[go: up one dir, main page]

 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (2,473)

Search Parameters:
Keywords = Ad Hoc

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
33 pages, 629 KiB  
Article
Enhancing Smart City Connectivity: A Multi-Metric CNN-LSTM Beamforming Based Approach to Optimize Dynamic Source Routing in 6G Networks for MANETs and VANETs
by Vincenzo Inzillo, David Garompolo and Carlo Giglio
Smart Cities 2024, 7(5), 3022-3054; https://doi.org/10.3390/smartcities7050118 - 17 Oct 2024
Abstract
The advent of Sixth Generation (6G) wireless technologies introduces challenges and opportunities for Mobile Ad Hoc Networks (MANETs) and Vehicular Ad Hoc Networks (VANETs), necessitating a reevaluation of traditional routing protocols. This paper introduces the Multi-Metric Scoring Dynamic Source Routing (MMS-DSR), a novel [...] Read more.
The advent of Sixth Generation (6G) wireless technologies introduces challenges and opportunities for Mobile Ad Hoc Networks (MANETs) and Vehicular Ad Hoc Networks (VANETs), necessitating a reevaluation of traditional routing protocols. This paper introduces the Multi-Metric Scoring Dynamic Source Routing (MMS-DSR), a novel enhancement of the Dynamic Source Routing (DSR) protocol, designed to meet the demands of 6G-enabled MANETs and the dynamic environments of VANETs. MMS-DSR integrates advanced technologies and methodologies to enhance routing performance in dynamic scenarios. Key among these is the use of a CNN-LSTM-based beamforming algorithm, which optimizes beamforming vectors dynamically, exploiting spatial-temporal variations characteristic of 6G channels. This enables MMS-DSR to adapt beam directions in real time based on evolving network conditions, improving link reliability and throughput. Furthermore, MMS-DSR incorporates a multi-metric scoring mechanism that evaluates routes based on multiple QoS parameters, including latency, bandwidth, and reliability, enhanced by the capabilities of Massive MIMO and the IEEE 802.11ax standard. This ensures route selection is context-aware and adaptive to changing dynamics, making it effective in urban settings where vehicular and mobile nodes coexist. Additionally, the protocol uses machine learning techniques to predict future route performance, enabling proactive adjustments in routing decisions. The integration of dynamic beamforming and machine learning allows MMS-DSR to effectively handle the high mobility and variability of 6G networks, offering a robust solution for future wireless communications, particularly in smart cities. Full article
Show Figures

Figure 1

Figure 1
<p>Flowchart for MMS-DSR Architecture.</p>
Full article ">Figure 2
<p>Network topology diagram illustrating the routes from Node A to Node J with respective metrics.</p>
Full article ">Figure 3
<p>Network topology diagram illustrating the routes from Node A to Node J with respective metrics.</p>
Full article ">Figure 4
<p>CNN-LSTM model architecture for MMS-DSR.</p>
Full article ">Figure 5
<p>Network topology diagram illustrating the routes from Node A to Node J with respective metrics.</p>
Full article ">Figure 6
<p>Network topology diagram illustrating the routes from Node A to Node J with respective metrics.</p>
Full article ">Figure 7
<p>Throughput comparison across varying numbers of vehicles.</p>
Full article ">Figure 8
<p>Throughput comparison across varying vehicle speeds.</p>
Full article ">Figure 9
<p>Latency comparison in function of vehicle density.</p>
Full article ">Figure 10
<p>Latency comparison in function on vehicle speed.</p>
Full article ">Figure 11
<p>Route discovery time vs. vehicle density.</p>
Full article ">Figure 12
<p>Route discovery time vs. vehicle speed.</p>
Full article ">Figure 13
<p>Routing overhead comparison in function of vehicle density.</p>
Full article ">Figure 14
<p>Routing overhead comparison in function of vehicle speed.</p>
Full article ">Figure 15
<p>Scalability comparison performance across increasing vehicle density.</p>
Full article ">
12 pages, 278 KiB  
Article
Clinical Simulation Program for the Training of Health Profession Residents in Confidentiality and the Use of Social Networks
by Alejandro Martínez-Arce, Alberto Bermejo-Cantarero, Laura Muñoz de Morales-Romero, Víctor Baladrón-González, Natalia Bejarano-Ramírez, Gema Verdugo-Moreno, María Antonia Montero-Gaspar and Francisco Javier Redondo-Calvo
Nurs. Rep. 2024, 14(4), 3040-3051; https://doi.org/10.3390/nursrep14040221 - 17 Oct 2024
Viewed by 125
Abstract
Background: In the transition to a professional learning environment, healthcare professionals in their first year of specialized postgraduate clinical training (known as residents in Spain) are suddenly required to handle confidential information with little or no prior training in the safe and appropriate [...] Read more.
Background: In the transition to a professional learning environment, healthcare professionals in their first year of specialized postgraduate clinical training (known as residents in Spain) are suddenly required to handle confidential information with little or no prior training in the safe and appropriate use of digital media with respect to confidentiality issues. The aims of this study were: (1) to explore the usefulness of an advanced clinical simulation program for educating residents from different healthcare disciplines about confidentiality and the dissemination of clinical data or patient images; (2) to explore the use of social networks in healthcare settings; and (3) to explore participants’ knowledge and attitudes on current regulations regarding confidentiality, image dissemination, and the use of social networks; Methods: This was a cross-sectional study. Data were collected from all 49 first-year residents of different health professions at a Spanish hospital between June and August 2022. High-fidelity clinical simulation sessions designed to address confidentiality and health information dissemination issues in hospital settings, including the use of social networks, were developed and implemented. Data were assessed using a 12-item ad hoc questionnaire on confidentiality and the use of social media in the healthcare setting. Descriptive of general data and chi-square test or Fisher’s exact test were performed using the SPSS 25.0 software; Results: All the participants reported using the messaging application WhatsApp regularly during their working day. A total of 20.4% of the participants stated that they had taken photos of clinical data (radiographs, analyses, etc.) without permission, with 40.8% claiming that they were unaware of the legal consequences of improper access to clinical records. After the course, the participants reported intending to modify their behavior when sharing patient data without their consent and with respect to how patients are informed; Conclusions: The use of advanced simulation in the training of interprofessional teams of residents is as an effective tool for initiating attitudinal change and increasing knowledge related to patient privacy and confidentiality. Further follow-up studies are needed to see how these attitudes are incorporated into clinical practice. Full article
20 pages, 33358 KiB  
Article
Unexpected and Extraordinarily Shallow Coralligenous Banks at the Sinuessa Site, a Heritage of the Campania Coast (SW Italy, Mediterranean Sea)
by Federica Ferrigno, Gabriella Di Martino, Luigia Donnarumma, Sara Innangi, Flavia Molisso, Francesco Rendina, Roberto Sandulli, Renato Tonielli, Giovanni Fulvio Russo and Marco Sacchi
Water 2024, 16(20), 2942; https://doi.org/10.3390/w16202942 (registering DOI) - 16 Oct 2024
Viewed by 369
Abstract
Coralligenous bioconstructions are biogenic calcareous formations developing at low irradiance on littoral rocky cliffs or on the deeper sub-horizontal bottom in the Mediterranean Sea. Unusually shallow coralligenous banks on the sandy coast of Sinuessa (Mondragone City, Gulf of Gaeta, SW Italy) were investigated. [...] Read more.
Coralligenous bioconstructions are biogenic calcareous formations developing at low irradiance on littoral rocky cliffs or on the deeper sub-horizontal bottom in the Mediterranean Sea. Unusually shallow coralligenous banks on the sandy coast of Sinuessa (Mondragone City, Gulf of Gaeta, SW Italy) were investigated. Their communities and the surrounding biogenic detritus were characterized. Geophysical and acoustic data revealed the presence of coralligenous banks between 7.5 and 15 m depth, showing constant thickness and sub-horizontal geometry, incised by sub-perpendicular channels. Sediment deposits ranging from silty sands to bioclastic gravel occur in the area. The biogenic detritus of the soft bottom sampled around the coralligenous banks is highly heterogeneous. Through the thanatocoenosis analysis of macrozoobenthos, different biocenoses were detected, among which the coralligenous and photophilic habitats are mainly represented, followed by the well-calibrated fine sands and the relit sands. A total of 16 different species and 10 epimegabenthic morphological groups (MGs) were detected on the coralligenous banks, of which 4 are included in European regulation for threatened species. The density of epimegabenthic organisms has an average of 10.34 ± 5.46 individuals or colonies/100 m2. Cladocora caespitosa is the dominant species, with a height of 17 ± 5 cm. This and other structuring species (SS) were larger in size in the sampled sites than in the literature data. Overall, coralligenous had a “medium” health status, with 52% of the individuals or colonies in healthy conditions, compared to 47% with epibiosis phenomena and 1% with entanglement. Longlines were the most common anthropogenic litter, with a density of 2/100 m2. Ad hoc monitoring programs and conservation measures would be desirable to protect and guarantee the well-being of these sensitive and rare shallow bioconstructions. Full article
(This article belongs to the Section Biodiversity and Functionality of Aquatic Ecosystems)
Show Figures

