences of SEA-97 (<b>A</b>) and Iran-05 (<b>B</b>) genetic lineages. The percentage of identical nucleotides is displayed in the bottom left half of each heatmap. The color scale varies from blue (minimum) to red (maximum). The top right half depicts the number of differences between the two sequences, including both gaps and single nucleotide polymorphisms (SNPs).</p>
Full article ">
12 pages, 670 KiB  
Article
A Qualitative Exploration of Relations Between Salutogenesis and Persistent Music Performance Among Refugees Resettled in the United States
by Bernard Austin Kigunda Muriithi and Jennifer Muriithi
Int. J. Environ. Res. Public Health 2025, 22(1), 9; https://doi.org/10.3390/ijerph22010009 - 25 Dec 2024
Abstract
In its broadest meaning, salutogenesis denotes an orientation toward the origins and assets for positive health, as opposed to the origins and risk factors associated with disease (i.e., pathogenesis). While salutogenesis continues to inspire health promotion, it has been noted that qualitative studies [...] Read more.
In its broadest meaning, salutogenesis denotes an orientation toward the origins and assets for positive health, as opposed to the origins and risk factors associated with disease (i.e., pathogenesis). While salutogenesis continues to inspire health promotion, it has been noted that qualitative studies can further its understanding and broaden its use in research, clinical practice, and policies. The present study is based on an analysis of structured and unstructured recorded interviews with six refugee musicians. Applying interpretive phenomenological analysis, we comparatively explored the factors contributing to persistence in music between participants. Five factors were found: (a) long-term participation and identity as musicians; (b) desirable effects of music performance; (c) competence, talent, and social recognition; (d) management of social and cultural differences; and (e) locally organized refugee events. The links between music performance and salutogenesis include the following: (1) the inclusion of salutogenic orientation (in addition to pathogenic orientation) toward health; (2) that music invigorated generalized resistance resources so that its expression was augmented, steady, and enduring; and (3) that a high sense of coherence (SOC) was demonstrated. Future studies are needed to reveal whether other activities can take similar roles in developing SOC, and experimental studies are needed before health policy recommendations regarding activities can be made for people that need improved SOC. Full article
Show Figures

