[go: up one dir, main page]

 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (44)

Search Parameters:
Keywords = hostile access

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
25 pages, 2987 KiB  
Article
Zero Trust VPN (ZT-VPN): A Systematic Literature Review and Cybersecurity Framework for Hybrid and Remote Work
by Syed Muhammad Zohaib, Syed Muhammad Sajjad, Zafar Iqbal, Muhammad Yousaf, Muhammad Haseeb and Zia Muhammad
Information 2024, 15(11), 734; https://doi.org/10.3390/info15110734 (registering DOI) - 17 Nov 2024
Viewed by 188
Abstract
Modern organizations have migrated from localized physical offices to work-from-home environments. This surge in remote work culture has exponentially increased the demand for and usage of Virtual Private Networks (VPNs), which permit remote employees to access corporate offices effectively. However, the technology raises [...] Read more.
Modern organizations have migrated from localized physical offices to work-from-home environments. This surge in remote work culture has exponentially increased the demand for and usage of Virtual Private Networks (VPNs), which permit remote employees to access corporate offices effectively. However, the technology raises concerns, including security threats, latency, throughput, and scalability, among others. These newer-generation threats are more complex and frequent, which makes the legacy approach to security ineffective. This research paper gives an overview of contemporary technologies used across enterprises, including the VPNs, Zero Trust Network Access (ZTNA), proxy servers, Secure Shell (SSH) tunnels, the software-defined wide area network (SD-WAN), and Secure Access Service Edge (SASE). This paper also presents a comprehensive cybersecurity framework named Zero Trust VPN (ZT-VPN), which is a VPN solution based on Zero Trust principles. The proposed framework aims to enhance IT security and privacy for modern enterprises in remote work environments and address concerns of latency, throughput, scalability, and security. Finally, this paper demonstrates the effectiveness of the proposed framework in various enterprise scenarios, highlighting its ability to prevent data leaks, manage access permissions, and provide seamless security transitions. The findings underscore the importance of adopting ZT-VPN to fortify cybersecurity frameworks, offering an effective protection tool against contemporary cyber threats. This research serves as a valuable reference for organizations aiming to enhance their security posture in an increasingly hostile threat landscape. Full article
(This article belongs to the Special Issue Feature Papers in Information in 2024–2025)
Show Figures

Figure 1

Figure 1
<p>Illustration of VPN functionality, demonstrating encrypted traffic flow for enhanced data security and user privacy across public networks.</p>
Full article ">Figure 2
<p>Zero Trust Network Access (ZTNA) framework, showing the continuous verification process that ensures secure access based on identity, context, and device compliance.</p>
Full article ">Figure 3
<p>Systematic literature review (SLR) methodology for selecting and filtering articles related to Zero Trust VPN and cybersecurity frameworks.</p>
Full article ">Figure 4
<p>Detailed architecture of the Zero Trust VPN (ZT-VPN) framework, depicting the Policy Enforcement Point, Identity Enforcement Point, and Security Enforcement Point modules for comprehensive security management.</p>
Full article ">
9 pages, 589 KiB  
Article
Midterm Outcome of Balloon-Expandable Covered Stenting of Femoral Access Site Complications
by András Szentiványi, Sarolta Borzsák, András Süvegh, Ákos Bérczi, Tamás Szűcsborús, Zoltán Ruzsa, Géza Fontos, Csaba Imre Szalay, Roland Papp, Levente Molnár and Csaba Csobay-Novák
J. Clin. Med. 2024, 13(21), 6550; https://doi.org/10.3390/jcm13216550 - 31 Oct 2024
Viewed by 400
Abstract
Background: Vascular access site complications (VASCs) after endovascular interventions requiring a large-bore access are frequent and known to be associated with increased morbidity and mortality. Although balloon-expandable covered stents (BECSs) are increasingly used in such indications, their performance in this rather hostile [...] Read more.
Background: Vascular access site complications (VASCs) after endovascular interventions requiring a large-bore access are frequent and known to be associated with increased morbidity and mortality. Although balloon-expandable covered stents (BECSs) are increasingly used in such indications, their performance in this rather hostile territory is currently unknown. We aimed to evaluate the safety and efficacy of BECSs in common femoral artery (CFA) VASCs management. Methods: This is a national multicenter retrospective study of all patients who underwent BECS implantation of the CFA due to a VASCs after an endovascular procedure between January 2020 and May 2023 in major tertiary referral centers in Hungary. Operative data were collected and follow-up ultrasound examinations were performed. Our study is registered on ClinicalTrials.gov (NCT05220540) and followed the STROBE guidelines. Results: Of the 23 patients enrolled (13 females, mean age: 74.2 ± 8.6), technical success was achieved in 21 (91.3%) cases, with one perioperative death. After an average follow-up of 18.0 ± 11.4 months, another nine (39.1%) deaths occurred, and one was VASCs-associated. BECS occlusion was detected in one (4.3%) patient, being the only reintervention (4.3%) where revascularization was also achieved. Conclusions: Although BECS implantation for CFA VASCs is feasible with a relatively high technical success rate, the mortality rate is non-negligible. Until adequately evaluated, BECS implantation in such indications is to be used with caution, ideally only within the framework of a trial. Full article
(This article belongs to the Section Cardiovascular Medicine)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Kaplan-Meier estimates of VASC-related and all-cause survival.</p>
Full article ">Figure 2
<p>Clinical success of covered stent implant after vascular access-related complication.</p>
Full article ">
12 pages, 1947 KiB  
Article
Early and Mid-Term Results of Endovascular Aneurysm Repair with the Cordis Incraft Ultra-Low Profile Endograft: A High-Volume Center Experience
by Luigi Baccani, Gianbattista Parlani, Giacomo Isernia, Massimo Lenti, Andrea Maria Terpin and Gioele Simonte
J. Clin. Med. 2024, 13(18), 5413; https://doi.org/10.3390/jcm13185413 - 12 Sep 2024
Viewed by 799
Abstract
Background/Objectives: In recent years, manufacturers have developed new low-profile stent grafts to allow endovascular treatment of abdominal aortic aneurysms (AAA) in patients with small access vessels. We evaluated the early and mid-term outcomes of the Incraft (Cordis Corp, Bridgewater, NJ, USA) ultra-low [...] Read more.
Background/Objectives: In recent years, manufacturers have developed new low-profile stent grafts to allow endovascular treatment of abdominal aortic aneurysms (AAA) in patients with small access vessels. We evaluated the early and mid-term outcomes of the Incraft (Cordis Corp, Bridgewater, NJ, USA) ultra-low profile endograft implantation in a high-volume single center. Methods: Between 2014 and 2023, 133 consecutive endovascular aneurysm repair (EVAR) procedures performed using the Incraft endograft were recorded in a prospective database. Indications included infrarenal aortic aneurysms, common iliac aneurysms, and infrarenal penetrating aortic ulcers. Mid-term results were analyzed using the Kaplan–Meier method. Results: During the study period, 133 patients were treated with the Cordis Incraft endograft, in both elective and urgent settings. The Incraft graft was the first choice for patients with hostile iliac accesses, a feature characterizing at least one side in 90.2% of the patients in the study cohort. The immediate technical success rate was 78.2%. The intraoperative endoleak rate was 51.9% (20.3% type 1 A, 0.8% type 1 B, and 30.8% type 2 endoleak). Within 30 days, technical and clinical success rates were both 99.3%; all type 1A and 1B endoleaks were resolved at the 30-day follow-up CT-angiogram. After a mean follow-up of 35.4 months, the actuarial freedom from the re-intervention rate was 96.0%, 91.1%, and 84.0% at 1, 3, and 5 years, respectively. The iliac leg patency rate was 97.1%, 94.1%, and 93.1% at 1, 3, and 5 years, respectively. No statistically significant differences were observed between hostile and non-hostile access groups, nor between the groups with grade 1, grade 2, and grade 3 access hostility. Conclusions: The ultra-low profile Cordis Incraft endograft represents a valid option for the endovascular treatment of AAA in patients with hostile iliac accesses. The procedure can be performed with high rates of technical and clinical success at 30 days and the rates of iliac branch occlusion observed during the follow-up period appear acceptable in patients with poor aorto-iliac outflow. Full article
(This article belongs to the Special Issue Clinical Advances in Aortic Aneurysm)
Show Figures

