Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (5,492)

Search Parameters:
Keywords = threat model

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
21 pages, 4681 KiB  
Article
Evaluation of Fifteen 5,6-Dihydrotetrazolo[1,5-c]quinazolines Against Nakaseomyces glabrata: Integrating In Vitro Studies, Molecular Docking, QSAR, and In Silico Toxicity Assessments
by Lyudmyla Antypenko, Oleksii Antypenko, Alina Fominichenko, Iryna Karnaukh, Serhii Kovalenko and Mieko Arisawa
J. Fungi 2024, 10(12), 816; https://doi.org/10.3390/jof10120816 (registering DOI) - 25 Nov 2024
Viewed by 37
Abstract
Nakaseomyces glabrata (Candida glabrata), the second most prevalent Candida pathogen globally, has emerged as a major clinical threat due to its ability to develop high-level azole resistance. In this study, two new 5,6-dihydrotetrazolo[1,5-c]quinazoline derivatives (c11 and c12) [...] Read more.
Nakaseomyces glabrata (Candida glabrata), the second most prevalent Candida pathogen globally, has emerged as a major clinical threat due to its ability to develop high-level azole resistance. In this study, two new 5,6-dihydrotetrazolo[1,5-c]quinazoline derivatives (c11 and c12) were synthesized and characterized using IR, LC-MS, 1H, and 13C NMR spectra. Along with 13 previously reported analogues, these compounds underwent in vitro antifungal testing against clinical N. glabrata isolates using a serial dilution method (0.125–64 mg/L). Remarkably, compounds c5 and c1 exhibited potent antifungal activity, with minimum inhibitory concentrations of 0.37 μM and 0.47 μM, respectively—about a 20-fold improvement in μM concentration over standard drugs like amphotericin B, caspofungin, and micafungin. A detailed structure–activity relationship analysis revealed crucial molecular features enhancing antifungal potency. Extensive molecular docking studies across 18 protein targets explored potential binding pockets and affinities of the lead compounds. A robust 3D-QSAR model, incorporating molecular descriptors Mor26m and Mor29e, displayed good predictive ability for antifungal activity. In silico predictions indicated an absence of herbicidal effect, negligible environmental toxicity (to honeybees, avian species, and aquatic organisms), and mild human toxicity concerns for these compounds. This comprehensive approach aims to develop novel and effective antifungal compounds against the clinically relevant pathogen N. glabrata. Full article
(This article belongs to the Special Issue Fungal Infections: New Challenges and Opportunities, 2nd Edition)
Show Figures

