Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (595)

Search Parameters:
Keywords = digital identity

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
21 pages, 2609 KiB  
Article
Blockchain-Based Responsibility Management Framework for Smart City Building Information Modeling Projects Using Non-Fungible Tokens
by Hao Bai, Zushun Li, Keyu Chen and Xiongwei Li
Buildings 2024, 14(11), 3647; https://doi.org/10.3390/buildings14113647 (registering DOI) - 16 Nov 2024
Viewed by 96
Abstract
In the context of digital construction, responsibility management in smart city building information modeling (BIM) projects spans the entire building lifecycle. The involvement of numerous BIM designers in project management and frequent data exchanges pose significant challenges for the traceability, immutability, and responsibility [...] Read more.
In the context of digital construction, responsibility management in smart city building information modeling (BIM) projects spans the entire building lifecycle. The involvement of numerous BIM designers in project management and frequent data exchanges pose significant challenges for the traceability, immutability, and responsibility attribution of BIM models. To address these issues, this study proposes a blockchain-based responsibility management and collaboration framework for BIM projects using non-fungible tokens (NFTs), aiming to enhance the management of responsibilities and accountability in BIM projects. This research adopts a design science methodology, strictly adhering to scientific research procedures to ensure rigor. First, NFTs based on blockchain technology were developed to generate corresponding digital signatures for BIM model files. This approach ensures that each BIM model file has a unique digital identity, enhancing transparency and traceability in responsibility management. Next, the interplanetary file system (IPFS) was used to generate digital fingerprints, with the content identifier generated by IPFS uploaded to the blockchain to ensure the immutability of BIM model files. This method guarantees the integrity and security of BIM model files throughout their lifecycle. Finally, the proposed methods were validated through a blockchain network. The experimental results indicate that the proposed framework is theoretically highly feasible and demonstrates good applicability and efficiency in practical production. The constructed blockchain network meets the actual needs of responsibility management in smart city BIM projects, enhancing the transparency and reliability of project management. Full article
(This article belongs to the Section Construction Management, and Computers & Digitization)
Show Figures

Figure 1

Figure 1
<p>Steps of the DSR method.</p>
Full article ">Figure 2
<p>Block diagram of rights and responsibilities management and collaborative optimization of BIM projects based on blockchain.</p>
Full article ">Figure 3
<p>NFT development flow chart.</p>
Full article ">Figure 4
<p>Schematic diagram of the IPFS architecture.</p>
Full article ">Figure 5
<p>Verification flowchart.</p>
Full article ">Figure 6
<p>Network latency diagram.</p>
Full article ">Figure 7
<p>Network throughput diagram.</p>
Full article ">Figure A1
<p>NFT Pseudocode Diagram.</p>
Full article ">
16 pages, 251 KiB  
Article
Bible Narratives and Youth Religious Identity: An Italian Exploratory Study
by Michele Caputo and Tommaso Rompianesi
Religions 2024, 15(11), 1385; https://doi.org/10.3390/rel15111385 - 14 Nov 2024
Viewed by 191
Abstract
Our article analyzes data from a broader exploratory Italian study on youth imaginaries and the role of narratives in attributing meaning to the world. The research gathered responses from 872 young people (aged 18 to 23) through a digital questionnaire. The data were [...] Read more.
Our article analyzes data from a broader exploratory Italian study on youth imaginaries and the role of narratives in attributing meaning to the world. The research gathered responses from 872 young people (aged 18 to 23) through a digital questionnaire. The data were analyzed with quantitative methodology using descriptive statistics. Our research questions can be formulated as follows: What level of familiarity do respondents have with biblical narratives? What narrative themes and categories do they use to define those stories? In relation to these elements, what are the characteristics of the respondents’ subgroups that defined themselves as “Religious”, “Indifferent/Agnostic”, and “Atheist”? The questionnaire items analyzed in this article provide an account of the respondents’ familiarity with some biblical narratives and their characters (Abraham, Jacob, and Ruth), as well as their choices related to the stories’ narrative themes and categories. The results from our sample open the field for further investigations, particularly in contexts characterized by different religious backgrounds (e.g., Protestant contexts), which may offer more nuanced interpretations of the educational process in relation to religious identity. Full article
14 pages, 1877 KiB  
Article
Description of Oryzobacter telluris sp. nov., a New Species Isolated from Bank-Side Soil in Seomjin River, South Korea
by Ahyoung Choi, Sumin Jang and Jaeduk Goh
Diversity 2024, 16(11), 689; https://doi.org/10.3390/d16110689 - 12 Nov 2024
Viewed by 341
Abstract
A novel bacterial strain, designated 24SJ04S-52T, was isolated from bank-side soil in the Osucheon Stream of the Seomjin River, Republic of Korea. This strain is aerobic, Gram-stain-positive, and short-rod-shaped, with optimal growth observed at 30 °C, pH 7, and 0% salinity, [...] Read more.
A novel bacterial strain, designated 24SJ04S-52T, was isolated from bank-side soil in the Osucheon Stream of the Seomjin River, Republic of Korea. This strain is aerobic, Gram-stain-positive, and short-rod-shaped, with optimal growth observed at 30 °C, pH 7, and 0% salinity, and growth occurring across a temperature range of 15–37 °C, pH 5–9, and salinity of 0–4%. Phylogenetic analysis of the 16S rRNA gene showed that strain 24SJ04S-52T shares 98.3% sequence similarity with Oryzobacter terrae PSGM2-16T. However, the average nucleotide identity (ANI) and digital DNA–DNA hybridization (dDDH) values were 85.0% and 50.1%, respectively, which are well below the species delineation thresholds of 95–96% for ANI and 70% for dDDH, confirming the novelty of this species. Genomic analysis identified a genome size of 3.98 Mb with a G+C content of 72.9 mol%. Functional annotation revealed various genes involved in amino acid, carbohydrate, and protein metabolism, suggesting metabolic versatility that may support adaptation to nutrient-variable environments. Chemotaxonomic analyses revealed distinctive profiles, including major fatty acids such as C17:1 ω8c, iso-C16:0, and iso-C14:0, with MK-8(H4) as the predominant menaquinone. The polar lipids included diphosphatidylglycerol, phosphatidylethanolamine, and phosphatidylinositol, and the peptidoglycan was of type A4γ with meso-diaminopimelic acid as the diagnostic diamino acid. These comprehensive analyses support the classification of strain 24SJ04S-52T as a novel species within the genus Oryzobacter, for which the name Oryzobacter telluris sp. nov. is proposed. The type strain is 24SJ04S-52T (=KACC 23836T = FBCC-B16192T). Full article
Show Figures