Figure 1

Figure 1
<p>Five years overall survival estimate calculated by the Kaplan–Meier method.</p>
Full article ">Figure 2
<p>Five years of freedom from any reintervention calculated by the Kaplan–Meier method.</p>
Full article ">Figure 3
<p>Five years of freedom from open surgical conversion calculated by the Kaplan–Meier method.</p>
Full article ">Figure 4
<p>Five years of freedom from iliac leg occlusion calculated by the Kaplan–Meier method.</p>
Full article ">Figure 5
<p>Five years of freedom from iliac leg occlusion in hostile (red) and non-hostile (blue) anatomy calculated by the Kaplan–Meier method.</p>
Full article ">Figure 6
<p>Five years of freedom from iliac leg occlusion in grade 1 (blue), grade 2 (red), and grade 3 (green) hostile anatomy were calculated by the Kaplan–Meier method.</p>
Full article ">Figure 7
<p>Pre-operative CT-angiogram of a patient with AAA and chronic total occlusion of the right common iliac artery (<b>A</b>); final intraoperative angiography and post-operative CT-angiogram demonstrating effective Incraft implantation with sac exclusion and complete right common iliac artery recanalization (<b>B</b>,<b>C</b>).</p>
Full article ">
19 pages, 997 KiB  
Systematic Review
Institutional Violence Perpetrated against Transgender Individuals in Health Services: A Systematic Review of Qualitative Studies
by Gilberto da Cruz Leal, José Nildo de Barros Silva Júnior, Quezia Rosa Ferreira, Jaqueline Garcia de Almeida Ballestero and Pedro Fredemir Palha
Int. J. Environ. Res. Public Health 2024, 21(8), 1106; https://doi.org/10.3390/ijerph21081106 - 21 Aug 2024
Viewed by 1019
Abstract
This review aims to analyze the evidence related to violence perpetrated against transgender individuals in health services based on their narratives. This is a systematic literature review of qualitative studies. A search was carried out in the Scopus, Web of Science, Latin American [...] Read more.
This review aims to analyze the evidence related to violence perpetrated against transgender individuals in health services based on their narratives. This is a systematic literature review of qualitative studies. A search was carried out in the Scopus, Web of Science, Latin American and Caribbean Literature in Health Sciences (LILACS), Cumulative Index to Nursing and Allied Health Literature (CINAHL), EMBASE, and MEDLINE databases using the descriptors “transgender people”, “violence”, and “health services”. The eligibility criteria included original qualitative articles addressing the research question, with fully available text, reporting violence specifically by health workers, involving trans individuals aged 18 and above, and published in Portuguese, English, or Spanish. In addition, studies were included that reported experiences of violence suffered by the trans population, through their narratives, in health services. A total of 3477 studies were found, of which 25 were included for analysis. The results highlighted situations such as refusal of service; resistance to the use of social names and pronouns; barriers to accessing health services; discrimination and stigma; insensitivity of health workers; lack of specialized care and professional preparedness; and a system focused on binarism. The analysis of the studies listed in this review highlights the multiple facets of institutional violence faced by the transgender population in health services. It is evident that the forms of violence often interlink and reinforce each other, creating a hostile environment for the transgender population in health services. Thus, there is an urgent need to create strategies that ensure access to dignified and respectful care for all individuals, regardless of their gender identity. Full article
Show Figures

