Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (2,465)

Search Parameters:
Keywords = Ad Hoc

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
16 pages, 863 KiB  
Article
Influence of Endodontic Cavity Design on Interfacial Voids, Class II Resin Composites Sealing Ability and Tooth Fracture Resistance: An In Vitro Study
by Abdurrahman S. Assalman, Faisal Al Onaizan, Moataz Elgezawi, Khalid S. Almulhim, Moamen A. Abdallah and Dalia Kaisarly
J. Clin. Med. 2024, 13(19), 6024; https://doi.org/10.3390/jcm13196024 - 9 Oct 2024
Abstract
Objective: The aim of this in vitro investigation is to study the effect of endodontic cavity design on interfacial voids, class II resin composite sealing ability, and fracture resistance in mandibular premolars. Methods: A total of 48 single-rooted mandibular premolars received [...] Read more.
Objective: The aim of this in vitro investigation is to study the effect of endodontic cavity design on interfacial voids, class II resin composite sealing ability, and fracture resistance in mandibular premolars. Methods: A total of 48 single-rooted mandibular premolars received compound class II preparations with either traditional flare access cavities (group A) or contracted endodontic cavity preparations (group B). Each study group was subdivided according to the coronal restoration into two sub-groups as α and β. In the α group, a microhybrid composite was used after etch-and-rinse bonding technique using an MDP-containing universal adhesive. In the β group, a self-adhesive composite was used as coronal restoration after endodontic treatment (n = 12) for each subgroup. A micro-CT analysis was performed to assess the obturation interfacial voids and tracing of class II cervical interfacial adaptation. The tooth fracture resistance testing was then performed adding an extra group of 12 sound non-prepared teeth, which were tested as the control for fracture strength testing. A one-way ANOVA and post-hoc testing were used together with descriptive statistics for an analysis of the mean values of obturation interfacial voids. A two-way ANOVA was used to assess the fracture resistance test results, and to find the influence of endodontic access design and the type of composite material on the fracture resistance testing. Chi-square testing was employed to analyze the cervical interfacial seal of the class II restorations. Results: A one-way ANOVA revealed that there were no statistically significant differences between test groups in the amount of obturation interfacial voids (p > 0.05). There were no statistically significant differences between test groups in terms of cervical interfacial sealing ability (p > 0.05). A two-way ANOVA revealed that no statistically significant differences between test groups including the control group existed in terms of the fracture resistance testing (p > 0.05). Conclusions: Although it does not improve tooth fracture resistance, the contracted endodontic access cavity does not deteriorate the quality of obturation in terms of the interfacial porosity. The self-adhesive composite does not improve the efficiency of cervical interfacial adaptation or tooth fracture resistance regardless of the endodontic access cavity shape, yet it revealed a substantial load-bearing capacity. Full article
(This article belongs to the Special Issue Current Topics in Endodontics)
16 pages, 912 KiB  
Article
Health-Related Quality of Life in Rugby Athletes: The Role of Dietary Supplements and Their Consumption
by Walter Sapuppo, Antonietta Monda, Davide Giacconi, Regina Gregori Grgič, Daniele Saccenti, Claudia Maria Mineo, Vincenzo Monda, Salvatore Allocca, Maria Casillo, Marcellino Monda, Girolamo Di Maio and Marco La Marra
Sports 2024, 12(10), 270; https://doi.org/10.3390/sports12100270 - 8 Oct 2024
Viewed by 232
Abstract
This study investigates dietary supplement use among rugby players and their general health, focusing on prevalence and underlying motivations. Involving 92 athletes, it examines the relationship between supplement usage, motivations, and health outcomes using the 36-item Short Form Health Survey and a 24-item [...] Read more.
This study investigates dietary supplement use among rugby players and their general health, focusing on prevalence and underlying motivations. Involving 92 athletes, it examines the relationship between supplement usage, motivations, and health outcomes using the 36-item Short Form Health Survey and a 24-item ad hoc questionnaire. Findings reveal a high frequency of supplement usage, motivated by desires to enhance performance, appearance, and mood. Significant differences in health-related quality of life are found between users and non-users, particularly in mental health, social functioning, and emotional stability. Motivations like performance enhancement and body shape manipulation were linked to altered health perceptions, indicating the psychosocial impacts of supplementation. This study emphasizes the need to consider the holistic effects of supplements on athlete well-being, advocating for a balanced approach prioritizing both physical and mental health. It calls for increased awareness among athletes, coaches, and sports professionals about the potential risks and benefits of supplement use and the importance of informed decision-making. Additionally, it highlights the need for further research to understand the mechanisms of supplement use and its impact on athlete health, aiming to enhance sports science and promote overall athlete well-being in competitive environments. Full article
(This article belongs to the Special Issue Exploring the Role of Acute Supplementation in Exercise Performance)
Show Figures