Figure 1

Figure 1
<p>Neighbor-joining phylogenetic tree based on 16S rRNA gene sequences showing positions of strain 24SJ04S-52<sup>T</sup> and other closely related members of the family <span class="html-italic">Intrasporangiaceae</span>. Bootstrap values (expressed as percentages of 1000 replications) over 70% are shown at nodes for neighbor-joining, maximum-likelihood, and maximum-parsimony methods, respectively. Filled circles indicate that the corresponding nodes were recovered by all treeing methods. An open circle indicates that the corresponding node was recovered by the neighbor-joining and maximum-likelihood methods. The minus sign indicates bootstrap values below 70% in the maximum-parsimony method. The bold font represents the novel species identified in this study. <span class="html-italic">Acidimicrobium ferrooxidans</span> DSM 10331<sup>T</sup> (CP001631) was used as an out-group. Bar, 0.02 substitutions per nucleotide position.</p>
Full article ">Figure 2
<p>Phylogenetic tree of strain 24SJ04S-52<sup>T</sup> and closely related type strains, inferred from GBDP distances calculated from genome sequences. Branch lengths are scaled according to the GBDP distance formula d5. Numbers near the branches represent GBDP pseudo-bootstrap support values &gt;70% based on 100 replications. The tree is rooted at the midpoint [<a href="#B49-diversity-16-00689" class="html-bibr">49</a>]. Leaf labels indicate species and subspecies affiliations, genomic G+C content, δ values, overall genome sequence length, protein count, and strain type [<a href="#B42-diversity-16-00689" class="html-bibr">42</a>]. The colors of the leaf labels denote species and subspecies clusters, with the novel species identified in this study highlighted in bold.</p>
Full article ">Figure 3
<p>Circular map of the strain 24SJ04S-52<sup>T</sup> genome. From outside to the center: the colored bands in ring 1 represent contigs; ring 2 represents the annotated genes on the forward strand (color determined by COG category); ring 3 shows the annotated genes on the reverse strand (color determined by COG category); ring 4 displays the RNA genes (rRNAs are displayed in red and tRNAs are displayed in purple); ring 5 shows the GC skew (higher-than-average values are displayed in green, while lower-than-average values are displayed in red); and ring 6 shows the GC ratio (higher-than-average values in blue and lower-than-average values in yellow).</p>
Full article ">Figure 4
<p>Orthologous gene cluster analysis using OrthoVenn3, depicting shared orthologous clusters among two <span class="html-italic">Oryzobacter</span> species. Numbers adjacent to species indicate the total clusters in each list.</p>
Full article ">Figure 5
<p>Transmission electron micrograph of strain 24SJ04S-52<sup>T</sup> cells. Bar, 0.5 µm.</p>
Full article ">
20 pages, 4009 KiB  
Article
Intelligent Carbon Metering and Settlement Method of New Power System Based on Blockchain Technology
by Ruxin Wen, Wen Tian, Huiying Liu, Wenjuan Lin, Xizhong Zhou and Xuerong Li
Energies 2024, 17(22), 5601; https://doi.org/10.3390/en17225601 - 9 Nov 2024
Viewed by 600
Abstract
Blockchain technology is an important technical basis for ensuring carbon trading and plays a fundamental role in maintaining fairness in the carbon trading market. This paper proposes a carbon emission metering and settlement method and a system based on blockchain technology which creates [...] Read more.
Blockchain technology is an important technical basis for ensuring carbon trading and plays a fundamental role in maintaining fairness in the carbon trading market. This paper proposes a carbon emission metering and settlement method and a system based on blockchain technology which creates the digital identity of electric meters and stores it in the blockchain. Verifiable credentials are generated based on the digital identity, energy data, and time stamp. The system records the energy data read by the verified meter to the blockchain cloud platform for carbon emission statistics. In the payment and settlement stage, through application of the blockchain and its combination with a digital payment wallet, the regional energy network consumption settlement value is generated according to the regional power supply and electricity consumption, and the settlement value is used as the benchmark to measure the carbon emissions in the region. Through the data analysis of practical application cases in an industrial park in China, this study concludes that the carbon emission statistical settlement method based on blockchain technology solves the problems of untrustworthiness, unreliability, and inconsistency in the statistical and settlement methods during the statistical settlement of electric energy statistics and energy consumption carbon emissions. Full article
(This article belongs to the Section F1: Electrical Power System)
Show Figures

Figure 1

Figure 1
<p>Verification algorithm of meter credentials. Green squares are users of the system; red labels are algorithms; yellow squares and the dashed square presents the dataset of the meter.</p>
Full article ">Figure 2
<p>Verification of blockchain cloud platform. The yellow squares and the dashed square present the essential functions of the concentrator; the purple squares and the dashed square present the actions interacted with the blockchain cloud platform.</p>
Full article ">Figure 3
<p>Determination of regional power data.</p>
Full article ">Figure 4
<p>The architectural framework of the blockchain prototype system.</p>
Full article ">Figure 5
<p>Home page of the system. The Chinese characters in the list on the left present function modules demonstrated in <a href="#energies-17-05601-t001" class="html-table">Table 1</a>, the tags and figures on the right present statistics of carbon meters.</p>
Full article ">Figure 6
<p>The specific information display for carbon meter certification. The Chinese characters present major attributes of meter certification, including the meter name, meter number, certificate number, validity period, peak value, issuing authority, certificate holder, etc.</p>
Full article ">Figure 7
<p>Wechat mini-program client interface. The Chinese characters present meter list, statistics of carbon meter, blockchain certification process and the meter certification.</p>
Full article ">Figure 8
<p>Equipment framework of the application industrial park.</p>
Full article ">Figure 9
<p>Carbon metering results of two electric carbon meters in the park: (<b>a</b>) Parking lot, A8 floor, and ****** Innovation Park. (<b>b</b>) ****** Boyue residence.</p>
Full article ">
13 pages, 3724 KiB  
Data Descriptor
Additions to Space Physics Data Facility and pysatNASA: Increasing Mars Global Surveyor and Mars Atmosphere and Volatile EvolutioN Dataset Utility
by Teresa M. Esman, Alexa J. Halford, Jeff Klenzing and Angeline G. Burrell
Data 2024, 9(11), 133; https://doi.org/10.3390/data9110133 - 8 Nov 2024
Viewed by 474
Abstract
The Space Physics Data Facility (SPDF) is a digital archive of space physics data and is useful for the storage, analysis, and dissemination of data. We discuss the process used to create an amended dataset and store it on the SPDF. The operational [...] Read more.
The Space Physics Data Facility (SPDF) is a digital archive of space physics data and is useful for the storage, analysis, and dissemination of data. We discuss the process used to create an amended dataset and store it on the SPDF. The operational software to generate the archival data software uses the open-source Python package pysat, and an end-user module has been added to the pysatNASA module. The result is the addition of data products to the Mars Global Surveyor (MGS) magnetometer (MAG) dataset, its archival location on SPDF, and pysat compatibility. The primary and metadata format increases the convenience and efficiency for users of the MGS MAG data. The storage of planetary and heliophysics data in one location supports the use of data throughout the solar system for comparison, while pysat compatibility enables loading data in an identical format for ease of processing. We encourage the use of the outlined process for past, present, and future space science missions of all sizes and funding levels. This includes balloons to Flagship-class missions. Full article
Show Figures