Figure 1

Figure 1
<p>Interview guide.</p>
Full article ">Figure 2
<p>Music performance and general resistance resources.</p>
Full article ">
15 pages, 239 KiB  
Article
Cosmetic Surgery and the Christian Body: Comparative Ethical Reflections from Orthodox and Catholic Traditions
by Angelos Mavropoulos
Religions 2025, 16(1), 8; https://doi.org/10.3390/rel16010008 - 25 Dec 2024
Abstract
This article explores the ethical dimensions of cosmetic surgery, offering a comparative analysis of perspectives from both the Orthodox and the Catholic moral theologies. Both traditions uphold the sanctity of the human body as a creation of God, emphasizing the importance of maintaining [...] Read more.
This article explores the ethical dimensions of cosmetic surgery, offering a comparative analysis of perspectives from both the Orthodox and the Catholic moral theologies. Both traditions uphold the sanctity of the human body as a creation of God, emphasizing the importance of maintaining its integrity and dignity. However, their approaches to the ethical implications of cosmetic surgery might reveal distinct theological nuances that reflect their unique doctrinal and cultural contexts. By examining the theological foundations, doctrinal teachings, and contemporary ethical debates within both traditions, this study seeks to illuminate how Orthodox and Catholic ethics address the complexities of bodily modification. The analysis highlights the ways in which each tradition navigates concerns related to vanity, identity, and the pursuit of physical perfection, offering insights into their shared values as well as their distinct perspectives. This interdenominational study aims to contribute to ecumenical and intercultural dialogue, fostering greater understanding and respect between the two original Christian traditions. By engaging with the ethical considerations surrounding cosmetic surgery, this article provides a platform for deeper reflection on the role of the body in Christian spirituality and the ongoing relevance of these issues in a diverse and interconnected world. Full article
23 pages, 368 KiB  
Article
Mosque Pedagogy in Belgium
by Betül Demirkoparan
Religions 2025, 16(1), 6; https://doi.org/10.3390/rel16010006 - 25 Dec 2024
Abstract
The aim of this research is to contribute to the research field of Islamic pedagogies by providing empirical insights on the educational strategies used in two different educational settings: Diyanet mosques and mosque-based knowledge centers in Belgium. Previous research has mainly focused on [...] Read more.
The aim of this research is to contribute to the research field of Islamic pedagogies by providing empirical insights on the educational strategies used in two different educational settings: Diyanet mosques and mosque-based knowledge centers in Belgium. Previous research has mainly focused on ‘imported’, ‘cyber’, or ‘intellectual’ imams, but little attention has been paid to newly emerging local authorities which we can describe as ‘native’ imams, vaizes, and ‘preaching teachers’. Both authorities are born and raised in Belgium and tend to develop a contextualized pedagogical model to meet the needs of Muslims. The analysis is based on fieldwork notes, classroom observations, and social media research. The findings demonstrate that, although similar teaching strategies are implemented in both settings, they are performed differently. It also demonstrates that education takes place through two reflective pedagogical methods that we term as pedagogy of Muslim Identity and pedagogy of Commitment. In addition, the findings show clearly how both aspects are guided by notions such as rooting, authenticity, and community building. Full article
33 pages, 3678 KiB  
Article
A Step Towards Neuroplasticity: Capsule Networks with Self-Building Skip Connections
by Nikolai A. K. Steur and Friedhelm Schwenker
AI 2025, 6(1), 1; https://doi.org/10.3390/ai6010001 - 24 Dec 2024
Abstract
Background: Integrating nonlinear behavior into the architecture of artificial neural networks is regarded as essential requirement to constitute their effectual learning capacity for solving complex tasks. This claim seems to be true for moderate-sized networks, i.e., with a lower double-digit number of layers. [...] Read more.
Background: Integrating nonlinear behavior into the architecture of artificial neural networks is regarded as essential requirement to constitute their effectual learning capacity for solving complex tasks. This claim seems to be true for moderate-sized networks, i.e., with a lower double-digit number of layers. However, going deeper with neural networks regularly turns into destructive tendencies of gradual performance degeneration during training. To circumvent this degradation problem, the prominent neural architectures Residual Network and Highway Network establish skip connections with additive identity mappings between layers. Methods: In this work, we unify the mechanics of both architectures into Capsule Networks (CapsNet)s by showing their inherent ability to learn skip connections. As a necessary precondition, we introduce the concept of Adaptive Nonlinearity Gates (ANG)s which dynamically steer and limit the usage of nonlinear processing. We propose practical methods for the realization of ANGs including biased batch normalization, the Doubly-Parametric ReLU (D-PReLU) activation function, and Gated Routing (GR) dedicated to extremely deep CapsNets. Results: Our comprehensive empirical study using MNIST substantiates the effectiveness of our developed methods and delivers valuable insights for the training of very deep nets of any kind. The final experiments on Fashion-MNIST and SVHN demonstrate the potential of pure capsule-driven networks with GR. Full article
Show Figures