Figure 1

Figure 1
<p>Box plots representing the mean (in red) of general health-related scores obtained by subjects who reported supplements and/or other substance consumption versus subjects who reported not consuming supplements and/or other substances. The SF-36 global score was compared between the two groups (<b>a</b>), as well as the following domains: mental health (<b>b</b>), social functioning (<b>c</b>), and role emotional (<b>d</b>). * = <span class="html-italic">p</span> &lt; 0.05, *** = <span class="html-italic">p</span> &lt; 0.001.</p>
Full article ">Figure 2
<p>Box plots representing the mean (in red) of general health-related scores obtained by athletes according to their self-reported motivation behind supplements and/or other substance intake, controlling for age. The SF-36 global score was compared between the groups (<b>a</b>), as well as the role emotional domain (<b>b</b>). * = <span class="html-italic">p</span> &lt; 0.05, ** = <span class="html-italic">p</span> &lt; 0.01.</p>
Full article ">
16 pages, 275 KiB  
Article
A Cross-Entropy Approach to the Domination Problem and Its Variants
by Ryan Burdett, Michael Haythorpe and Alex Newcombe
Entropy 2024, 26(10), 844; https://doi.org/10.3390/e26100844 - 6 Oct 2024
Viewed by 283
Abstract
The domination problem and three of its variants (total domination, 2-domination, and secure domination) are considered. These problems have various real-world applications, including error correction codes, ad hoc routing for wireless networks, and social network analysis, among others. However, each of them is [...] Read more.
The domination problem and three of its variants (total domination, 2-domination, and secure domination) are considered. These problems have various real-world applications, including error correction codes, ad hoc routing for wireless networks, and social network analysis, among others. However, each of them is NP-hard to solve to provable optimality, making fast heuristics for these problems desirable. There are a wealth of highly developed heuristics and approximation algorithms for the domination problem; however, such heuristics are much less common for variants of the domination problem. We redress this gap in the literature by proposing a novel implementation of the cross-entropy method that can be applied to any sensible variant of domination. We present results from experiments that demonstrate that this approach can produce good results in an efficient manner even for larger graphs and that it works roughly as well for any of the domination variants considered. Full article
Show Figures