Figure 1

Figure 1
<p>The 11–14 April 2001 storm event as observed in MGS, ACE, and OMNI data. The panels show (<b>a</b>) the MGS magnetic field magnitude, (<b>b</b>) the ACE solar wind magnetic field magnitude, (<b>c</b>) the ACE solar wind proton speed, (<b>d</b>) the ACE proton number density, and (<b>e</b>) the OMNI SYM-H. The enhancement in the MGS magnetic field magnitude is shown in a red dashed rectangle.</p>
Full article ">Figure 2
<p>The Jan 2016 storm event as observed in MAVEN, ACE, and OMNI data. The panels show (<b>a</b>) the MAVEN magnetic field magnitude, (<b>b</b>) the ACE solar wind magnetic field magnitude, (<b>c</b>) the ACE solar wind proton speed, (<b>d</b>) the ACE proton number density, and (<b>e</b>) the OMNI SYM-H. The enhancement in the MAVEN magnetic field magnitude related to the Jan. 1st event is shown in a red-dashed rectangle.</p>
Full article ">Figure 3
<p>This plot shows the event from <a href="#data-09-00133-f002" class="html-fig">Figure 2</a> using data from multiple instruments onboard MAVEN. They include (<b>a</b>) LPW EUV irradiance 0.1–7 nm bandpass [W/m<sup>2</sup>], (<b>b</b>) SEP 30–1000 keV Ion flux [n/(cm<sup>2</sup>s sr)], (<b>c</b>) SEP 30–1000 keV electron flux [n/(cm<sup>2</sup> s sr)], (<b>d</b>) SWIA ion dynamic pressure [nPa], (<b>e</b>) <span class="html-italic">H</span><sup>+</sup> Flow Velocity Magnitude [km/s], (<b>f</b>) <span class="html-italic">H</span>+ Density [cm<sup>−3</sup>], and (<b>g</b>) Magnetic Field magnitude [nT].</p>
Full article ">
16 pages, 4757 KiB  
Article
Whole Genome Sequencing and Biocontrol Potential of Streptomyces luteireticuli ASG80 Against Phytophthora Diseases
by Gang Xu, Weihuai Wu, Liqian Zhu, Yanqiong Liang, Minli Liang, Shibei Tan, Helong Chen, Xing Huang, Chunping He, Ying Lu, Kexian Yi and Xiang Ma
Microorganisms 2024, 12(11), 2255; https://doi.org/10.3390/microorganisms12112255 - 7 Nov 2024
Viewed by 444
Abstract
Phytophthora-induced crop diseases, commonly known as “plant plagues”, pose a significant threat to global food security. In this study, strain ASG80 was isolated from sisal roots and demonstrated a broad-spectrum antagonistic activity against several Phytophthora species and fungal pathogens. Strain ASG80 was [...] Read more.
Phytophthora-induced crop diseases, commonly known as “plant plagues”, pose a significant threat to global food security. In this study, strain ASG80 was isolated from sisal roots and demonstrated a broad-spectrum antagonistic activity against several Phytophthora species and fungal pathogens. Strain ASG80 was identified as Streptomyces luteireticuli via phylogenetic analysis, digital DNA–DNA hybridization (dDDH), and average nucleotide identity (ANI). Whole-genome sequencing identified 40 biosynthetic gene clusters (BGCs) related to secondary metabolite production, including antimicrobial compounds. Strain ASG80 extract exhibited broad-spectrum inhibitory activity against Phytophthora nicotianae, P. vignae, P. cinnamomi, and P. sojae. Pot experiments showed that strain ASG80 extract significantly reduced sisal zebra disease incidence, with an efficacy comparable to the fungicide metalaxyl. These findings suggest that strain ASG80 is a promising biocontrol agent with substantial potential for managing Phytophthora-related diseases in agriculture. Full article
(This article belongs to the Special Issue Microorganisms in Agriculture)
Show Figures