Figure 1

Figure 1
<p>Study area located in the Gulf of Gaeta (central Tyrrhenian Sea).</p>
Full article ">Figure 2
<p>(<b>a</b>) Shaded relief map and (<b>b</b>) slope map with bathymetric contour of the DTM.</p>
Full article ">Figure 3
<p>Acoustic mosaic derived from side data processing (1 m pixel resolution) in grayscale (high values correspond to high reflectivity). The two insets show details of the acoustic mosaic (20 cm pixel resolution) and the planned ROV transects.</p>
Full article ">Figure 4
<p>Morphobathymetric map with sample location, grain size, and sorting of marine sediments.</p>
Full article ">Figure 5
<p>Examples of biogenic detritus sampled in proximity to the coralligenous bioconstructions of the study area, composed of bivalve and gastropod shell fragments (<b>a</b>–<b>f</b>), with bryozoan (<b>a</b>) and vegetal (<b>c</b>,<b>f</b>) fragments.</p>
Full article ">Figure 6
<p>ROV images of the Sinuessa_1–6 transects of the coralligenous bioconstructions.</p>
Full article ">Figure 7
<p>ROV image of the Sinuessa_7 transect of the coralligenous bioconstructions.</p>
Full article ">Figure 8
<p>Species richness as number of structuring and not structuring species or morphological groups (MGs) at each site (S_01–S_07).</p>
Full article ">Figure 9
<p>Density (number of individuals or colonies/100 m<sup>2</sup>) of epimegabenthic structuring species at each site (S_01–S_07).</p>
Full article ">Figure 10
<p>Dominance (%) of epimegabenthic structuring species in the study area.</p>
Full article ">Figure 11
<p>The percentage of epimegabenthic structuring species in health status and damaged (epibiosis, entanglement, necrosis phenomena were not observed).</p>
Full article ">Figure 12
<p>Height (cm) ± SE of epimegabenthic structuring species in the study area (dataset), compared with literature data.</p>
Full article ">
22 pages, 4080 KiB  
Article
The House-Scale Effects of the COVID-19 Pandemic in the Italian Property Market
by Pierluigi Morano, Felicia Di Liddo and Francesco Tajani
Land 2024, 13(10), 1681; https://doi.org/10.3390/land13101681 (registering DOI) - 15 Oct 2024
Viewed by 361
Abstract
The present research aims at identifying any changes in the market appreciations of the residential segment in Italy caused by the COVID-19 pandemic. With reference to the first half of 2023 (phase III, “post-COVID-19”), in the paper, a logical–operational methodology is implemented: a [...] Read more.
The present research aims at identifying any changes in the market appreciations of the residential segment in Italy caused by the COVID-19 pandemic. With reference to the first half of 2023 (phase III, “post-COVID-19”), in the paper, a logical–operational methodology is implemented: a sample of properties sold in the two-month period January–February 2023 is collected and an econometric analysis is applied for determining (i) the most influential factors on selling prices and (ii) the functional links between prices and each selected explanatory variable. Furthermore, the findings obtained are compared with those related to the phases I, “ante-COVID-19”, and II, “COVID-19 in itinere” (by recalling a previous study of the same authors), to highlight the variations between the periods and provide useful guidelines for the design of domestic spaces in different Italian geographical contexts. In addition, this work conducts a comparison of the outputs derived from the econometric analysis starting from the real estate data collected on the reference markets (revealed preferences) with the results of a direct survey carried out on a sample of individuals through the administration of an ad hoc developed questionnaire and aimed at investigating the opinions of potential buyers of residential properties (stated preferences). The use of the “twin” approach (an analysis of perceptions via the direct survey integrated by the implementation of an econometric technique) allows us to verify the consistence of the real dynamics of market (expressed by the interviewees) with the mathematical model results for investigating the house-scale effects of the COVID-19 pandemic in the considered cities. Full article
Show Figures