Figure 1

Figure 1
<p>Examples of reported antifungal compounds targeting Candida species, with a focus on the studied 5,6-dihydrotetrazolo[1,5-<span class="html-italic">c</span>]quinazolines (numbering follows a previous antimicrobial study [<a href="#B36-jof-10-00816" class="html-bibr">36</a>], and includes investigated substances with two additional novel ones, <b>c11</b> and <b>c12</b>, for continuity).</p>
Full article ">Figure 2
<p>Minimum inhibitory concentration (μM) of 5,6-dihydrotetrazolo[1,5-<span class="html-italic">c</span>]quinazolines (yellow color) and references (<b>Mf</b>: micafungin, <b>Cf</b>: caspofungin, <b>AfB</b>: amphotericin B; blue color). And their structure–activity relationship against <span class="html-italic">N. glabrata.</span> General molecular structure was optimized by HyperChem 8.0.8, and Discovery Studio v21.1.0.20298 was used for 3D visualization.</p>
Full article ">Figure 3
<p>Visual 3D representation of the sterol uptake control protein 2 (PDB ID: 7VPR) with lead-compound <b>c1</b> (Vina score −10.4 kkal/mol), showing bonds formation in its cavity of chain D. All ten formed bonds were hydrophobic: π-σ in blue color; π-π stacked in light blue color; alkyl in pink color; π-alkyl in orange color. Discovery Studio v21.1.0.20298 was used for 3D visualization.</p>
Full article ">Figure 4
<p>Correlation graphs of predicted vs. experimental MIC (μM/mg/L) of model equations.</p>
Full article ">Figure 5
<p>Calculated minnow toxicity (log LD<sub>50</sub>, mg/kg/day, results were multiplied in 100 for the same scale; results below 30: high acute), rat acute toxicity (LD<sub>50</sub>, mg/kg; results were divided in 10 for the same scale; results under 5: strong; 5–50: moderate; 50–500: slightly; over 500: safe), and rat chronic toxicity (lowest observed adverse effect level (LOAEL), mg/kg/day; results under 10: strong; 10–50: medium; over 50: weak).</p>
Full article ">Figure 6
<p>Pearson coefficient of correlation between predicted affinity (Vina score, kcal/mol) to CYP51 (sterol 14-alpha demethylase, PDB ID: 5TZ1) [<a href="#B36-jof-10-00816" class="html-bibr">36</a>] and toxicity (MT: minnow toxicity, log LD<sub>50</sub>, mg/kg/day), RAT: rat acute toxicity (LD<sub>50</sub>, mg/kg), RCT: rat chronic toxicity (LOAEL, mg/kg/day) [<a href="#B72-jof-10-00816" class="html-bibr">72</a>].</p>
Full article ">
40 pages, 3414 KiB  
Article
Investigating the Predominance of Large Language Models in Low-Resource Bangla Language over Transformer Models for Hate Speech Detection: A Comparative Analysis
by Fatema Tuj Johora Faria, Laith H. Baniata and Sangwoo Kang
Mathematics 2024, 12(23), 3687; https://doi.org/10.3390/math12233687 (registering DOI) - 25 Nov 2024
Viewed by 85
Abstract
The rise in abusive language on social media is a significant threat to mental health and social cohesion. For Bengali speakers, the need for effective detection is critical. However, current methods fall short in addressing the massive volume of content. Improved techniques are [...] Read more.
The rise in abusive language on social media is a significant threat to mental health and social cohesion. For Bengali speakers, the need for effective detection is critical. However, current methods fall short in addressing the massive volume of content. Improved techniques are urgently needed to combat online hate speech in Bengali. Traditional machine learning techniques, while useful, often require large, linguistically diverse datasets to train models effectively. This paper addresses the urgent need for improved hate speech detection methods in Bengali, aiming to fill the existing research gap. Contextual understanding is crucial in differentiating between harmful speech and benign expressions. Large language models (LLMs) have shown state-of-the-art performance in various natural language tasks due to their extensive training on vast amounts of data. We explore the application of LLMs, specifically GPT-3.5 Turbo and Gemini 1.5 Pro, for Bengali hate speech detection using Zero-Shot and Few-Shot Learning approaches. Unlike conventional methods, Zero-Shot Learning identifies hate speech without task-specific training data, making it highly adaptable to new datasets and languages. Few-Shot Learning, on the other hand, requires minimal labeled examples, allowing for efficient model training with limited resources. Our experimental results show that LLMs outperform traditional approaches. In this study, we evaluate GPT-3.5 Turbo and Gemini 1.5 Pro on multiple datasets. To further enhance our study, we consider the distribution of comments in different datasets and the challenge of class imbalance, which can affect model performance. The BD-SHS dataset consists of 35,197 comments in the training set, 7542 in the validation set, and 7542 in the test set. The Bengali Hate Speech Dataset v1.0 and v2.0 include comments distributed across various hate categories: personal hate (629), political hate (1771), religious hate (502), geopolitical hate (1179), and gender abusive hate (316). The Bengali Hate Dataset comprises 7500 non-hate and 7500 hate comments. GPT-3.5 Turbo achieved impressive results with 97.33%, 98.42%, and 98.53% accuracy. In contrast, Gemini 1.5 Pro showed lower performance across all datasets. Specifically, GPT-3.5 Turbo excelled with significantly higher accuracy compared to Gemini 1.5 Pro. These outcomes highlight a 6.28% increase in accuracy compared to traditional methods, which achieved 92.25%. Our research contributes to the growing body of literature on LLM applications in natural language processing, particularly in the context of low-resource languages. Full article
Show Figures

