Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (6,185)

Search Parameters:
Keywords = authentication

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
26 pages, 1156 KiB  
Review
Digital Watermarking Technology for AI-Generated Images: A Survey
by Huixin Luo, Li Li and Juncheng Li
Mathematics 2025, 13(4), 651; https://doi.org/10.3390/math13040651 (registering DOI) - 16 Feb 2025
Abstract
The rapid advancement of AI-generated content (AIGC) has significantly improved the realism and accessibility of synthetic images. While large image generation models offer immense potential in creative industries, they also introduce serious challenges, including copyright infringement, content authentication, and the traceability of generated [...] Read more.
The rapid advancement of AI-generated content (AIGC) has significantly improved the realism and accessibility of synthetic images. While large image generation models offer immense potential in creative industries, they also introduce serious challenges, including copyright infringement, content authentication, and the traceability of generated images. Digital watermarking has emerged as a promising approach to address these concerns by embedding imperceptible yet detectable signatures into generated images. This survey provides a comprehensive review of three core areas: (1) the evolution of image generation technologies, highlighting key milestones such as the transition from GANs to diffusion models; (2) traditional and state-of-the-art digital image watermarking algorithms, encompassing spatial domain, transform domain, and deep learning-based approaches; (3) watermarking methods specific to AIGC, including ownership authentication of AI model and diffusion model, and watermarking of AI-generated images. Additionally, we examine common performance evaluation metrics used in this field, such as watermark capacity, watermark detection accuracy, fidelity, and robustness. Finally, we discuss the unresolved issues and propose several potential directions for future research. We look forward to this paper offering valuable reference for academics in the field of AIGC watermarking and related fields. Full article
13 pages, 246 KiB  
Article
Can Reading the Life of a Self-Abusive Visionary Make Sense Today?
by Mary Frohlich
Religions 2025, 16(2), 244; https://doi.org/10.3390/rel16020244 (registering DOI) - 16 Feb 2025
Abstract
The Autobiography of Saint Marguerite-Marie Alacoque recounts her many visions, ecstasies, and sufferings as she became God’s messenger, initiating the highly successful modern form of devotion to the Sacred Heart. Reading the Autobiography today is difficult, however. She constantly practices forms of obedience, [...] Read more.
The Autobiography of Saint Marguerite-Marie Alacoque recounts her many visions, ecstasies, and sufferings as she became God’s messenger, initiating the highly successful modern form of devotion to the Sacred Heart. Reading the Autobiography today is difficult, however. She constantly practices forms of obedience, self-control, and self-abuse that are offensive to today’s sensibilities. Her image of Jesus is as her “Master’ and “Sovereign” who desires and demands suffering on the part of those who love him. Her theology of the necessity of repairing God’s wounded honor by suffering is likewise outdated. Finally, the reliance of her message on visions does not inspire trust in an era that generally views visions as symptoms of pathology. This essay proposes that it is possible to discover authentic inspiration in the Autobiography by reading it with the help of several mediating theories. First, Hubert Hermans’ Dialogical Self Theory offers insight into traditional, modern, and postmodern styles of self-construction, thus situating Alacoque’s stories and practices within her time (at the cusp between traditional and modern styles) while offering a glimpse of how she can be understood within our time (at the cusp between modern and postmodern styles). Second, a historically contextualized eucharistic theology of embodied self-giving helps to see past the problematic elements of her theology. Finally, an ecotheological theory of visions suggests a way to understand her visions that may unveil their significance for our own time of crisis. Full article
(This article belongs to the Special Issue Imagining Ultimacy: Religious and Spiritual Experience in Literature)
28 pages, 7038 KiB  
Article
Kami Fumi-e: Japanese Paper Images to Be Trampled on—A Mystery Resolved
by Riccardo Montanari, Philippe Colomban, Maria Francesca Alberghina, Salvatore Schiavone and Claudia Pelosi
Heritage 2025, 8(2), 78; https://doi.org/10.3390/heritage8020078 (registering DOI) - 16 Feb 2025
Abstract
There has been long-standing debate as to whether Kami Fumi-e (paper images to be trampled on) had actually been used in image trampling sessions as part of the 250-year persecution of Christianity enforced by the Tokugawa Shogunate. Sacred images of Christianity officially [...] Read more.