Figure 1

Figure 1
<p>Visualization of the degradation problem in relation to the network depth based on (<b>a</b>) plain networks and (<b>b</b>) CapsNets with distinct activation functions, using the MNIST classification dataset. A plain network contains 32 neurons per layer, while a CapsNet consists of eight capsules with four neurons each. Network depth is stated as the number of intermediate blocks, including an introducing convolutional layer and a closing classification head. Each block consists of a fully connected layer followed by BN and the application of the activation function. In the case of CapsNets, signal flow between consecutive capsule layers is controlled by a specific routing procedure. The final loss (as cross-entropy) and accuracy, both based on the training set, are reported as an average over five runs with random network initialization. Each run comprises <math display="inline"><semantics> <mrow> <mn>2</mn> <mi>n</mi> </mrow> </semantics></math> training epochs, where <span class="html-italic">n</span> equals the number of intermediate blocks.</p>
Full article ">Figure 2
<p>Shortcut and skip connections (highlighted in red) in residual learning. (<b>a</b>) Original definition of a shortcut connection with projection matrix based on [<a href="#B5-ai-06-00001" class="html-bibr">5</a>]. (<b>b</b>) Pattern for self-building skip connections in a CapsNet with SR and an activation function with a suitable linear interval.</p>
Full article ">Figure 3
<p>Replacement of the static signal propagation in a CapsNet with a nonlinear routing procedure to form parametric information flow gates. (<b>a</b>) Basic pattern with a single routing gate. (<b>b</b>) Exemplary skip path (highlighted in red) crossing multiple layers and routing gates.</p>
Full article ">Figure 4
<p>Customizing the initialization scheme for BN<math display="inline"><semantics> <mrow> <mo>(</mo> <mi>β</mi> <mo>,</mo> <mi>γ</mi> <mo>)</mo> </mrow> </semantics></math> allows the training of deeper networks by constraining the input distribution (in blue) of an activation function to be positioned in a mostly linear section. Exemplary initializations are shown for (<b>a</b>) sigmoid with BN<math display="inline"><semantics> <mrow> <mo>(</mo> <mn>0</mn> <mo>,</mo> <mn>0.5</mn> <mo>)</mo> </mrow> </semantics></math>, and (<b>b</b>) Leaky ReLU with BN<math display="inline"><semantics> <mrow> <mo>(</mo> <mo>−</mo> <mn>2</mn> <mo>,</mo> <mn>1</mn> <mo>)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p>Parametric versions of ReLU with (<b>a</b>) single and (<b>b</b>) four degree(s) of freedom using an exemplary parameter range of <math display="inline"><semantics> <mrow> <msub> <mi>ρ</mi> <mi>i</mi> </msub> <mo>∈</mo> <mrow> <mo>[</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>]</mo> </mrow> </mrow> </semantics></math>. (<b>a</b>) PReLU learns a nonlinearity specification <math display="inline"><semantics> <mi>ρ</mi> </semantics></math> for input values below zero and directly passes signals above zero. (<b>b</b>) SReLU applies the identity function within the interval <math display="inline"><semantics> <mrow> <mo>[</mo> <msub> <mi>t</mi> <mi>min</mi> </msub> <mo>,</mo> <msub> <mi>t</mi> <mi>max</mi> </msub> <mo>]</mo> </mrow> </semantics></math>, and learns two individual nonlinearity specifications <math display="inline"><semantics> <msub> <mi>ρ</mi> <mn>1</mn> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>ρ</mi> <mn>2</mn> </msub> </semantics></math> outside of the centered interval.</p>
Full article ">Figure 6
<p>(<b>a</b>) Generic model architecture with (<b>b</b>) one-layer Feature Extractor (FE), a classification head with <span class="html-italic">z</span> classes and (<b>c</b>) intermediate blocks consisting of fully-connected layers. Dense blocks are specified via capsules or scalar neurons (plain) for the fully-connected units.</p>
Full article ">Figure 7
<p><b>First two rows:</b> Mean (first row) and best (second row) training loss progressions over five runs for each BN<math display="inline"><semantics> <mrow> <mo>(</mo> <mi>β</mi> <mo>,</mo> <mi>γ</mi> <mo>)</mo> </mrow> </semantics></math> initialization scheme per activation function. <b>Last two rows:</b> Mean deviation per BN layer of the final <math display="inline"><semantics> <msub> <mi>β</mi> <mi>i</mi> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>γ</mi> <mi>i</mi> </msub> </semantics></math> parameters from their initial values, using the identified superior BN initialization scheme for each activation function. Per plot the model parameter deviations are shown for the best run and as average over all five runs.</p>
Full article ">Figure 8
<p>(<b>a</b>) Mean and (<b>b</b>) best training loss development over five runs using 90 intermediate blocks, AMSGrad and the superior BN<math display="inline"><semantics> <mrow> <mo>(</mo> <mi>β</mi> <mo>,</mo> <mi>γ</mi> <mo>)</mo> </mrow> </semantics></math> initialization strategy per activation function. Both subfigures provide an inset as a zoom-in for tight regions.</p>
