[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (2,279)

Search Parameters:
Keywords = physical security

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
25 pages, 5896 KiB  
Article
Dynamic Adaptive Artificial Hummingbird Algorithm-Enhanced Deep Learning Framework for Accurate Transmission Line Temperature Prediction
by Xiu Ji, Chengxiang Lu, Beimin Xie, Huanhuan Han and Mingge Li
Electronics 2025, 14(3), 403; https://doi.org/10.3390/electronics14030403 - 21 Jan 2025
Viewed by 149
Abstract
As power demand increases and the scale of power grids expands, accurately predicting transmission line temperatures is becoming essential for ensuring the stability and security of power systems. Traditional physical and statistical models struggle with complex multivariate time series, often failing to balance [...] Read more.
As power demand increases and the scale of power grids expands, accurately predicting transmission line temperatures is becoming essential for ensuring the stability and security of power systems. Traditional physical and statistical models struggle with complex multivariate time series, often failing to balance short-term fluctuations with long-term dependencies, and their prediction accuracy and adaptability remain limited. To address these challenges, this paper proposes a deep learning model architecture based on the Dynamic Adaptive Artificial Hummingbird Algorithm (DA-AHA), named the DA-AHA-CNN-LSTM-TPA (DA-AHA-CLT). The model integrates convolutional neural networks (CNNs) for local feature extraction, long short-term memory (LSTM) networks for temporal modeling, and temporal pattern attention mechanisms (TPA) for dynamic feature weighting, while the DA-AHA optimizes hyperparameters to enhance prediction accuracy and stability. The traditional artificial hummingbird algorithm (AHA) is further improved by introducing dynamic step-size adjustment, greedy local search, and grouped parallel search mechanisms to balance global exploration and local exploitation. Our experimental results demonstrate that the DA-AHA-CLT model achieves a coefficient of determination (R2) of 0.987, a root-mean-square error (RMSE) of 0.023, a mean absolute error (MAE) of 0.018, and a median absolute error (MedAE) of 0.011, outperforming traditional models such as CNN-LSTM and LSTM-TPA. These findings confirm that the DA-AHA-CLT model effectively captures the complex dynamic characteristics of transmission line temperatures, offering superior performance and robustness in full-time-step prediction tasks, and highlight its potential for solving challenging multivariate time-series forecasting problems in power systems. Full article
Show Figures

Figure 1

Figure 1
<p>LSTM structure.</p>
Full article ">Figure 2
<p>TPA structure.</p>
Full article ">Figure 3
<p>CNN structure.</p>
Full article ">Figure 4
<p>Algorithmic optimization process.</p>
Full article ">Figure 5
<p>Diagram of model structure.</p>
Full article ">Figure 6
<p>Visualization of processed data.</p>
Full article ">Figure 7
<p>DA-AHA optimizes CLT.</p>
Full article ">Figure 8
<p>Visualization of model performance metrics.</p>
Full article ">Figure 9
<p>DA-AHA optimization process.</p>
Full article ">Figure 10
<p>DA-AHA -CLT testing process.</p>
Full article ">Figure 11
<p>Results of different models.</p>
Full article ">Figure 12
<p>Comparison of different models.</p>
Full article ">Figure 13
<p>Comparison of different algorithms.</p>
Full article ">
19 pages, 8449 KiB  
Article
Physical Vulnerability of The Gambia’s Coastline in the Context of Climate Change
by Muhammad Leroy Albert Gomez, Kissao Gnandi, Chrétien Ngouanet, Ibrahima Pouye and Joshua Ntajal
World 2025, 6(1), 17; https://doi.org/10.3390/world6010017 - 20 Jan 2025
Viewed by 246
Abstract
The Gambia’s coastline, known for its unique ecosystems and vital role in the country’s economy through fisheries, tourism, and agriculture, is becoming increasingly vulnerable as a result of the combined effects of climate change and human activity. This coastline sustains an important portion [...] Read more.
The Gambia’s coastline, known for its unique ecosystems and vital role in the country’s economy through fisheries, tourism, and agriculture, is becoming increasingly vulnerable as a result of the combined effects of climate change and human activity. This coastline sustains an important portion of the population by providing livelihoods and contributing to food security, as well as housing critical infrastructure including ports, urban areas, and tourism hubs. However, as climate change intensifies pre-existing vulnerabilities, such as increased sea-level rise, coastal erosion, and extreme weather events, these socio-economic assets are becoming more and more vulnerable. As a result, this study focused on investigating the physical vulnerability of the coastline in the context of climate change. The vulnerability assessment was conducted using the coastal vulnerability index approach, utilising a combination of oceanographic data, remote sensing, and field observations. The research outcomes supported the identification of key areas at risk and examined the contributing factors such as tidal ranges, storm surges, and human activities. The findings highlight the immediate and long-term threats to coastal communities, infrastructure, and natural habitats. Due to the vulnerability provided by geological and geomorphological factors, the average Coastal Vulnerability Index (CVI) score of 29 indicates a high level of exposure to coastal hazards from Buniadu Point to Barra. From Banjul to Cape Point, the average coastline dynamic rate is positive at 0.21 m/year, indicating some accretion. Despite this, the CVI score of 22 indicates significant vulnerability to coastal hazards from Bald Cape to Salifor Point. The study also explored potential mitigation and adaptation strategies to enhance coastal resilience to sea-level rise, coastal erosion, and flooding. Integrated and sustainable strategies were outlined to support policy-making and community-based initiatives towards safeguarding coastal regions of The Gambia against the backdrop of climate change. Full article
38 pages, 3394 KiB  
Review
A Compact Review of Current Technologies for Carbon Capture as Well as Storing and Utilizing the Captured CO2
by Tim M. Thiedemann and Michael Wark
Processes 2025, 13(1), 283; https://doi.org/10.3390/pr13010283 - 20 Jan 2025
Viewed by 426
Abstract
With the consequences of climate change becoming more urgent, there has never been a more pressing need for technologies that can help to reduce the carbon dioxide (CO2) emissions of the most polluting sectors, such as power generation, steel, cement, and [...] Read more.
With the consequences of climate change becoming more urgent, there has never been a more pressing need for technologies that can help to reduce the carbon dioxide (CO2) emissions of the most polluting sectors, such as power generation, steel, cement, and the chemical industry. This review summarizes the state-of-the-art technologies for carbon capture, for instance, post-combustion, pre-combustion, oxy-fuel combustion, chemical looping, and direct air capture. Moreover, already established carbon capture technologies, such as absorption, adsorption, and membrane-based separation, and emerging technologies like calcium looping or cryogenic separation are presented. Beyond carbon capture technologies, this review also discusses how captured CO2 can be securely stored (CCS) physically in deep saline aquifers or depleted gas and oil reservoirs, stored chemically via mineralization, or used in enhanced oil recovery. The concept of utilizing the captured CO2 (CCU) for producing value-added products, including formic acid, methanol, urea, or methane, towards a circular carbon economy will also be shortly discussed. Real-life applications, e.g., already pilot-scale continuous methane (CH4) production from flue gas CO2, are shown. Actual deployment of the most crucial technologies for the future will be explored in real-life applications. This review aims to provide a compact view of the most crucial technologies that should be considered when choosing to capture, store, or convert CO2, informing future researchers with efforts aimed at mitigating CO2 emissions and tackling the climate crisis. Full article
Show Figures