There has been long-standing debate as to whether Kami Fumi-e (paper images to be trampled on) had actually been used in image trampling sessions as part of the 250-year persecution of Christianity enforced by the Tokugawa Shogunate. Sacred images of Christianity officially recorded to have been trampled on are housed in the permanent collection of the Tokyo National Museum and are almost uniquely made of metal alloy. The controversy regarding paper images, apart from the medium being considered unsuitable for such extreme use, was fueled by the appearance of a significant number of them in museum collections and institutions worldwide in the 20th century. Most of the prints bear dates from different eras of the Edo period, sometimes hundreds of years apart; therefore, long-standing arguments regarding their authenticity marked the last century. In order to distinguish later copies from potentially original pieces, if ever existed, XRF, Raman, and FTIR analytical techniques were used to study the materials characterizing them. In addition, detailed observation of the main visual features (overall design composition, inscriptions, paper support, etc.) was carried out to highlight potential discrepancies that could pair with scientific evidence and lead to a definitive conclusion. Full article
(This article belongs to the Collection Feature Papers)
37 pages, 1068 KiB  
Article
Why Do Tourists Visit the Food Market? A Host–Guest Sharing Model Based on the Theory of Self-Regulation
by Shiran Lin, He Zhu, Jiaming Liu, Fengjiao Li and Chenrouyu Zheng
Land 2025, 14(2), 407; https://doi.org/10.3390/land14020407 (registering DOI) - 15 Feb 2025
Abstract
The transformation of traditional food markets into urban tourism destinations has garnered increasing attention, yet the mechanisms driving tourist motivations remain underexplored. This study addresses this gap by proposing a host–guest sharing model grounded in the Theory of Self-Regulation (TSR). Employing a mixed-methods [...] Read more.
The transformation of traditional food markets into urban tourism destinations has garnered increasing attention, yet the mechanisms driving tourist motivations remain underexplored. This study addresses this gap by proposing a host–guest sharing model grounded in the Theory of Self-Regulation (TSR). Employing a mixed-methods approach, we first conducted grounded theory analysis on 358,700 words of travelogues, identifying six TSR-based constructs: host–guest sharing, sense of place, behavior attitude, desire, subjective norms, and behavioral intention. These constructs were then validated through structural equation modeling (SEM) using survey data from 416 tourists. Results indicate that host–guest sharing (β = 0.925) and sense of place (β = 0.947) are the primary drivers of tourist intention, mediated by behavior attitude (β = 0.662) and desire (β = 0.861). Subjective norms (β = 0.724) further reinforce intention formation. The findings highlight the centrality of authentic cultural experiences and resident–tourist interactions in shaping food market tourism. This research extends the TSR framework by integrating geographical and psychological perspectives and offering actionable insights for urban planners to enhance food markets as sustainable tourism attractions through improved service quality, cultural storytelling, and equitable space design. Full article
(This article belongs to the Section Land Planning and Landscape Architecture)
26 pages, 1000 KiB  
Article
The Impact of Multilevel Coaching on Pre-Service Teachers’ Fidelity of Implementation of an Evidence-Based Reading Intervention
by Corinne R. Kingsbery, Kristen D. Beach, Samantha A. Gesel, Charles L. Wood, Erin K. Washburn and Thomas Connors
Educ. Sci. 2025, 15(2), 244; https://doi.org/10.3390/educsci15020244 (registering DOI) - 15 Feb 2025
Abstract
Teacher preparation programs (TPPs) can equip pre-service teachers (PSTs) with skills to implement evidence-based reading interventions with fidelity by engaging PSTs in carefully designed clinical experiences with feedback via coaching. To individualize support and facilitate a responsive approach to feedback centered on PSTs’ [...] Read more.
Teacher preparation programs (TPPs) can equip pre-service teachers (PSTs) with skills to implement evidence-based reading interventions with fidelity by engaging PSTs in carefully designed clinical experiences with feedback via coaching. To individualize support and facilitate a responsive approach to feedback centered on PSTs’ levels of fidelity, first, this study examined the impact of a multilevel coaching intervention on PSTs’ fidelity of implementation of an evidence-based reading intervention during a tutoring clinical experience. Second, this study examined PSTs’ perceptions of the feasibility, effectiveness, and future impact of the multilevel coaching intervention. Results of a single-case, multiple baseline across participants design indicated a functional relation between the multilevel coaching intervention and PSTs’ fidelity, inclusive of both structural and process dimensions. Furthermore, PSTs found the multilevel coaching intervention to be socially valid, indicating the intervention was feasible, effective, and impactful on their future teaching experiences. Major implications for teacher preparation and coaching support include (a) providing PSTs with authentic clinical experiences, inclusive of coaching support, when implementing EBPs; (b) viewing fidelity as a multidimensional construct that can inform coaching support and teacher practices; and (c) enhancing TPPs with experiences that impact PSTs’ perceptions about their own ability to teach reading. Full article