Full article ">Figure 9
<p>(<b>a</b>) Percentage gain in accuracy for the remaining epochs measured in relation to the final accuracy. Accuracy gains below one percentage (red line) are gray. (<b>b</b>) Mean training loss development over five runs for varying network depths using ReLU, AMSGrad and BN<math display="inline"><semantics> <mrow> <mo>(</mo> <mn>2</mn> <mo>,</mo> <mn>1</mn> <mo>)</mo> </mrow> </semantics></math> initialization strategy.</p>
Full article ">Figure 10
<p>Each row summarizes the experiment results of the parametric activation functions PReLU, SReLU/D-PReLU and APLU, respectively. <b>First two columns:</b> Mean (first column) and best (second column) training loss development over five runs using AMSGrad and varying initialization strategies for BN<math display="inline"><semantics> <mrow> <mo>(</mo> <mi>β</mi> <mo>,</mo> <mi>γ</mi> <mo>)</mo> </mrow> </semantics></math> and the activation function parameters. Insets are provided as zoom-in for tight regions. <b>Second two columns:</b> Mean parameter deviations per layer from their initial values with respect to BN and the parametric activation function. In each case, the identified superior configuration strategy is used. For APLU the configuration with <math display="inline"><semantics> <mrow> <mi>s</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math> is preferred against <math display="inline"><semantics> <mrow> <mi>s</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math> for the benefit of proper visualization. <b>Last column:</b> Mean training loss progress over five runs for varying network depths using the identified superior configuration strategy.</p>
Full article ">Figure 11
<p>Mean training loss development over five runs using CapsNets with a depth of 500 intermediate blocks and varying routing procedures, activation functions and BN initializations.</p>
Full article ">Figure 12
<p>(<b>a</b>) Mean training (<b>solid</b>) and validation (<b>dotted</b>) loss progressions over five runs for the pure capsule-driven architecture. (<b>b</b>) Mean bias parameter deviation of GR after training from their initial value of <math display="inline"><semantics> <mrow> <mo>−</mo> <mn>3</mn> </mrow> </semantics></math>.</p>
Full article ">Figure A1
<p>Row-wise 20 random samples for each dataset in <a href="#ai-06-00001-t0A1" class="html-table">Table A1</a>.</p>
Full article ">Figure A2
<p>Final training loss (<b>left</b>) and training accuracy (<b>right</b>) averaged over five runs using CapsNets with increasing network depth and distinct configurations.</p>
Full article ">Figure A3
<p>Convolutional capsule unit with GR between two layers of identical dimensionality and image downsampling using grouped convolutions.</p>
Full article ">
19 pages, 8353 KiB  
Article
Comparison of Ignition Process and Thermodynamic Conditions of TC4 and TC17 Alloys Under High-Speed Rubbing Ignition
by Yajun Li, Jianjun Li, Zichong Zu, Congzhen Wang, Yuqi Zhang, Lei Shao and Jinfeng Huang
Materials 2025, 18(1), 16; https://doi.org/10.3390/ma18010016 - 24 Dec 2024
Abstract
This study investigates the combustion characteristics and critical thermodynamic conditions for the ignition of TC4 and TC17 alloys under high-speed friction conditions. The results indicate that, under identical rubbing conditions, both the critical pressure and the ignition temperature of the TC17 alloy are [...] Read more.
This study investigates the combustion characteristics and critical thermodynamic conditions for the ignition of TC4 and TC17 alloys under high-speed friction conditions. The results indicate that, under identical rubbing conditions, both the critical pressure and the ignition temperature of the TC17 alloy are higher than those of the TC4 alloy. The critical ignition conditions for both alloys increase with thickness, while they decrease with increasing rotational speed, oxygen concentration, and oxygen pressure. The primary characteristics in the initial stage of friction ignition are abrasive and adhesive wear. As the duration of friction increases, material from the friction surface begins to peel away, creating favorable conditions for ignition. At the moment of ignition, significant peeling occurs, along with visible cracks and molten structures, resulting in the production of a substantial amount of titanium oxide on the friction surface. Based on the ignition theory proposed by Frank-Kamenetskii, the reaction order, adsorption coefficient, pre-exponential factor, and activation energy of the ignition criterion under high-speed friction conditions were determined by fitting and analyzing the experimental results. The ignition temperatures of the TC4 and TC17 alloys at different speeds were predicted with a relative error of less than 2.06%. This demonstrates that the Frank-Kamenetskii model can be utilized to explain the critical ignition conditions of titanium alloys under high-speed rubbing conditions. Full article
Show Figures