Figure 1

Figure 1
<p>PRISMA flowchart. Source: created from the model by Page et al. [<a href="#B28-ijerph-21-01106" class="html-bibr">28</a>].</p>
Full article ">
23 pages, 6953 KiB  
Article
Rice Terrace Experience in Japan: An Ode to the Beauty of Seasonality and Nostalgia
by Qian Wang, Xiaoqi Yang, Xinyu Liu and Katsunori Furuya
Land 2024, 13(1), 64; https://doi.org/10.3390/land13010064 - 5 Jan 2024
Cited by 1 | Viewed by 2430
Abstract
Rice terraces are a time-honored agricultural feature that overcomes rough terrain and hostile growing conditions. In addition to playing an essential role in agricultural production and land conservation, rice terraces have been recognized as living cultural landscapes, important agricultural heritage, and popular agritourism [...] Read more.
Rice terraces are a time-honored agricultural feature that overcomes rough terrain and hostile growing conditions. In addition to playing an essential role in agricultural production and land conservation, rice terraces have been recognized as living cultural landscapes, important agricultural heritage, and popular agritourism destinations for their aesthetic, sociocultural, and environmental values. However, there is a lack of understanding of this emerging niche market, especially from outsider perspectives. To fill the gap, this study analyzes Google Maps reviews of seventy representative rice terraces in Japan based on a mixed-method content analysis, aiming to identify visitors’ overall experiences, seasonal perceptions, and the causes of negative experiences. The results indicate that the overall experience of rice terraces in Japan includes seven themes: agricultural landscapes, times and seasons, visual perception, accessibility and infrastructure, sense of place, Genfukei of Japan, and food. Visitors’ perceptions toward the four seasons of the rice terraces have distinctive characteristics and result in different satisfaction levels. The main reasons for negative experiences are farmland abandonment, lack of character, poor accessibility, and bad timing. Leveraging the power of netnography, the study sheds light on the sustainable development of agricultural heritage tourism through the introduction of rice terrace conservation initiatives in Japan and the exploration of rice terrace experience. Full article
Show Figures

Figure 1

Figure 1
<p>(<b>a</b>) Shiroyone Senmaida Rice Terraces; (<b>b</b>) Iwakubi Shoryu Rice Terraces (source: Wikimedia Commons [<a href="#B33-land-13-00064" class="html-bibr">33</a>,<a href="#B34-land-13-00064" class="html-bibr">34</a>]).</p>
Full article ">Figure 2
<p>(<b>a</b>) The distribution of rice terraces certified in the 1999 and 2021 nationwide selection. (<b>b</b>) The distribution of study cases in this research. Compiled by the authors according to the official information from certified rice terrace site lists.</p>
Full article ">Figure 2 Cont.
<p>(<b>a</b>) The distribution of rice terraces certified in the 1999 and 2021 nationwide selection. (<b>b</b>) The distribution of study cases in this research. Compiled by the authors according to the official information from certified rice terrace site lists.</p>
Full article ">Figure 3
<p>Research workflow.</p>
Full article ">Figure 4
<p>The temporal distribution in the number and average ratings for reviews by month, season, and year.</p>
Full article ">Figure 5
<p>The concept map of the rice terrace overall experience.</p>
Full article ">Figure 6
<p>The quadrant plot for seasonal experiences.</p>
Full article ">Figure 7
<p>The major findings of the study.</p>
Full article ">
2 pages, 172 KiB  
Abstract
Agriculture through Industry 4.0: Management, Challenges, and Opportunities in Hostile Environment: The Case of Iraq
by Sanar Muhyaddin
Eng. Proc. 2023, 40(1), 27; https://doi.org/10.3390/engproc2023040027 - 14 Aug 2023
Viewed by 750
Abstract
This paper reviews the future trends, the present situation and the prospects facing the application of Industry 4.0 technologies (e.g., Drones, texting technologies, GPS, etc.) in Iraq’s agricultural sector in general and small agribusiness industries in particular. Iraq struggles with chronic structural and [...] Read more.
This paper reviews the future trends, the present situation and the prospects facing the application of Industry 4.0 technologies (e.g., Drones, texting technologies, GPS, etc.) in Iraq’s agricultural sector in general and small agribusiness industries in particular. Iraq struggles with chronic structural and emerging challenges that have hindered its food production over the years. In 2019, Iraq’s population had increased to around 39 million people, compared to 23.5 million Iraqis in 2000. This shift amounts to a 66% increase in population in 20 years. Food supply, whether locally produced or imported, has been struggling to catch up with the population growth, and Iraq has become increasingly dependent on food imports to meet domestic demand. Between 1985 and 2017, food imports increased from USD 2 billion to USD 11 billion, growing from 19 to 21% of total imports. Iraq’s economy has been highly dependent on the oil sector; with declining oil prices, politicians and international communities have emphasised that modern and smart agriculture that applies Industry 4.0 technology can increase productivity and be a source of job creation, income generation and self-reliance. Nonetheless, evidence obtained via this exploratory study using unstructured interviews (3 out 33) via an interpretive approach and conducting thematic analysis of the interviews with farmers and agri-entrepreneurs indicate that there is a long journey ahead before Iraq can rely on agriculture and new technologies, instead of oil, for its economy and to improve its food system. Moreover, Iraq’s political turmoil and uncertainty, the cyclical conflict and wars, and the corruption and mismanagement of state resources exacerbate this problem. Indeed, farmers face many challenges, such as a lack of infrastructure and security, the dominance of state-owned enterprises, and financing issues, with many farm owners struggling to access finance since there is no clear banking or credit system. On top of that issue, the diminishing of tacit knowledge among the farmers and the labour shortage issue in the agricultural sector hinders application of smart technology, as the majority of workers remaining in the market are unskilled labour. This study contributed to the literature on the application of smart technologies in agriculture and its socioeconomic effects. The exploratory nature of this study identifies areas for future research. Additionally, the arguments presented in this research highlight the challenges farmers and agri-entrepreneurs face in adopting new technologies and the tactics that they use to survive in a hostile environment like Iraq. It will also offer suggestions to help policymakers and international communities focus on intervention to help farmers and agri-entrepreneurs in Iraq to improve their performance. Full article
54 pages, 12312 KiB  
Review
A Tutorial on Agricultural IoT: Fundamental Concepts, Architectures, Routing, and Optimization
by Emmanuel Effah, Ousmane Thiare and Alexander M. Wyglinski
IoT 2023, 4(3), 265-318; https://doi.org/10.3390/iot4030014 - 27 Jul 2023
Cited by 4 | Viewed by 3475
Abstract
This paper presents an in-depth contextualized tutorial on Agricultural IoT (Agri-IoT), covering the fundamental concepts, assessment of routing architectures and protocols, and performance optimization techniques via a systematic survey and synthesis of the related literature. The negative impacts of climate change and the [...] Read more.
This paper presents an in-depth contextualized tutorial on Agricultural IoT (Agri-IoT), covering the fundamental concepts, assessment of routing architectures and protocols, and performance optimization techniques via a systematic survey and synthesis of the related literature. The negative impacts of climate change and the increasing global population on food security and unemployment threats have motivated the adoption of the wireless sensor network (WSN)-based Agri-IoT as an indispensable underlying technology in precision agriculture and greenhouses to improve food production capacities and quality. However, most related Agri-IoT testbed solutions have failed to achieve their performance expectations due to the lack of an in-depth and contextualized reference tutorial that provides a holistic overview of communication technologies, routing architectures, and performance optimization modalities based on users’ expectations. Thus, although IoT applications are founded on a common idea, each use case (e.g., Agri-IoT) varies based on the specific performance and user expectations as well as technological, architectural, and deployment requirements. Likewise, the agricultural setting is a unique and hostile area where conventional IoT technologies do not apply, hence the need for this tutorial. Consequently, this tutorial addresses these via the following contributions: (1) a systematic overview of the fundamental concepts, technologies, and architectural standards of WSN-based Agri-IoT, (2) an evaluation of the technical design requirements of a robust, location-independent, and affordable Agri-IoT, (3) a comprehensive survey of the benchmarking fault-tolerance techniques, communication standards, routing and medium access control (MAC) protocols, and WSN-based Agri-IoT testbed solutions, and (4) an in-depth case study on how to design a self-healing, energy-efficient, affordable, adaptive, stable, autonomous, and cluster-based WSN-specific Agri-IoT from a proposed taxonomy of multi-objective optimization (MOO) metrics that can guarantee an optimized network performance. Furthermore, this tutorial established new taxonomies of faults, architectural layers, and MOO metrics for cluster-based Agri-IoT (CA-IoT) networks and a three-tier objective framework with remedial measures for designing an efficient associated supervisory protocol for cluster-based Agri-IoT networks. Full article
(This article belongs to the Topic IoT for Energy Management Systems and Smart Cities)
Show Figures