Figure 1

Figure 1
<p>Simplified scheme for the post-combustion route for carbon capture (based on [<a href="#B17-processes-13-00283" class="html-bibr">17</a>]).</p>
Full article ">Figure 2
<p>Simplified flowsheet of CO<sub>2</sub> absorption via fluid absorbents (based on [<a href="#B19-processes-13-00283" class="html-bibr">19</a>]).</p>
Full article ">Figure 3
<p>Simplified flowsheet of CO<sub>2</sub> capture via calcium looping (based on [<a href="#B84-processes-13-00283" class="html-bibr">84</a>]).</p>
Full article ">Figure 4
<p>Simplified flowsheet of CO<sub>2</sub> absorption via membrane separation using a hollow fiber membrane: (<b>a</b>) flue gas stream inside the lumen side, (<b>b</b>) fluid absorbent inside the lumen side, and (<b>c</b>) transverse flow of flue gas stream (based on [<a href="#B102-processes-13-00283" class="html-bibr">102</a>]).</p>
Full article ">Figure 5
<p>Techniques for cryogenic CO<sub>2</sub> capture in the conventional and unconventional pathways (based on [<a href="#B102-processes-13-00283" class="html-bibr">102</a>]).</p>
Full article ">Figure 6
<p>Simplified flowsheet of the pre-combustion route (based on [<a href="#B17-processes-13-00283" class="html-bibr">17</a>]).</p>
Full article ">Figure 7
<p>Simplified flowsheet of an integrated gasification combined cycle (based on [<a href="#B149-processes-13-00283" class="html-bibr">149</a>]).</p>
Full article ">Figure 8
<p>Simplified flowsheet of the oxy-fuel combustion route (based on [<a href="#B19-processes-13-00283" class="html-bibr">19</a>]).</p>
Full article ">Figure 9
<p>Simplified flowsheet of chemical looping combustion route (based on [<a href="#B170-processes-13-00283" class="html-bibr">170</a>,<a href="#B171-processes-13-00283" class="html-bibr">171</a>]).</p>
Full article ">Figure 10
<p>Simplified flowsheet of direct air capture.</p>
Full article ">Figure 11
<p>Simplified possibilities for carbon storage solutions: (1) depleted oil/gas fields, (2) enhanced oil recovery, (3) coal beds, (4) deep saline aquifers, and (5) carbonate materials (based on [<a href="#B205-processes-13-00283" class="html-bibr">205</a>]).</p>
Full article ">Figure 12
<p>Concave-down geometry of a deep saline aquifer with cap rock sealing (based on [<a href="#B211-processes-13-00283" class="html-bibr">211</a>]).</p>
Full article ">
16 pages, 502 KiB  
Article
Specific Nutrients Mediate the Association of Food Insecurity and Sleep Regularity Index (SRI) in U.S. Adults: NHANES 2011–2014
by Samuel Myron Degenhard, Nicole Farmer, Li Yang, Jennifer J. Barb, Katherine A. Maki and Gwenyth R. Wallen
Nutrients 2025, 17(2), 340; https://doi.org/10.3390/nu17020340 - 18 Jan 2025
Viewed by 472
Abstract
Background/Objectives: Food-insecure individuals are at risk for poor health outcomes, including substandard sleep health. A possible association of food insecurity with sleep regularity has not been explored, and factors contributing to the relationship between food insecurity and sleep are not well understood. This [...] Read more.
Background/Objectives: Food-insecure individuals are at risk for poor health outcomes, including substandard sleep health. A possible association of food insecurity with sleep regularity has not been explored, and factors contributing to the relationship between food insecurity and sleep are not well understood. This cross-sectional study explored the relationship between food insecurity and sleep regularity and identified specific nutrients that mediated the association. Methods: This study used dietary intake, interview, physical examination, actigraphy, and laboratory data from NHANES 2011–2014 to assess the possible correlation between food insecurity and sleep in a sample of U.S. adults (n = 6730). Mediation analysis was conducted to determine specific serum biomarkers and intake of nutrients that indirectly contributed to the relationship. Results: Food insecurity was negatively correlated with sleep regularity. Dietary intake of fiber; vitamins A, B1, B2, C, E, and K; β-carotene; zinc; copper; and potassium and serum concentrations of palmitoleic acid had significant indirect effects on this association. The low/marginal food security group under-consumed vitamin K, and the very low food security group under-consumed vitamin K and zinc. Among food-insecure, income-eligible adults, those who received benefits from food assistance programs consumed significantly less fiber and β-carotene and exhibited significantly higher serum concentrations of palmitoleic acid than non-participants. Conclusions: Food insecurity predicted sleep regularity, and this relationship was mediated by dietary intake and serum concentrations of specific nutrients, underscoring the role of nutrition security when evaluating potential health impacts for adults experiencing food insecurity. Full article
(This article belongs to the Special Issue The Relationship Between Sleep, Dietary Patterns and Human Health)
Show Figures

Figure A1

Figure A1
<p>Filtering of participants for final study sample.</p>
Full article ">
20 pages, 7204 KiB  
Article
Virtual Node-Driven Cloud–Edge Collaborative Resource Scheduling for Surveillance with Visual Sensors
by Xinyang Gu, Zhansheng Duan, Guangyuan Ye and Zhenjun Chang
Sensors 2025, 25(2), 535; https://doi.org/10.3390/s25020535 - 17 Jan 2025
Viewed by 347
Abstract
For public security purposes, distributed surveillance systems are widely deployed in key areas. These systems comprise visual sensors, edge computing boxes, and cloud servers. Resource scheduling algorithms are critical to ensure such systems’ robustness and efficiency. They balance workloads and need to meet [...] Read more.
For public security purposes, distributed surveillance systems are widely deployed in key areas. These systems comprise visual sensors, edge computing boxes, and cloud servers. Resource scheduling algorithms are critical to ensure such systems’ robustness and efficiency. They balance workloads and need to meet real-time monitoring and emergency response requirements. Existing works have primarily focused on optimizing Quality of Service (QoS), latency, and energy consumption in edge computing under resource constraints. However, the issue of task congestion due to insufficient physical resources has been rarely investigated. In this paper, we tackle the challenges posed by large workloads and limited resources in the context of surveillance with visual sensors. First, we introduce the concept of virtual nodes for managing resource shortages, referred to as virtual node-driven resource scheduling. Then, we propose a convex-objective integer linear programming (ILP) model based on this concept and demonstrate its efficiency. Additionally, we propose three alternative virtual node-driven scheduling algorithms, the extension of a random algorithm, a genetic algorithm, and a heuristic algorithm, respectively. These algorithms serve as benchmarks for comparison with the proposed ILP model. Experimental results show that all the scheduling algorithms can effectively address the challenge of offloading multiple priority tasks under resource constraints. Furthermore, the ILP model shows the best scheduling performance among them. Full article
(This article belongs to the Special Issue Cloud and Edge Computing for IoT Applications)
Show Figures