Figure 1

Figure 1
<p>3D representation and schematic diagram of equipment.</p>
Full article ">Figure 2
<p>The combustion process of TC4 alloy samples: (<b>a</b>–<b>c</b>) ignition stage; (<b>d</b>,<b>e</b>) intense combustion stage; (<b>f</b>) combustion extinction phase.</p>
Full article ">Figure 3
<p>The combustion process of TC17 alloy samples: (<b>a</b>–<b>c</b>) ignition stage; (<b>d</b>,<b>e</b>) intense combustion stage; (<b>f</b>) combustion extinction phase.</p>
Full article ">Figure 4
<p>In situ thermal imaging of TC4 alloy during rubbing ignition process: (<b>a</b>–<b>d</b>) thermal imaging; (<b>e</b>) ignition temperature curve.</p>
Full article ">Figure 5
<p>In situ thermal imaging of TC17 alloy during rubbing ignition process: (<b>a</b>–<b>d</b>) thermal imaging; (<b>e</b>) ignition temperature curve.</p>
Full article ">Figure 6
<p>The friction coefficient during rubbing ignition process: (<b>a</b>) friction coefficient curve; (<b>b</b>) average friction coefficient.</p>
Full article ">Figure 7
<p>Microstructure of TC4 alloy during rubbing ignition process: (<b>a</b>,<b>b</b>) 0.5 s; (<b>c</b>,<b>d</b>) 1.5 s; (<b>e</b>,<b>f</b>) 0.5 s; (<b>g</b>,<b>h</b>) ignition moment.</p>
Full article ">Figure 8
<p>Microstructure of TC17 alloy during rubbing ignition process: (<b>a</b>,<b>b</b>) 0.5 s; (<b>c</b>,<b>d</b>) 1.5 s; (<b>e</b>,<b>f</b>) 2.5 s; (<b>g</b>,<b>h</b>) ignition moment.</p>
Full article ">Figure 9
<p>XRD analysis during rubbing ignition process: (<b>a</b>) TC4; (<b>b</b>) TC17.</p>
Full article ">Figure 10
<p>The combustion threshold temperatures and pressures of TC4 and TC17 alloys under the following conditions: (<b>a</b>,<b>b</b>) thickness; (<b>c</b>,<b>d</b>) rotational speed; (<b>e</b>) oxygen pressure; (<b>f</b>) oxygen concentration.</p>
Full article ">Figure 11
<p>(<b>a</b>) the determination of adsorption coefficient (<b>b</b>) plots of T versus lnP.</p>
Full article ">Figure 12
<p>The experimental and computed values of ignition temperature at different rotational speeds of TC4 and TC17 alloys.</p>
Full article ">
14 pages, 322 KiB  
Article
Some Identities on (p,q)-Analog of the Generalized Hyperharmonic Polynomials of Order ν
by Sibel Koparal
Symmetry 2025, 17(1), 4; https://doi.org/10.3390/sym17010004 - 24 Dec 2024
Abstract
In this paper, p,q-analogues of the generalized harmonic polynomials and the generalized hyperharmonic polynomials of order ν are defined. We found new sums of these numbers by using combinatorial operations. We also obtained the generating function and used it to [...] Read more.
In this paper, p,q-analogues of the generalized harmonic polynomials and the generalized hyperharmonic polynomials of order ν are defined. We found new sums of these numbers by using combinatorial operations. We also obtained the generating function and used it to reproduce new equations. The applications of matrices are made in the end. Full article
(This article belongs to the Section Mathematics)
Show Figures