Figure 1

Figure 1
<p>Isolation of strain ASG80 with strong antifungal activity against <span class="html-italic">Phytophthora nicotianae</span>. (<b>A</b>) The colony morphology of strain ASG80. (<b>B</b>) Morphological characteristics of aerial mycelia of strain ASG80 using SEM. (<b>C</b>) Strain ASG80 extracts inhibiting mycelial growth of <span class="html-italic">P</span>. <span class="html-italic">nicotianae</span>.</p>
Full article ">Figure 2
<p>Genome map of strain ASG80: The outermost circle represents the genome size. The second and third circles depict genes on the positive and negative strands of the genome, with different colors indicating various COG functional classifications. The fourth circle displays repeat sequences, while the fifth indicates tRNA (blue) and rRNA (purple). The sixth circle represents GC content, and the innermost circle shows the GC skew. The letters A–Z correspond to the functional classification of CDS genes in the chromosome.</p>
Full article ">Figure 3
<p>Phylogenetic tree of strain ASG80 based on 16S rRNA gene sequence analysis. The bootstrap values (%) at the branches were calculated from 1000 replications.</p>
Full article ">Figure 4
<p>Analysis of strain ASG80 and related <span class="html-italic">Streptomyces</span> species. (<b>A</b>) A phylogenetic tree was constructed using the Type Strain Genome Server to analyze the whole genome sequences. (<b>B</b>) Heatmaps were generated to visualize the calculated average nucleotide identity (ANI) values and digital DNA–DNA hybridization (dDDH) values. <sup>T</sup>: Type strain.</p>
Full article ">Figure 5
<p>Comparative genomics analysis of strain ASG80. (<b>A</b>) Evolutionary relationship between ASG80 and three species. (<b>B</b>) Venn diagram of gene family statistics. (<b>C</b>) Genome collinearity of ASG80/JCM4788, ASG80/CMAA1322 and ASG80/JCM4087.</p>
Full article ">
30 pages, 6439 KiB  
Article
Adaptive Multi-Function Radar Temporal Behavior Analysis
by Zhenjia Xu, Qingsong Zhou, Zhihui Li, Jialong Qian, Yi Ding, Qinxian Chen and Qiyun Xu
Remote Sens. 2024, 16(22), 4131; https://doi.org/10.3390/rs16224131 - 6 Nov 2024
Viewed by 521
Abstract
The performance of radar mode recognition has been significantly enhanced by the various architectures of deep learning networks. However, these approaches often rely on supervised learning and are susceptible to overfitting on the same dataset. As a transitional phase towards Cognitive Multi-Functional Radar [...] Read more.
The performance of radar mode recognition has been significantly enhanced by the various architectures of deep learning networks. However, these approaches often rely on supervised learning and are susceptible to overfitting on the same dataset. As a transitional phase towards Cognitive Multi-Functional Radar (CMFR), Adaptive Multi-Function Radar (AMFR) possesses the capability to emit identical waveform signals across different working modes and states for task completion, with dynamically adjustable waveform parameters that adapt based on scene information. From a reconnaissance perspective, the valid signals received exhibit sparsity and localization in the time series. To address this challenge, we have redefined the reconnaissance-focused research priorities for radar systems to emphasize behavior analysis instead of pattern recognition. Based on our initial comprehensive digital system simulation model of a radar, we conducted reconnaissance and analysis from the perspective of the reconnaissance side, integrating both radar and reconnaissance aspects into environmental simulations to analyze radar behavior under realistic scenarios. Within the system, waveform parameters on the radar side vary according to unified rules, while resource management and task scheduling switch based on operational mechanisms. The target in the reconnaissance side maneuvers following authentic behavioral patterns while adjusting the electromagnetic space complexity in the environmental aspect as required. The simulation results indicate that temporal annotations in signal flow data play a crucial role in behavioral analysis from a reconnaissance perspective. This provides valuable insights for future radar behavior analysis incorporating temporal correlations and sequential dependencies. Full article
Show Figures

Figure 1

Figure 1
<p>Simulation system architecture.</p>
Full article ">Figure 2
<p>System-visualized operating interface.</p>
Full article ">Figure 3
<p>(<b>a</b>) The trend of <math display="inline"><semantics> <msub> <mfenced separators="" open="(" close=")"> <mrow> <mi>A</mi> <mo>·</mo> <mi>T</mi> </mrow> </mfenced> <mrow> <mi>r</mi> <mi>e</mi> <mi>q</mi> <mi>u</mi> <mi>i</mi> <mi>r</mi> <mi>e</mi> </mrow> </msub> </semantics></math> under a given <math display="inline"><semantics> <msub> <mi>P</mi> <mi>d</mi> </msub> </semantics></math> value. (<b>b</b>) The trend of <math display="inline"><semantics> <msub> <mfenced separators="" open="(" close=")"> <mrow> <mi>A</mi> <mo>·</mo> <mi>T</mi> </mrow> </mfenced> <mrow> <mi>r</mi> <mi>e</mi> <mi>q</mi> <mi>u</mi> <mi>i</mi> <mi>r</mi> <mi>e</mi> </mrow> </msub> </semantics></math> under a given <math display="inline"><semantics> <msub> <mi>P</mi> <mrow> <mi>f</mi> <mi>a</mi> </mrow> </msub> </semantics></math> value.</p>
Full article ">Figure 4
<p>Relationship curve between <math display="inline"><semantics> <mfenced separators="" open="(" close=")"> <mrow> <mi>A</mi> <mo>·</mo> <mi>T</mi> </mrow> </mfenced> </semantics></math> and <span class="html-italic">N</span>.</p>
Full article ">Figure 5
<p>Antenna array gain pattern.</p>
Full article ">Figure 6
<p>Spectrum diagram when MFR executes the S state.</p>
Full article ">Figure 7
<p>(<b>a</b>–<b>f</b>) Time-domain diagram of JAM signal interception.</p>
Full article ">Figure 8
<p>(<b>a</b>–<b>f</b>) Signal waveform parameter diagram.</p>
Full article ">Figure 9
<p>Relationship between <math display="inline"><semantics> <mrow> <mi>F</mi> <mi>a</mi> <mi>c</mi> <mi>t</mi> <mi>o</mi> <mi>r</mi> </mrow> </semantics></math> value and number of pulses <span class="html-italic">N</span> under given conditions.</p>
Full article ">Figure 10
<p>Trend of evaluation function value <math display="inline"><semantics> <mrow> <mi>E</mi> <mi>v</mi> <mi>a</mi> </mrow> </semantics></math> with maximum number of pulses <math display="inline"><semantics> <msub> <mi>N</mi> <mrow> <mi>c</mi> <mi>o</mi> <mi>n</mi> <mi>f</mi> <mi>i</mi> <mi>r</mi> <mi>m</mi> <mo>_</mo> <mi>m</mi> <mi>a</mi> <mi>x</mi> </mrow> </msub> </semantics></math>.</p>
Full article ">
20 pages, 5811 KiB  
Article
YOLOX-S-TKECB: A Holstein Cow Identification Detection Algorithm
by Hongtao Zhang, Li Zheng, Lian Tan, Jiahui Gao and Yiming Luo
Agriculture 2024, 14(11), 1982; https://doi.org/10.3390/agriculture14111982 - 5 Nov 2024
Viewed by 367
Abstract
Accurate identification of individual cow identity is a prerequisite for the construction of digital farms and serves as the basis for optimized feeding, disease prevention and control, breed improvement, and product quality traceability. Currently, cow identification faces challenges such as poor recognition accuracy, [...] Read more.
Accurate identification of individual cow identity is a prerequisite for the construction of digital farms and serves as the basis for optimized feeding, disease prevention and control, breed improvement, and product quality traceability. Currently, cow identification faces challenges such as poor recognition accuracy, large data volumes, weak model generalization ability, and low recognition speed. Therefore, this paper proposes a cow identification method based on YOLOX-S-TKECB. (1) Based on the characteristics of Holstein cows and their breeding practices, we constructed a real-time acquisition and preprocessing platform for two-dimensional Holstein cow images and built a cow identification model based on YOLOX-S-TKECB. (2) Transfer learning was introduced to improve the convergence speed and generalization ability of the cow identification model. (3) The CBAM attention mechanism module was added to enhance the model’s ability to extract features from cow torso patterns. (4) The alignment between the apriori frame and the target size was improved by optimizing the clustering algorithm and the multi-scale feature fusion method, thereby enhancing the performance of object detection at different scales. The experimental results demonstrate that, compared to the traditional YOLOX-S model, the improved model exhibits a 15.31% increase in mean average precision (mAP) and a 32-frame boost in frames per second (FPS). This validates the feasibility and effectiveness of the proposed YOLOX-S-TKECB-based cow identification algorithm, providing valuable technical support for the application of dairy cow identification in farms. Full article
(This article belongs to the Section Farm Animal Production)
Show Figures