Figure 1

Figure 1
<p>Video surveillance scene diagram. The red star indicates areas where security incidents have occurred, while the yellow star indicates areas with a high likelihood of future security incidents. Red cameras that can monitor red star areas have the highest priority, while yellow cameras that can monitor yellow star areas have the medium priority. The line between cameras and edge servers represents wired network connections.</p>
Full article ">Figure 2
<p>Video surveillance task topology diagram: the gray node is the virtual node. The connection between the camera and edge servers indicates that tasks generated by the camera can be offloaded to the corresponding edge server or further offloaded to the cloud. A virtual node is connected to all cameras, enabling any task generated by the cameras to be offloaded to it. The virtual node is distinct from edge servers and the cloud, serving as a conceptual entity.</p>
Full article ">Figure 3
<p>A brief example demonstrating how the ILP model works. The red camera generates a high-priority task, while the other five black cameras generate low-priority tasks.</p>
Full article ">Figure 4
<p>Virtual node-driven genetic algorithm crossover.</p>
Full article ">Figure 5
<p>Virtual node-driven genetic algorithm mutation.</p>
Full article ">Figure 6
<p>Test data graph. The x-axis represents the test ID, and the y-axis shows the task number. We conduct 220 experiments, divided into 11 groups of 20 experiments each. Each group has the same number of tasks, with task priorities distributed in a 1:3:6 ratio for high, medium, and low priorities.</p>
Full article ">Figure 7
<p>Task scheduling success rate. The x-axis represents the test ID, and the y-axis shows the percentage of successful task offloading.</p>
Full article ">Figure 8
<p>The number of tasks offloaded to edge servers. The x-axis represents the test ID, and the y-axis shows the number of tasks offloaded to servers.</p>
Full article ">Figure 9
<p>Edge server resource utilization. The x-axis represents the test ID, and the y-axis shows the resource utilization.</p>
Full article ">Figure 10
<p>CPU execution time. The x-axis represents the total number of tasks, and the y-axis shows the execution time of the algorithms in seconds.</p>
Full article ">
17 pages, 490 KiB  
Article
Food Insecurity and Coping Mechanisms: Impact on Maternal Mental Health and Child Malnutrition
by Berna Rahi, Farah Al Mashharawi, Hana Harb, Myriam El Khoury-Malhame and Lama Mattar
Nutrients 2025, 17(2), 330; https://doi.org/10.3390/nu17020330 - 17 Jan 2025
Viewed by 404
Abstract
Background: Household food insecurity (HFI) is a serious public health concern in Lebanon. Adverse mental health issues have been reported among food insecure households in addition to physical and nutritional complications. Caregivers in food insecure families tend to adopt different coping mechanisms to [...] Read more.
Background: Household food insecurity (HFI) is a serious public health concern in Lebanon. Adverse mental health issues have been reported among food insecure households in addition to physical and nutritional complications. Caregivers in food insecure families tend to adopt different coping mechanisms to mitigate the effects of food insecurity (FI) on their children. Objective: This cross-sectional observational study aimed to explore the relationship between FI, maternal depression, child malnutrition, and differential coping mechanisms adopted by mothers. Methods: A total of 219 women were enrolled in this study; FI was assessed using the household food insecurity assessment (HFIAS), maternal depression using the patient health questionnaire (PHQ-9), and their children’s nutritional status through recall of anthropometric measurements. Pearson’s correlations and logistic regressions were performed to evaluate the associations between HFI, maternal depression, and children’s nutritional status. Results: A strong positive correlation between HFI and maternal depression (p = 0.001) and children’s nutritional status (p = 0.008) was shown. Logistic regressions revealed that being food secure decreased the risk of maternal depression (OR = 0.328, 95% CI 0.125–0.863, p = 0.024), while it did not predict children’s nutritional status. Eight main themes related to coping mechanisms were identified. Conclusions: This study highlights the understudied relationship between food insecurity and maternal depression, showing an increased prevalence of HFI among residents in Lebanon with a positive correlation with increased maternal depression. Further investigation is warranted to better explore how to mitigate the negative impact of food insecurity on mental health, maternal nutritional needs, and Infant and Young Child Feeding (IYCF) practices in Lebanon. Full article
(This article belongs to the Special Issue Malnutrition and Gastrointestinal Disease)
Show Figures