33 pages, 861 KiB  
Article
Secure Electric Vehicle Charging Infrastructure in Smart Cities: A Blockchain-Based Smart Contract Approach
by Abdullahi Chowdhury, Sakib Shahriar Shafin, Saleh Masum, Joarder Kamruzzaman and Shi Dong
Smart Cities 2025, 8(1), 33; https://doi.org/10.3390/smartcities8010033 (registering DOI) - 15 Feb 2025
Abstract
Increasing adoption of electric vehicles (EVs) and the expansion of EV charging infrastructure present opportunities for enhancing sustainable transportation within smart cities. However, the interconnected nature of EV charging stations (EVCSs) exposes this infrastructure to various cyber threats, including false data injection, man-in-the-middle [...] Read more.
Increasing adoption of electric vehicles (EVs) and the expansion of EV charging infrastructure present opportunities for enhancing sustainable transportation within smart cities. However, the interconnected nature of EV charging stations (EVCSs) exposes this infrastructure to various cyber threats, including false data injection, man-in-the-middle attacks, malware intrusions, and denial of service attacks. Financial attacks, such as false billing and theft of credit card information, also pose significant risks to EV users. In this work, we propose a Hyperledger Fabric-based blockchain network for EVCSs to mitigate these risks. The proposed blockchain network utilizes smart contracts to manage key processes such as authentication, charging session management, and payment verification in a secure and decentralized manner. By detecting and mitigating malicious data tampering or unauthorized access, the blockchain system enhances the resilience of EVCS networks. A comparative analysis of pre- and post-implementation of the proposed blockchain network demonstrates how it thwarts current cyberattacks in the EVCS infrastructure. Our analyses include performance metrics using the benchmark Hyperledger Caliper test, which shows the proposed solution’s low latency for real-time operations and scalability to accommodate the growth of EV infrastructure. Deployment of this blockchain-enhanced security mechanism will increase user trust and reliability in EVCS systems. Full article
26 pages, 1143 KiB  
Article
Securing UAV Flying Ad Hoc Wireless Networks: Authentication Development for Robust Communications
by Muhammet A. Sen, Saba Al-Rubaye and Antonios Tsourdos
Sensors 2025, 25(4), 1194; https://doi.org/10.3390/s25041194 (registering DOI) - 15 Feb 2025
Abstract
Unmanned Aerial Vehicles (UAVs) have revolutionized numerous domains by introducing exceptional capabilities and efficiencies. As UAVs become increasingly integrated into critical operations, ensuring the security of their communication channels emerges as a paramount concern. This paper investigates the importance of safeguarding UAV communication [...] Read more.
Unmanned Aerial Vehicles (UAVs) have revolutionized numerous domains by introducing exceptional capabilities and efficiencies. As UAVs become increasingly integrated into critical operations, ensuring the security of their communication channels emerges as a paramount concern. This paper investigates the importance of safeguarding UAV communication against cyber threats, considering both intra-UAV and UAV–ground station interactions in the scope of the Flying Ad Hoc Networks (FANETs). To leverage the advancements in security methodologies, particularly focusing on Physical Unclonable Functions (PUFs), this paper proposes a novel authentication framework tailored for UAV networking systems. Investigating the existing literature, we categorize related studies into authentication strategies, illuminating the evolving landscape of UAV security. The proposed framework demonstrated a high level of security with lower communication and computation costs in comparison with selected studies with similar types of attacks. This paper highlights the urgent need for strong security measures to mitigate the increasing threats that UAVs encounter and ensure their sustained effectiveness in a variety of applications. The results indicate that the proposed protocol is sufficiently secure and, in terms of communication cost, achieves an 18% improvement compared to the best protocol in the referenced studies. Full article
(This article belongs to the Special Issue Security, Privacy and Trust in Wireless Sensor Networks)
Show Figures