Figure 1

Figure 1
<p><math display="inline"><semantics> <mrow> <msubsup> <mi>H</mi> <mrow> <mn>3</mn> <mo>,</mo> <mn>7</mn> </mrow> <mn>2</mn> </msubsup> <mfenced separators="" open="(" close=")"> <mi>p</mi> <mo>,</mo> <mi>q</mi> <mo>,</mo> <mn>2</mn> </mfenced> </mrow> </semantics></math> values for some fixed <span class="html-italic">q</span>.</p>
Full article ">
16 pages, 489 KiB  
Article
Under-Five Child Poverty and Income Inequality in South Africa: A Multidimensional Perspective at the Lowest Geographic Areas
by Jabulani Mathebula and Olufunke Alaba
Int. J. Environ. Res. Public Health 2025, 22(1), 6; https://doi.org/10.3390/ijerph22010006 - 24 Dec 2024
Abstract
Under-five child poverty and income inequality are complex socio-economic phenomena that significantly impact the well-being of children worldwide. While there is a growing body of literature addressing child poverty in South Africa, our understanding of settlement discrepancies and factors influencing multidimensional under-five child [...] Read more.
Under-five child poverty and income inequality are complex socio-economic phenomena that significantly impact the well-being of children worldwide. While there is a growing body of literature addressing child poverty in South Africa, our understanding of settlement discrepancies and factors influencing multidimensional under-five child poverty and income in the country remains limited. This study assesses under-five-specific multidimensional poverty and the determinates of child poverty and inequality in the lowest geographical areas in South Africa. Alkire-Foster’s methodology was applied to construct and estimate the multidimensional poverty index for under-five children across settlement areas. The selected indicators were designed to reflect the unique deprivations and challenges faced by children in this age group. The results showed that there is a significant number of children who are deprived in indicators such as access to ECD (43%), hunger (20%), and education and employment at 69% and 65%, respectively. These are some key variables that require policy interventions to improve the development outcomes of children. The logistic regression results showed that 14 out of the 34 predictors were significant. Inequality was significant and positive at 1%. The findings suggest that more work still needs to be undertaken to improve the living conditions of children, especially in the former homelands, to achieve the goals set in the National Development Plan and Sustainable Development Goals. In the past, non-whites were assigned a homeland according to their ethnicity or a place where national or ethnic identity has formed. Full article
(This article belongs to the Special Issue 2nd Edition of Epidemiology and Global Health)
Show Figures

Figure 1

Figure 1
<p>Child MPI composition.</p>
Full article ">
30 pages, 16219 KiB  
Article
Fostering National Identity Through Sustainable Heritage Conservation: Ushaiger Village as a Model for Saudi Arabia
by Silvia Mazzetto
Heritage 2025, 8(1), 4; https://doi.org/10.3390/heritage8010004 - 24 Dec 2024
Abstract
As the Middle East experiences rapid growth due to its oil wealth, there is a pressing need to balance contemporary development with the preservation of its rich cultural heritage. This study focuses on Ushaiger Village in Saudi Arabia, an example of traditional Najid [...] Read more.
As the Middle East experiences rapid growth due to its oil wealth, there is a pressing need to balance contemporary development with the preservation of its rich cultural heritage. This study focuses on Ushaiger Village in Saudi Arabia, an example of traditional Najid architecture that was once abandoned and has now been brought back to life through restoration. This research tracks the restoration steps, looks at how old buildings are being reused today, and assesses the effectiveness of these efforts through a survey of 80 local residents and tourists. The results show significant improvements in preserving the village, with over 100 buildings restored using traditional, environmentally friendly materials like mud and limestone. This restoration has won strong support from the community and has boosted the local economy by increasing tourism and supporting local businesses, aligning well with Saudi Arabia’s Vision 2030 goals. This study illustrates that caring for heritage sites can promote economic and environmental health, providing a model for integrating cultural heritage into national development plans. Ushaiger Village’s story highlights the benefits of thoughtful conservation, showing that it can enhance community life and keep cultural identities alive within the Saudi Vision 2030. Full article
Show Figures