Figure 1

Figure 1
<p>Results for square grid graphs <math display="inline"><semantics> <mrow> <mi>G</mi> <mo>(</mo> <mi>n</mi> <mo>,</mo> <mi>n</mi> <mo>)</mo> </mrow> </semantics></math>. The size of the best solutions returned by the cross-entropy method is displayed using a dotted line, while the size of the best solutions returned by the greedy heuristic is displayed using a dashdotted line. The known optimal values are displayed using a solid line. In the case of secure domination, a dashed line is used for the upper bounds obtained by CPLEX after 10,000 s.</p>
Full article ">Figure 2
<p>Results for flower snarks <math display="inline"><semantics> <mrow> <mi>J</mi> <mo>(</mo> <mi>k</mi> <mo>)</mo> </mrow> </semantics></math>. The size of the best solutions returned by the cross-entropy method is displayed using a dotted line, while the size of the best solutions returned by the greedy heuristic is displayed using a dashdotted line. The known optimal values are displayed using a solid line.</p>
Full article ">Figure 3
<p>Average runtime in seconds for a single run of the cross-entropy algorithm on square grid graphs <math display="inline"><semantics> <mrow> <mi>G</mi> <mo>(</mo> <mi>n</mi> <mo>,</mo> <mi>n</mi> <mo>)</mo> </mrow> </semantics></math> for the different variants of domination. The solid line corresponds to the domination problem; the dashed line to total domination; the dotted line to 2-domination; and the dashdotted line to secure domination.</p>
Full article ">
37 pages, 1076 KiB  
Article
Distributed Ledger-Based Authentication and Authorization of IoT Devices in Federated Environments
by Michał Jarosz, Konrad Wrona and Zbigniew Zieliński
Electronics 2024, 13(19), 3932; https://doi.org/10.3390/electronics13193932 - 4 Oct 2024
Viewed by 407
Abstract
One of the main security challenges when federating separate Internet of Things (IoT) administrative domains is effective Identity and Access Management, which is required to establish trust and secure communication between federated IoT devices. The primary goal of the work is to develop [...] Read more.
One of the main security challenges when federating separate Internet of Things (IoT) administrative domains is effective Identity and Access Management, which is required to establish trust and secure communication between federated IoT devices. The primary goal of the work is to develop a “lightweight” protocol to enable authentication and authorization of IoT devices in federated environments and ensure the secure communication of IoT devices. We propose a novel Lightweight Authentication and Authorization Framework for Federated IoT (LAAFFI) which takes advantage of the unique fingerprint of IoT devices based on their configuration and additional hardware modules, such as Physical Unclonable Function, to provide flexible authentication and authorization based on Distributed Ledger technology. Moreover, LAAFFI supports IoT devices with limited computing resources and devices not equipped with secure storage space. We implemented a prototype of LAAFFI and evaluated its performance in the Hyperledger Fabric-based IoT framework. Three main metrics were evaluated: latency, throughput (number of operations or transactions per second), and network resource utilization rate (transmission overhead introduced by the LAAFFI protocol). The performance tests conducted confirmed the high efficiency and suitability of the protocol for federated IoT environments. Also, all LAAFFI components are scalable as confirmed by tests. We formally evaluated LAAFFI security using Verifpal as a formal verification tool. Based on the models developed for Verifpal, we validated their security properties, such as message secrecy, authenticity, and freshness. Our results show that the proposed solution can improve the security of federated IoT environments while providing zero-day interoperability and high scalability. Compared to existing solutions, LAAFFI is more efficient due to the use of symmetric cryptography and algorithms adapted for operations involving IoT devices. LAAFFI supports multiple authorization mechanisms, and since it also offers authentication and accountability, it meets the requirements of Authentication, Authorization and Accounting (AAA). It uses Distributed Ledger (DL) and smart contracts to ensure that the request complies with the policies agreed between the organizations. LAAFFI offers authentication of devices belonging to a single organization and different organizations, with the assurance that the encryption key will be shared with another device only if the appropriate security policy is met. The proposed protocol is particularly useful for ensuring the security of federated IoT environments created ad hoc for special missions, e.g., operations conducted by NATO countries and disaster relief operations Humanitarian Assistance and Disaster Relief (HADR) involving military forces and civilian services, where immediate interoperability is required. Full article
(This article belongs to the Special Issue Security and Trust in Internet of Things and Edge Computing)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Communication between the IoT device and a ledger node during the registration phase.</p>
Full article ">Figure 2
<p>Communication between an IoT device and the distributed ledger.</p>
Full article ">Figure 3
<p>The procedure of communication between IoT devices.</p>
Full article ">Figure 4
<p>The method of generating pseudorandom numbers in the Linux operating system since version 5.6. Source: Own design based on [<a href="#B12-electronics-13-03932" class="html-bibr">12</a>].</p>
Full article ">Figure 5
<p>A federated IoT network with two organizations with two DL nodes each.</p>
Full article ">Figure 6
<p>Overhead data transferred during our tests.</p>
Full article ">
30 pages, 1625 KiB  
Article
A Robust Routing Protocol in Cognitive Unmanned Aerial Vehicular Networks
by Anatte Rozario, Ehasan Ahmed and Nafees Mansoor
Sensors 2024, 24(19), 6334; https://doi.org/10.3390/s24196334 - 30 Sep 2024
Viewed by 485
Abstract
The adoption of UAVs in defence and civilian sectors necessitates robust communication networks. This paper presents a routing protocol for Cognitive Radio Unmanned Aerial Vehicles (CR-UAVs) in Flying Ad-hoc Networks (FANETs). The protocol is engineered to optimize route selection by considering crucial parameters [...] Read more.
The adoption of UAVs in defence and civilian sectors necessitates robust communication networks. This paper presents a routing protocol for Cognitive Radio Unmanned Aerial Vehicles (CR-UAVs) in Flying Ad-hoc Networks (FANETs). The protocol is engineered to optimize route selection by considering crucial parameters such as distance, speed, link quality, and energy consumption. A standout feature is the introduction of the Central Node Resolution Factor (CNRF), which enhances routing decisions. Leveraging the Received Signal Strength Indicator (RSSI) enables accurate distance estimation, crucial for effective routing. Moreover, predictive algorithms are integrated to tackle the challenges posed by high mobility scenarios. Security measures include the identification of malicious nodes, while the protocol ensures resilience by managing multiple routes. Furthermore, it addresses route maintenance and handles link failures efficiently, cluster formation, and re-clustering with joining and leaving new nodes along with the predictive algorithm. Simulation results showcase the protocol’s self-comparison under different packet sizes, particularly in terms of end-to-end delay, throughput, packet delivery ratio, and normalized routing load. However, superior performance compared to existing methods, particularly in terms of throughput and packet transmission delay, underscoring its potential for widespread adoption in both defence and civilian UAV applications. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