Figure 1

Figure 1
<p>Methodology flowchart.</p>
Full article ">
14 pages, 946 KiB  
Article
Fruit Quality and Production Parameters of Some Bitter Cherry Cultivars
by Ionel Perju, Iulia Mineață, Sorina Sîrbu, Iuliana Elena Golache, Ionuț Vasile Ungureanu and Carmen Doina Jităreanu
Horticulturae 2025, 11(1), 87; https://doi.org/10.3390/horticulturae11010087 - 14 Jan 2025
Viewed by 424
Abstract
Bitter cherries (Prunus avium var. sylvestris Ser.) represent a valuable raw material in the traditional Eastern European food industry with high potential within the horticultural chain and circular economy in the context of global food security due to exceptional nutritional properties. The [...] Read more.
Bitter cherries (Prunus avium var. sylvestris Ser.) represent a valuable raw material in the traditional Eastern European food industry with high potential within the horticultural chain and circular economy in the context of global food security due to exceptional nutritional properties. The present study was carried out in the period 2022–2024 and had as its main purpose the evaluation of the fruit quality and production indices of some bitter cherry cultivars suitable for the technological norms specific to industrial processing. Five bitter cherry cultivars (C1-Amaris, C2-Amar Maxut, C3-Amar Galata, C4-Silva, C5-Amara) were studied and analyzed in terms of fruit quality—morpho-physiological and organoleptic traits, and physical and chemical parameters—and general productivity—tree vigor, fruiting, and yield indices. The results highlighted a wide variability in the physical characteristics of bitter cherries, with an average weight between 3.3 and 4.9 g and the color of the skin varying from yellow with redness to dark red and blackish. Regarding the chemical attributes, antioxidant activity was relatively higher in fruits with a more intense bitter taste (89.3 μg Trolox·g−1 f.w for C2 and 89.1 μg Trolox·g−1 f.w. for C4 and C5), a fact also found in the content total of polyphenols (with a maximum value of 743.2 mg GAE·100 g−1 f.w at C2). Total soluble solids content had an average value of 20.51°Brix and titratable acidity of 0.85 g malic acid·100 g−1 f.w. The influence of local environmental factors on the productivity of bitter cherry cultivars was highlighted by significant statistical differences (p < 0.05) between cultivars. Thus, the resistance to frost in the full flowering phenophase had an average value of 86.69%, and regarding the resistance to fruit cracking, the highest percentage was found in C1, with 99.79% unaffected fruits. The productivity index per tree had an average value of 0.24 kg per cm2 trunk cross-section area. The physico-chemical properties of the fruits and the productivity of bitter cherry cultivars support the possibility of their efficient use in processing and the food industry, yielding high-quality products with nutraceutical value. Full article
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>The distribution of <span class="html-italic">Prunus</span> sp. across the territory of Romania (original). The points on the map represent the distribution both as a wild and cultivated plant across the entire country and at different relief altitudes.</p>
Full article ">Figure 2
<p>Visual characteristics of fruits (color and shape) in the studied bitter cherry cultivars.</p>
Full article ">
16 pages, 581 KiB  
Article
Securing Cyber Physical Systems: Lightweight Industrial Internet of Things Authentication (LI2A) for Critical Infrastructure and Manufacturing
by Alaa T. Al Ghazo, Mohammed Abu Mallouh, Sa’ed Alajlouni and Islam T. Almalkawi
Appl. Syst. Innov. 2025, 8(1), 11; https://doi.org/10.3390/asi8010011 - 14 Jan 2025
Viewed by 497
Abstract
The increasing incorporation of Industrial Internet of Things (IIoT) devices into critical industrial operations and critical infrastructures necessitates robust security measures to safeguard confidential information and ensure dependable connectivity. Particularly in Cyber Physical Systems (CPSs), IIoT system security becomes critical as systems become [...] Read more.
The increasing incorporation of Industrial Internet of Things (IIoT) devices into critical industrial operations and critical infrastructures necessitates robust security measures to safeguard confidential information and ensure dependable connectivity. Particularly in Cyber Physical Systems (CPSs), IIoT system security becomes critical as systems become more interconnected and digital. This paper introduces a novel Lightweight Industrial IoT Authentication (LI2A) method as a solution to address security concerns in the industrial sector and smart city infrastructure. Mutual authentication, authenticated message integrity, key agreement, soundness, forward secrecy, resistance to a variety of assaults, and minimal resource consumption are all features offered by LI2A. Critical to CPS operations, the approach prevents impersonation, man-in-the-middle, replay, eavesdropping, and modification assaults, according to a security study. The method proposed herein ensures the integrity of CPS networks by verifying communication reliability, identifying unauthorized message modifications, establishing a shared session key between users and IIoT devices, and periodically updating keys to ensure sustained security. A comprehensive assessment of performance takes into account each aspect of storage, communication, and computation. The communication and computing capabilities of LI2A, which are critical for the operation of CPS infrastructure, are demonstrated through comparisons with state-of-the-art systems from the literature. LI2A can be implemented in resource-constrained IIoT devices found in CPS and industrial environments, according to the results. By integrating IIoT devices into critical processes in CPS, it is possible to enhance security while also promoting urban digitalization and sustainability. Full article
(This article belongs to the Special Issue Industrial Cybersecurity)
Show Figures

Figure 1

Figure 1
<p>System model.</p>
Full article ">Figure 2
<p>Online registration phase.</p>
Full article ">Figure 3
<p>Key agreement phase.</p>
Full article ">Figure 4
<p>Forward secrecy phase.</p>
Full article ">Figure 5
<p>Communication cost comparison with state-of-the-art schemes [<a href="#B22-asi-08-00011" class="html-bibr">22</a>,<a href="#B31-asi-08-00011" class="html-bibr">31</a>,<a href="#B32-asi-08-00011" class="html-bibr">32</a>,<a href="#B33-asi-08-00011" class="html-bibr">33</a>].</p>
Full article ">
23 pages, 22211 KiB  
Article
A Local Adversarial Attack with a Maximum Aggregated Region Sparseness Strategy for 3D Objects
by Ling Zhao, Xun Lv, Lili Zhu, Binyan Luo, Hang Cao, Jiahao Cui, Haifeng Li and Jian Peng
J. Imaging 2025, 11(1), 25; https://doi.org/10.3390/jimaging11010025 - 13 Jan 2025
Viewed by 484
Abstract
The increasing reliance on deep neural network-based object detection models in various applications has raised significant security concerns due to their vulnerability to adversarial attacks. In physical 3D environments, existing adversarial attacks that target object detection (3D-AE) face significant challenges. These attacks often [...] Read more.
The increasing reliance on deep neural network-based object detection models in various applications has raised significant security concerns due to their vulnerability to adversarial attacks. In physical 3D environments, existing adversarial attacks that target object detection (3D-AE) face significant challenges. These attacks often require large and dispersed modifications to objects, making them easily noticeable and reducing their effectiveness in real-world scenarios. To maximize the attack effectiveness, large and dispersed attack camouflages are often employed, which makes the camouflages overly conspicuous and reduces their visual stealth. The core issue is how to use minimal and concentrated camouflage to maximize the attack effect. Addressing this, our research focuses on developing more subtle and efficient attack methods that can better evade detection in practical settings. Based on these principles, this paper proposes a local 3D attack method driven by a Maximum Aggregated Region Sparseness (MARS) strategy. In simpler terms, our approach strategically concentrates the attack modifications to specific areas to enhance effectiveness while maintaining stealth. To maximize the aggregation of attack-camouflaged regions, an aggregation regularization term is designed to constrain the mask aggregation matrix based on the face-adjacency relationships. To minimize the attack camouflage regions, a sparseness regularization is designed to make the mask weights tend toward a U-shaped distribution and limit extreme values. Additionally, neural rendering is used to obtain gradient-propagating multi-angle augmented data and suppress the model’s detection to locate universal critical decision regions from multiple angles. These technical strategies ensure that the adversarial modifications remain effective across different viewpoints and conditions. We test the attack effectiveness of different region selection strategies. On the CARLA dataset, the average attack efficiency of attacking the YOLOv3 and v5 series networks reaches 1.724, which represents an improvement of 0.986 (134%) compared to baseline methods. These results demonstrate a significant enhancement in attack performance, highlighting the potential risks to real-world object detection systems. The experimental results demonstrate that our attack method achieves both stealth and aggressiveness from different viewpoints. Furthermore, we explore the transferability of the decision regions. The results indicate that our method can be effectively combined with different texture optimization methods, with the average precision decreasing by 0.488 and 0.662 across different networks, which indicates a strong attack effectiveness. Full article
Show Figures