Figure 1

Figure 1
<p>Overview of the research methodology for assessing conservation and sustainable reuse in heritage buildings.</p>
Full article ">Figure 2
<p>A map illustrating the geographical location of Ushaiger Village within the broader context of the region.</p>
Full article ">Figure 3
<p>Aerial view and landscape of Ushaiger Heritage Village, highlighting the traditional architecture and the surrounding agricultural landscape. The images depict the village’s layout and the current state of its historic mud-brick structures. Source: <a href="http://heritage.moc.gov.sa" target="_blank">heritage.moc.gov.sa</a>, accessed on 27 September 2024.</p>
Full article ">Figure 4
<p>Measurements taken on three buildings. Researchers conducting physical measurements of an agricultural structure (<b>a</b>), a residential unit (<b>b</b>), and the public well (<b>c</b>) in Ushaiger Village to document construction techniques and assess preservation needs.</p>
Full article ">Figure 4 Cont.
<p>Measurements taken on three buildings. Researchers conducting physical measurements of an agricultural structure (<b>a</b>), a residential unit (<b>b</b>), and the public well (<b>c</b>) in Ushaiger Village to document construction techniques and assess preservation needs.</p>
Full article ">Figure 5
<p>Sample of 3D printing for the virtual model. A detailed 3D-printed model of two abandoned buildings in Ushaiger, a residential unit (<b>left</b>) and an agricultural structure (<b>right</b>), illustrating the integration of traditional architectural elements with digital technology for heritage preservation and sustainable urban growth.</p>
Full article ">Figure 6
<p>Zonal map of Ushaiger Heritage Village, showing on the left the general division into all the zones (Z1–Z8) and on the right, the selection of distinct zones (Z1 to Z4) with different levels of accessibility and preservation.</p>
Full article ">Figure 7
<p>Image of a residential building in Zone 2 (Z2) of Ushaiger Heritage Village (<b>left</b>), showcasing traditional Najdi architecture with mud-brick construction. The restoration efforts (<b>right</b>) maintain the original esthetic and structural integrity, highlighting the village’s adaptive reuse for contemporary purposes.</p>
Full article ">Figure 8
<p>The demographic distribution of survey participants.</p>
Full article ">Figure 9
<p>The Submitted informative sheet for participants, outlining the purpose of the study, participation details, and consent, approved by Prince Sultan University’s Institutional Review Board (PSUIRB-2022-09-0123) (accessed on 27 September 2024).</p>
Full article ">Figure 10
<p>Survey questionnaire presented to the inhabitants of Ushaiger Village, designed to gather insights on heritage preservation and community involvement, as approved by Prince Sultan University’s Institutional Review Board (PSU IRB-2022-09-0123).</p>
Full article ">Figure 11
<p>Distribution based on the buildings’ status of conservation.</p>
Full article ">Figure 12
<p>Two examples of Assessment Schedules elaborated for each building in Ushaiger Village. Left: Main entrance gate of the village. Right: External defensive tower of the village. The Assessment Schedule included site surveys, analyses for status of materials preservation, and the private/public accessibility.</p>
Full article ">Figure 13
<p>Proportion of traditional materials used.</p>
Full article ">Figure 14
<p>Assessment Schedule for restored commercial building, detailing the restoration and adaptation process of a commercial building in Ushaiger Village, highlighting its transformation from a traditional structure to a contemporary space for local inhabitants’ commercial use.</p>
Full article ">Figure 15
<p>Building function distribution. An overview of the different functions of buildings in Ushaiger Village, with private residential homes making up the largest portion, alongside agricultural units, commercial spaces, and public structures such as mosques and wells.</p>
Full article ">Figure 16
<p>Assessment Schedule for Dar Almeshrag, outlining the assessment phases conducted at Dar Almeshrag, including site surveys, structural analyses, and heritage preservation evaluations, aimed at documenting the building’s condition and historical significance.</p>
Full article ">Figure 17
<p>Assessment Schedule for damaged and collapsed building in Ushaiger Village, documenting its structural condition and areas of partial or total collapse, highlighting the needs for potential restoration or preservation.</p>
Full article ">Figure 18
<p>Radar chart for sustainability categories. Assessment values of the questionnaire: 1 = very low, 2 = low, 3 = high, 4 very high.</p>
Full article ">Figure 19
<p>Correlation heatmap for sustainability criteria.</p>
Full article ">Figure 20
<p>Stacked area chart for sustainability impact before and after restoration.</p>
Full article ">Figure 21
<p>Respondents’ ratings on environmental sustainability criteria, with particularly high scores for reducing pollution, mitigating natural hazards, and efficiently using natural resources, reflecting strong community awareness and commitment to sustainable practices.</p>
Full article ">Figure 22
<p>Socio-cultural sustainability ratings, including social inclusion, cultural diversity, and the preservation of social values, underscoring the community’s strong appreciation for these aspects in heritage preservation.</p>
Full article ">Figure 23
<p>Ecological sustainability and climate impact. A graphic display of respondents’ high ratings for minimizing climate change and the efficient use of natural resources, highlighting the importance of heritage restoration in supporting broader environmental sustainability goals.</p>
Full article ">
31 pages, 2399 KiB  
Article
A Privacy-Preserving Reputation Evaluation System with Compressed Revocable One-Time Ring Signature (CRORS)
by Xu Han and Dawei Zhang
Mathematics 2025, 13(1), 8; https://doi.org/10.3390/math13010008 - 24 Dec 2024
Abstract
Reputation evaluation systems are vital for online platforms, helping users make informed choices based on the trustworthiness of products, services, or individuals. Ensuring privacy and trust in these systems is critical to allow users to provide feedback without fear of retribution or identity [...] Read more.
Reputation evaluation systems are vital for online platforms, helping users make informed choices based on the trustworthiness of products, services, or individuals. Ensuring privacy and trust in these systems is critical to allow users to provide feedback without fear of retribution or identity exposure. The ring signature (RS), enabling anonymous group-based signing, has garnered attention for building secure and private reputation systems. However, RS-based systems face significant challenges, including the inability to identify malicious users who repeatedly sign the same message, the lack of mechanisms to reveal identities involved in unlawful activities, and a linear growth in signature size with the number of ring members, which poses storage challenges for certain applications. Addressing these limitations, we propose a compressed revocable one-time ring signature (CRORS) scheme leveraging compressible proofs under the Diffie–Hellman Decision and Discrete Logarithm assumptions in the random oracle model. CRORS ensures anonymity, unforgeability, one-time linkability, non-slanderability, and revocability. The one-time linkability feature prevents double-signing, while revocability enables identity disclosure for regulatory enforcement. Additionally, the signature size is reduced to O(logn), significantly enhancing storage efficiency. These improvements make CRORS particularly suitable for blockchain-based reputation systems with ever-growing storage demands. Theoretical analysis validates its effectiveness and practicality. Full article
Show Figures