Figure 1
<p>Various Connectivities of UAVs.</p>
Full article ">Figure 2
<p>Overview of the Proposed Clustering scheme.</p>
Full article ">Figure 3
<p>Scenario of communication between GS and CNs.</p>
Full article ">Figure 4
<p>(<b>a</b>) Bipartite Graph formation by node <math display="inline"><semantics> <mrow> <mi>U</mi> <msub> <mi>N</mi> <mi>a</mi> </msub> </mrow> </semantics></math>, (<b>b</b>) Maximum edge Biclique graph of node <math display="inline"><semantics> <mrow> <mi>U</mi> <msub> <mi>N</mi> <mi>a</mi> </msub> </mrow> </semantics></math>, (<b>c</b>) Nodes with CNRF value, (<b>d</b>) Proposed cluster-based network.</p>
Full article ">Figure 5
<p>Comparison of End to End Delay for packet sizes of 512 and 1024.</p>
Full article ">Figure 6
<p>Comparison of throughput for packet sizes of 512 and 1024.</p>
Full article ">Figure 7
<p>Comparison of packet delivery ratios for packet sizes of 512 and 1024.</p>
Full article ">Figure 8
<p>Comparison of normalized routing loads for packet sizes of 512 and 1024.</p>
Full article ">Figure 9
<p>Number of Nodes vs. Delay.</p>
Full article ">Figure 10
<p>Number of nodes vs. Throughput.</p>
Full article ">Figure 11
<p>OLSR+GPSR vs. Proposed protocol Overhead.</p>
Full article ">Figure 12
<p>OLSR+GPSR vs. Proposed protocol Throughput.</p>
Full article ">Figure 13
<p>OLSR+GPSR vs. Proposed protocol Packet Delivery Ratio.</p>
Full article ">Figure 14
<p>OLSR+GPSR vs. Proposed protocol End-to-End Delay.</p>
Full article ">
22 pages, 1246 KiB  
Article
SROR: A Secure and Reliable Opportunistic Routing for VANETs
by Huibin Xu and Ying Wang
Vehicles 2024, 6(4), 1730-1751; https://doi.org/10.3390/vehicles6040084 - 30 Sep 2024
Viewed by 321
Abstract
In Vehicular Ad Hoc Networks (VANETs), high mobility of vehicles issues a huge challenge to the reliability and security of transmitting packets. Therefore, a Secure and Reliable Opportunistic Routing (SROR) is proposed in this paper. During construction of Candidate Forwarding Nodes (CFNs) set, [...] Read more.
In Vehicular Ad Hoc Networks (VANETs), high mobility of vehicles issues a huge challenge to the reliability and security of transmitting packets. Therefore, a Secure and Reliable Opportunistic Routing (SROR) is proposed in this paper. During construction of Candidate Forwarding Nodes (CFNs) set, the relative velocity, connectivity probability, and packet forwarding ratio are taken into consideration. The aim of SROR is to maximally improve the packet delivery ratio as well as reduce the end-to-end delay. The selection of a relay node from CFNs is formalized as a Markov Decision Process (MDP) optimization. The SROR algorithm extracts useful knowledge from historical behavior of nodes by interacting with the environment. This useful knowledge are utilized to select the relay node as well as to prevent the malicious nodes from forwarding packets. In addition, the influence of different learning rate and exploratory factor policy on rewards of agents are analyzed. The experimental results show that the performance of SROR outperforms the benchmarks in terms of the packet delivery ratio, end-to-end delay, and attack success ratio. As vehicle density ranges from 10 to 50 and percentage of malicious vehicles is fixed at 10%, the average of packet delivery ratio, end-to-end delay, and attack success ratio are 0.82, 0.26s, and 0.37, respectively, outperforming benchmark protocols. Full article
Show Figures

Figure 1

Figure 1
<p>A typical network structure of VANETs.</p>
Full article ">Figure 2
<p>System model.</p>
Full article ">Figure 3
<p>The idea of opportunistic routing.</p>
Full article ">Figure 4
<p>An <span class="html-italic">m</span> hops path from a source node to its destination.</p>
Full article ">Figure 5
<p>Structure of SROR.</p>
Full article ">Figure 6
<p>Learning rate for OneCycleLR policy: (<b>a</b>) from episode 1 to 20,000; (<b>b</b>) from episode 12,000 to 20,000.</p>
Full article ">Figure 7
<p>Average reward and cumulative rewards for the OneCycleLR policy. (<b>a</b>) Average reward. (<b>b</b>) Cumulative rewards.</p>
Full article ">Figure 8
<p>Effect of <math display="inline"><semantics> <mi>ε</mi> </semantics></math> on reward. (<b>a</b>) Average reward. (<b>b</b>) Cumulative rewards.</p>
Full article ">Figure 9
<p>Comparison of the performance under different vehicle densities. (<b>a</b>) Packet delivery ratio. (<b>b</b>) End-to-end delay. (<b>c</b>) Attack success ratio.</p>
Full article ">Figure 10
<p>Comparison of the performance under different <math display="inline"><semantics> <mi>σ</mi> </semantics></math>. (<b>a</b>) Packet delivery ratio. (<b>b</b>) End-to-end delay. (<b>c</b>) Attack success ratio.</p>
Full article ">
14 pages, 211 KiB  
Article
Fetishism for Our Times: A Rhetorical and Philosophical Exploration
by Timo Airaksinen
Religions 2024, 15(10), 1192; https://doi.org/10.3390/rel15101192 - 30 Sep 2024
Viewed by 289
Abstract
This article develops a detailed theory of the fetishes of the modern world. Fetishes may still have their original religious application as talismans and totems, but their actual range is much wider, as I illustrate. I show that a modern fetish satisfies our [...] Read more.
This article develops a detailed theory of the fetishes of the modern world. Fetishes may still have their original religious application as talismans and totems, but their actual range is much wider, as I illustrate. I show that a modern fetish satisfies our needs in an unexpected and unlikely manner: it does what it, prima facie, is not supposed to do. How does this happen? To explain, we must trace the construction of fetishes; I do this using some key rhetorical concepts. Paradiastole is a technique of evaluative redescription. It describes the world in value terms as something it is not—we can then ironize the result. If it serves the speakers’ essential interests and satisfies their desires, we have explained a fetish as a good-maker. The fetishization of an object, because of its ironic background, tends to invite critical, meiotic, and even derogatory responses—usually, the issue is and remains essentially contested. For example, early Christians wrote hagiographies that treated some people as saints, thus creating ad hoc beliefs that satisfied their religious interests. I also suggest a different, metonymic understanding of fetishes and their educational benefits. Perhaps my theory is overly permissive, allowing too many fetishes. My final conjecture is that true fetishes function as identity markers; for example, the crucifix is a fetish that defines Christianity. Full article
(This article belongs to the Section Religions and Humanities/Philosophies)
11 pages, 1393 KiB  
Article
Effect of the Organizational Model of the Subject of Activities in the Natural Environment on Students’ Satisfaction and Learning
by Virginia Gómez-Barrios, Lázaro Mediavilla-Saldaña, Vicente Gómez-Encinas and Juan José Salinero
Sustainability 2024, 16(19), 8501; https://doi.org/10.3390/su16198501 - 29 Sep 2024
Viewed by 425
Abstract
The aim of this study was to identify the most suitable organizational model for teaching the university subject of Outdoor Activities in relation to learning acquisition and satisfaction. For this purpose, four models were designed, some of which were dominated by traditional education [...] Read more.
The aim of this study was to identify the most suitable organizational model for teaching the university subject of Outdoor Activities in relation to learning acquisition and satisfaction. For this purpose, four models were designed, some of which were dominated by traditional education and others by innovative education. The data collection instruments were the Spanish version of the Physical Education of the Sport Satisfaction Instrument, adapted to the university context, and the questionnaire on the contents of the subject designed ad hoc. Data collection was carried out before and after the intervention with a total of 125 students. For data analysis, an ANCOVA was performed. The results showed that there were significant differences in satisfaction between groups (p = 0.029), but not in the boredom scale (p = 0.109). With regard to acquisition of learning between groups, there were significant differences (p = 0.005) in the overall grade of the subject. There were also significant differences in the scores for content taught differently depending on the group (p = 0.003), with a higher score in the most innovative group, the intensive-continuous group, compared to the fractioned (p = 0.005) and classic groups (p = 0.015). It is concluded that there is a positive effect between direct and continuous contact with nature, both in the acquisition of learning and in student satisfaction, with the most innovative model obtaining the best results of the study. Full article
(This article belongs to the Special Issue Sustainable Quality Education: Innovations, Challenges, and Practices)
Show Figures