Figure 1

Figure 1
<p>Based on YOLOX-S-TKECB cow identification algorithm technology roadmap.</p>
Full article ">Figure 2
<p>Helios Camera.</p>
Full article ">Figure 3
<p>Dairy cattle 3D data acquisition channel. (<b>a</b>) Setup schematic; (<b>b</b>) actual collection scene.</p>
Full article ">Figure 4
<p>Original Holstein cow acquisition image. (<b>a</b>) Helios camera captures examples. (<b>b</b>) Sample graphs are randomly collected.</p>
Full article ">Figure 5
<p>The image is processed by the in-frame algorithm. (<b>a</b>) Master drawing; (<b>b</b>) brightness boost; (<b>c</b>) contrast boost; (<b>d</b>) rotation angle calibration; (<b>e</b>) flip; (<b>f</b>) affine transformation, t; (<b>g</b>) shear transformation; (<b>h</b>) HSV data enhancement.</p>
Full article ">Figure 6
<p>The image is processed by an interframe algorithm. (<b>a</b>) Mixup enhancement operation; (<b>b</b>) Mosaic enhancement operations.</p>
Full article ">Figure 7
<p>YOLOX-S network structure diagram.</p>
Full article ">Figure 8
<p>Focus module operation diagram.</p>
Full article ">Figure 9
<p>Transfer learning model structure diagram.</p>
Full article ">Figure 10
<p>Flowchart of K-means++ algorithm.</p>
Full article ">Figure 11
<p>CBAM diagram of mixed attention mechanism.</p>
Full article ">Figure 12
<p>BiFPN structure diagram. P3, P4, P5, P6, and P7 represent the output layers of the backbone network, with each output layer having corresponding output features (including information such as the number of channels, the size of the features, etc.). Circles without color represent features, while colored circles represent operators. The wired connections indicate weights (w), and both upward and downward connections involve resize operations, representing either upsampling or downsampling.</p>
Full article ">Figure 13
<p>YOLOX-S recognition model detection effect. (<b>a</b>) Improved previous single object identification effect; (<b>b</b>) improved previous multi-target identification effect; (<b>c</b>) model training accuracy curve before improvement; (<b>d</b>) model training loss function curve before improvement.</p>
Full article ">Figure 14
<p>YOLOX-S-TKECB recognition model detection effect. (<b>a</b>) Improved single object identification effect; (<b>b</b>) improved multi-target identification effect; (<b>c</b>) improved model training accuracy curve; (<b>d</b>) improved model training loss function curve.</p>
Full article ">Figure 14 Cont.
<p>YOLOX-S-TKECB recognition model detection effect. (<b>a</b>) Improved single object identification effect; (<b>b</b>) improved multi-target identification effect; (<b>c</b>) improved model training accuracy curve; (<b>d</b>) improved model training loss function curve.</p>
Full article ">
14 pages, 7591 KiB  
Article
Acoustic Signal Reconstruction Across Water–Air Interface Through Millimeter-Wave Radar Micro-Vibration Detection
by Yuchen Du, Xiaolong Cao, Yiguang Yang, Tongchang Zhang, Jiaqi Yuan, Tengyuan Cui and Jianquan Yao
J. Mar. Sci. Eng. 2024, 12(11), 1989; https://doi.org/10.3390/jmse12111989 - 4 Nov 2024
Viewed by 547
Abstract
Water surface micro-amplitude waves (WSMWs) of identical frequency are elicited as acoustic waves propagating through water. This displacement can be translated into an intermediate frequency (IF) phase shift through transmitting a frequency modulated continuous wave (FMCW) towards the water surface by a millimeter-wave [...] Read more.
Water surface micro-amplitude waves (WSMWs) of identical frequency are elicited as acoustic waves propagating through water. This displacement can be translated into an intermediate frequency (IF) phase shift through transmitting a frequency modulated continuous wave (FMCW) towards the water surface by a millimeter-wave radar, and information transmission across the water–air interface is achieved via the signal reconstruction method. In this paper, a novel mathematical model based on energy conversion from underwater acoustic to vibration (ECUAV) is presented. This method was able to obtain WSMW vibration information directly by measuring the sound source level (SL). An acoustic electromagnetic wave-based information transmission (AEIT) system was integrated within the water tank environment. The measured distribution of SL within the frequency range of 100 Hz to 300 Hz exhibited the same amplitude variation trend as predicted by the ECUAV model. Thus, the WSMW formation process at 135 Hz was simulated, and the phase information was extracted. The initial vibration information was retrieved through a combination of phase unwinding and Butterworth digital filtering. Fourier transform was applied to the vibrational data to accurately reproduce the acoustic frequency of underwater nodes. Finally, the dual-band binary frequency shift keying (BFSK) modulated underwater encoding acoustic signal was effectively recognized and reconstructed by the AEIT system. Full article
Show Figures