Figure 1

Figure 1
<p>Visual representation of comment distribution across datasets in Dataset 1.</p>
Full article ">Figure 2
<p>Detailed visual examples of hate speech detection categories in Dataset 1.</p>
Full article ">Figure 3
<p>Visual representation of comment distribution across datasets in Dataset 2.</p>
Full article ">Figure 4
<p>Detailed visual examples of hate speech detection categories in Dataset 2.</p>
Full article ">Figure 5
<p>Visual representation of comment distribution across datasets in Dataset 3.</p>
Full article ">Figure 6
<p>Detailed visual examples of hate speech detection categories in Dataset 3.</p>
Full article ">Figure 7
<p>The diagram showcases the suggested methodology for Bangla hate speech detection using PLMs.</p>
Full article ">Figure 8
<p>Illustration of prompt design for Zero-Shot Learning with Gemini 1.5 Pro and GPT-3.5 Turbo in Dataset 1.</p>
Full article ">Figure 9
<p>Illustration of prompt design for Zero-Shot Learning with Gemini 1.5 Pro and GPT-3.5 Turbo in Dataset 2.</p>
Full article ">Figure 10
<p>Illustration of prompt design for Zero-Shot Learning with Gemini 1.5 Pro and GPT-3.5 Turbo in Dataset 3.</p>
Full article ">Figure 11
<p>Visual representation of prompt design for Few-Shot Learning using Gemini 1.5 Pro and GPT-3.5 Turbo in Dataset 1.</p>
Full article ">Figure 12
<p>Visual representation of prompt design for Few-Shot Learning using Gemini 1.5 Pro and GPT-3.5 Turbo in Dataset 2.</p>
Full article ">Figure 13
<p>Visual representation of prompt design for Few-Shot Learning using Gemini 1.5 Pro and GPT-3.5 Turbo in Dataset 3.</p>
Full article ">Figure 14
<p>Visualization of confusion matrices showing the performance of BanglaBERT and Bangla BERT Base in hate speech detection.</p>
Full article ">Figure 15
<p>Visualization of confusion matrices showing the performance of BanglaBERT in hate speech detection for Dataset 2.</p>
Full article ">Figure 16
<p>Error analysis of Large Language Models on Bangla hate speech detection.</p>
Full article ">
16 pages, 1271 KiB  
Article
Impact of Geographic Location on Risks of Fintech as a Representative of Financial Institutions
by Yelena Popova, Olegs Cernisevs and Sergejs Popovs
Geographies 2024, 4(4), 753-768; https://doi.org/10.3390/geographies4040041 (registering DOI) - 25 Nov 2024
Viewed by 142
Abstract
The activities of contemporary financial institutions require significant geographic expansion. Even the increased level of industry digitalisation does not minimise the importance of the physical assets of financial institutions. The environmental factors specific to each geographic region can significantly influence the efficiency of [...] Read more.
The activities of contemporary financial institutions require significant geographic expansion. Even the increased level of industry digitalisation does not minimise the importance of the physical assets of financial institutions. The environmental factors specific to each geographic region can significantly influence the efficiency of operations of financial institutions. The goal of the article is to determine the impact of the geographic location of physical assets via environmental risks affecting the other risks of fintech as a representative of financial institutions. The impact is determined by the employment of the PLS-SEM model implemented in SmartPLS 4.0 software. The model determines the impact of environmental risks on governance risks, operational risks, human resources and safety risks, ICT risks, compliance risks, and strategic risks. These groups of risks form the latent variables, which comprise the experts’ estimation of threats and vulnerabilities impacts and their likelihoods. After testing five hypotheses, two of them were supported—environmental risks impact human resources safety risks and operational risks. Full article
Show Figures

Figure 1

Figure 1
<p>PLS-SEM model graphical view.</p>
Full article ">Figure 2
<p>f<sup>2</sup> effect sizes.</p>
Full article ">
17 pages, 5777 KiB  
Article
Monitoring the Degree of Gansu Zokor Damage in Chinese Pine by Hyperspectral Remote Sensing
by Yang Hu, Xiaoluo Aba, Shien Ren, Jing Yang, Xin He, Chenxi Zhang, Yi Lu, Yanqi Jiang, Liting Wang, Yijie Chen, Xiaoqin Mi and Xiaoning Nan
Forests 2024, 15(12), 2074; https://doi.org/10.3390/f15122074 (registering DOI) - 24 Nov 2024
Viewed by 344
Abstract
Chinese pine has been extensively planted in the Loess Plateau, but it faces significant threats from Gansu zokor. Traditional methods for monitoring rodent damage rely on manual surveys to assess damage rates but are time-consuming and often underestimate the actual degree of damage, [...] Read more.
Chinese pine has been extensively planted in the Loess Plateau, but it faces significant threats from Gansu zokor. Traditional methods for monitoring rodent damage rely on manual surveys to assess damage rates but are time-consuming and often underestimate the actual degree of damage, particularly in mildly affected pines. This study proposes a remote sensing monitoring method that integrates hyperspectral analysis with physiological and biochemical parameter models to enhance the accuracy of rodent damage detection. Using ASD Field Spec 4, we analyzed spectral data from 125 Chinese pine needles, measuring chlorophyll (CHC), carotenoid (CAC), and water content (WAC). Through correlation analysis, we identified sensitive vegetation indices (VIs) and red-edge parameters (REPs) linked to different levels of damage. We report several key results. The 680 nm spectral band is instrumental in monitoring damage, with significant decreases in CHC, CAC, and WAC corresponding to increased damage severity. We identified six VIs and five REPs, which were later predicted using stepwise regression (SR), support vector machine (SVM), and random forest (RF) models. Among all models, the vegetation index-based RF model exhibited the best predictive performance, achieving coefficient of determination (R2) values of 0.988, 0.949, and 0.999 for CHC, CAC, and WAC, with root mean square errors (RMSEs) of 0.115 mg/g, 0.042 mg/g, and 0.007 mg/g, and mean relative errors (MREs) of 8.413%, 9.169%, and 1.678%. This study demonstrates the potential of hyperspectral remote sensing technology for monitoring rodent infestations in Chinese pines, providing a reliable basis for large-scale assessments and effective management strategies for pest control. Full article
(This article belongs to the Special Issue Risk Assessment and Management of Forest Pest Outbreaks)
Show Figures