Figure 1

Figure 1
<p>PUFs in UAV authentication: fundamental operational mechanism.</p>
Full article ">Figure 2
<p>Characteristics of PUFs.</p>
Full article ">Figure 3
<p>FANET Architectures. (<b>a</b>) Basic FANET model, (<b>b</b>) Multi-Group FANET, (<b>c</b>) Multi-Layer FANET.</p>
Full article ">Figure 4
<p>Security flaws in UAV system.</p>
Full article ">Figure 5
<p>Authentication process between UAV and GS.</p>
Full article ">Figure 6
<p>The authentication process between UAVs through the GS.</p>
Full article ">Figure 7
<p>Logical proof of the protocol.</p>
Full article ">Figure 8
<p>Comparison of communication costs in similar protocols [<a href="#B14-sensors-25-01194" class="html-bibr">14</a>,<a href="#B28-sensors-25-01194" class="html-bibr">28</a>,<a href="#B44-sensors-25-01194" class="html-bibr">44</a>,<a href="#B45-sensors-25-01194" class="html-bibr">45</a>,<a href="#B46-sensors-25-01194" class="html-bibr">46</a>].</p>
Full article ">
19 pages, 617 KiB  
Article
Digital Sustainability of Heritage: Exploring Indicators Affecting the Effectiveness of Digital Dissemination of Intangible Cultural Heritage Through Qualitative Interviews
by Zi Yan, Chen Kim Lim, Sharina Abdul Halim, Minhaz Farid Ahmed, Kian Lam Tan and Lucheng Li
Sustainability 2025, 17(4), 1593; https://doi.org/10.3390/su17041593 - 14 Feb 2025
Abstract
Currently, the digitization of heritage has become a research hotspot, but there remain gaps in evaluating the effectiveness of its digital dissemination. This qualitative study explores the indicators influencing the effectiveness of digital dissemination of intangible cultural heritage (ICH), with a special focus [...] Read more.
Currently, the digitization of heritage has become a research hotspot, but there remain gaps in evaluating the effectiveness of its digital dissemination. This qualitative study explores the indicators influencing the effectiveness of digital dissemination of intangible cultural heritage (ICH), with a special focus on Shu brocade weaving techniques, which is the national ICH item of China and has a high cultural, economic, and artistic value. Original data for this study was collected through semi-structured interviews with the most representative stakeholders. Based on the grounded theory, interviews were further analyzed through NVivo software 14, and 30 indicators were identified. The results of this study reveal the importance of indicators related to the authenticity and integrity of cultural connotations as well as the transmission of traditional skills, especially through stakeholder participation, in the digital dissemination of ICH. This study emphasizes the significance of improving the effectiveness of digital dissemination for the sustainable development of ICH and the preservation of precious culture for future generations. Full article
(This article belongs to the Special Issue Architecture, Urban Space and Heritage in the Digital Age)
11 pages, 2843 KiB  
Article
Genetic Diversity of the Traditional Economic Green Alga Capsosiphon fulvescens in Republic of Korea
by Soon Jeong Lee, Eun-Young Lee and Sang-Rae Lee
Diversity 2025, 17(2), 132; https://doi.org/10.3390/d17020132 - 14 Feb 2025
Abstract
The taxonomic position of the green alga Capsosiphon fulvescens was first reported from Northern Europe and has since been reported from all over the world, including Korea. In Korea, C. fulvescens has been used as an essential edible economic alga for approximately 570 [...] Read more.
The taxonomic position of the green alga Capsosiphon fulvescens was first reported from Northern Europe and has since been reported from all over the world, including Korea. In Korea, C. fulvescens has been used as an essential edible economic alga for approximately 570 years, from the time of the Joseon Dynasty to the present, and is currently under development as a new aquaculture strain. Therefore, examining the taxonomic relationships between the European and Korean C. fulvescens is important. In this study, we analyzed nuclear 18S rDNA and ITS regions and compared them with the DNA sequences of authentic materials of North Atlantic C. fulvescens. Additionally, rbcL and tufA genes were sequenced to analyze genetic variations among populations. The results showed that the Korean and European C. fulvescens were different species. Moreover, the Korean C. fulvescens was distantly related to the North Atlantic C. fulvescens at the order level. Moreover, the Korean C. fulvescens formed a sister group with the North Pacific Pseudothrix borealis. Cryptic genetic diversity was observed at the intraspecific level among the Korean populations. These findings will help in tracing the origin of the Korean C. fulvescens and provide new genetic insights into this species. Full article
Show Figures