Figure 1

Figure 1
<p>Research process.</p>
Full article ">Figure 2
<p>Results by groups on the variable of satisfaction and boredom. Note: <sup>b</sup> significant differences with respect to group intensive-continuous (<span class="html-italic">p</span> &lt; 0.05).</p>
Full article ">
32 pages, 452 KiB  
Article
Some Combined Results from Eneström–Kakeya and Rouché Theorems on the Generalized Schur Stability of Polynomials and the Stability of Quasi-Polynomials-Application to Time-Delay Systems
by Manuel De la Sen
Mathematics 2024, 12(19), 3023; https://doi.org/10.3390/math12193023 - 27 Sep 2024
Viewed by 255
Abstract
This paper derives some generalized Schur-type stability results of polynomials based on several forms and generalizations of the Eneström–Kakeya theorem combined with the Rouché theorem. It is first investigated, under sufficiency-type conditions, the derivation of the eventually generalized Schur stability sufficient conditions which [...] Read more.
This paper derives some generalized Schur-type stability results of polynomials based on several forms and generalizations of the Eneström–Kakeya theorem combined with the Rouché theorem. It is first investigated, under sufficiency-type conditions, the derivation of the eventually generalized Schur stability sufficient conditions which are not necessarily related to the zeros of the polynomial lying in the unit open circle. In a second step, further sufficient conditions were introduced to guarantee that the above generalized Schur stability property persists within either the same above complex nominal stability region or in some larger one. The classical weak and, respectively, strong Schur stability in the closed and, respectively, open complex unit circle centred at zero are particular cases of their corresponding generalized versions. Some of the obtained and proved results are further generalized “ad hoc” for the case of quasi-polynomials whose zeros might be interpreted, in some typical cases, as characteristic zeros of linear continuous-time delayed time-invariant dynamic systems with commensurate constant point delays. Full article
10 pages, 218 KiB  
Article
Antimicrobial Use in Cats in a University Veterinary Hospital in Central Italy: A Retrospective Study
by Matilde Vernaccini, Lucia De Marchi, Angela Briganti, Ilaria Lippi, Veronica Marchetti, Valentina Meucci and Luigi Intorre
Antibiotics 2024, 13(10), 927; https://doi.org/10.3390/antibiotics13100927 - 27 Sep 2024
Viewed by 594
Abstract
Background: Monitoring antimicrobial use is crucial for understanding current prescribing practices. Such information helps in establishing stewardship programs for effectively using antimicrobials and combating resistance to them. Objectives: This study describes how antimicrobials are prescribed at the Veterinary Teaching Hospital of the University [...] Read more.
Background: Monitoring antimicrobial use is crucial for understanding current prescribing practices. Such information helps in establishing stewardship programs for effectively using antimicrobials and combating resistance to them. Objectives: This study describes how antimicrobials are prescribed at the Veterinary Teaching Hospital of the University of Pisa and compares how the internal medicine and intensive care units differ in their usage of antimicrobials. Methods: The study involved cats that were presented in the units in 2021 and 2022. Antimicrobial prescriptions were obtained via the hospital’s management software (OCIROE). Results: In a population of 1164 non-surgical cats with 397 antimicrobials prescribed, the most prescribed ones were amoxicillin–clavulanic acid in the internal medicine unit and ampicillin in the intensive care unit. Twenty-five percent of all antimicrobials were Highest-Priority Critically Important Antimicrobials or Antimicrobial Advice Ad Hoc Expert Group Category B. The oral route was the main route of administration in the internal medicine unit, while parenteral was the most common route used in the intensive care unit. Most antimicrobials were prescribed to treat pathologic conditions affecting the urinary (39%), gastroenteric (21%), respiratory (13%), and integumentary (12%) systems. A diagnosis, accurate dosage, and the use of species-approved medications were recorded in the antimicrobial prescriptions. However, only 11% of these prescriptions were supported by antimicrobial susceptibility tests. Conclusions: These results suggest room for improvement, particularly in increasing the use of antimicrobial susceptibility testing to ensure more targeted antimicrobial therapy. Given the importance of antimicrobial resistance and the One Health approach, the study also highlights the need to consider the broader impact of antimicrobial use in animals, including the potential contribution to resistance in bacteria that affect both animal and human health. Full article