Figure 1

Figure 1
<p>Overview of the study area.</p>
Full article ">Figure 2
<p>Spectral reflectance (<b>a</b>) and first derivative spectral reflectance (<b>b</b>) of Chinese pine needles at different damage levels.</p>
Full article ">Figure 3
<p>Physiological and biochemical parameter changes (<b>a</b>) and multiple comparisons (<b>b</b>) in Chinese pine under different levels of damage. Distinct letters (a–e) above the bars represent statistically significant differences among groups (<span class="html-italic">p</span> &lt; 0.05).</p>
Full article ">Figure 4
<p>Correlation between physiological and biochemical parameters of Chinese pine and vegetation indices (<b>a</b>) and red-edge parameters (<b>b</b>).</p>
Full article ">Figure 5
<p>Chlorophyll content estimation model accuracy comparison. (<b>a</b>) SR model with VIs as input variables; (<b>b</b>) SVM model with VIs as input variables; (<b>c</b>) RF model with VIs as input variables; (<b>d</b>) SR model with REPs as input variables; (<b>e</b>) SVM model with REPs as input variables; (<b>f</b>) RF model with REPs as input variables.</p>
Full article ">Figure 6
<p>Carotenoid content estimation model accuracy comparison. (<b>a</b>) SR model with VIs as input variables; (<b>b</b>) SVM model with VIs as input variables; (<b>c</b>) RF model with VIs as input variables; (<b>d</b>) SR model with REPs as input variables; (<b>e</b>) SVM model with REPs as input variables; (<b>f</b>) RF model with REPs as input variables.</p>
Full article ">Figure 7
<p>Water content estimation model accuracy comparison. (<b>a</b>) SR model with VIs as input variables; (<b>b</b>) SVM model with VIs as input variables; (<b>c</b>) RF model with VIs as input variables; (<b>d</b>) SR model with REPs as input variables; (<b>e</b>) SVM model with REPs as input variables; (<b>f</b>) RF model with REPs as input variables.</p>
Full article ">Figure A1
<p>Images of ground trees, needles, and roots of pine trees at different levels of damage.</p>
Full article ">
20 pages, 3346 KiB  
Article
Privacy-Preserving Modeling of Trajectory Data: Secure Sharing Solutions for Trajectory Data Based on Granular Computing
by Yanjun Chen, Ge Zhang, Chengkun Liu and Chunjiang Lu
Mathematics 2024, 12(23), 3681; https://doi.org/10.3390/math12233681 (registering DOI) - 24 Nov 2024
Viewed by 259
Abstract
Trajectory data are embedded within driving paths, GPS positioning systems, and mobile signaling information. A vast amount of trajectory data play a crucial role in the development of smart cities. However, these trajectory data contain a significant amount of sensitive user information, which [...] Read more.
Trajectory data are embedded within driving paths, GPS positioning systems, and mobile signaling information. A vast amount of trajectory data play a crucial role in the development of smart cities. However, these trajectory data contain a significant amount of sensitive user information, which poses a substantial threat to personal privacy. In this work, we have constructed an internal secure information granule model based on differential privacy to ensure the secure sharing and analysis of trajectory data. This model deeply integrates granular computing with differential privacy, addressing the issue of privacy leakage during the sharing of trajectory data. We introduce the Laplace mechanism during the granulation of information granules to ensure data security, and the flexibility at the granularity level provides a solid foundation for subsequent data analysis. Meanwhile, this work demonstrates the practical applications of the solution for the secure sharing of trajectory data. It integrates trajectory data with economic data using the Takagi–Sugeno fuzzy rule model to fit and predict regional economies, thereby verifying the feasibility of the granular computing model based on differential privacy and ensuring the privacy and security of users’ trajectory information. The experimental results show that the information granule model based on differential privacy can more effectively enable data analysis. Full article
(This article belongs to the Section Fuzzy Sets, Systems and Decision Making)
17 pages, 7457 KiB  
Article
An Assessment of the Tipping Point Behavior for Shoreline Retreat: A PCR Model Application at Vung Tau Beach, Vietnam
by Xiaoting Wang, Ali Dastgheib, Johan Reyns, Fan Li, Trang Minh Duong, Weiguo Zhang, Qinke Sun and Roshanka Ranasinghe
J. Mar. Sci. Eng. 2024, 12(12), 2141; https://doi.org/10.3390/jmse12122141 (registering DOI) - 24 Nov 2024
Viewed by 232
Abstract
Storm waves and rising sea levels pose significant threats to low-lying coastal areas, particularly sandy beaches, which are especially vulnerable. The research on the long-time-scale changes in sandy coasts, especially the identification of tipping points in the shoreline-retreat rate, is limited. Vung Tau [...] Read more.
Storm waves and rising sea levels pose significant threats to low-lying coastal areas, particularly sandy beaches, which are especially vulnerable. The research on the long-time-scale changes in sandy coasts, especially the identification of tipping points in the shoreline-retreat rate, is limited. Vung Tau beach, characterized by its low terrain and rapid tourism-driven economic growth, was selected as a typical study area to quantify the shoreline retreat throughout the 21st century under various sea-level rise (SLR) scenarios, and to identify the existence of tipping points by investigating the projected annual change in shoreline retreat (m/yr). This study employs the Probabilistic Coastline Recession (PCR) model, a physics-based tool specifically designed for long-term coastline change assessments. The results indicate that shoreline retreat accelerates over time, particularly after a tipping point is reached around 2050 in the SSP1-2.6, SSP2-4.5, and SSP5-8.5 scenarios. Under the SSP5-8.5 scenario, the median retreat distance is projected to increase from 19 m in 2050 to 89 m by 2100, nearly a fourfold rise. In comparison, the retreat distances are smaller under the SSP1-2.6 and SSP2-4.5 scenarios, but the same accelerating trend is observed beyond 2050. These findings highlight the growing risks associated with sea-level rise, especially the rapid increase in exceedance probabilities for retreat distances by the end of the century. By 2100, the probability of losing the entire beach at Vung Tau is projected to be 22% under SSP5-8.5. The approach of identifying tipping points based on the PCR model presented here can be applied to other sandy coastal regions, providing critical references for timely planning and the implementation of adaptation measures. Full article
(This article belongs to the Special Issue Coastal Evolution and Erosion under Climate Change)
Show Figures