Figure 1

Figure 1
<p>Seasonal failure probability-2014 [<a href="#B4-IoT-04-00014" class="html-bibr">4</a>] depicting the extent of climate change impact on Africa’s farmlands.</p>
Full article ">Figure 2
<p>Generalized design expectations of WSN-based Agri-IoT technology.</p>
Full article ">Figure 3
<p>Generalized Agri-IoT framework consisting of: field layout overview of Agri-IoT framework (<b>a</b>), sample of classic Agri-IoT in the state of the art (<b>b</b>), and key components of an SN or a BS (<b>c</b>).</p>
Full article ">Figure 4
<p>Conceptual framework: Agri-IoT-based farm monitoring and control cycle.</p>
Full article ">Figure 5
<p>Proposed Agri-IoT architectural layers with core components of Agri-IoT ecosystem and the “things” taxonomy.</p>
Full article ">Figure 6
<p>Generalized taxonomy of IoT applications.</p>
Full article ">Figure 7
<p>The roles of Agri-IoT in smart farming with specific use cases.</p>
Full article ">Figure 8
<p>Different architectural layers in the state of the art of IoT ecosystem.</p>
Full article ">Figure 9
<p>Principal design factors for Agri-IoT networks.</p>
Full article ">Figure 10
<p>Proposed design objectives and strategies of WSN-based Agri-IoT routing protocols.</p>
Full article ">Figure 11
<p>Taxonomy of WSN-based routing protocols of Agri-IoT.</p>
Full article ">Figure 12
<p>Sample network architectures: centralized-data-centric, cluster-based, and graph/flooding-based architectural frameworks of WSN sublayer.</p>
Full article ">Figure 13
<p>Proposed functionality-based MAC classification framework.</p>
Full article ">Figure 14
<p>Fault–error–failure cycle [<a href="#B72-IoT-04-00014" class="html-bibr">72</a>].</p>
Full article ">Figure 15
<p>Faults in the WSN sublayer of Agri-IoT: sources and fault propagation model.</p>
Full article ">Figure 16
<p>Classification of faults in the state of the art and proposed fault taxonomies for WSN-based Agri-IoT.</p>
Full article ">Figure 17
<p>FM framework in WSN sublayer of Agri-IoT.</p>
Full article ">Figure 18
<p>Conceptual architectural framework of the proposed CA-IoT for precision irrigation management.</p>
Full article ">Figure 19
<p>CA-IoT use case cluster illustrating the key network components: MNs, CH, and BS.</p>
Full article ">Figure 20
<p>Characterization of cluster-based networks and deduced taxonomy of MOO metrics for optimizing Agri-IoT networks.</p>
Full article ">Figure 21
<p>Proposed operation cycle for designing our CA-IoT network’s routing protocol.</p>
Full article ">
19 pages, 3390 KiB  
Article
Information Fusion for Radar Signal Sorting with the Distributed Reconnaissance Receivers
by Yuxin Zhao, Hancong Feng, Kaili Jiang and Bin Tang
Remote Sens. 2023, 15(15), 3743; https://doi.org/10.3390/rs15153743 - 27 Jul 2023
Cited by 2 | Viewed by 1342
Abstract
The conventional method of centralizing information fusion is commonly employed for sorting radar signals in reconnaissance receivers. However, challenges arise when the distance between reconnaissance receivers and the fusion center is distant, or when the fusion center is compromised by hostile forces. To [...] Read more.
The conventional method of centralizing information fusion is commonly employed for sorting radar signals in reconnaissance receivers. However, challenges arise when the distance between reconnaissance receivers and the fusion center is distant, or when the fusion center is compromised by hostile forces. To address these issues, this paper proposes a novel distributed information fusion method. In this method, each reconnaissance receiver is restricted to accessing adjacent nodes within an undirected graph for information transmission and local computation. The distributed Dempster’s combination rule and the cautious conjunctive rule are implemented using weight functions and consensus algorithms. Furthermore, an innovative outlier detection algorithm is incorporated into the fusion process to enhance its robustness. Experimental results demonstrate that the proposed method effectively improves the accuracy of radar signal sorting. When the sorting accuracy of a single reconnaissance receiver is equal to or higher than 60%, both fusion rules achieve a sorting accuracy of 100%. Even when the sorting accuracy of a single reconnaissance receiver is as low as 50%, the fused result still maintains a sorting accuracy of over 97%. Full article
Show Figures