(This article belongs to the Section Antibiotics Use and Antimicrobial Stewardship)
9 pages, 228 KiB  
Article
Lifestyle Intervention to Promote an Adequate Gestational Weight Gain and Improve Perinatal Outcomes in a Cohort of Obese Women
by Daniela Menichini, Eleonora Spelta, Francesca Monari, Elisabetta Petrella, Fabio Facchinetti and Isabella Neri
Nutrients 2024, 16(19), 3261; https://doi.org/10.3390/nu16193261 - 26 Sep 2024
Viewed by 374
Abstract
Objective: This study aims to evaluate the correlation of gestational weight gain (GWG) with pregnancy and perinatal outcomes in a cohort of obese women class I-III receiving standard care (SC) or lifestyle intervention (LI). Methods: This is a prospective cohort study including singleton [...] Read more.
Objective: This study aims to evaluate the correlation of gestational weight gain (GWG) with pregnancy and perinatal outcomes in a cohort of obese women class I-III receiving standard care (SC) or lifestyle intervention (LI). Methods: This is a prospective cohort study including singleton obese women (body mass index, BMI ≥ 30) who delivered between 2016 and 2020. Women exposed to a LI were referred to an obesity weight management ad hoc clinic. Women followed by family centers or private settings represented the SC group. The LI started between the 9 and 12th week, consisting of a low-calorie diet and physical activity program. Pregnancy and perinatal outcomes were prospectively collected. Women included in the SC group were followed, simply checking their pregnancy and health status, providing general recommendations on a healthy lifestyle in pregnancy. GWG was categorized as insufficient, adequate, or excessive according to the Institute of Medicine (IOM). Results: A total of 1874 obese singleton women delivered in the study period. Among them, 565 (30.1%) were included in the LI while 1309 received SC. Women in SC showed a higher rate of GWG out of the IOM recommendations (excessive/insufficient), while women in the LI group showed higher adequate GWG. The small-for-gestational-age (SGA) rate resulted to be higher in the SC group. Once adjusting for age, BMI, country of origin, provider, and gestational hypertension, the risk for SGA was increased by insufficient GWG (OR = 1.25; 95%CI: 1.03–1.59), while it was reduced by LI (OR = 0.67, 95%CI: 0.42–0.98). Conclusions: In a cohort of obese women, the exposure to an LI was associated with more adequate GWG, reduced insufficient weight gain, and a decreased risk of SGA infants. Full article
(This article belongs to the Section Nutrition and Obesity)
16 pages, 1697 KiB  
Article
Effects of Hyaluronic Acid (HA) and Platelet-Rich Plasma (PRP) on Mandibular Mobility in Temporomandibular Joint Disorders: A Controlled Clinical Trial
by Maciej Chęciński, Dariusz Chlubek and Maciej Sikora
Biomolecules 2024, 14(10), 1216; https://doi.org/10.3390/biom14101216 - 26 Sep 2024
Viewed by 387
Abstract
Hyaluronic acid (HA) is a glycosaminoglycan composed of D-glucuronic acid and N-acetylglucosamine with an up-to-several-million-Daltons chain-length responsible for the lubricating properties of the temporomandibular joint (TMJ) synovial fluid. Arthritis results in the predominance of HA degradation over synthesis leading to temporomandibular disorders (TMDs). [...] Read more.
Hyaluronic acid (HA) is a glycosaminoglycan composed of D-glucuronic acid and N-acetylglucosamine with an up-to-several-million-Daltons chain-length responsible for the lubricating properties of the temporomandibular joint (TMJ) synovial fluid. Arthritis results in the predominance of HA degradation over synthesis leading to temporomandibular disorders (TMDs). TMD injection treatments are divided into HA supplementation and platelet-rich plasma (PRP) inflammation suppression. We questioned whether either approach lubricated the TMJ better and answered it in a two-arm equal-allocation trial with a non-concurrent active treatment control (two groups of 39 patients each). HA statistically significantly improved (p < 0.01) and PRP did not statistically significantly change (0.06 ≤ p ≤ 0.53) articular mobility compared to baselines in 128 TMJs. Statistically significant inter-group discrepancies were observed for abduction (MD = −4.05 mm; SE = 1.08; p = 0.00; d = −0.85) and protrusion (MD = −0.97 mm; SE = 0.43; p = 0.03; d = −0.51) but not for rightward (MD = −0.21; SE = 0.43; p = 0.63; d = −0.11) and leftward (MD = −0.30; SE = 0.42; p = 0.47; d = −0.16) movements. HA supplementation proved superior to PRP autografting in ad hoc TMJ lubrication and hence is more appropriate in hypomobile TMD cases of symptomatic treatment. Full article
Show Figures