Figure 1

Figure 1
<p>Map showing Vung Tau and its location in Vietnam. The solid red line represents the study area’s coastline. The land-use data are source from OpenStreetMap [<a href="#B24-jmse-12-02141" class="html-bibr">24</a>]. The coastal bathymetry is nearly 6.5 km off the coast, derived from the Southern Institute of Water Resources Research, Vietnam.</p>
Full article ">Figure 2
<p>The wave rose of Vung Tau beach. The wave data are downloaded from the Copernicus Climate Date Store and are derived from ERA5 hourly reanalysis data from 1993 to 2022.</p>
Full article ">Figure 3
<p>Vung Tau average beach profile.</p>
Full article ">Figure 4
<p>Regional relative sea-level rise curves for the SSP1-2.6, SSP2-4.5, and SS5-8.5 scenarios, calculated using the approach given by Nicholls et al. [<a href="#B28-jmse-12-02141" class="html-bibr">28</a>] together with the IPCC AR6 sea-level projections.</p>
Full article ">Figure 5
<p>The scheme of the PCR model implementation. <span class="html-italic">Hs</span>: maximum wave height in one storm, <span class="html-italic">T<sub>p</sub></span>: peak period associated with H, <span class="html-italic">Dur</span>: duration of storm, <span class="html-italic">Dir</span>: mean direction of storm, <span class="html-italic">S</span>: gap between two storms, <span class="html-italic">SLR</span>: sea-level rise, <span class="html-italic">CDF</span>: cumulative distribution function.</p>
Full article ">Figure 6
<p>Storm identification of Vung Tau over a 30-year period from 1993 to 2022. Green represents the storm identification threshold, blue indicates all wave data, and red shows identified storm events.</p>
Full article ">Figure 7
<p>Cumulative distribution curve of historical storm events from 1993 to 2022. Generalized extreme value distribution fitting (GEV-fit) of the maximum significant wave height (<b>a</b>) and storm duration (<b>b</b>).</p>
Full article ">Figure 8
<p>Dependency distribution: maximum significant wave height and mean wave direction during the storm (<b>a</b>), and maximum significant wave height and storm duration (<b>b</b>). The blue circles represent 154 storm events from 1993 to 2022.</p>
Full article ">Figure 9
<p>Joint probability model of the cumulative distribution function (CDF) of maximum wave height and storm duration in Vung Tau. The black circles represent 154 storm events from 1993 to 2022.</p>
Full article ">Figure 10
<p>Linear distribution of maximum significant wave height and mean peak wave period during storms in Vung Tau.</p>
Full article ">Figure 11
<p>The exceedance probability curves of cumulative shoreline retreat for 2050, 2080, and 2100 under the SSP1-2.6, SSP2-4.5, and SSP5-8.5 scenarios. The positive values of shoreline retreat indicate coastal erosion and the negative values of shoreline retreat represent coastal accretion. The gray rectangle represents the road location.</p>
Full article ">Figure 12
<p>The annual shoreline changes in the 3-year average position compared to the previous year’s shoreline position under the SSP1-2.6 (<b>a</b>), SSP2-4.5 (<b>b</b>), and SSP5-8.5 (<b>c</b>) scenarios.</p>
Full article ">Figure 13
<p>The average annual change rate of P50 during the three time periods (2030–2050, 2051–2080, and 2081–2100) under the SSP1-2.6, SSP2-4.5, and SSP5-8.5 scenarios.</p>
Full article ">
27 pages, 19927 KiB  
Article
Metabonomics and Transcriptomics Analyses Reveal the Underlying HPA-Axis-Related Mechanisms of Lethality in Larimichthys polyactis Exposed to Underwater Noise Pollution
by Qinghua Jiang, Yu Zhang, Ting Ye, Xiao Liang and Bao Lou
Int. J. Mol. Sci. 2024, 25(23), 12610; https://doi.org/10.3390/ijms252312610 - 24 Nov 2024
Viewed by 211
Abstract
The problem of marine noise pollution has a long history. Strong noise (>120 dB re 1 µPa) will affects the growth, development, physiological responses, and behaviors of fish, and also can induce the stress response, posing a mortal threat. Although many studies have [...] Read more.
The problem of marine noise pollution has a long history. Strong noise (>120 dB re 1 µPa) will affects the growth, development, physiological responses, and behaviors of fish, and also can induce the stress response, posing a mortal threat. Although many studies have reported that underwater noise may affect the survival of fish by disturbing their nervous system and endocrine system, the underlying causes of death due to noise stimulation remain unknown. Therefore, in this study, we used the underwater noise stress models to conduct underwater strong noise (50–125 dB re 1 µPa, 10–22,000 Hz) stress experiments on small yellow croaker for 10 min (short-term noise stress) and 6 days (long-term noise stress). A total of 150 fishes (body weight: 40–60 g; body length: 12–14 cm) were used in this study. Omics (metabolomics and transcriptomics) studies and quantitative analyses of important genes (HPA (hypothalamic–pituitary–adrenal)-axis functional genes) were performed to reveal genetic and metabolic changes in the important tissues associated with the HPA axis (brain, heart, and adrenal gland). Finally, we found that the strong noise pollution can significantly interfere with the expression of HPA-axis functional genes (including corticotropin releasing hormone (CRH), corticotropin releasing hormone receptor 2 (CRHR2), and arginine vasotocin (AVT)), and long-term stimulation can further induce metabolic disorders of the functional tissues (brain, heart, and adrenal gland), posing a lethal threat. Meanwhile, we also found that there were two kinds of death processes, direct death and chronic death, and both were closely related to the duration of stimulation and the regulation of the HPA axis. Full article