Figure 1

Figure 1
<p>Flow chart of the two steps of the developed methodological approach.</p>
Full article ">Figure 2
<p>Summary of the independent variables considered in the econometric analysis.</p>
Full article ">Figure 3
<p>Summary of the variables included in the econometric model obtained for each Italian city with reference to phase III (I semester 2023).</p>
Full article ">Figure 4
<p>Average percentage contributions for each variable with reference to phase III (I semester 2023).</p>
Full article ">Figure 5
<p>Comparison between the average percentage contributions on selling price obtained from the analysis carried out for the three phases.</p>
Full article ">Figure 6
<p>Changes detected in the market appreciation of the analyzed factors between phase III (post-COVID-19) and phase I (ante-COVID-19).</p>
Full article ">Figure 7
<p>Comparison between the surface area of the property in which the interviewees currently live and that of the one they need/desire.</p>
Full article ">Figure 8
<p>Comparison between the number of rooms in the property in which the interviewees currently live and in the one they need/desire.</p>
Full article ">Figure 9
<p>Stated preferences for specific property characteristics.</p>
Full article ">
20 pages, 1163 KiB  
Article
Positive Effects of Aerobic-Resistance Exercise and an Ad Libitum High-Protein, Low-Glycemic Index Diet on Irisin, Omentin, and Dyslipidemia in Men with Abdominal Obesity: A Randomized Controlled Trial
by Agnieszka Suder, Karol Makiel, Aneta Targosz, Piotr Kosowski and Robert M. Malina
Nutrients 2024, 16(20), 3480; https://doi.org/10.3390/nu16203480 (registering DOI) - 14 Oct 2024
Viewed by 335
Abstract
Objectives: The aim of this research was to evaluate changes in body composition, adipokine levels, and dyslipidemia parameters in males with abdominal obesity following two distinct interventions: exercise alone and exercise combined with an ad libitum diet. Methods: This study included 44 males [...] Read more.
Objectives: The aim of this research was to evaluate changes in body composition, adipokine levels, and dyslipidemia parameters in males with abdominal obesity following two distinct interventions: exercise alone and exercise combined with an ad libitum diet. Methods: This study included 44 males with abdominal obesity (mean age 34.7 ± 5.5 years, waist circumference [WC] 110.3 ± 8.5, BMI 32.0 ± 3.9), who were randomly assigned to three groups: an experimental group engaging in aerobic-resistance exercise (II, n = 16), an experimental group engaging in aerobic-resistance exercise combined with an ad libitum high-protein, low-glycemic index carbohydrate diet (III, n = 16), both interventions lasting 6 weeks, and a control group without interventions (I, n = 12). Body composition metrics (body mass index [BMI], waist circumference [WC], body fat [BF], abdominal fat [ABD]) and fat-free mass [FFM], along with biochemical blood analyses (irisin [IR], omentin [OMEN], glucose [GLU], insulin [INS], LDL- and HDL-cholesterol), were measured at baseline and after the 6-week intervention. The effects of the interventions on the analyzed variables across groups were assessed using mixed ANOVA tests with post-hoc comparisons. Effect size (ES) was also calculated using partial eta squared (ηp2). Results: The intervention in group III resulted in a significant decrease in IR (p < 0.01, ηp2 = 0.03) by 41% and LDL-C (p < 0.01, ηp2 = 0.02) by 14%. These effects were associated with a reduction in BF (p < 0.01, ηp2 = 0.02) by 14%, ABD (p < 0.01, ηp2 = 0.03) by 31%, and WC (p < 0.01, ηp2 = 0.01) by 3%. In group II, decreases after 6 weeks of intervention were noted only in WC (p = 0.02, ηp2 = 0.01) by 1% and in INS (p < 0.01, ηp2 = 0.04) by 47%. No differences were found between groups. The use of low-glycemic index carbohydrates (p < 0.01, ηp2 = 0.06) and increased protein intake (p < 0.01, ηp2 = 0.30) led to changes in the fiber-to-energy value of the diet ratio (p < 0.01, ηp2 = 0.18) and a reduction in dietary energy value (p < 0.01, ηp2 = 0.13) by 23%, resulting in a greater energy deficit than in the II group. Conclusions: These findings highlight the effect of combining dietary and exercise interventions to achieve significant changes in body composition and metabolic parameters, even over a short period of intervention. Full article
(This article belongs to the Special Issue The Effect of Lifestyle and Eating Habits on Obesity)
Show Figures

Figure 1

Figure 1
<p>Study flowchart.</p>
Full article ">Figure 2
<p>Variation in irisin (IR) [ng/mL] concentration in the control (CG I), exercise (EG II), and exercise–diet (EGD III) groups at baseline and after six weeks.</p>
Full article ">
27 pages, 14919 KiB  
Article
Marine Microplastic Classification by Hyperspectral Imaging: Case Studies from the Mediterranean Sea, the Strait of Gibraltar, the Western Atlantic Ocean and the Bay of Biscay
by Roberta Palmieri, Silvia Serranti, Giuseppe Capobianco, Andres Cózar, Elisa Martí and Giuseppe Bonifazi
Appl. Sci. 2024, 14(20), 9310; https://doi.org/10.3390/app14209310 - 12 Oct 2024
Viewed by 419
Abstract
In this work, a comprehensive characterization of microplastic samples collected from unique geographical locations, including the Mediterranean Sea, Strait of Gibraltar, Western Atlantic Ocean and Bay of Biscay utilizing advanced hyperspectral imaging (HSI) techniques working in the short-wave infrared range (1000–2500 nm) is [...] Read more.
In this work, a comprehensive characterization of microplastic samples collected from unique geographical locations, including the Mediterranean Sea, Strait of Gibraltar, Western Atlantic Ocean and Bay of Biscay utilizing advanced hyperspectral imaging (HSI) techniques working in the short-wave infrared range (1000–2500 nm) is presented. More in detail, an ad hoc hierarchical classification approach was developed and applied to optimize the identification of polymers. Morphological and morphometrical attributes of microplastic particles were simultaneously measured by digital image processing. Results showed that the collected microplastics are mainly composed, in decreasing order of abundance, by polyethylene (PE), polypropylene (PP), polystyrene (PS) and expanded polystyrene (EPS), in agreement with the literature data related to marine microplastics. The investigated microplastics belong to the fragments (86.8%), lines (9.2%) and films (4.0%) categories. Rigid (thick-walled) fragments were found at all sampling sites, while film-type microplastics and lines were absent in some samples from the Mediterranean Sea and the Western Atlantic Ocean. Rigid fragments and lines are mainly made of PE, whereas PP is the most common polymer for the film category. Average Feret diameter of microplastic fragments decreases from EPS (3–4 mm) to PE (2–3 mm) and PP (1–2 mm). The setup strategies illustrate that the HSI-based approach enables the classification of the polymers constituting microplastic particles and, at the same time, to measure and classify them by shape. Such multiple characterization of microplastic samples at the individual level is proposed as a useful tool to explore the environmental selection of microplastic features (i.e., composition, category, size, shape) and to advance the understanding of the role of weathering, hydrodynamic and other phenomena in their transport and fragmentation. Full article
Show Figures