Figure 1

Figure 1
<p>A local adversarial attack with a Maximum Aggregated Region Sparseness strategy for 3D objects.</p>
Full article ">Figure 2
<p>Overview of the Maximum Aggregated Region Sparseness strategy.</p>
Full article ">Figure 3
<p>Aggregation matrix: influence factor calculation based on face–core distance.</p>
Full article ">Figure 4
<p>Adversarial examples without regularization for sparsity.</p>
Full article ">Figure 5
<p>Overview of the dataset which contains a variety of simulated images from the Carla simulation, captured under different perspectives, distances, and environmental conditions.</p>
Full article ">Figure 6
<p>Examples of different region selection strategies.</p>
Full article ">Figure 7
<p>Adversarial examples generated from different angles based on MARS.</p>
Full article ">Figure 8
<p>Mask weight distribution: (<b>top</b>) <math display="inline"><semantics> <mrow> <mi>l</mi> <mi>o</mi> <mi>s</mi> <mi>s</mi> <mo>=</mo> <msub> <mi>L</mi> <mrow> <mi>a</mi> <mi>g</mi> <mi>g</mi> </mrow> </msub> <mo>+</mo> <msub> <mi>L</mi> <mrow> <mi>a</mi> <mi>d</mi> <mi>v</mi> </mrow> </msub> </mrow> </semantics></math>; (<b>bottom</b>) <math display="inline"><semantics> <mrow> <mi>l</mi> <mi>o</mi> <mi>s</mi> <mi>s</mi> <mo>=</mo> <msub> <mi>L</mi> <mrow> <mi>a</mi> <mi>g</mi> <mi>g</mi> </mrow> </msub> <mo>+</mo> <msub> <mi>L</mi> <mrow> <mi>s</mi> <mi>p</mi> <mi>a</mi> <mi>r</mi> <mi>s</mi> <mi>e</mi> </mrow> </msub> <mo>+</mo> <msub> <mi>L</mi> <mrow> <mi>a</mi> <mi>d</mi> <mi>v</mi> </mrow> </msub> </mrow> </semantics></math>.</p>
Full article ">
20 pages, 18281 KiB  
Article
IMU Sensor-Based Worker Behavior Recognition and Construction of a Cyber–Physical System Environment
by Sehwan Park, Minkyo Youm and Junkyeong Kim
Sensors 2025, 25(2), 442; https://doi.org/10.3390/s25020442 - 13 Jan 2025
Viewed by 370
Abstract
According to South Korea’s Ministry of Employment and Labor, approximately 25,000 construction workers suffered from various injuries between 2015 and 2019. Additionally, about 500 fatalities occur annually, and multiple studies are being conducted to prevent these accidents and quickly identify their occurrence to [...] Read more.
According to South Korea’s Ministry of Employment and Labor, approximately 25,000 construction workers suffered from various injuries between 2015 and 2019. Additionally, about 500 fatalities occur annually, and multiple studies are being conducted to prevent these accidents and quickly identify their occurrence to secure the golden time for the injured. Recently, AI-based video analysis systems for detecting safety accidents have been introduced. However, these systems are limited to areas where CCTV is installed, and in locations like construction sites, numerous blind spots exist due to the limitations of CCTV coverage. To address this issue, there is active research on the use of MEMS (micro-electromechanical systems) sensors to detect abnormal conditions in workers. In particular, methods such as using accelerometers and gyroscopes within MEMS sensors to acquire data based on workers’ angles, utilizing three-axis accelerometers and barometric pressure sensors to improve the accuracy of fall detection systems, and measuring the wearer’s gait using the x-, y-, and z-axis data from accelerometers and gyroscopes are being studied. However, most methods involve use of MEMS sensors embedded in smartphones, typically attaching the sensors to one or two specific body parts. Therefore, in this study, we developed a novel miniaturized IMU (inertial measurement unit) sensor that can be simultaneously attached to multiple body parts of construction workers (head, body, hands, and legs). The sensor integrates accelerometers, gyroscopes, and barometric pressure sensors to measure various worker movements in real time (e.g., walking, jumping, standing, and working at heights). Additionally, incorporating PPG (photoplethysmography), body temperature, and acoustic sensors, enables the comprehensive observation of both physiological signals and environmental changes. The collected sensor data are preprocessed using Kalman and extended Kalman filters, among others, and an algorithm was proposed to evaluate workers’ safety status and update health-related data in real time. Experimental results demonstrated that the proposed IMU sensor can classify work activities with over 90% accuracy even at a low sampling rate of 15 Hz. Furthermore, by integrating internal filtering, communication modules, and server connectivity within an application, we established a cyber–physical system (CPS), enabling real-time monitoring and immediate alert transmission to safety managers. Through this approach, we verified improved performance in terms of miniaturization, measurement accuracy, and server integration compared to existing commercial sensors. Full article
(This article belongs to the Special Issue Sensor-Based Human Activity Recognition)
Show Figures