(This article belongs to the Special Issue Fish Nutrition, Metabolism and Physiology)
26 pages, 794 KiB  
Article
Securing the Future of Web-Enabled IoT: A Critical Analysis of Web of Things Security
by Khalied M. Albarrak
Appl. Sci. 2024, 14(23), 10867; https://doi.org/10.3390/app142310867 - 23 Nov 2024
Viewed by 523
Abstract
The Web of Things (WoT) represents a significant advancement on the Internet of Things (IoT), where web technologies are integrated to enhance device interoperability and accessibility. While this integration offers numerous benefits, it also introduces new and complex security challenges. This paper presents [...] Read more.
The Web of Things (WoT) represents a significant advancement on the Internet of Things (IoT), where web technologies are integrated to enhance device interoperability and accessibility. While this integration offers numerous benefits, it also introduces new and complex security challenges. This paper presents a critical analysis of WoT security, examining the ecosystem’s vulnerabilities and associated threats. Our contributions include an in-depth analysis of existing threat enumeration methodologies, highlighting misconceptions and inefficiencies that may weaken security measures. We further conduct a comprehensive survey of critical threats within the WoT environment, detailing potential attack vectors and misuses linked to these threats. To address these security gaps, we propose a set of defenses tailored to each identified threat, providing a holistic view of the WoT’s security landscape. We also develop abstract architectural models of the WoT using UML, serving as foundational tools for understanding the interactions and risks within WoT systems. Finally, we model a specific attack scenario, demonstrating how attacks unfold in real-world WoT environments and the importance of defense strategies. These findings aim to guide the development of secure WoT systems, ensuring robust defenses against evolving security threats. Full article
26 pages, 1789 KiB  
Article
How Do Algorithmic Management Practices Affect Workforce Well-Being? A Parallel Moderated Mediation Model
by Husam Zayid, Ahmad Alzubi, Ayşen Berberoğlu and Amir Khadem
Behav. Sci. 2024, 14(12), 1123; https://doi.org/10.3390/bs14121123 - 23 Nov 2024
Viewed by 334
Abstract
Modern workplaces increasingly use algorithmic management practices (AMPs), which shape task assignment, monitoring, and evaluation. Despite the potential benefits these practices offer, like increased efficiency and objectivity, their impact on workforce well-being (WFW) has raised concerns. Drawing on self-determination theory (SDT) and conservation [...] Read more.
Modern workplaces increasingly use algorithmic management practices (AMPs), which shape task assignment, monitoring, and evaluation. Despite the potential benefits these practices offer, like increased efficiency and objectivity, their impact on workforce well-being (WFW) has raised concerns. Drawing on self-determination theory (SDT) and conservation of resources theory (COR), this study examines the relationship between algorithmic management practices and workforce well-being, incorporating job burnout (JBO) and perceived threat (PT) as parallel mediators and person–job fit (PJF) as a moderator. The research employed a cross-sectional survey design targeting 2450 KOSGEB-registered manufacturing SMEs in Istanbul, Turkey. A sample of 666 respondents participated, and the data were analyzed using Smart PLS 4, employing structural equation modeling to test the proposed model. The results indicated that algorithmic management practices significantly increased job burnout and perceived threat, both of which negatively impacted workforce well-being. However, the direct effect of algorithmic management practices on workforce well-being was non-significant. Person–job fit moderated the relationships between algorithmic management practices and both job burnout and perceived threat, further influencing workforce well-being. The findings underscore the critical need for organizations to balance algorithmic efficiency with human-centric practices. Prioritizing person–job fit and fostering transparency in algorithmic processes can mitigate negative impacts, enhance employee well-being, and drive sustainable organizational success in the digital age. Full article
(This article belongs to the Special Issue Leadership in the New Era of Technology)
Show Figures