Figure 1

Figure 1
<p>Sampling sites in the Western Atlantic Ocean, Bay of Biscay, Strait of Gibraltar and Mediterranean Sea.</p>
Full article ">Figure 2
<p>Dendrogram showing the hierarchical PLS-DA model built to classify the four different polymers constituting microplastic particles: PE, PP, EPS, PS and not identified (NI).</p>
Full article ">Figure 3
<p>Composition of the training dataset of microplastics. Polyethylene (PE), polypropylene (PP), polystyrene (PS) and expanded polystyrene (EPS).</p>
Full article ">Figure 4
<p>Average raw reflectance spectra in the SWIR range (1000–2500 nm) of the reference microplastic particles acquired by HSI device and used as training set.</p>
Full article ">Figure 5
<p>Average pre-processed reflectance spectra of the different polymers (<b>a</b>) and PCA score plot (PC1–PC2–PC5) (<b>b</b>) related to Rule 1.</p>
Full article ">Figure 6
<p>Average pre-processed reflectance spectra of the different polymers (<b>a</b>) and PCA score plot (PC1–PC2–PC5) (<b>b</b>) related to Rule 2.</p>
Full article ">Figure 7
<p>Source digital images and corresponding false color prediction maps obtained from the HSI-hierarchical model of some of the examined microplastic samples from the Mediterranean Sea and the Strait of Gibraltar obtained by the application of the hierarchical PLS-DA model.</p>
Full article ">Figure 8
<p>Source digital images and corresponding false color prediction maps obtained from the HSI-hierarchical model of some of the examined microplastic samples from the Western Atlantic Ocean (E4 Sermiento) and the Bay of Biscay (ETO 16 and NST 41) were obtained following the application of the hierarchical PLS-DA model.</p>
Full article ">Figure 9
<p>Percentages of different identified polymers in the investigated marine microplastic samples collected in different areas. NI: not identified.</p>
Full article ">Figure 10
<p>Abundance of microplastic categories in each analyzed sample.</p>
Full article ">Figure 11
<p>Percentage of polymer types in each analyzed marine microplastic category such as fragments, films and lines.</p>
Full article ">Figure 12
<p>Percentage abundance of polymer types at each sampling site, categorized by fragments, films and lines.</p>
Full article ">Figure 12 Cont.
<p>Percentage abundance of polymer types at each sampling site, categorized by fragments, films and lines.</p>
Full article ">Figure 13
<p>Maximum Feret diameter frequency distribution (in number) for PE, PP, EPS, PS.</p>
Full article ">Figure 14
<p>Area frequency distribution (in number) for PE, PP, EPS and PS fragments.</p>
Full article ">Figure 15
<p>Perimeter frequency distribution (in number) for PE, PP, EPS and PS fragments.</p>
Full article ">Figure 16
<p>Circularity frequency distribution (in number) for PE, PP, EPS and PS fragments.</p>
Full article ">Figure 17
<p>Example of microplastic items, made of different polymers (i.e., PP, PE and EPS), showing different circularity values.</p>
Full article ">Figure A1
<p>Digital images and corresponding predicted images obtained after the application of hierarchical PLS-DA model of the microplastic samples coming from the Strait of Gibraltar and Mediterranean Sea: (<b>a</b>) A02DS, (<b>b</b>) A06NS, (<b>c</b>) A27NS and (<b>d</b>) A34NS.</p>
Full article ">Figure A1 Cont.
<p>Digital images and corresponding predicted images obtained after the application of hierarchical PLS-DA model of the microplastic samples coming from the Strait of Gibraltar and Mediterranean Sea: (<b>a</b>) A02DS, (<b>b</b>) A06NS, (<b>c</b>) A27NS and (<b>d</b>) A34NS.</p>
Full article ">Figure A1 Cont.
<p>Digital images and corresponding predicted images obtained after the application of hierarchical PLS-DA model of the microplastic samples coming from the Strait of Gibraltar and Mediterranean Sea: (<b>a</b>) A02DS, (<b>b</b>) A06NS, (<b>c</b>) A27NS and (<b>d</b>) A34NS.</p>
Full article ">Figure A2
<p>Digital images and corresponding predicted images obtained after the application of hierarchical PLS-DA model of the microplastic samples coming from the Western Atlantic Ocean: E4-Sarmiento.</p>
Full article ">Figure A2 Cont.
<p>Digital images and corresponding predicted images obtained after the application of hierarchical PLS-DA model of the microplastic samples coming from the Western Atlantic Ocean: E4-Sarmiento.</p>
Full article ">Figure A3
<p>Digital images and corresponding predicted images obtained after the application of hierarchical PLS-DA model of the microplastic samples coming from Bay of Biscay: ETO 16.</p>
Full article ">Figure A4
<p>Digital images and corresponding predicted images obtained after the application of hierarchical PLS-DA model of the microplastic samples coming from Bay of Biscay: NST41.</p>
Full article ">
8 pages, 195 KiB  
Article
Symptomatic Vitreous Opacities: Exploring the Mismatch between Clinical Observation of Vitreous Alterations and Self-Reported Symptoms
by Giulio Bamonte, Clemente Maria Iodice, Rodolfo Mastropasqua, Elon H. C. Van Dijk, Andrea Appeltans, Maria Vittoria Cicinelli, Matteo Menean, Marcel Ten Tusscher, Stuart W. Harmer, Paola Marolo, Enrico Borrelli, Michele Reibaldi, Georgios D. Panos and Lorenzo Motta
J. Clin. Med. 2024, 13(20), 6052; https://doi.org/10.3390/jcm13206052 - 11 Oct 2024
Viewed by 644
Abstract
Objectives: To assess the mismatch between the clinical observation of vitreous alterations and self-reported symptoms in young patients complaining of symptomatic vitreous opacities (SVO). Methods: The ophthalmic medical records of young patients presenting primarily with SVO were retrospectively evaluated. Symptoms severity was assessed [...] Read more.
Objectives: To assess the mismatch between the clinical observation of vitreous alterations and self-reported symptoms in young patients complaining of symptomatic vitreous opacities (SVO). Methods: The ophthalmic medical records of young patients presenting primarily with SVO were retrospectively evaluated. Symptoms severity was assessed using a questionnaire. The status of the vitreous body was examined with indirect ophthalmoscopy at the slit-lamp and classified according to an ad hoc severity scale. Results: Sixty eyes of thirty otherwise healthy patients (median age: 32.5 (IQR: 29.0–37.0) years old) complaining of SVO (median duration: 38 months; interquartile range: 18–84 months) were enrolled. SVO was rated as severe by 50% of participants, affecting all the activities explored in the questionnaire. Twenty-three patients (76.6%) reported SVO-related depression and/or anxiety, for which eleven patients (36.6%) were or had been using medication. Fifty-eight eyes (96.6%) showed no evidence of (or minimal) vitreous opacity, while two eyes (3.3%) were found to have significant vitreous opacity. No significant inter-gender differences (p > 0.05) and no significant differences (p > 0.05) were found between the severity of vitreous opacity and patients’ reported symptoms nor with their psychological status and medication use. Conclusions: Severe discomfort related to the perception of vitreous floaters exists in young patients whose vitreous gel examination is unremarkable or shows only minor alterations. We believe this discrepancy can be explained by optical anisotropy; significant forward-scattering of light, which results in floater symptoms; and reduced back reflection, which limits the clinical observation. Full article
12 pages, 1157 KiB  
Article
Multi-Layered Unsupervised Learning Driven by Signal-to-Noise Ratio-Based Relaying for Vehicular Ad Hoc Network-Supported Intelligent Transport System in eHealth Monitoring
by Ali Nauman, Adeel Iqbal, Tahir Khurshaid and Sung Won Kim
Sensors 2024, 24(20), 6548; https://doi.org/10.3390/s24206548 - 11 Oct 2024
Viewed by 564
Abstract
Every year, about 1.19 million people are killed in traffic accidents; hence, the United Nations has a goal of halving the number of road traffic deaths and injuries by 2030. In line with this objective, technological innovations in telecommunication, particularly brought about by [...] Read more.
Every year, about 1.19 million people are killed in traffic accidents; hence, the United Nations has a goal of halving the number of road traffic deaths and injuries by 2030. In line with this objective, technological innovations in telecommunication, particularly brought about by the rise of 5G networks, have contributed to the development of modern Vehicle-to-Everything (V2X) systems for communication. A New Radio V2X (NR-V2X) was introduced in the latest Third Generation Partnership Project (3GPP) releases which allows user devices to exchange information without relying on roadside infrastructures. This, together with Massive Machine Type Communication (mMTC) and Ultra-Reliable Low Latency Communication (URLLC), has led to the significantly increased reliability, coverage, and efficiency of vehicular communication networks. The use of artificial intelligence (AI), especially K-means clustering, has been very promising in terms of supporting efficient data exchange in vehicular ad hoc networks (VANETs). K-means is an unsupervised machine learning (ML) technique that groups vehicles located near each other geographically so that they can communicate with one another directly within these clusters while also allowing for inter-cluster communication via cluster heads. This paper proposes a multi-layered VANET-enabled Intelligent Transportation System (ITS) framework powered by unsupervised learning to optimize communication efficiency, scalability, and reliability. By leveraging AI in VANET solutions, the proposed framework aims to address road safety challenges and contribute to global efforts to meet the United Nations’ 2030 target. Additionally, this framework’s robust communication and data processing capabilities can be extended to eHealth monitoring systems, enabling real-time health data transmission and processing for continuous patient monitoring and timely medical interventions. This paper’s contributions include exploring AI-driven approaches for enhanced data interaction, improved safety in VANET-based ITS environments, and potential applications in eHealth monitoring. Full article
(This article belongs to the Special Issue Intelligent Sensors and Control for Vehicle Automation)
Show Figures