Figure 1

Figure 1
<p>Aquaculture farm showing the cultivation of <span class="html-italic">Capsosiphon fulvescens</span> in Korea (Jangheung, Republic of Korea; 30 April 2014).</p>
Full article ">Figure 2
<p>A herbarium specimen (National Institute of Biological Resources [NIBR]) examined in this study (Wando, Republic of Korea, 15 March 2022; NIBR accession number: NIBRCL0000115865).</p>
Full article ">Figure 3
<p>Morphological features of vegetative cells of Korean <span class="html-italic">Capsosiphon fulvescens</span>. Scale bar: (1) 1 cm, (2) 1 mm, (3) 100 μm, and (4) 100 μm.</p>
Full article ">Figure 4
<p>Neighbor-joining tree constructed using sequences of the 18S rDNA region by applying Kimura’s two-parameter model. The bootstrap test was conducted with 2000 replicates.</p>
Full article ">Figure 5
<p>Neighbor-joining tree constructed using sequences of the internal transcribed spacer (ITS) region by applying Kimura’s two-parameter model. The bootstrap test was conducted with 2000 replicates.</p>
Full article ">
19 pages, 645 KiB  
Review
Electroanalytical Approaches to Combatting Food Adulteration: Advances in Non-Enzymatic Techniques for Ensuring Quality and Authenticity
by Fotios Tsopelas
Molecules 2025, 30(4), 876; https://doi.org/10.3390/molecules30040876 - 14 Feb 2025
Abstract
Food adulteration remains a pressing issue, with serious implications for public health and economic fairness. Electroanalytical techniques have emerged as promising tools for detecting food adulteration due to their high sensitivity, cost-effectiveness, and adaptability to field conditions. This review delves into the application [...] Read more.
Food adulteration remains a pressing issue, with serious implications for public health and economic fairness. Electroanalytical techniques have emerged as promising tools for detecting food adulteration due to their high sensitivity, cost-effectiveness, and adaptability to field conditions. This review delves into the application of these techniques across various food matrices, including olive oil, honey, milk, alcoholic beverages, fruit juices, and coffee. By leveraging methodologies such as voltammetry and chemometric data processing, significant advancements have been achieved in identifying both specific and non-specific adulterants. This review highlights novel electrodes, such as carbon-based electrodes modified with nanoparticles, metal oxides, and organic substrates, which enhance sensitivity and selectivity. Additionally, electronic tongues employing multivariate analysis have shown promise in distinguishing authentic products from adulterated ones. The integration of machine learning and miniaturization offers potential for on-site testing, making these techniques accessible to non-experts. Despite challenges such as matrix complexity and the need for robust validation, electroanalytical methods represent a transformative approach to food authentication. These findings underscore the importance of continuous innovation to address emerging adulteration threats and ensure compliance with quality standards. Full article
(This article belongs to the Section Analytical Chemistry)
Show Figures