Figure 1

Figure 1
<p>Fabrication of the prototype IMU sensor: (<b>a</b>) appearance of the fabricated IMU sensor; (<b>b</b>) diagram of the IMU sensor and the positions of the included sensors.</p>
Full article ">Figure 2
<p>Algorithm flowchart for worker status assessment.</p>
Full article ">Figure 3
<p>Results of applying the forward gaze algorithm: (<b>a</b>) when only the head turns; (<b>b</b>) when both body and head turn together (during directional change).</p>
Full article ">Figure 3 Cont.
<p>Results of applying the forward gaze algorithm: (<b>a</b>) when only the head turns; (<b>b</b>) when both body and head turn together (during directional change).</p>
Full article ">Figure 4
<p>Results of applying the Kalman filter and walking detection: (<b>a</b>) result of applying the Kalman filter to raw data; (<b>b</b>) walking detection results (1 when there is no foot movement; 0 when there is foot movement).</p>
Full article ">Figure 4 Cont.
<p>Results of applying the Kalman filter and walking detection: (<b>a</b>) result of applying the Kalman filter to raw data; (<b>b</b>) walking detection results (1 when there is no foot movement; 0 when there is foot movement).</p>
Full article ">Figure 5
<p>Results of applying the energy detection algorithm during jumping.</p>
Full article ">Figure 6
<p>Results of applying the extended Kalman filter to barometric data and estimation of altitude changes.</p>
Full article ">Figure 7
<p>IMU sensor placement by body part.</p>
Full article ">Figure 8
<p>IMU sensor application integration screen and database connection screen.</p>
Full article ">Figure 9
<p>Dashboard and environment setup for CPS implementation: (<b>a</b>) CPS dashboard screen layout; (<b>b</b>) CPS environment construction scene.</p>
Full article ">Figure 9 Cont.
<p>Dashboard and environment setup for CPS implementation: (<b>a</b>) CPS dashboard screen layout; (<b>b</b>) CPS environment construction scene.</p>
Full article ">Figure 10
<p>Worker icons and UI in CPS operation.</p>
Full article ">Figure 11
<p>Example of CPS application for multiple workers.</p>
Full article ">
19 pages, 2018 KiB  
Article
Secrecy Analysis of LEO Satellite-to-Ground Station Communication System Influenced by Gamma-Shadowed Ricean Fading
by Ivan Radojkovic, Jelena Anastasov, Dejan N. Milic, Predrag Ivaniš and Goran T. Djordjevic
Electronics 2025, 14(2), 293; https://doi.org/10.3390/electronics14020293 - 13 Jan 2025
Viewed by 369
Abstract
The Low Earth Orbit (LEO) small satellites are extensively used for global connectivity to enable services in underpopulated, remote or underdeveloped areas. Their inherent broadcast nature exposes LEO–terrestrial communication links to severe security threats, which always reveal new challenges. The secrecy performance of [...] Read more.
The Low Earth Orbit (LEO) small satellites are extensively used for global connectivity to enable services in underpopulated, remote or underdeveloped areas. Their inherent broadcast nature exposes LEO–terrestrial communication links to severe security threats, which always reveal new challenges. The secrecy performance of the satellite-to-ground user link in the presence of a ground eavesdropper is studied in this paper. We observe both scenarios of the eavesdropper’s channel state information (CSI) being known or unknown to the satellite. Throughout the analysis, we consider that locations of the intended and unauthorized user are both arbitrary in the satellite’s footprint. On the other hand, we analyze the case when the user is in the center of the satellite’s central beam. In order to achieve realistic physical layer security features of the system, the satellite channels are assumed to undergo Gamma-shadowed Ricean fading, where both line-of-site and scattering components are influenced by shadowing effect. In addition, some practical effects, such as satellite multi-beam pattern and free space loss, are considered in the analysis. Capitalizing on the aforementioned scenarios, we derive the novel analytical expressions for the average secrecy capacity, secrecy outage probability, probability of non-zero secrecy capacity, and probability of intercept events in the form of Meijer’s G functions. In addition, novel asymptotic expressions are derived from previously mentioned metrics. Numerical results are presented to illustrate the effects of beam radius, satellite altitude, receivers’ position, as well as the interplay of the fading or/and shadowing impacts over main and wiretap channels on the system security. Analytical results are confirmed by Monte Carlo simulations. Full article
(This article belongs to the Special Issue New Advances of Microwave and Optical Communication)
Show Figures

Figure 1

Figure 1
<p>System model. (<b>a</b>) User in the center of the beam spot; (<b>b</b>) Users arbitrarily located inside disk of radius <span class="html-italic">R</span>.</p>
Full article ">Figure 2
<p>ASC versus the average SNR, <math display="inline"><semantics> <mrow> <msub> <mover accent="true"> <mi>γ</mi> <mo>¯</mo> </mover> <mi mathvariant="normal">U</mi> </msub> </mrow> </semantics></math>, for different S’s altitudes.</p>
Full article ">Figure 3
<p>IP versus the E’s distance for different fading depths and MERs.</p>
Full article ">Figure 4
<p>SOP versus the E’s distance for different values of 3 dB angle.</p>
Full article ">Figure 5
<p>SOP versus MER for different shadowing severity when users are arbitrarily located within a specific circle disk.</p>
Full article ">Figure 6
<p>SPSC versus MER for different system/channel parameters.</p>
Full article ">Figure 7
<p>Intercept probability vs. MER for different positions of legitimate users.</p>
Full article ">
22 pages, 865 KiB  
Article
Secrecy-Constrained UAV-Mounted RIS-Assisted ISAC Networks: Position Optimization and Power Beamforming
by Weichao Yang, Yajing Wang, Dawei Wang, Yixin He and Li Li
Drones 2025, 9(1), 51; https://doi.org/10.3390/drones9010051 - 13 Jan 2025
Viewed by 452
Abstract
This paper investigates secrecy solutions for integrated sensing and communication (ISAC) systems, leveraging the combination of a reflecting intelligent surface (RIS) and an unmanned aerial vehicle (UAV) to introduce new degrees of freedom for enhanced system performance. Specifically, we propose a secure ISAC [...] Read more.
This paper investigates secrecy solutions for integrated sensing and communication (ISAC) systems, leveraging the combination of a reflecting intelligent surface (RIS) and an unmanned aerial vehicle (UAV) to introduce new degrees of freedom for enhanced system performance. Specifically, we propose a secure ISAC system supported by a UAV-mounted RIS, where an ISAC base station (BS) facilitates secure multi-user communication while simultaneously detecting potentially malicious radar targets. Our goal is to improve parameter estimation performance, measured by the Cramér–Rao bound (CRB), by jointly optimizing the UAV position, transmit beamforming, and RIS beamforming, subject to constraints including the UAV flight area, communication users’ quality of service (QoS) requirements, secure transmission demands, power budget, and RIS reflecting coefficient limits. To address this non-convex, multivariate, and coupled problem, we decompose it into three subproblems, which are solved iteratively using particle swarm optimization (PSO), semi-definite relaxation (SDR), majorization–minimization (MM), and alternating direction method of multipliers (ADMM) algorithms. Our numerical results validate the effectiveness of the proposed scheme and demonstrate the potential of employing UAV-mounted RIS in ISAC systems to enhance radar sensing capabilities. Full article
(This article belongs to the Special Issue Physical-Layer Security in Drone Communications)
Show Figures

Figure 1

Figure 1
<p>A secure ISAC system supported by a UAV-mounted RIS.</p>
Full article ">Figure 2
<p>CRB versus the number of RIS reflecting the <span class="html-italic">M</span> element.</p>
Full article ">Figure 3
<p>CRB versus the SINR requirement <math display="inline"><semantics> <mi>γ</mi> </semantics></math>.</p>
Full article ">Figure 4
<p>CRB versus the transmit power <math display="inline"><semantics> <msub> <mi>P</mi> <mi>BS</mi> </msub> </semantics></math>.</p>
Full article ">Figure 5
<p>CRB versus the number of antennas <span class="html-italic">N</span>.</p>
Full article ">
57 pages, 5169 KiB  
Systematic Review
Systematic Synthesis of Knowledge Relating to the Hydrological Functioning of Inland Valleys in Sub-Saharan Africa
by Akominon M. Tidjani, Pierre G. Tovihoudji, Pierre B. Irénikatché Akponikpe and Marnik Vanclooster
Water 2025, 17(2), 193; https://doi.org/10.3390/w17020193 - 12 Jan 2025
Viewed by 648
Abstract
The potential of inland valleys to enhance food security and improve agricultural resilience to climate change in Africa is constrained by a limited understanding of their hydrological functioning and inadequate water management. In order to synthesize knowledge on hydrological responses in inland valley [...] Read more.
The potential of inland valleys to enhance food security and improve agricultural resilience to climate change in Africa is constrained by a limited understanding of their hydrological functioning and inadequate water management. In order to synthesize knowledge on hydrological responses in inland valley areas, this work reviewed 275 studies from tropical Sub-Saharan Africa (SSA). Data from the literature search were collected from Scopus™, ScienceDirect™, Web of Science™, Google Scholar™, and doctoral theses repositories such as ZEF, HAL, and Theses.fr, covering studies published from the inception of these databases through 31 May 2023. Our approach involved, firstly, a bibliometric analysis of all papers to gain insights into research trends and interests. Secondly, we performed a quantitative synthesis of results from 66 studies examining stream flows in a set of 79 inland valleys to better understand factors that govern runoff dynamics in these environments. Correlative analyses and clustering methods were applied to identify potential links between runoff and watershed physical parameters. The findings highlight the varied responses of inland valleys over both time and space, influenced by a combination of catchment drivers. The correlation matrices between hydrological indices and physical parameters indicate a strong relationship among runoff and a range of parameters, of which the most significant are rainfall (R2 = 0.77) and soil silt content (R2 = 0.68). Challenges in accurately spatializing information related to potential determining components of the water cycle, such as groundwater dynamics and soil moisture, seem to have limited the exploration of interactions between river flow, soil moisture, and groundwater. Future works should prioritize the development of accurate and user-friendly hydrological models that balance complexity and data availability to enhance the understanding of inland valley behavior at fine scales and consolidate food security in Africa. Full article
Show Figures