Figure 1

Figure 1
<p>An illustration of the multi-layered unsupervised learning-based and VANET-enabled ITS framework.</p>
Full article ">Figure 2
<p>Analysis of the proposed collision detection algorithm, where (<b>a</b>) illustrates the vehicle path and detects collisions and (<b>b</b>) illustrates the variation in vehicle speed over a given time period.</p>
Full article ">Figure 3
<p>Analysis of proposed SNR-based information spread system, where results identify the edge vehicles and new information path.</p>
Full article ">Figure 4
<p>An illustration of the multilayered, unsupervised, learning-based, and VANET-enabled ITS framework.</p>
Full article ">
16 pages, 1425 KiB  
Article
Influence of Endodontic Cavity Design on Interfacial Voids, Class II Resin Composites Sealing Ability and Tooth Fracture Resistance: An In Vitro Study
by Abdurrahman S. Assalman, Faisal Al Onaizan, Moataz Elgezawi, Khalid S. Almulhim, Moamen A. Abdallah and Dalia Kaisarly
J. Clin. Med. 2024, 13(19), 6024; https://doi.org/10.3390/jcm13196024 - 9 Oct 2024
Viewed by 547
Abstract
Objective: The aim of this in vitro investigation is to study the effect of endodontic cavity design on interfacial voids, class II resin composite sealing ability, and fracture resistance in mandibular premolars. Methods: A total of 48 single-rooted mandibular premolars received [...] Read more.
Objective: The aim of this in vitro investigation is to study the effect of endodontic cavity design on interfacial voids, class II resin composite sealing ability, and fracture resistance in mandibular premolars. Methods: A total of 48 single-rooted mandibular premolars received compound class II preparations with either traditional flare access cavities (group A) or contracted endodontic cavity preparations (group B). Each study group was subdivided according to the coronal restoration into two sub-groups as α and β. In the α group, a microhybrid composite was used after etch-and-rinse bonding technique using an MDP-containing universal adhesive. In the β group, a self-adhesive composite was used as coronal restoration after endodontic treatment (n = 12) for each subgroup. A micro-CT analysis was performed to assess the obturation interfacial voids and tracing of class II cervical interfacial adaptation. The tooth fracture resistance testing was then performed adding an extra group of 12 sound non-prepared teeth, which were tested as the control for fracture strength testing. A one-way ANOVA and post-hoc testing were used together with descriptive statistics for an analysis of the mean values of obturation interfacial voids. A two-way ANOVA was used to assess the fracture resistance test results, and to find the influence of endodontic access design and the type of composite material on the fracture resistance testing. Chi-square testing was employed to analyze the cervical interfacial seal of the class II restorations. Results: A one-way ANOVA revealed that there were no statistically significant differences between test groups in the amount of obturation interfacial voids (p > 0.05). There were no statistically significant differences between test groups in terms of cervical interfacial sealing ability (p > 0.05). A two-way ANOVA revealed that no statistically significant differences between test groups including the control group existed in terms of the fracture resistance testing (p > 0.05). Conclusions: Although it does not improve tooth fracture resistance, the contracted endodontic access cavity does not deteriorate the quality of obturation in terms of the interfacial porosity. The self-adhesive composite does not improve the efficiency of cervical interfacial adaptation or tooth fracture resistance regardless of the endodontic access cavity shape, yet it revealed a substantial load-bearing capacity. Full article
(This article belongs to the Special Issue Current Topics in Endodontics)
Show Figures