Figure 1

Figure 1
<p>Multi-receiver collaborative reconnaissance scene.</p>
Full article ">Figure 2
<p>Distributed fusion flowchart.</p>
Full article ">Figure 3
<p>Distributed outlier detection algorithm.</p>
Full article ">Figure 4
<p>The topology of an undirected graph with six receivers.</p>
Full article ">Figure 5
<p>The effects of convergence accuracy and parameter <math display="inline"><semantics><mi>ϵ</mi></semantics></math> on convergence speed.</p>
Full article ">Figure 6
<p>Average consensus algorithm using Equations (16) and (17) give the average value of the weight <math display="inline"><semantics><mrow><msub><mover accent="true"><mi>ω</mi><mo>¯</mo></mover><mo>∑</mo></msub><mo>=</mo><mrow><mo>(</mo><mn>0.8213</mn><mo>,</mo><mn>0.1048</mn><mo>,</mo><mn>0.2789</mn><mo>,</mo><mn>0.1621</mn><mo>,</mo><mn>0.1124</mn><mo>)</mo></mrow></mrow></semantics></math>.</p>
Full article ">Figure 7
<p>The topology of an undirected graph with 20 receivers.</p>
Full article ">
16 pages, 4114 KiB  
Article
An Easy-To-Use External Fixator for All Hostile Environments, from Space to War Medicine: Is It Meant for Everyone’s Hands?
by Julie Manon, Vladimir Pletser, Michael Saint-Guillain, Jean Vanderdonckt, Cyril Wain, Jean Jacobs, Audrey Comein, Sirga Drouet, Julien Meert, Ignacio Jose Sanchez Casla, Olivier Cartiaux and Olivier Cornu
J. Clin. Med. 2023, 12(14), 4764; https://doi.org/10.3390/jcm12144764 - 19 Jul 2023
Cited by 3 | Viewed by 1709
Abstract
Long bone fractures in hostile environments pose unique challenges due to limited resources, restricted access to healthcare facilities, and absence of surgical expertise. While external fixation has shown promise, the availability of trained surgeons is limited, and the procedure may frighten unexperienced personnel. [...] Read more.
Long bone fractures in hostile environments pose unique challenges due to limited resources, restricted access to healthcare facilities, and absence of surgical expertise. While external fixation has shown promise, the availability of trained surgeons is limited, and the procedure may frighten unexperienced personnel. Therefore, an easy-to-use external fixator (EZExFix) that can be performed by nonsurgeon individuals could provide timely and life-saving treatment in hostile environments; however, its efficacy and accuracy remain to be demonstrated. This study tested the learning curve and surgical performance of nonsurgeon analog astronauts (n = 6) in managing tibial shaft fractures by the EZExFix during a simulated Mars inhabited mission, at the Mars Desert Research Station (Hanksville, UT, USA). The reduction was achievable in the different 3D axis, although rotational reductions were more challenging. Astronauts reached similar bone-to-bone contact compared to the surgical control, indicating potential for successful fracture healing. The learning curve was not significant within the limited timeframe of the study (N = 4 surgeries lasting <1 h), but the performance was similar to surgical control. The results of this study could have important implications for fracture treatment in challenging or hostile conditions on Earth, such as war or natural disaster zones, developing countries, or settings with limited resources. Full article
(This article belongs to the Special Issue Advances in Trauma and Orthopedic Surgery)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Creation of the fractured leg model. Landmark of the fracture line with a laser ((<b>a</b>) above—red line) and vertical benchmarks to further evaluate fracture reduction ((<b>a</b>) below—white arrows). Bone cutting by the diamond bandsaw following the fracture landmark (<b>b</b>). Soft tissues assembly and fixation around the fractured bone, mounted on a foot prosthesis (<b>c</b>). Final fractured leg model (<b>d</b>). Adapted from Manon et al. [<a href="#B4-jcm-12-04764" class="html-bibr">4</a>].</p>
Full article ">Figure 2
<p>Material needed to build the EZExFix (<b>a</b>). Final construct mounted on a broken artificial leg on a sagittal, frontal, and upper view, respectively (<b>b</b>). Broken artificial leg after removing soft tissues ready to measure analysis parameters on a sagittal, frontal, and upper view, respectively (<b>c</b>). Adapted from Manon et al. [<a href="#B4-jcm-12-04764" class="html-bibr">4</a>].</p>
Full article ">Figure 3
<p>Measurement following six vectors (three translations and three rotations) into Cartesian coordinates (<b>a</b>). Ant: anterior, Post: posterior, Inf: inferior, Sup: superior, Med: medial, Lat: lateral, ER: external rotation, VR: varus, RC: recurvatum. For the procedure to harvest points position with the coordinate measuring machine, the pin has to point to the desired localization and a computer registers it (<b>b</b>). Points of interest to take measurements of anatomical world and pathologic world (<b>c</b>). The green and red dots are used to approximate the correct tibial axis and the blue ones are used to describe the fracture position.</p>