Figure 1

Figure 1
<p>Articular surface. Adapted. Author: Mfigueiredo. License: CC BY-SA 3.0 (<a href="https://creativecommons.org/licenses/by-sa/3.0/" target="_blank">https://creativecommons.org/licenses/by-sa/3.0/</a>) [<a href="#B29-biomolecules-14-01216" class="html-bibr">29</a>].</p>
Full article ">Figure 2
<p>Flow diagram.</p>
Full article ">Figure 3
<p>Distribution of baselines, quantified at 2 mm intervals. Abduction values scaled down by a factor of 10 for visualization consistency, with all other variables presented without scaling.</p>
Full article ">Figure 4
<p>Mandibular abduction change compared to initial mandibular abduction.</p>
Full article ">
12 pages, 1374 KiB  
Article
Can Pest Management and Cultivar Affect Phytoptus avellanae Infestations on Hazelnut?
by Mario Contarini, Roberto Masturzi, Eleonora Iezzi, Miloš Petrović, Cristian Silvestri, Silvia Turco, Stefano Speranza and Luca Rossini
Insects 2024, 15(10), 740; https://doi.org/10.3390/insects15100740 - 26 Sep 2024
Viewed by 349
Abstract
The big bud mite Phytoptus avellanae is a resurgent pest of hazelnut, Corylus avellana, causing substantial yields reductions in many productive areas. Mites colonise and develop within healthy buds which become swollen, with subsequent alteration to the plant’s development. To date, there [...] Read more.
The big bud mite Phytoptus avellanae is a resurgent pest of hazelnut, Corylus avellana, causing substantial yields reductions in many productive areas. Mites colonise and develop within healthy buds which become swollen, with subsequent alteration to the plant’s development. To date, there has been limited knowledge on how the cultivar and pest management strategies affect infestations. This study explored these aspects through two ad hoc experiments carried out in central Italy. In the first experiment, the susceptibility of 11 cultivars with different geographic origins was tested in a germplasm hazelnut collection. The second experiment assessed the infestation level in orchards with integrated pest management (IPM) and organic pest management strategies and in a renaturalised environment (a former agricultural area now converted in a natural park). The results showed that the most and the least susceptible cultivars were Tonda Gentile and Nocchione, respectively. No significant differences were found between IPM and organic management, but they were both different to the renaturalised environment. The outcomes of this research can serve as a valuable reference and can be applied to all current or potential hazelnut cultivation areas characterised by the same environmental conditions. Full article
(This article belongs to the Special Issue Resilient Tree Nut Agroecosystems under Changing Climate)
Show Figures

Figure 1

Figure 1
<p>Infestation level of the 11 cultivars at “Le Cese” varietal collection, over the two years of observations, 2023 and 2024. Lines inside the boxes indicate the median values and the points outside represent the outliers. The whiskers include 95% of the data. Different letters indicate significant difference between cultivars after Bonferroni post hoc test (<span class="html-italic">p</span> &lt; 0.05).</p>
Full article ">Figure 2
<p>Infestation level in the orchards with organic, IPM, and renaturalised management. (<b>A</b>) growing season of 2023, (<b>B</b>) growing season of 2024. The lines inside the boxes indicate the median values and the points outside represent the outliers. The whiskers include 95% of the data. Different letters indicate significant difference between cultivars after Bonferroni post hoc test (<span class="html-italic">p</span> &lt; 0.05).</p>
Full article ">
20 pages, 1008 KiB  
Article
Dynamics of Blood Flows in the Cardiocirculatory System
by Maria Pia D’Arienzo and Luigi Rarità
Computation 2024, 12(10), 194; https://doi.org/10.3390/computation12100194 - 25 Sep 2024
Viewed by 357
Abstract
Models and simulations of blood flow in vascular networks are useful to deepen knowledge of cardiovascular diseases. This paper considers a model based on partial differential equations that mimic the dynamics of vascular networks in terms of flow velocities and arterial pressures. Such [...] Read more.
Models and simulations of blood flow in vascular networks are useful to deepen knowledge of cardiovascular diseases. This paper considers a model based on partial differential equations that mimic the dynamics of vascular networks in terms of flow velocities and arterial pressures. Such quantities are found by using ad hoc numerical schemes to examine variations in the pressure and homeostatic conditions of a whole organism. Two different case studies are examined. The former uses 15 arteries—a network that shows the real oscillations in pressures and velocities due to variations in artery volume. The latter focuses on the 55 principal arteries, and blood flows are studied by using a model of a heart valve that opens and closes via the differences in the aortic and left ventricle pressures. This last case confirms the possibility of autonomously regulating blood pressure and velocity in arteries in general and when tilt tests are applied to patients. Full article
(This article belongs to the Section Computational Engineering)
Show Figures