Figure 1

Figure 1
<p>3D Micro-CT image for root canal system. After root canal instrumentation (green), After obturation (red), and Superimposed image (brown) of two scans show percentage of obturation voids between two scans.</p>
Full article ">Figure 2
<p>Micro-CT scan sections of representative sample: (<b>a</b>) apical section, (<b>b</b>,<b>c</b>) middle-third section, (<b>d</b>) coronal-third section, (<b>e</b>,<b>f</b>) axial sections of tooth crown show penetration of silver nitrate underneath the composite material, and (<b>g</b>) sagittal section of tooth crown shows penetration of silver nitrate.</p>
Full article ">Figure 3
<p>Fracture resistance testing in a universal testing machine, sample mounted at 45°.</p>
Full article ">Figure 4
<p>Obturation interfacial voids, mean, and standard deviation for all groups. A: traditional access cavity, B: contracted access cavity, Alpha: microhybrid composite, and Beta: self-adhesive composite.</p>
Full article ">Figure 5
<p>Fracture resistance results, mean and standard deviation. A: traditional access cavity, B: contracted access cavity, Alpha: microhybrid composite, and Beta: self-adhesive composite.</p>
Full article ">
16 pages, 912 KiB  
Article
Health-Related Quality of Life in Rugby Athletes: The Role of Dietary Supplements and Their Consumption
by Walter Sapuppo, Antonietta Monda, Davide Giacconi, Regina Gregori Grgič, Daniele Saccenti, Claudia Maria Mineo, Vincenzo Monda, Salvatore Allocca, Maria Casillo, Marcellino Monda, Girolamo Di Maio and Marco La Marra
Sports 2024, 12(10), 270; https://doi.org/10.3390/sports12100270 - 8 Oct 2024
Viewed by 482
Abstract
This study investigates dietary supplement use among rugby players and their general health, focusing on prevalence and underlying motivations. Involving 92 athletes, it examines the relationship between supplement usage, motivations, and health outcomes using the 36-item Short Form Health Survey and a 24-item [...] Read more.
This study investigates dietary supplement use among rugby players and their general health, focusing on prevalence and underlying motivations. Involving 92 athletes, it examines the relationship between supplement usage, motivations, and health outcomes using the 36-item Short Form Health Survey and a 24-item ad hoc questionnaire. Findings reveal a high frequency of supplement usage, motivated by desires to enhance performance, appearance, and mood. Significant differences in health-related quality of life are found between users and non-users, particularly in mental health, social functioning, and emotional stability. Motivations like performance enhancement and body shape manipulation were linked to altered health perceptions, indicating the psychosocial impacts of supplementation. This study emphasizes the need to consider the holistic effects of supplements on athlete well-being, advocating for a balanced approach prioritizing both physical and mental health. It calls for increased awareness among athletes, coaches, and sports professionals about the potential risks and benefits of supplement use and the importance of informed decision-making. Additionally, it highlights the need for further research to understand the mechanisms of supplement use and its impact on athlete health, aiming to enhance sports science and promote overall athlete well-being in competitive environments. Full article
(This article belongs to the Special Issue Exploring the Role of Acute Supplementation in Exercise Performance)
Show Figures

Figure 1

Figure 1
<p>Box plots representing the mean (in red) of general health-related scores obtained by subjects who reported supplements and/or other substance consumption versus subjects who reported not consuming supplements and/or other substances. The SF-36 global score was compared between the two groups (<b>a</b>), as well as the following domains: mental health (<b>b</b>), social functioning (<b>c</b>), and role emotional (<b>d</b>). * = <span class="html-italic">p</span> &lt; 0.05, *** = <span class="html-italic">p</span> &lt; 0.001.</p>
Full article ">Figure 2
<p>Box plots representing the mean (in red) of general health-related scores obtained by athletes according to their self-reported motivation behind supplements and/or other substance intake, controlling for age. The SF-36 global score was compared between the groups (<b>a</b>), as well as the role emotional domain (<b>b</b>). * = <span class="html-italic">p</span> &lt; 0.05, ** = <span class="html-italic">p</span> &lt; 0.01.</p>
Full article ">
16 pages, 275 KiB  
Article
A Cross-Entropy Approach to the Domination Problem and Its Variants
by Ryan Burdett, Michael Haythorpe and Alex Newcombe
Entropy 2024, 26(10), 844; https://doi.org/10.3390/e26100844 - 6 Oct 2024
Viewed by 363
Abstract
The domination problem and three of its variants (total domination, 2-domination, and secure domination) are considered. These problems have various real-world applications, including error correction codes, ad hoc routing for wireless networks, and social network analysis, among others. However, each of them is [...] Read more.
The domination problem and three of its variants (total domination, 2-domination, and secure domination) are considered. These problems have various real-world applications, including error correction codes, ad hoc routing for wireless networks, and social network analysis, among others. However, each of them is NP-hard to solve to provable optimality, making fast heuristics for these problems desirable. There are a wealth of highly developed heuristics and approximation algorithms for the domination problem; however, such heuristics are much less common for variants of the domination problem. We redress this gap in the literature by proposing a novel implementation of the cross-entropy method that can be applied to any sensible variant of domination. We present results from experiments that demonstrate that this approach can produce good results in an efficient manner even for larger graphs and that it works roughly as well for any of the domination variants considered. Full article
Show Figures