Full article ">Figure 4
<p>Examples of points of interest (in green, red, blue, and magenta) encoded with the coordinate measuring machine and used to construct the global reference frame R<sub>world</sub> fixed to the tibial plateau (green dots), the local reference frame R<sub>p</sub> fixed to the proximal part of the fracture (blue dots), and the local reference frame R<sub>d</sub> fixed to the distal part of the fracture (magenta dots).</p>
Full article ">Figure 5
<p>Example of proximal (blue dots) and distal (magenta dots) parts of the fracture registered in the global reference frame R<sub>world</sub> (<b>a</b>). The local reference frame R<sub>p</sub> is fixed to the centroid of the blue dots. As an illustration, L<sub>max</sub> is the maximum distance between proximal and distal parts of the fracture, measured in mm along the axis z<sub>p</sub>. Example of results for the calculation of the location parameter between proximal and distal parts of the fracture (<b>b</b>). The blue curve represents the evolution of the location of the distal part along the circumference of the proximal part of the fracture. The horizontal red line is the 2 mm threshold. The horizontal green line the 1.5 mm threshold. The 2 mm and 1.5 mm bone-to-bone contacts are computed as the part of the blue curve lying under the red and green horizontal lines, respectively.</p>
Full article ">Figure 6
<p>Average translational displacements of analog astronauts’ surgeries comparing to surgeon ones. A: anterior, P: posterior, M: medial, L: lateral, L+: lengthening, L−: shortening, ˟: mean, °: outliers, ns: nonsignificant.</p>
Full article ">Figure 7
<p>Average angular displacements of analog astronauts’ surgeries compared to surgeon ones. VR: varus, VL: valgus, FL: flessum, RC: recurvatum, ER: external rotation, IR: internal rotation, ˟: mean, ns: nonsignificant, **: <span class="html-italic">p</span> &lt; 0.01.</p>
Full article ">Figure 8
<p>Bone-to-bone contact less than 2 and 1.5 mm for astronauts and the surgeon, represented on axial cross sections of the mid-shaft tibial fractures. The opaque surface corresponds to the bone contact percentage under the respective threshold. This contact zone is purely theoretical, not anatomical. Outcomes are expressed as the mean percentage over the total tibial circumference (+/−standard deviation).</p>
Full article ">Figure 9
<p>Panel chart of the six different displacements and the bone-to-bone contacts expressed as mean scores (black bold straight lines) across the four successive sessions (Sessions S<sub>1</sub>, S<sub>2</sub>, S<sub>3</sub>, S<sub>4</sub>). As a reference, S<sub>EVA</sub> and S<sub>stress</sub> are represented by yellow and red lines, respectively, as a horizontal bar calibrated on the corresponding mean scores. Error bars show the standard deviation. Green area shows physiologic range and red warns about the pathologic one. A: anterior, P: posterior, M: medial, L: lateral, L+: lengthening, L−: shortening, VR: varus, VL: valgus, FL: flessum, RC: recurvatum, ER: external rotation, IR: internal rotation.</p>
Full article ">
15 pages, 2234 KiB  
Article
An Asymmetric Encryption-Based Key Distribution Method for Wireless Sensor Networks
by Yuan Cheng, Yanan Liu, Zheng Zhang and Yanxiu Li
Sensors 2023, 23(14), 6460; https://doi.org/10.3390/s23146460 - 17 Jul 2023
Cited by 4 | Viewed by 1508
Abstract
Wireless sensor networks are usually applied in hostile areas where nodes can easily be monitored and captured by an adversary. Designing a key distribution scheme with high security and reliability, low hardware requirements, and moderate communication load is crucial for wireless sensor networks. [...] Read more.
Wireless sensor networks are usually applied in hostile areas where nodes can easily be monitored and captured by an adversary. Designing a key distribution scheme with high security and reliability, low hardware requirements, and moderate communication load is crucial for wireless sensor networks. To address the above objectives, we propose a new key distribution scheme based on an ECC asymmetric encryption algorithm. The two-way authentication mechanism in the proposed scheme not only prevents illegal nodes from accessing the network, but also prevents fake base stations from communicating with the nodes. The complete key distribution and key update methods ensure the security of session keys in both static and dynamic environments. The new key distribution scheme provides a significant performance improvement compared to the classical key distribution schemes for wireless sensor networks without sacrificing reliability. Simulation results show that the proposed new scheme reduces the communication load and key storage capacity, has significant advantages in terms of secure connectivity and attack resistance, and is fully applicable to wireless sensor networks. Full article
(This article belongs to the Special Issue Smart Mobile and Sensing Applications)
Show Figures