Figure 1

Figure 1
<p>The process of detecting water surface vibrations based on millimeter-wave radar.</p>
Full article ">Figure 2
<p>(<b>a</b>) Millimeter-wave radar signal detection process. (<b>b</b>) The single-chirp linear FMCW signal structure.</p>
Full article ">Figure 3
<p>(<b>a</b>) Relationship between interface vibration amplitude versus <span class="html-italic">SL</span> and frequency; (<b>b</b>) water surface microwave attenuation process, <span class="html-italic">f</span> = 50 Hz; (<b>c</b>) 2D top view; (<b>d</b>) 2D profile.</p>
Full article ">Figure 4
<p>(<b>a</b>) Information transmission system based on Radar. (<b>b</b>) Tank environment.</p>
Full article ">Figure 5
<p>Frequency-dependent sound source information. (<b>a</b>) Sound Level. (<b>b</b>) Maximum amplitude of surface undulations.</p>
Full article ">Figure 6
<p>IF signal phase information at 135 Hz. (<b>a</b>) Before filtering. (<b>b</b>) After filtering.</p>
Full article ">Figure 7
<p>Perturbation detection frequency domain diagram at <span class="html-italic">f</span> = 135 Hz and <span class="html-italic">f</span> = 150 Hz.</p>
Full article ">Figure 8
<p>Frequency domain analysis of water surface vibration with varying frequency.</p>
Full article ">Figure 9
<p>BFSK signal modulation. (<b>a</b>) IF phase signal before filtering. (<b>b</b>) IF phase signal after filtering.</p>
Full article ">Figure 10
<p>BFSK signal modulation. (<b>a</b>) Frequency domain response with origin environmental noise. (<b>b</b>) Time–frequency process with origin environmental noise. (<b>c</b>) Frequency domain response after digital filtering. (<b>d</b>) Time–frequency process after digital filtering.</p>
Full article ">
22 pages, 7112 KiB  
Article
A New Encryption Algorithm Utilizing DNA Subsequence Operations for Color Images
by Saeed Mirzajani, Seyed Shahabeddin Moafimadani and Majid Roohi
AppliedMath 2024, 4(4), 1382-1403; https://doi.org/10.3390/appliedmath4040073 - 4 Nov 2024
Viewed by 426
Abstract
The computer network has fundamentally transformed modern interactions, enabling the effortless transmission of multimedia data. However, the openness of these networks necessitates heightened attention to the security and confidentiality of multimedia content. Digital images, being a crucial component of multimedia communications, require robust [...] Read more.
The computer network has fundamentally transformed modern interactions, enabling the effortless transmission of multimedia data. However, the openness of these networks necessitates heightened attention to the security and confidentiality of multimedia content. Digital images, being a crucial component of multimedia communications, require robust protection measures, as their security has become a global concern. Traditional color image encryption/decryption algorithms, such as DES, IDEA, and AES, are unsuitable for image encryption due to the diverse storage formats of images, highlighting the urgent need for innovative encryption techniques. Chaos-based cryptosystems have emerged as a prominent research focus due to their properties of randomness, high sensitivity to initial conditions, and unpredictability. These algorithms typically operate in two phases: shuffling and replacement. During the shuffling phase, the positions of the pixels are altered using chaotic sequences or matrix transformations, which are simple to implement and enhance encryption. However, since only the pixel positions are modified and not the pixel values, the encrypted image’s histogram remains identical to the original, making it vulnerable to statistical attacks. In the replacement phase, chaotic sequences alter the pixel values. This research introduces a novel encryption technique for color images (RGB type) based on DNA subsequence operations to secure these images, which often contain critical information, from potential cyber-attacks. The suggested method includes two main components: a high-speed permutation process and adaptive diffusion. When implemented in the MATLAB software environment, the approach yielded promising results, such as NPCR values exceeding 98.9% and UACI values at around 32.9%, demonstrating its effectiveness in key cryptographic parameters. Security analyses, including histograms and Chi-square tests, were initially conducted, with passing Chi-square test outcomes for all channels; the correlation coefficient between adjacent pixels was also calculated. Additionally, entropy values were computed, achieving a minimum entropy of 7.0, indicating a high level of randomness. The method was tested on specific images, such as all-black and all-white images, and evaluated for resistance to noise and occlusion attacks. Finally, a comparison of the proposed algorithm’s NPCR and UAC values with those of existing methods demonstrated its superior performance and suitability. Full article
Show Figures

Figure 1

Figure 1
<p>DNA subsequence elongation and truncation processes.</p>
Full article ">Figure 2
<p>The schematic of the utilized procedure: (<b>a</b>) The schematic of the image encryption method, (<b>b</b>) The schematic of the decryption method.</p>
Full article ">Figure 3
<p>Encryption and decryption of images: (<b>a</b>–<b>d</b>): Plain images. (<b>e</b>–<b>h</b>): Respective encryption of images. (<b>i</b>–<b>l</b>): Respective decryption of images.</p>
Full article ">Figure 4
<p>(<b>a</b>) Original color image of Daryasar; (<b>b</b>–<b>d</b>) plain image histograms for R, G, and B, respectively; (<b>e</b>) cipher image; (<b>f</b>–<b>h</b>) cipher image histograms, respectively.</p>
Full article ">Figure 5
<p>Correlation histograms. (<b>a</b>,<b>c</b>,<b>e</b>) show the histograms for the original image, while (<b>b</b>,<b>d</b>,<b>f</b>) display the histograms for the encrypted image.</p>
Full article ">Figure 5 Cont.
<p>Correlation histograms. (<b>a</b>,<b>c</b>,<b>e</b>) show the histograms for the original image, while (<b>b</b>,<b>d</b>,<b>f</b>) display the histograms for the encrypted image.</p>
Full article ">Figure 6
<p>Encrypted images with correct and incorrect initial keys, and their differences from the original encrypted images: (<b>a</b>–<b>e</b>) depict five newly encrypted images using the specified keys, while (<b>f</b>–<b>j</b>) illustrate the differences between the incorrectly encrypted images and the original image.</p>
Full article ">Figure 7
<p>Evaluation with selected plain images for uniform color patterns: (<b>a</b>) image with all-white pixels, (<b>b</b>) encrypted version of the all-white image, (<b>c</b>) histogram of the red channel for the all-white image, (<b>d</b>) image with all-black pixels, (<b>e</b>) encrypted version of the all-black image, (<b>f</b>) histogram of the red channel for the all-black image.</p>
Full article ">Figure 8
<p>Outcomes of the noise attack evaluation for the “Guangzhou” image ((<b>a</b>,<b>b</b>): 10% noise attack, (<b>c</b>,<b>d</b>): 15% noise attack, (<b>e</b>,<b>f</b>): 20% noise attack).</p>
Full article ">
22 pages, 6696 KiB  
Article
Pre-Planning and Post-Evaluation Approaches to Sustainable Vernacular Architectural Practice: A Research-by-Design Study to Building Renovation in Shangri-La’s Shanpian House, China
by Nan Yang, Jinliu Chen, Liang Ban, Pengcheng Li and Haoqi Wang
Sustainability 2024, 16(21), 9568; https://doi.org/10.3390/su16219568 - 3 Nov 2024
Viewed by 889
Abstract
The renovation and revitalization of vernacular architecture are pivotal in sustainable rural development. In regions like Shangri-La, traditional structures not only safeguard cultural heritage but also provide a foundation for enhancing local communities’ living conditions. However, these villages face growing challenges, including infrastructure [...] Read more.
The renovation and revitalization of vernacular architecture are pivotal in sustainable rural development. In regions like Shangri-La, traditional structures not only safeguard cultural heritage but also provide a foundation for enhancing local communities’ living conditions. However, these villages face growing challenges, including infrastructure decay, cultural erosion, and inadequate adaptation to modern living standards. Addressing these issues requires innovative research approaches that combine heritage preservation with the integration of contemporary functionality. This study employs a research-by-design approach, focusing on the Shanpian House as a case study, to explore how pre-planning and post-evaluation methods can revitalize traditional vernacular architecture. The pre-planning phase utilizes field surveys and archival research to assess spatial, cultural, and environmental conditions, framing a design strategy informed by field theory. In doing so, it evaluates how traditional architectural elements can be preserved while introducing modern construction techniques that meet current living standards. The post-evaluation phase, conducted through questionnaires and semi-structured interviews, assesses user satisfaction, focusing on the impact of architectural esthetics, structural stability, and material choices. Key findings from an OLS regression highlight the strong positive correlation between architectural style, structural choices, and cultural relevance with resident satisfaction. The research emphasizes that design elements such as structural details, materials, and infrastructure upgrades are critical in shaping perceptions of both functionality and cultural identity. Interestingly, the model reveals that improving architectural esthetics, alongside modern indoor features such as network connectivity, has a significant impact on enhancing overall resident satisfaction (significance level: 0.181). This study contributes to the broader discourse on sustainable building renovation by demonstrating how traditional architecture can be thoughtfully adapted for contemporary use and also proposes a paradigm shift in the renovation of historic buildings, advocating for a balance between preservation and modernization. The application of sustainable materials, digital modeling, and innovative construction techniques further ensures that these traditional structures meet the demands of modern civilization while maintaining their cultural integrity. Full article
Show Figures