Figure 1

Figure 1
<p>Screening sheet of the document classification and selection procedure (according to PRISMA 2020 flow diagram for new systematic reviews, which included searches of databases and registers only). * Consider, if feasible to do so, reporting the number of records identified from each database or register searched (rather than the total number across all databases/registers). ** If automation tools were used, indicate how many records were excluded by a human and how many were excluded by automation tools.</p>
Full article ">Figure 2
<p>Temporal dynamics of inland valley hydrology research in Africa.</p>
Full article ">Figure 3
<p>Distribution of studies on hydrological issues in inland valleys areas in Africa. Red numbers are the number of studies per country and blue dots represent experimental sites used for quantitative synthesis. In background, the climate map according the Köppen classsification.</p>
Full article ">Figure 4
<p>Network of collaborations between researchers working on the hydrological functioning of inland valleys; ‘*’ refers to the name of the most important collaborator of the cluster.</p>
Full article ">Figure 5
<p>Rainfall–runoff relations according to time scale in inland valleys: (<b>a</b>) at event scale, (<b>b</b>) at annual scale, and (<b>c</b>) at multi-year scale. Bsh, Aw, and Cwb, respectively, refer to dry, tropical, and temperate climatic groups according to the Köppen classification.</p>
Full article ">Figure 6
<p>Runoff coefficients according to time and climate scales in inland valleys: (<b>a</b>) at event scale, (<b>b</b>) at annual scale, and (<b>c</b>) at multi-year scale. Circles refer to individual observations.</p>
Full article ">Figure 7
<p>Correlation matrix between physical parameters and hydrological indices in inland valley areas at annual scale. Acronyms means: area (A), minimum elevation (Emin), total relief (TR), slope of flow axis (Sriver), topographic wetness index (TWI), percentage of upstream drainage area (Udra), mean clay content in catchment surface (Cl-Csf), mean sand content in catchment surface (Sa-Csf), mean silt content in catchment surface (Si-Csf), mean clay content in catchment at a depth of 2 m (Cl-C2m), average of absolute depth of bedrock in catchment (Dbed), annual normalized difference vegetation index (NDVI), tree cover (TC), non-tree vegetation area (NTVeg), non-vegetated area (NVA), annual rainfall (Pa), annual actual evapotranspiration (AET), annual total runoff (Qa), and annual total runoff coefficient (Cra). ** <span class="html-italic">p</span> &lt; 0.05, * <span class="html-italic">p</span> &lt; 0.1.</p>
Full article ">Figure 8
<p>Correlation matrix between physical parameters and hydrological indices in inland valleys areas at multi-year scale. Acronyms means: area (A), minimum elevation (Emin), total relief (TR), slope of flow axis (Sriver), topographic wetness index (TWI), percentage of upstream drainage area (Udra), mean clay content in catchment surface (Cl-Csf), mean sand content in catchment surface (Sa-Csf), mean silt content in catchment surface (Si-Csf), mean clay content in catchment at a depth of 2 m (Cl-C2m), average of absolute depth of bedrock in catchment (Dbed), mean annual normalized difference vegetation index (NDVImean), mean tree cover (TCmean), non-tree vegetation area (NTVmean), non-vegetated Area (NVAmean), mean annual rainfall (Pmean), mean annual actual evapotranspiration (AETmean), mean total runoff (Qamean), mean runoff coefficient (Crmean). ** <span class="html-italic">p</span> &lt; 0.05, * <span class="html-italic">p</span> &lt; 0.1.</p>
Full article ">Figure 9
<p>Scatter plots of runoff coefficients according to land cover factors in inland valleys at annual scale.</p>
Full article ">Figure 10
<p>Annual runoff simulations with model based on physical characteristics of inland valleys (<b>a</b>) at calibration and (<b>b</b>) at validation.</p>
Full article ">Figure 11
<p>(<b>a</b>) Comparison between observed and simulated discharge at annual scale in inland valleys, (<b>b</b>) residual analysis of observed vs. simulated runoff according to modeling studies in inland valleys.</p>
Full article ">
26 pages, 1706 KiB  
Article
Assessment of Different Conventional and Biofortified Wheat Genotypes Based on Biology and Damage Pattern of Rhyzopertha dominica and Trogoderma granarium
by Hafiz Muhammad Bilal Yousuf, Muhammad Yasin, Muhammad Asif Khan, Asim Abbasi, Muhammad Arshad, Muhammad Anjum Aqueel, Inzamam Ul Haq, Waleed A. A. Alsakkaf, Marwa I. Mackled, Nazih Y. Rebouh and Hayssam M. Ali
Insects 2025, 16(1), 66; https://doi.org/10.3390/insects16010066 - 11 Jan 2025
Viewed by 468
Abstract
The lesser grain borer, Rhyzopertha dominica (F.) (Coleoptera: Bostrichidae) and khapra beetle, Trogoderma granarium E. (Coleoptera: Dermestidae) are primary stored-grain insect pests. Differences in certain biological and physical parameters of both pest species and wheat genotypes were investigated under laboratory conditions. Zinc (Zn)-biofortified [...] Read more.
The lesser grain borer, Rhyzopertha dominica (F.) (Coleoptera: Bostrichidae) and khapra beetle, Trogoderma granarium E. (Coleoptera: Dermestidae) are primary stored-grain insect pests. Differences in certain biological and physical parameters of both pest species and wheat genotypes were investigated under laboratory conditions. Zinc (Zn)-biofortified (Zincol-2016 and Akbar-2019) and conventional (Arooj-2022, Nawab-2021, Dilkash-2021, Bhakkar Star-2019) wheat genotypes were used in this study. Zn-biofortified genotypes outperformed the conventional ones, with significant differences observed in fecundity, percent adult emergence, total developmental duration, percent grain damage, and weight loss of both insect species. The results further revealed that the fecundity of R. dominica and T. granarium were lowest on Akbar-2019 in both the free-choice test (42.50 and 33.17) and no-choice test (35.50 and 32.50), respectively. Similarly, percent adult emergence of both insect species was also lowest on Akbar-2019 in both the free-choice test (69.78 and 70.28%) and no-choice test (67.38 and 70.71%). The total developmental period also showed significant variation among the tested genotypes. The longest developmental period was recorded in Akbar-2019, i.e., 44.33 and 58.83 days, for R. dominica and T. granarium, respectively. Similarly, percent grain damage (13.23 and 10.33%) and weight loss (3.62 and 2.12%) were found to be minimum in Akbar-2019 for both pest species, respectively. Additionally, a positive correlation was observed between grain moisture content and damage parameters, suggesting that the higher moisture content may aggravate the percent grain damage and weight loss. These findings indicate that the nutritional qualities of Zn-biofortified wheat genotypes negatively affected the development of both insect species; thus, it can be an efficacious approach not only for ensuring food security but also for protecting grains against storage pests. Full article
(This article belongs to the Section Insect Molecular Biology and Genomics)
Show Figures