Figure 1

Figure 1
<p>The network topology.</p>
Full article ">Figure 2
<p>Flowchart of authentication and key agreement in the static scenario.</p>
Full article ">Figure 3
<p>Specific steps for phase I in an example.</p>
Full article ">Figure 4
<p>Specific steps for phase II in an example.</p>
Full article ">Figure 5
<p>Sensor <span class="html-italic">S</span><sub>0</sub> moves from Cluster0 to Cluster2.</p>
Full article ">Figure 6
<p>Flowchart of authentication and key agreement in the mobile subscheme.</p>
Full article ">Figure 7
<p>Secure connectivity versus key pool size <span class="html-italic">P</span>.</p>
Full article ">Figure 8
<p>The probability of resilience against sensor capture in different schemes.</p>
Full article ">
16 pages, 928 KiB  
Article
HDLNIDS: Hybrid Deep-Learning-Based Network Intrusion Detection System
by Emad Ul Haq Qazi, Muhammad Hamza Faheem and Tanveer Zia
Appl. Sci. 2023, 13(8), 4921; https://doi.org/10.3390/app13084921 - 14 Apr 2023
Cited by 39 | Viewed by 6543
Abstract
Attacks on networks are currently the most pressing issue confronting modern society. Network risks affect all networks, from small to large. An intrusion detection system must be present for detecting and mitigating hostile attacks inside networks. Machine Learning and Deep Learning are currently [...] Read more.
Attacks on networks are currently the most pressing issue confronting modern society. Network risks affect all networks, from small to large. An intrusion detection system must be present for detecting and mitigating hostile attacks inside networks. Machine Learning and Deep Learning are currently used in several sectors, particularly the security of information, to design efficient intrusion detection systems. These systems can quickly and accurately identify threats. However, because malicious threats emerge and evolve regularly, networks need an advanced security solution. Hence, building an intrusion detection system that is both effective and intelligent is one of the most cognizant research issues. There are several public datasets available for research on intrusion detection. Because of the complexity of attacks and the continually evolving detection of an attack method, publicly available intrusion databases must be updated frequently. A convolutional recurrent neural network is employed in this study to construct a deep-learning-based hybrid intrusion detection system that detects attacks over a network. To boost the efficiency of the intrusion detection system and predictability, the convolutional neural network performs the convolution to collect local features, while a deep-layered recurrent neural network extracts the features in the proposed Hybrid Deep-Learning-Based Network Intrusion Detection System (HDLNIDS). Experiments are conducted using publicly accessible benchmark CICIDS-2018 data, to determine the effectiveness of the proposed system. The findings of the research demonstrate that the proposed HDLNIDS outperforms current intrusion detection approaches with an average accuracy of 98.90% in detecting malicious attacks. Full article
(This article belongs to the Collection Innovation in Information Security)
Show Figures

Figure 1

Figure 1
<p>Proposed HDLNIDS model.</p>
Full article ">Figure 2
<p>Accuracy of proposed deep learning model with respect to epochs.</p>
Full article ">Figure 3
<p>Loss graph of proposed deep learning model with respect to epochs.</p>
Full article ">
10 pages, 244 KiB  
Article
Experimental Mindfulness Intervention in an Emergency Department for Stress Management and Development of Positive Working Environment
by Alexandros Argyriadis, Louiza Ioannidou, Ioannis Dimitrakopoulos, Maritsa Gourni, Georgia Ntimeri, Chrisi Vlachou and Agathi Argyriadi
Healthcare 2023, 11(6), 879; https://doi.org/10.3390/healthcare11060879 - 17 Mar 2023
Cited by 5 | Viewed by 3174
Abstract
Mindfulness-based interventions have increasingly gained the interest of health professionals in the last decade, especially practices that are short, economical, easily accessible, and physically, cognitively, and psychologically compelling. Nurses of Emergency Departments are a special, dynamic, but at the same time vulnerable group [...] Read more.
Mindfulness-based interventions have increasingly gained the interest of health professionals in the last decade, especially practices that are short, economical, easily accessible, and physically, cognitively, and psychologically compelling. Nurses of Emergency Departments are a special, dynamic, but at the same time vulnerable group of health professionals who work in shifts and face multiple challenges. Considering the recent literature and the fact that stress and a hostile work environment are the top ranked health professionals’ challenges, there is a need for a further study of the use of mindfulness. This study aimed to investigate the effect of the application of mindfulness on nurses in the Emergency Department on several factors related to daily nursing practice and that directly affect these specific health professionals. This experimental study was performed on 14 participating nurses in the Emergency Department of a Public General Hospital in Athens, randomized into two groups: a control and an intervention group. The data collection tools were two digital smart devices, participatory observation, and semi-structured interviews. By practicing mindfulness meditation, the participating nurses in the intervention group showed improvement in their cognitive functions (attention, thinking, memory, concentration), professional interpersonal relationships, personal satisfaction and communication with patients and caregivers, sleep rate, negative emotions, and behaviors. The findings suggest that the application of mindfulness practices should be considered an easy, affordable, economical, accessible, and effective method that nurses can use to strengthen and empower themselves, enjoying its multiple benefits. The effectiveness of the application of mindfulness remains an important issue for future research in other health professionals as well. Full article
(This article belongs to the Special Issue Job Satisfaction and Mental Health of Workers)
16 pages, 1175 KiB  
Article
Leveraging Complementary Resources through Relational Capital to Improve Alliance Performance under an Uncertain Environment: A Moderated Mediation Analysis
by Xian Liu, Wenyu Wang and Yiyi Su
Sustainability 2023, 15(1), 310; https://doi.org/10.3390/su15010310 - 25 Dec 2022
Cited by 4 | Viewed by 2851
Abstract
Integrating the resource-based theory, the relational view, and the contingency theory, this research advances the strategic alliance literature by providing a theoretical framework that explains alliance outcomes from both the inter-organizational and the external environmental perspectives. Specifically, we analyzed the effect of complementary [...] Read more.
Integrating the resource-based theory, the relational view, and the contingency theory, this research advances the strategic alliance literature by providing a theoretical framework that explains alliance outcomes from both the inter-organizational and the external environmental perspectives. Specifically, we analyzed the effect of complementary resources on alliance performance through the mechanism of relational capital in an uncertain environment. We also explored the moderating roles of environmental dynamism and environmental hostility in the indirect relationship between resource complementarity and alliance performance with a moderated mediation model. Based on the empirical evidence from a survey of 210 alliance firms, we found that complementary resources that a firm can access from its strategic alliance motivate it to invest relational capital in the partnership, which in turn improves alliance performance. However, the positive link between resource complementarity and relational capital is attenuated under a highly dynamic environment. More importantly, results of the moderated mediation analysis suggest that the mediating effect of relational capital between resource complementarity and alliance performance is stronger when the environment is less dynamic, but this effect is not moderated by environmental hostility. These findings imply that complementary resources are critical antecedents of alliance performance, yet firms could not leverage the value of complementary resources to achieve alliance success without sound relational mechanisms or the ability to adapt to the uncertain environment. Full article
(This article belongs to the Section Economic and Business Aspects of Sustainability)
Show Figures