Figure 1

Figure 1
<p>Strategy for the identification and quantification of food adulteration using electroanalytical techniques.</p>
Full article ">
14 pages, 4263 KiB  
Article
Modernising the Control Curriculum and Delivery to Meet 21st Century Needs
by John Anthony Rossiter
Processes 2025, 13(2), 531; https://doi.org/10.3390/pr13020531 - 13 Feb 2025
Abstract
This paper focuses on the changes in tertiary education to reflect the changes in both technology and advances in the control field. It is necessary for educators to continually update both the content and delivery of control related topics to prepare graduates for [...] Read more.
This paper focuses on the changes in tertiary education to reflect the changes in both technology and advances in the control field. It is necessary for educators to continually update both the content and delivery of control related topics to prepare graduates for the future. This paper is separated into two different foci. The first part looks at advances in technology alongside the changing needs of society and reviews how the control community is responding to these changes. The second part focuses more on learning resources and reviews some of the freely available tools that are available to students and professors to help students better understand both the topic and its importance to society. Full article
(This article belongs to the Section Automation Control Systems)
Show Figures

Figure 1

Figure 1
<p>Example of a cheap take-home kit (two heaters) in a small sandwich box.</p>
Full article ">Figure 2
<p>Screen dump from virtual laboratory on open-loop behaviour of car speed.</p>
Full article ">Figure 3
<p>Webpage of student competition on underwater robots.</p>
Full article ">
18 pages, 1143 KiB  
Article
Lightweight Secure Communication Supporting Batch Authentication for UAV Swarm
by Pengbin Han, Aina Sui and Jiang Wu
Drones 2025, 9(2), 139; https://doi.org/10.3390/drones9020139 - 13 Feb 2025
Abstract
In recent years, with the widespread application of UAV swarm, the security problems faced have been gradually discovered, such as the lack of reliable identity authentication, which makes UAVs vulnerable to invasion. To solve these security problems, a lightweight secure communication scheme supporting [...] Read more.
In recent years, with the widespread application of UAV swarm, the security problems faced have been gradually discovered, such as the lack of reliable identity authentication, which makes UAVs vulnerable to invasion. To solve these security problems, a lightweight secure communication scheme supporting batch authentication for UAV swarm is proposed. Firstly, a layered secure communication model for UAV swarm is designed. Then, a secure transmission protocol is implemented by using elliptic curves under this model, which not only reduces the number of encryptions but also ensures the randomness and one-time use of the session key. Moreover, a UAV identity authentication scheme supporting batch signature verification is proposed, which improves the efficiency of identity authentication. The experiments show that, when the number of UAVs is 60, the computation cost of the proposed scheme is 0.071 s, and the communication cost is 0.203 s, fully demonstrating the efficiency and practicability of the scheme. Through comprehensive security analysis, the capability of the proposed scheme to resist various attacks is demonstrated. Full article
Show Figures