Figure 1

Figure 1
<p>Pre-planning and post-evaluation (PPPE) design framework.</p>
Full article ">Figure 2
<p>Creating and evaluating a spatial perception framework for rural architecture based on field theory.</p>
Full article ">Figure 3
<p>Research object.</p>
Full article ">Figure 4
<p>Analysis of building lighting and thermal insulation under climate influence.</p>
Full article ">Figure 5
<p>Comparison of architectural outdoor performance before and after reconstruction.</p>
Full article ">Figure 6
<p>Analysis of the design structure and major space of <span class="html-italic">Shanpian</span> House.</p>
Full article ">Figure 7
<p>Comparison of indoor space design before and after construction.</p>
Full article ">Figure 8
<p>Prediction of architectural appearance impact on overall satisfaction.</p>
Full article ">Figure 9
<p>Prediction of architectural structure and device impact on overall satisfaction.</p>
Full article ">Figure 10
<p>Prediction of architectural space and performance impact on overall satisfaction.</p>
Full article ">
18 pages, 1210 KiB  
Review
A Narrative Review of Identity, Data and Location Privacy Techniques in Edge Computing and Mobile Crowdsourcing
by Syed Raza Bashir, Shaina Raza and Vojislav Misic
Electronics 2024, 13(21), 4228; https://doi.org/10.3390/electronics13214228 - 28 Oct 2024
Viewed by 558
Abstract
As digital technology advances, the proliferation of connected devices poses significant challenges and opportunities in mobile crowdsourcing and edge computing. This narrative review focuses on the need for privacy protection in these fields, emphasizing the increasing importance of data security in a data-driven [...] Read more.
As digital technology advances, the proliferation of connected devices poses significant challenges and opportunities in mobile crowdsourcing and edge computing. This narrative review focuses on the need for privacy protection in these fields, emphasizing the increasing importance of data security in a data-driven world. Through an analysis of contemporary academic literature, this review provides an understanding of the current trends and privacy concerns in mobile crowdsourcing and edge computing. We present insights and highlight advancements in privacy-preserving techniques, addressing identity, data, and location privacy. This review also discusses the potential directions that can be useful resources for researchers, industry professionals, and policymakers. Full article
(This article belongs to the Special Issue Data Security and Data Analytics in Cloud Computing)
Show Figures

Figure 1

Figure 1
<p>Publication trend on privacy in edge computing and mobile crowdsourcing in recent years. The full year 2024 is not covered, so additional publications are expected.</p>
Full article ">Figure 2
<p>Top publishers by number of publications in the field.</p>
Full article ">Figure 3
<p>Publication trends over time by topic.</p>
Full article ">Figure 4
<p>Flow of the privacy-preserving methods covered in this work.</p>
Full article ">Figure 5
<p>Anatomy of a mobile crowdsourcing campaign.</p>
Full article ">Figure 6
<p>Edge computing architecture illustrating the interplay between user, edge, and cloud layers.</p>
Full article ">
10 pages, 3817 KiB  
Article
Brevundimonas aurifodinae, sp. nov., an Aerobic Anoxygenic Phototroph Resistant to Metalloid Oxyanions Isolated from Gold Mine Tailings
by Chris Maltman, Katia Messner, John A. Kyndt and Vladimir Yurkov
Microorganisms 2024, 12(11), 2167; https://doi.org/10.3390/microorganisms12112167 - 27 Oct 2024
Viewed by 586
Abstract
A polyphasic taxonomic study was carried out on the rod-shaped, orange-pigmented strain C11T, isolated from gold mine tailings. Sequencing of the 16S rRNA gene showed a relatedness to Brevundimonas, with a 98.4% and 98.2% similarity to Brevundimonas bacteroides and Brevundimonas [...] Read more.
A polyphasic taxonomic study was carried out on the rod-shaped, orange-pigmented strain C11T, isolated from gold mine tailings. Sequencing of the 16S rRNA gene showed a relatedness to Brevundimonas, with a 98.4% and 98.2% similarity to Brevundimonas bacteroides and Brevundimonas variabilis, respectively. The average nucleotide identity and a digital DNA–DNA hybridization with the closest phylogenetic neighbor of strain C11T indicate distinction at the species level, further confirmed by the differences in physiology. C18:1 ω7c is the dominant cellular fatty acid. Its DNA G + C content is 68.3 mol %. Its predominant ubiquinone is Q-10; 1,2-Di-O-acyl-3-O-α-D-glucopyranuronosyl glycerol, phosphatidylglycerol, 1,2-di-O-acyl-3-O-α-D-glucopyranosyl glycerol, and 1,2-di-O-acyl-3-O-[D-glucopyranosyl-(1→4)-α-D-glucopyranuronosyl] glycerol are its major polar lipid constituents. This bacterium produces bacteriochlorophyll a and tolerates high concentrations of (μg/mL) the following: tellurium (>1500), selenium (1000 to >5000), and vanadium (>5000) oxyanions. The data support the inclusion of the strain C11T into the genus Brevundimonas as a new species with the proposed name Brevundimonas aurifodinae sp. nov. (C11T = NRRL B-61758T; =DSM 118059T). Full article
Show Figures