Figure 1

Figure 1
<p>Mean (±SE) moisture content of different wheat genotypes before and after infestation of (<b>A</b>) <span class="html-italic">R. dominica</span> and (<b>B</b>) <span class="html-italic">T. granarium</span>. Different letters above the bars show significant differences among the genotypes (Tukey’s HSD test, <span class="html-italic">p</span> &lt; 0.01).</p>
Full article ">Figure 2
<p>Mean (±SE) incubation period (<b>A</b>) and larval development (<b>B</b>) of <span class="html-italic">R. dominica</span> and <span class="html-italic">T. granarium</span> on six wheat genotypes. Different letters above the bars show significant differences among the genotypes (Tukey’s HSD test, <span class="html-italic">p</span> &lt; 0.01).</p>
Full article ">Figure 3
<p>Mean (±SE) pupal (<b>A</b>) and total development duration (<b>B</b>) of <span class="html-italic">R. dominica</span> and <span class="html-italic">T. granarium</span> on six wheat genotypes. Different letters above the bars show significant differences among the genotypes (Tukey’s HSD test, <span class="html-italic">p</span> &lt; 0.01).</p>
Full article ">Figure 4
<p>Mean (±SE) male and female longevity of <span class="html-italic">R. dominica</span> (<b>A</b>) and <span class="html-italic">T. granarium</span> (<b>B</b>) on six wheat genotypes. Different letters above the bars show significant differences among the genotypes (Tukey’s HSD test, <span class="html-italic">p</span> &lt; 0.01).</p>
Full article ">Figure 4 Cont.
<p>Mean (±SE) male and female longevity of <span class="html-italic">R. dominica</span> (<b>A</b>) and <span class="html-italic">T. granarium</span> (<b>B</b>) on six wheat genotypes. Different letters above the bars show significant differences among the genotypes (Tukey’s HSD test, <span class="html-italic">p</span> &lt; 0.01).</p>
Full article ">Figure 5
<p>Correlation between grain moisture content and damage parameters caused by <span class="html-italic">R. dominica</span> and <span class="html-italic">T. granarium</span> on six wheat genotypes. Percent grain damage (<b>A,B</b>) and percent weight loss (<b>C</b>,<b>D</b>).</p>
Full article ">
19 pages, 984 KiB  
Article
Supplementary Treatment for Alleviating Pain and Enhancing Functional Ability in Geriatric Patients with Osteoarthritis
by Sorina Maria Aurelian, Corina Oancea, Justin Aurelian, Ruxandra Mihalache, Andreea Iulia Vlădulescu-Trandafir, Alexandru Capisizu, Narcis Chirca and Andreea Zamfirescu
Healthcare 2025, 13(2), 127; https://doi.org/10.3390/healthcare13020127 - 11 Jan 2025
Viewed by 347
Abstract
Background and Objectives: A degenerative joint disease that primarily affects elderly individuals, osteoarthritis (OA) causes pain, decreased mobility, and a lower quality of life. Procaine is regarded as a “veteran” medicine due to its extensive clinical use, although it remains a molecule [...] Read more.
Background and Objectives: A degenerative joint disease that primarily affects elderly individuals, osteoarthritis (OA) causes pain, decreased mobility, and a lower quality of life. Procaine is regarded as a “veteran” medicine due to its extensive clinical use, although it remains a molecule of interest, as researchers are uncovering new biological and pharmacological effects through innovative experimental methods. This study evaluates the efficacy of the “procaine complex”, developed in our country, in alleviating pain and improving functionality in elderly individuals with osteoarthritis of the knee and hip. Materials and Methods: We conducted an assessment of a longitudinal short-term study involving 177 patients aged 65 and older, who were randomly divided into two groups. One group received physical therapy and “procaine complex” periarticular injections (n = 101), while the other group received just physical therapy (n = 76). We assessed pain using a visual analog scale (VAS), in addition to functional evaluations using the Lequesne Index, Activities of Daily Living (ADL), and Instrumental ADL (IADL) scores. We evaluated these through a CGA (complex geriatric assessment), the walk test, “Up and Go” test, Mini Mental State (MMSE) and Geriatric Depression Scale (GDS) for cognitive status. We analyzed all the data from this study using PSPP v3 software. Results: The procaine complex treatment group exhibited a significant reduction in pain (p < 0.001) and improvement in daily activities (p < 0.001) relative to the control group. However, there was no notable difference in walking test scores (p = 0.171). No substantial detrimental effects were identified. The procaine complex did not surpass physical therapy in reducing depressive disorders, but both groups showed some enhancement in this regard. Conclusions: This study demonstrates an innovative approach to pain management by integrating periarticular “procaine complex” injections with physical therapy. This provides elderly individuals experiencing osteoarthritis pain and functional limitations with a secure and efficacious alternative to surgery, or may diminish years of disability. Full article
(This article belongs to the Section Pain Management)
Show Figures

Figure 1

Figure 1
<p>Study flow chart demonstrating the selection and treatment process of involved patients. The selected patients were subject to two examination checkpoints: initially on the first day of hospitalization (T0) and after 10 days of therapy (T1).</p>
Full article ">Figure 2
<p>Walking speed distribution among gonarthrosis and coxarthrosis patient groups.</p>
Full article ">Figure 3
<p>New treatment option for pain.</p>
Full article ">
Back to TopTop