Figure 1

Figure 1
<p>System model.</p>
Full article ">Figure 2
<p>Comparison of communication delay with existing schemes [<a href="#B25-drones-09-00139" class="html-bibr">25</a>].</p>
Full article ">Figure 3
<p>Comparison of communication delay with existing schemes [<a href="#B28-drones-09-00139" class="html-bibr">28</a>].</p>
Full article ">Figure 4
<p>Comparison of communication delay with existing schemes [<a href="#B25-drones-09-00139" class="html-bibr">25</a>,<a href="#B28-drones-09-00139" class="html-bibr">28</a>].</p>
Full article ">Figure 5
<p>Comparison of communication cost with existing schemes [<a href="#B26-drones-09-00139" class="html-bibr">26</a>,<a href="#B27-drones-09-00139" class="html-bibr">27</a>,<a href="#B30-drones-09-00139" class="html-bibr">30</a>,<a href="#B31-drones-09-00139" class="html-bibr">31</a>,<a href="#B32-drones-09-00139" class="html-bibr">32</a>,<a href="#B33-drones-09-00139" class="html-bibr">33</a>].</p>
Full article ">Figure 6
<p>Comparison of batch signature verification delay with existing schemes [<a href="#B26-drones-09-00139" class="html-bibr">26</a>,<a href="#B27-drones-09-00139" class="html-bibr">27</a>,<a href="#B30-drones-09-00139" class="html-bibr">30</a>,<a href="#B31-drones-09-00139" class="html-bibr">31</a>,<a href="#B32-drones-09-00139" class="html-bibr">32</a>,<a href="#B33-drones-09-00139" class="html-bibr">33</a>].</p>
Full article ">
19 pages, 1729 KiB  
Article
Integrating Coastal Sámi Traditional Knowledge in Science Education: Challenges, Approaches, and the Path Forward
by Birgitte Mari Midtervoll Lange, Julie Marie Pedersen, Gunnar Kristiansen, Vivienne Mackisack and Siw Turid Killengreen
Educ. Sci. 2025, 15(2), 230; https://doi.org/10.3390/educsci15020230 - 13 Feb 2025
Abstract
This study explores the integration of Sámi traditional knowledge in Norwegian science education, addressing the challenges that are faced by teachers who are unfamiliar with Sámi culture. The research employs action research methods, involving student teachers and teacher educators, to develop teaching units [...] Read more.
This study explores the integration of Sámi traditional knowledge in Norwegian science education, addressing the challenges that are faced by teachers who are unfamiliar with Sámi culture. The research employs action research methods, involving student teachers and teacher educators, to develop teaching units focused on Coastal Sámi topics. The study highlights the use of Banks’s multicultural curriculum reform approaches to analyze how Indigenous perspectives were incorporated. The key findings reveal that while efforts were made to include Coastal Sámi concepts, the integration often remained superficial. This study underscores the need for comprehensive teacher training and resources to effectively teach Indigenous topics. The conclusions emphasize the importance of a transformative approach to education that authentically incorporates diverse perspectives, advocating for systemic support to enhance teachers’ ability to deliver culturally relevant education. The research calls for collaboration among policymakers, teacher educators, and the Sámi community to ensure meaningful integration of Indigenous knowledge in curricula, fostering a deeper understanding and appreciation of Sámi culture and sustainability practices. Full article
Show Figures

Figure 1

Figure 1
<p>Overview of the four interventions. The large blue arrows indicate the changes that were implemented between each intervention.</p>
Full article ">
50 pages, 1029 KiB  
Article
A Review, Analysis, and Roadmap to Support the Short-Term and Long-Term Sustainability of the European Crafts Sector
by Nikolaos Partarakis, Xenophon Zabulis, Carlo Meghini, Arnaud Dubois, Ines Moreno, Chistodoulos Ringas, Aikaterini Ziova, Danai Kaplanidi, David Arnaud, Noël Crescenzo, Patricia Hee, Juan José Ortega, Josefina Garrido, Marie-Adelaide Benvenuti and Jelena Krivokapic
Heritage 2025, 8(2), 70; https://doi.org/10.3390/heritage8020070 - 13 Feb 2025
Abstract
This publication highlights the strategic combination of the preservation of heritage and innovation for supporting the sustainability of traditional crafts in Europe. Demonstrating both challenges and opportunities faced by artisans, there is a need to balance cultural authenticity and the pressures of current [...] Read more.
This publication highlights the strategic combination of the preservation of heritage and innovation for supporting the sustainability of traditional crafts in Europe. Demonstrating both challenges and opportunities faced by artisans, there is a need to balance cultural authenticity and the pressures of current markets and environmental imperatives. The research has explored interventions at three levels of craft practice, education, and training and recommends practical directions on short- and long-term bases. Key findings include new materials and technologies to revitalize crafts, the integration of digital tools in education, and cross-border collaboration, which are considered vital for enhancing the visibility and viability of traditional crafts. The circular economy principles and eco-certifications emerge as key to aligning traditional crafts with global sustainability goals. The analysis also highlights cultural policies and funding mechanisms as a means of encouraging innovation and promoting the resilience of the craft sector. The publication, by weaving together case studies, policy analysis, and strategic recommendations, provides a comprehensive roadmap for stakeholders—from artisans and educators to policymakers and researchers—to ensure that the legacy and relevance of Europe’s rich craft heritage continue. Full article
(This article belongs to the Section Cultural Heritage)
16 pages, 3247 KiB  
Article
Genetic Diversity and Population Structure of Siamese Rosewood (Dalbergia cochinchinensis Pierre) in Thailand Using matK and Internal Transcribed Spacer Markers
by Benjarat Prompen, Weerachai Saijuntha, Warayutt Pilap and Sudarat Thanonkeo
Forests 2025, 16(2), 332; https://doi.org/10.3390/f16020332 - 13 Feb 2025
Abstract
Siamese rosewood (Dalbergia cochinchinensis Pierre) is a highly valuable economic tree species in Thailand. This study investigated genetic diversity across 72 tree samples from 17 Thai locations using two genetic markers: the chloroplast maturase K (matK) gene and the nuclear [...] Read more.
Siamese rosewood (Dalbergia cochinchinensis Pierre) is a highly valuable economic tree species in Thailand. This study investigated genetic diversity across 72 tree samples from 17 Thai locations using two genetic markers: the chloroplast maturase K (matK) gene and the nuclear internal transcribed spacer (ITS) region. Analysis of 48 matK and 65 ITS sequences revealed 34 (DcM1–DcM34) and 31 (DcI1–DcI31) haplotypes, respectively. The Saraburi province haplotype DcM10 exhibited the highest genetic divergence, differing by 25 mutational steps from other haplotypes. Phylogenetic analysis incorporating GenBank sequences from other Dalbergia species showed that matK sequences separated D. cochinchinensis into two distinct clades: Clade A, comprising most Thai samples, and Clade B, containing Saraburi samples grouped with sequences from Laos and Cambodia. In contrast, ITS analysis revealed a single monophyletic group. These findings have important applications for conservation strategies, particularly in prioritizing the genetically distinct Saraburi population for protection, and can inform breeding programs to maintain genetic diversity. Additionally, the identified genetic markers could be developed into tools for timber authentication to combat illegal logging, while the revealed population structure can guide reforestation efforts and international conservation collaboration with Laos and Cambodia. Full article
Show Figures