Figure 1

Figure 1
<p>Results for square grid graphs <math display="inline"><semantics> <mrow> <mi>G</mi> <mo>(</mo> <mi>n</mi> <mo>,</mo> <mi>n</mi> <mo>)</mo> </mrow> </semantics></math>. The size of the best solutions returned by the cross-entropy method is displayed using a dotted line, while the size of the best solutions returned by the greedy heuristic is displayed using a dashdotted line. The known optimal values are displayed using a solid line. In the case of secure domination, a dashed line is used for the upper bounds obtained by CPLEX after 10,000 s.</p>
Full article ">Figure 2
<p>Results for flower snarks <math display="inline"><semantics> <mrow> <mi>J</mi> <mo>(</mo> <mi>k</mi> <mo>)</mo> </mrow> </semantics></math>. The size of the best solutions returned by the cross-entropy method is displayed using a dotted line, while the size of the best solutions returned by the greedy heuristic is displayed using a dashdotted line. The known optimal values are displayed using a solid line.</p>
Full article ">Figure 3
<p>Average runtime in seconds for a single run of the cross-entropy algorithm on square grid graphs <math display="inline"><semantics> <mrow> <mi>G</mi> <mo>(</mo> <mi>n</mi> <mo>,</mo> <mi>n</mi> <mo>)</mo> </mrow> </semantics></math> for the different variants of domination. The solid line corresponds to the domination problem; the dashed line to total domination; the dotted line to 2-domination; and the dashdotted line to secure domination.</p>
Full article ">
37 pages, 1076 KiB  
Article
Distributed Ledger-Based Authentication and Authorization of IoT Devices in Federated Environments
by Michał Jarosz, Konrad Wrona and Zbigniew Zieliński
Electronics 2024, 13(19), 3932; https://doi.org/10.3390/electronics13193932 - 4 Oct 2024
Viewed by 511
Abstract
One of the main security challenges when federating separate Internet of Things (IoT) administrative domains is effective Identity and Access Management, which is required to establish trust and secure communication between federated IoT devices. The primary goal of the work is to develop [...] Read more.
One of the main security challenges when federating separate Internet of Things (IoT) administrative domains is effective Identity and Access Management, which is required to establish trust and secure communication between federated IoT devices. The primary goal of the work is to develop a “lightweight” protocol to enable authentication and authorization of IoT devices in federated environments and ensure the secure communication of IoT devices. We propose a novel Lightweight Authentication and Authorization Framework for Federated IoT (LAAFFI) which takes advantage of the unique fingerprint of IoT devices based on their configuration and additional hardware modules, such as Physical Unclonable Function, to provide flexible authentication and authorization based on Distributed Ledger technology. Moreover, LAAFFI supports IoT devices with limited computing resources and devices not equipped with secure storage space. We implemented a prototype of LAAFFI and evaluated its performance in the Hyperledger Fabric-based IoT framework. Three main metrics were evaluated: latency, throughput (number of operations or transactions per second), and network resource utilization rate (transmission overhead introduced by the LAAFFI protocol). The performance tests conducted confirmed the high efficiency and suitability of the protocol for federated IoT environments. Also, all LAAFFI components are scalable as confirmed by tests. We formally evaluated LAAFFI security using Verifpal as a formal verification tool. Based on the models developed for Verifpal, we validated their security properties, such as message secrecy, authenticity, and freshness. Our results show that the proposed solution can improve the security of federated IoT environments while providing zero-day interoperability and high scalability. Compared to existing solutions, LAAFFI is more efficient due to the use of symmetric cryptography and algorithms adapted for operations involving IoT devices. LAAFFI supports multiple authorization mechanisms, and since it also offers authentication and accountability, it meets the requirements of Authentication, Authorization and Accounting (AAA). It uses Distributed Ledger (DL) and smart contracts to ensure that the request complies with the policies agreed between the organizations. LAAFFI offers authentication of devices belonging to a single organization and different organizations, with the assurance that the encryption key will be shared with another device only if the appropriate security policy is met. The proposed protocol is particularly useful for ensuring the security of federated IoT environments created ad hoc for special missions, e.g., operations conducted by NATO countries and disaster relief operations Humanitarian Assistance and Disaster Relief (HADR) involving military forces and civilian services, where immediate interoperability is required. Full article
(This article belongs to the Special Issue Security and Trust in Internet of Things and Edge Computing)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Communication between the IoT device and a ledger node during the registration phase.</p>
Full article ">Figure 2
<p>Communication between an IoT device and the distributed ledger.</p>
Full article ">Figure 3
<p>The procedure of communication between IoT devices.</p>
Full article ">Figure 4
<p>The method of generating pseudorandom numbers in the Linux operating system since version 5.6. Source: Own design based on [<a href="#B12-electronics-13-03932" class="html-bibr">12</a>].</p>
Full article ">Figure 5
<p>A federated IoT network with two organizations with two DL nodes each.</p>
Full article ">Figure 6
<p>Overhead data transferred during our tests.</p>
Full article ">
30 pages, 1625 KiB  
Article
A Robust Routing Protocol in Cognitive Unmanned Aerial Vehicular Networks
by Anatte Rozario, Ehasan Ahmed and Nafees Mansoor
Sensors 2024, 24(19), 6334; https://doi.org/10.3390/s24196334 - 30 Sep 2024
Viewed by 583
Abstract
The adoption of UAVs in defence and civilian sectors necessitates robust communication networks. This paper presents a routing protocol for Cognitive Radio Unmanned Aerial Vehicles (CR-UAVs) in Flying Ad-hoc Networks (FANETs). The protocol is engineered to optimize route selection by considering crucial parameters [...] Read more.
The adoption of UAVs in defence and civilian sectors necessitates robust communication networks. This paper presents a routing protocol for Cognitive Radio Unmanned Aerial Vehicles (CR-UAVs) in Flying Ad-hoc Networks (FANETs). The protocol is engineered to optimize route selection by considering crucial parameters such as distance, speed, link quality, and energy consumption. A standout feature is the introduction of the Central Node Resolution Factor (CNRF), which enhances routing decisions. Leveraging the Received Signal Strength Indicator (RSSI) enables accurate distance estimation, crucial for effective routing. Moreover, predictive algorithms are integrated to tackle the challenges posed by high mobility scenarios. Security measures include the identification of malicious nodes, while the protocol ensures resilience by managing multiple routes. Furthermore, it addresses route maintenance and handles link failures efficiently, cluster formation, and re-clustering with joining and leaving new nodes along with the predictive algorithm. Simulation results showcase the protocol’s self-comparison under different packet sizes, particularly in terms of end-to-end delay, throughput, packet delivery ratio, and normalized routing load. However, superior performance compared to existing methods, particularly in terms of throughput and packet transmission delay, underscoring its potential for widespread adoption in both defence and civilian UAV applications. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