Figure 1

Figure 1
<p>Conceptual model.</p>
Full article ">Figure 2
<p>The moderating effect of environmental dynamism on the relationship between resource complementarity and relational capital.</p>
Full article ">Figure 3
<p>Floodlight analysis results for the resource complementarity × environmental dynamism interaction effect on alliance performance.</p>
Full article ">
18 pages, 842 KiB  
Article
Strengthening Equity and Inclusion in Urban Greenspace: Interrogating the Moral Management & Policing of 2SLGBTQ+ Communities in Toronto Parks
by Claire Davis and Sara Edge
Int. J. Environ. Res. Public Health 2022, 19(23), 15505; https://doi.org/10.3390/ijerph192315505 - 23 Nov 2022
Cited by 5 | Viewed by 3850
Abstract
There is growing recognition that greenspace provides invaluable benefits to health and wellbeing, and is essential infrastructure for promoting both social and environmental sustainability in urban settings. This paper contributes towards efforts to build ‘just’ and equitable urban sustainability, and more specifically greenspace [...] Read more.
There is growing recognition that greenspace provides invaluable benefits to health and wellbeing, and is essential infrastructure for promoting both social and environmental sustainability in urban settings. This paper contributes towards efforts to build ‘just’ and equitable urban sustainability, and more specifically greenspace management, by drawing attention to hostility and exclusion experienced by two-spirit, lesbian, gay, bisexual, transgender, queer, genderqueer, pansexual, transsexual, intersex and gender-variant (2SLGBTQ+) park occupants. There is evidence that access to greenspace is inequitable—despite ongoing media accounts of targeted violence and discriminatory police patrolling of 2SLGBTQ+ communities in urban parks, this population has not received adequate research attention. This paper examines systemic barriers that impede urban greenspace access among 2SLGBTQ+ communities, including how the threat of violence in greenspace limits opportunities for accessing benefits associated with naturalized settings. These themes are explored within the context of the City of Toronto, Canada. Our mixed-method approach draws upon key informant interviews, key document content analysis, and ground-truthing. Our findings reveal how queer corporeality, kinship and love subvert deeply entrenched heteronormative social values and understandings of sexuality, partnership, gender, and use of public space, challenging institutional understandings of morality and daily life. The paper concludes by reflecting on the state of 2SLGBTQ+ communities’ relationships to greenspace, and potential ways forward in building greater inclusivity into the social fabric of park design and management. Full article
(This article belongs to the Special Issue Building Sustainable Urban Space: A Sustainability Approach)
Show Figures

Figure 1

Figure 1
<p>Pride flag painted benches situated along the west side of Barbara Hall park in Toronto’s Church-Wellesley Village neighbourhood.</p>
Full article ">Figure 2
<p>Trans flag benches located in Barbara Hall Park. A police cruiser can be seen parked on the perimeter of the park.</p>
Full article ">
15 pages, 2351 KiB  
Article
The Impact of COVID-19 Lockdowns in a Sample of Outpatients in a Mental Health Department of a Metropolitan Hospital in Milan
by Mauro Percudani, Matteo Porcellana, Ilaria Di Bernardo, Ivan Limosani, Attilio Negri, Luigi Zerbinati and Carla Morganti
Medicina 2022, 58(9), 1274; https://doi.org/10.3390/medicina58091274 - 14 Sep 2022
Cited by 1 | Viewed by 1520
Abstract
Background and Objectives: Italy was the first country in Europe to face the coronavirus 2019 (COVID-19) pandemic and its consequences, which led to two phases of severe restrictions for its population. This study aims to estimate the connections between the trauma of [...] Read more.
Background and Objectives: Italy was the first country in Europe to face the coronavirus 2019 (COVID-19) pandemic and its consequences, which led to two phases of severe restrictions for its population. This study aims to estimate the connections between the trauma of the COVID-19 emergency and the clinical features of a sample of outpatients in a Milan Community Mental Health setting, comparing the first (April 2020) and second lockdowns (November 2020). Materials and Methods: The sample included 116 consecutive outpatients recruited in April 2020 and 116 in November 2020. The subjects were evaluated with Clinical Global Impression Severity (CGI-S), Brief Psychiatric Rating Scale (BPRS-18), and Impact of Event Scale-Revised (IES-R). Results: The IES-R identified 47.4% participants in April and 50% in November with clinical scores over the cut-off. The network analysis of BPRS-18 and IES-R depicted the connection among different symptoms; in April, Unusual Thought Content, Anxiety, and Somatic Concern represented the most central items, and the strongest connections were found between Uncooperativeness and Hostility, Blunted Affect and Emotional Withdrawal, and IES-Intrusion and IES-Arousal. In the November group, the most central items were represented by Conceptual Disorganization and Emotional Withdrawal, whereas the strongest connections were found between IES-Arousal and IES-Intrusion, Excitement and Grandiosity, and Unusual Thought Content and Conceptual Disorganization. Conclusions: Our findings show continued high distress levels and increased psychological burdens during the second phase of restrictions; this could be described as “pandemic fatigue”, a general psychological weariness due to pandemic-related restrictions, as well as a lack of motivation to comply with them. As mental health professionals, our mission during these difficult times has been to keep community psychiatry services accessible, with particular regard to vulnerable and marginalized populations. Full article
(This article belongs to the Section Epidemiology & Public Health)
Show Figures

Figure 1

Figure 1
<p>Network structure in the April sample. Edge weights reflect the connection strength of BPRS factors with IES-R dimensions in the April network.</p>
Full article ">Figure 2
<p>Network structure in the November sample. Edge weights reflect the connection strength of BPRS factors with IES-R dimensions in the November network.</p>
Full article ">Figure 3
<p>Centrality plot (strength) of the April sample.</p>
Full article ">Figure 4
<p>Centrality plot (strength) of the November sample.</p>
Full article ">
Back to TopTop