Figure 1

Figure 1
<p>Research model.</p>
Full article ">Figure 2
<p>Evaluation of the measurement model. Note: Dashed arrows represent moderating effect, sold arrows represent direct relationships.</p>
Full article ">Figure 3
<p>Estimation of the structural model. Note(s): Absolute values are applied to <span class="html-italic">p</span>-values. Note: Dashed arrows represent moderating effect, sold arrows represent direct relationships.</p>
Full article ">Figure 4
<p>The moderation effect of PJF in the relationship between AMPs and job burnout.</p>
Full article ">Figure 5
<p>The moderation effect of PJF in the relationship between AMPs and perceived threat.</p>
Full article ">Figure 6
<p>The moderation effect of PJF in the relationship between AMPs and workforce well-being.</p>
Full article ">
20 pages, 4057 KiB  
Article
Cybersecurity in Smart Grids: Detecting False Data Injection Attacks Utilizing Supervised Machine Learning Techniques
by Anwer Shees, Mohd Tariq and Arif I. Sarwat
Energies 2024, 17(23), 5870; https://doi.org/10.3390/en17235870 - 22 Nov 2024
Viewed by 378
Abstract
By integrating advanced technologies and data-driven systems in smart grids, there has been a significant revolution in the energy distribution sector, bringing a new era of efficiency and sustainability. Nevertheless, with this advancement comes vulnerability, particularly in the form of cyber threats, which [...] Read more.
By integrating advanced technologies and data-driven systems in smart grids, there has been a significant revolution in the energy distribution sector, bringing a new era of efficiency and sustainability. Nevertheless, with this advancement comes vulnerability, particularly in the form of cyber threats, which have the potential to damage critical infrastructure. False data injection attacks are among the threats to the cyber–physical layer of smart grids. False data injection attacks pose a significant risk, manipulating the data in the control system layer to compromise the grid’s integrity. An early detection and mitigation of such cyberattacks are crucial to ensuring the smart grid operates securely and reliably. In this research paper, we demonstrate different machine learning classification models for detecting false data injection attacks, including the Extra Tree, Random Forest, Extreme Gradient Boosting, Logistic Regression, Decision Tree, and Bagging Classifiers, to secure the integrity of smart grids. A comprehensive dataset of various attack scenarios provides insights to explore and develop effective detection models. Results show that the Extra Tree, Random Forest, and Extreme Gradient Boosting models’ accuracy in detecting the attack outperformed the existing literature, an achieving accuracy of 98%, 97%, and 97%, respectively. Full article
(This article belongs to the Section A1: Smart Grids and Microgrids)
Show Figures