Figure 1

Figure 1
<p>The restaurant reputation evaluation system.</p>
Full article ">Figure 2
<p>Workflow of the restaurant reputation evaluation system.</p>
Full article ">Figure 3
<p>Comparison of the signature size [<a href="#B16-mathematics-13-00008" class="html-bibr">16</a>,<a href="#B17-mathematics-13-00008" class="html-bibr">17</a>,<a href="#B31-mathematics-13-00008" class="html-bibr">31</a>,<a href="#B34-mathematics-13-00008" class="html-bibr">34</a>].</p>
Full article ">
29 pages, 1635 KiB  
Review
A Comparative Survey of Centralised and Decentralised Identity Management Systems: Analysing Scalability, Security, and Feasibility
by Aviral Goel and Yogachandran Rahulamathavan
Future Internet 2025, 17(1), 1; https://doi.org/10.3390/fi17010001 - 24 Dec 2024
Abstract
Traditional identity management (IdM) solutions based on centralised protocols, such as Lightweight Directory Access Protocol (LDAP) and Security Assertion Markup Language (SAML), are where a central authority manages all the processes. This risks a single point of failure and other vulnerabilities. In response, [...] Read more.
Traditional identity management (IdM) solutions based on centralised protocols, such as Lightweight Directory Access Protocol (LDAP) and Security Assertion Markup Language (SAML), are where a central authority manages all the processes. This risks a single point of failure and other vulnerabilities. In response, decentralised techniques like blockchain and decentralised identities (DIDs) are being explored. This review paper performs a comparison of popular decentralised identity management (DIM) protocols, such as self-sovereign identity (SSI), against traditional centralised approaches such as LDAP and SAML. These decentralised identity management systems are being developed, keeping users’ identity data as its highest priority. Additionally, this method eliminates the need for a central authority to manage and secure the system. To further explore the potential of decentralised identity management, this study delves into popular blockchain-based decentralised identity management systems such as uPort, Sovrin, EverID, Blockstack, ShoCard, and Hyperledger Indy. We analyse their underlying principles and compare them with the well-established centralised identity management solutions, focusing on key aspects such as scalability, security, and feasibility. However, despite their benefits and several worthy developments in this field, decentralised approaches are still not widely used. Through this study, we investigate both centralised and decentralised methods and review their strengths and weaknesses. By reviewing multiple research papers, this survey aims to provide an understanding and aid in selecting the most suitable identity management system for different use cases. Full article
Show Figures

Figure 1

Figure 1
<p>Timeline of Evolution of Identity and Authentication Methods.</p>
Full article ">Figure 2
<p>Centralised identity management systems.</p>
Full article ">Figure 3
<p>Sequence diagram of CIMS.</p>
Full article ">Figure 4
<p>Federated identity management.</p>
Full article ">Figure 5
<p>Sequence diagram of SAML authentication.</p>
Full article ">Figure 6
<p>Sequence diagram of OAuth authentication.</p>
Full article ">Figure 7
<p>Sequence diagram of DIMS.</p>
Full article ">Figure 8
<p>Sequence diagram on working of ShoCard.</p>
Full article ">
Back to TopTop