Figure 1

Figure 1
<p>Morphological characteristics of <span class="html-italic">D. cochinchinensis</span> used for species identification: (<b>a</b>) Siamese rosewood tree; (<b>b</b>) inflorescences; (<b>c</b>) green pods; (<b>d</b>) dried pods; (<b>e</b>) seeds; and (<b>f</b>) stem.</p>
Full article ">Figure 2
<p>Geographic distribution of <span class="html-italic">D. cochinchinensis</span> sampling locations in this study.</p>
Full article ">Figure 3
<p>The median-joining haplotype network of the chloroplast maturase K (<span class="html-italic">matK</span>) and nuclear internal transcribed spacer (ITS) depicts the relationships among haplotypes from examined populations of <span class="html-italic">D. cochinchinensis</span>. The area of the circles represents the proportion of specimen numbers found in each haplotype. The length of each branch demonstrates the number of mutational steps (ms).</p>
Full article ">Figure 4
<p>Phylogenetic tree based on the nuclear internal transcribed spacer (ITS) sequences showing relationships among <span class="html-italic">D. cochinchinensis</span> samples from this study and previously published sequences of <span class="html-italic">D. cochinchinensis</span> and other <span class="html-italic">Dalbergia</span> species from GenBank. Numbers at nodes indicate bootstrap support values from maximum likelihood/maximum parsimony analyses. <span class="html-italic">Pterocarpus indicus</span> was used as an outgroup.</p>
Full article ">Figure 5
<p>Phylogenetic tree based on the chloroplast maturase K (<span class="html-italic">matK</span>) sequences showing relationships among <span class="html-italic">D. cochinchinensis</span> samples from this study and previously published sequences of <span class="html-italic">D. cochinchinensis</span> and other <span class="html-italic">Dalbergia</span> species from GenBank. Two distinct clades (A and B) were identified within <span class="html-italic">D. cochinchinensis</span>. Numbers at nodes indicate bootstrap support values from maximum likelihood/maximum parsimony analyses. <span class="html-italic">Pterocarpus indicus</span> was used as an outgroup.</p>
Full article ">
Back to TopTop