Figure 1

Figure 1
<p>(<b>Left</b>) 15-edged network. (<b>Right</b>) Network with main arteries.</p>
Full article ">Figure 2
<p>Pressure vs. time (in blue) and flow velocity vs. time (in red), assuming <math display="inline"><semantics> <mrow> <msub> <mi>R</mi> <mi>μ</mi> </msub> <mo>=</mo> <mn>0.75</mn> </mrow> </semantics></math> for edge 5 for 30 s of simulation.</p>
Full article ">Figure 3
<p>Edge 5; <math display="inline"><semantics> <mrow> <msub> <mi>R</mi> <mi>μ</mi> </msub> <mo>=</mo> <mn>0.75</mn> </mrow> </semantics></math>; a 15 s simulation of pressure (blue) and flow velocity (red).</p>
Full article ">Figure 4
<p>Pressure vs. time (in blue) and flow velocity vs. time (in red), assuming <math display="inline"><semantics> <mrow> <msub> <mi>R</mi> <mi>μ</mi> </msub> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math> for edge 5 for 30 s of simulation.</p>
Full article ">Figure 5
<p>Edge 13; <math display="inline"><semantics> <mrow> <msub> <mi>R</mi> <mi>μ</mi> </msub> <mo>=</mo> <mn>0.75</mn> </mrow> </semantics></math>; simulation of pressure (blue) and flow velocity (red).</p>
Full article ">Figure 6
<p>Pressure vs. time (in blue) and flow velocity vs. time (in red), assuming <math display="inline"><semantics> <mrow> <msub> <mi>R</mi> <mi>μ</mi> </msub> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math> for edge 9.</p>
Full article ">Figure 7
<p>Flow velocity (blue); arterial and left ventricular pressures (red and black, respectively) for the ascending aorta (artery 1).</p>
Full article ">Figure 8
<p>Evolution of flow velocity (blue), left ventricular pressure (black), and arterial pressure (red) for the intercostal artery, i.e., artery 26 (represented on the left), and for the anterior tibial edge, i.e., artery 49 (depicted on the right).</p>
Full article ">Figure 9
<p>Flow velocity (blue); arterial and left ventricular pressures (red and black) for edges 7 (on the left) and 18 (on the right).</p>
Full article ">Figure 10
<p>Intercostal artery, i.e., artery 26: Effects of a tilt (variation in black) on arterial pressure (on the left) and flow velocity (on the right).</p>
Full article ">
11 pages, 302 KiB  
Article
Association between Academic Performance, Physical Activity, and Academic Stress in Compulsory Secondary Education: An Analysis by Sex
by Dilan Galeano-Rojas, Marina Cuadros-Juárez, Borys Bismark León Reyes, Mónica Alexandra Castelo Reyna, Claudio Farías-Valenzuela and Pedro Valdivia-Moral
Children 2024, 11(10), 1161; https://doi.org/10.3390/children11101161 - 25 Sep 2024
Viewed by 1408
Abstract
Objectives: The main objective of this study is to analyze the relationships between academic performance, physical activity, and academic stress in secondary education students, while the secondary objective is to establish differences by gender in the physical activity and academic stress levels of [...] Read more.
Objectives: The main objective of this study is to analyze the relationships between academic performance, physical activity, and academic stress in secondary education students, while the secondary objective is to establish differences by gender in the physical activity and academic stress levels of secondary students based on academic performance. Methods: The sample was composed of students from both sexes who attended public institutions. Data collection was conducted applying an ad hoc questionnaire for academic performance, the PAQ-C questionnaire for physical activity, and the QASSE questionnaire for academic stress. Data analysis was performed using descriptive statistics: Spearman’s correlation coefficient was used for associations, while comparisons were conducted via the Mann–Whitney U test and Kruskal–Wallis H test. Results: The results show that academic stress is negatively correlated with physical activity and academic performance. Men present significantly higher values in physical activity, while women present higher mean values in general academic stress and the academic overload dimension. Lastly, regarding academic performance, significant differences were observed in the family pressure dimension, with students who perform better academically presenting lower mean values in this dimension of academic stress. Conclusions: In conclusion, the more the general academic stress, the lower the physical activity levels and academic performance. In addition, physical activity appears as a potential coping strategy for academic stress, and its influence on academic performance should be further studied in secondary education. Full article
Back to TopTop