Figure 1

Figure 1
<p>Strain C11<sup>T</sup> growth at different pH (<b>A</b>) and NaCl concentrations (<b>B</b>). The optimum is the darkened bar. Standard deviations are added.</p>
Full article ">Figure 2
<p>Photosynthetic complex, cell morphology, and pigmentation of strain C11<sup>T</sup>. (<b>A</b>) Whole cell (light orange line) and pigment extract (dark orange, dashed line) absorbance spectra. Peaks and shoulders of importance are indicated. (<b>B</b>) Phase contrast micrograph of cells. Bar is 5 μm. (<b>C</b>) Liquid culture.</p>
Full article ">Figure 3
<p>Maximum Likelihood 16S rRNA phylogenetic tree of strain C11<sup>T</sup> and validated species in <span class="html-italic">Brevundimonas</span>. The scale bar represents the amount of substitutions per nucleotide. Accession numbers are in parenthesis. Value at nodes indicate the bootstrap support calculated with a neighbor joining analysis of 1000 resampled datasets; only values &gt; 50% are shown. <span class="html-italic">Aquidulcibacter paucihalophilus</span> LMG 28362<sup>T</sup> was used as the outgroup.</p>
Full article ">Figure 4
<p>Genome Blast Distance Phylogeny tree of strain C11<sup>T</sup> among species of the genus <span class="html-italic">Brevundimonas</span>. The blue numbers on branches are the pseudo-bootstrap support values &gt; 60% from 100 replications, with an average branch support of 81.3%. The black numbers represent the branch length. The tree was rooted at the midpoint.</p>
Full article ">
27 pages, 1316 KiB  
Review
Digital Device Usage and Childhood Cognitive Development: Exploring Effects on Cognitive Abilities
by Vicente Javier Clemente-Suárez, Ana Isabel Beltrán-Velasco, Silvia Herrero-Roldán, Stephanie Rodriguez-Besteiro, Ismael Martínez-Guardado, Alexandra Martín-Rodríguez and Jose Francisco Tornero-Aguilera
Children 2024, 11(11), 1299; https://doi.org/10.3390/children11111299 - 27 Oct 2024
Viewed by 2183
Abstract
The increasing ubiquity of digital devices in childhood had outpaced the understanding of their effects on cognitive development, creating a significant research gap regarding their long-term impact. Objective: The present narrative overview explored the complex relationship between digital device usage and cognitive development [...] Read more.
The increasing ubiquity of digital devices in childhood had outpaced the understanding of their effects on cognitive development, creating a significant research gap regarding their long-term impact. Objective: The present narrative overview explored the complex relationship between digital device usage and cognitive development in childhood. Methods: We conducted a comprehensive literature search across multiple databases, including PubMed, Embase, Scopus, and Web of Science, to critically assess cognitive domains such as attention, memory, executive functions, problem-solving skills, and social cognition. Incorporating over 157 peer-reviewed studies published between 2001 and 2024, we used strict inclusion and exclusion criteria to ensure scientific rigor. Results: The review integrated empirical findings with established theoretical frameworks, particularly from cognitive development and media psychology, to highlight both the advantages and risks of early, frequent exposure to technology. The potential for digital devices to enhance cognitive skills, such as multitasking and information processing, was weighed against risks such as cognitive overload, diminished attention spans, and impaired social skills. We also examined psychological and behavioral outcomes, including identity formation, emotional regulation, and maladaptive behaviors associated with excessive screen time. Additionally, we identified strategies to mitigate negative effects, emphasizing structured digital engagement and parental involvement to support healthy cognitive and psychological growth. Our findings provided actionable recommendations for parents, educators, and policymakers, promoting optimal digital practices that enhanced cognitive development while safeguarding against potential harms. Conclusions: The review offered essential insights for stakeholders in child development, education, and policy-making, highlighting the need for balanced integration of digital tools in childhood learning environments. Full article
(This article belongs to the Section Pediatric Neurology & Neurodevelopmental Disorders)
Show Figures

Figure 1

Figure 1
<p>PRISMA flow diagram.</p>
Full article ">Figure 2
<p>The influence of using digital devices on the development of children and the importance of considering the context, content, and duration of this usage.</p>
Full article ">Figure 3
<p>Potential Negative Impacts of Excessive Device Use on Children.</p>
Full article ">
12 pages, 217 KiB  
Essay
The Architecture of Immortality Through Neuroengineering
by Dany Moussa and Hind Moussa
Philosophies 2024, 9(6), 163; https://doi.org/10.3390/philosophies9060163 - 25 Oct 2024
Viewed by 648
Abstract
From mobile health and wearables to implantable medical devices and neuroprosthetics, the integration of machines into human biology and cognition is expanding. This paper explores the technological advancements that are pushing the human–machine boundaries further, raising profound questions about identity and existence in [...] Read more.
From mobile health and wearables to implantable medical devices and neuroprosthetics, the integration of machines into human biology and cognition is expanding. This paper explores the technological advancements that are pushing the human–machine boundaries further, raising profound questions about identity and existence in digital realms. The development of robots, androids, and AI–human hybrids promises to augment human capabilities beyond current limits. However, alongside these advancements, significant limitations arise: biological, technical, ethical, and legal. This paper further discusses the existential implications of these technological strides. It addresses the philosophical dimensions of mortality, forgiveness, and the significance of death in a world where technological immortality may be within reach. By addressing these questions, the paper seeks to provide a comprehensive analysis of the potential for these advancements to reshape our understanding of existence and the quest for immortality. Full article
Back to TopTop