Figure 1
<p>Various Connectivities of UAVs.</p>
Full article ">Figure 2
<p>Overview of the Proposed Clustering scheme.</p>
Full article ">Figure 3
<p>Scenario of communication between GS and CNs.</p>
Full article ">Figure 4
<p>(<b>a</b>) Bipartite Graph formation by node <math display="inline"><semantics> <mrow> <mi>U</mi> <msub> <mi>N</mi> <mi>a</mi> </msub> </mrow> </semantics></math>, (<b>b</b>) Maximum edge Biclique graph of node <math display="inline"><semantics> <mrow> <mi>U</mi> <msub> <mi>N</mi> <mi>a</mi> </msub> </mrow> </semantics></math>, (<b>c</b>) Nodes with CNRF value, (<b>d</b>) Proposed cluster-based network.</p>
Full article ">Figure 5
<p>Comparison of End to End Delay for packet sizes of 512 and 1024.</p>
Full article ">Figure 6
<p>Comparison of throughput for packet sizes of 512 and 1024.</p>
Full article ">Figure 7
<p>Comparison of packet delivery ratios for packet sizes of 512 and 1024.</p>
Full article ">Figure 8
<p>Comparison of normalized routing loads for packet sizes of 512 and 1024.</p>
Full article ">Figure 9
<p>Number of Nodes vs. Delay.</p>
Full article ">Figure 10
<p>Number of nodes vs. Throughput.</p>
Full article ">Figure 11
<p>OLSR+GPSR vs. Proposed protocol Overhead.</p>
Full article ">Figure 12
<p>OLSR+GPSR vs. Proposed protocol Throughput.</p>
Full article ">Figure 13
<p>OLSR+GPSR vs. Proposed protocol Packet Delivery Ratio.</p>
Full article ">Figure 14
<p>OLSR+GPSR vs. Proposed protocol End-to-End Delay.</p>
Full article ">
22 pages, 1246 KiB  
Article
SROR: A Secure and Reliable Opportunistic Routing for VANETs
by Huibin Xu and Ying Wang
Vehicles 2024, 6(4), 1730-1751; https://doi.org/10.3390/vehicles6040084 - 30 Sep 2024
Viewed by 440
Abstract
In Vehicular Ad Hoc Networks (VANETs), high mobility of vehicles issues a huge challenge to the reliability and security of transmitting packets. Therefore, a Secure and Reliable Opportunistic Routing (SROR) is proposed in this paper. During construction of Candidate Forwarding Nodes (CFNs) set, [...] Read more.
In Vehicular Ad Hoc Networks (VANETs), high mobility of vehicles issues a huge challenge to the reliability and security of transmitting packets. Therefore, a Secure and Reliable Opportunistic Routing (SROR) is proposed in this paper. During construction of Candidate Forwarding Nodes (CFNs) set, the relative velocity, connectivity probability, and packet forwarding ratio are taken into consideration. The aim of SROR is to maximally improve the packet delivery ratio as well as reduce the end-to-end delay. The selection of a relay node from CFNs is formalized as a Markov Decision Process (MDP) optimization. The SROR algorithm extracts useful knowledge from historical behavior of nodes by interacting with the environment. This useful knowledge are utilized to select the relay node as well as to prevent the malicious nodes from forwarding packets. In addition, the influence of different learning rate and exploratory factor policy on rewards of agents are analyzed. The experimental results show that the performance of SROR outperforms the benchmarks in terms of the packet delivery ratio, end-to-end delay, and attack success ratio. As vehicle density ranges from 10 to 50 and percentage of malicious vehicles is fixed at 10%, the average of packet delivery ratio, end-to-end delay, and attack success ratio are 0.82, 0.26s, and 0.37, respectively, outperforming benchmark protocols. Full article
Show Figures

Figure 1

Figure 1
<p>A typical network structure of VANETs.</p>
Full article ">Figure 2
<p>System model.</p>
Full article ">Figure 3
<p>The idea of opportunistic routing.</p>
Full article ">Figure 4
<p>An <span class="html-italic">m</span> hops path from a source node to its destination.</p>
Full article ">Figure 5
<p>Structure of SROR.</p>
Full article ">Figure 6
<p>Learning rate for OneCycleLR policy: (<b>a</b>) from episode 1 to 20,000; (<b>b</b>) from episode 12,000 to 20,000.</p>
Full article ">Figure 7
<p>Average reward and cumulative rewards for the OneCycleLR policy. (<b>a</b>) Average reward. (<b>b</b>) Cumulative rewards.</p>
Full article ">Figure 8
<p>Effect of <math display="inline"><semantics> <mi>ε</mi> </semantics></math> on reward. (<b>a</b>) Average reward. (<b>b</b>) Cumulative rewards.</p>
Full article ">Figure 9
<p>Comparison of the performance under different vehicle densities. (<b>a</b>) Packet delivery ratio. (<b>b</b>) End-to-end delay. (<b>c</b>) Attack success ratio.</p>
Full article ">Figure 10
<p>Comparison of the performance under different <math display="inline"><semantics> <mi>σ</mi> </semantics></math>. (<b>a</b>) Packet delivery ratio. (<b>b</b>) End-to-end delay. (<b>c</b>) Attack success ratio.</p>
Full article ">
14 pages, 211 KiB  
Article
Fetishism for Our Times: A Rhetorical and Philosophical Exploration
by Timo Airaksinen
Religions 2024, 15(10), 1192; https://doi.org/10.3390/rel15101192 - 30 Sep 2024
Viewed by 345
Abstract
This article develops a detailed theory of the fetishes of the modern world. Fetishes may still have their original religious application as talismans and totems, but their actual range is much wider, as I illustrate. I show that a modern fetish satisfies our [...] Read more.
This article develops a detailed theory of the fetishes of the modern world. Fetishes may still have their original religious application as talismans and totems, but their actual range is much wider, as I illustrate. I show that a modern fetish satisfies our needs in an unexpected and unlikely manner: it does what it, prima facie, is not supposed to do. How does this happen? To explain, we must trace the construction of fetishes; I do this using some key rhetorical concepts. Paradiastole is a technique of evaluative redescription. It describes the world in value terms as something it is not—we can then ironize the result. If it serves the speakers’ essential interests and satisfies their desires, we have explained a fetish as a good-maker. The fetishization of an object, because of its ironic background, tends to invite critical, meiotic, and even derogatory responses—usually, the issue is and remains essentially contested. For example, early Christians wrote hagiographies that treated some people as saints, thus creating ad hoc beliefs that satisfied their religious interests. I also suggest a different, metonymic understanding of fetishes and their educational benefits. Perhaps my theory is overly permissive, allowing too many fetishes. My final conjecture is that true fetishes function as identity markers; for example, the crucifix is a fetish that defines Christianity. Full article
(This article belongs to the Section Religions and Humanities/Philosophies)
Back to TopTop