Figure 1

Figure 1
<p>Smart grid under FDIA scenario in the Cyber Layer.</p>
Full article ">Figure 2
<p>Flow diagram of the work conducted.</p>
Full article ">Figure 3
<p>Process of decision-making by Extra Tree Classifier.</p>
Full article ">Figure 4
<p>Comparison of ROC curves with different classifiers.</p>
Full article ">Figure 5
<p>Confusion matrix showing TP, TN, FP, and FN.</p>
Full article ">Figure 6
<p>Line graph of performance.</p>
Full article ">Figure 7
<p>Depicts the performance of different techniques.</p>
Full article ">Figure 8
<p>The network topology.</p>
Full article ">Figure 9
<p>Comparison of accuracy of different states of the art, from left [<a href="#B44-energies-17-05870" class="html-bibr">44</a>,<a href="#B45-energies-17-05870" class="html-bibr">45</a>,<a href="#B46-energies-17-05870" class="html-bibr">46</a>,<a href="#B47-energies-17-05870" class="html-bibr">47</a>,<a href="#B48-energies-17-05870" class="html-bibr">48</a>,<a href="#B49-energies-17-05870" class="html-bibr">49</a>], and our proposed models.</p>
Full article ">
20 pages, 3515 KiB  
Article
Comprehensive Analysis of the Annulus Pressure Buildup in Wells with Sustained Gas Leakage Below the Liquid Level
by Siqi Yang, Jianglong Fu, Nan Zhao, Changfeng Xu, Lihong Han, Jianjun Wang, Hailong Liu, Yuhang Zhang and Jun Liu
Processes 2024, 12(12), 2631; https://doi.org/10.3390/pr12122631 - 22 Nov 2024
Viewed by 325
Abstract
During the process of natural gas development, sustained casing pressure (SCP) frequently occurs within the annulus of the gas wells; we specifically referred to the “A” annular space located between the tubing and the production casing in this paper. SCP in an annulus [...] Read more.
During the process of natural gas development, sustained casing pressure (SCP) frequently occurs within the annulus of the gas wells; we specifically referred to the “A” annular space located between the tubing and the production casing in this paper. SCP in an annulus poses a paramount safety challenge, universally acknowledged as a significant threat to gas field development and production, jeopardizing well integrity, personnel safety, and environmental protection. There are multiple factors that contribute to this issue. Due to the multitude of factors contributing to SCP in an annulus and the unclear mechanisms underlying the pressure buildup in wells, an early assessment of downhole leakage risks remains challenging. Hence, this study focused on a comprehensive analysis of the SCP in the annulus of gas wells. A detailed experimental study on the pressure buildup in an annulus due to tubing leakage below the liquid level was conducted, and the variation patterns of the annulus pressure under various leakage conditions were explored. The findings indicated that the equilibrium attainment time of annulus pressure at the wellhead subsequent to tubing leakage decreases with the increase in the pressure difference between the tubing and the casing, the liquid level height, the leakage orifice diameter, and the quantity, while it increases with the increase in the leakage position and gas temperature. According to the theory of gas fluid dynamics, a predictive model of the annulus pressure buildup with sustained gas leakage below the liquid level was proposed, which was well-validated against experimental results, achieving a model accuracy of over 95%. This study provided a theoretical framework for diagnosing SCP in the annulus of gas wells and developing mitigation strategies, thereby contributing to the advancement of the research field and ensuring the safety of industrial operations. Full article
(This article belongs to the Special Issue Risk Assessment and System Safety in the Process Industry)
Show Figures

Figure 1

Figure 1
<p>Schematic diagram of SCP in the annulus of gas well.</p>
Full article ">Figure 2
<p>Schematic diagram of the test apparatus for simulating the SCP in the annulus.</p>
Full article ">Figure 3
<p>The variation in annular pressure at the wellhead under different pressure differences between the tubing and casing.</p>
Full article ">Figure 4
<p>The variation in annular pressure at the wellhead under different liquid level heights.</p>
Full article ">Figure 5
<p>The variation in annular pressure at the wellhead under different gas temperatures.</p>
Full article ">Figure 6
<p>The variation in the annular pressure at the wellhead under different leakage positions.</p>
Full article ">Figure 7
<p>The variation in the annular pressure at the wellhead under leakage orifice diameter.</p>
Full article ">Figure 8
<p>The schematic diagram of the five leakage scenarios: (<b>a</b>) one leakage orifice (leakage position is 0.6 m), (<b>b</b>) two leakage orifices (leakage positions are 0.3 m and 0.6 m), (<b>c</b>) two leakage orifices (leakage positions are 0.3 m and 1.0 m), (<b>d</b>) two leakage orifices (leakage positions are 0.6 m and 1.0 m), (<b>e</b>) three leakage orifice (leakage positions are 0.3 m, 0.6 m, and 1.0 m).</p>
Full article ">Figure 9
<p>The variation in the annular pressure at the wellhead under leakage orifice quantity.</p>
Full article ">Figure 10
<p>Flow chart of the predictive model of the pressure buildup in the annulus.</p>
Full article ">Figure 11
<p>Comparison of the variation in annular pressure at the wellhead after gas leakage. (Test conditions: liquid level height is 1.5 m, pressure difference between the tubing and casing is 300 KPa, gas temperature is 25 °C, position of the single leakage orifice is 0.6 m, and its diameter is 1 mm).</p>
Full article ">Figure 12
<p>Comparison of the predictive model and experimental results in the (<b>a</b>) equilibrium attainment time and the (<b>b</b>) equilibrium value of the annular pressure at the wellhead.</p>
Full article ">
17 pages, 2579 KiB  
Article
Comparative Study of Ammonium and Orthophosphate Removal Efficiency with Natural and Modified Clay-Based Materials, for Sustainable Management of Eutrophic Water Bodies
by Irene Biliani, Vasiliki Tsavatopoulou and Ierotheos Zacharias
Sustainability 2024, 16(23), 10214; https://doi.org/10.3390/su162310214 - 22 Nov 2024
Viewed by 508
Abstract
Eutrophication, a global threat that leads to degradation of freshwater and seawater aquatic ecosystems, is driven by excessive nutrient loading. This study explores the sustainable management of eutrophic water bodies with the application of natural and modified clay-based materials as a practical solution [...] Read more.
Eutrophication, a global threat that leads to degradation of freshwater and seawater aquatic ecosystems, is driven by excessive nutrient loading. This study explores the sustainable management of eutrophic water bodies with the application of natural and modified clay-based materials as a practical solution to mitigate eutrophication by removing ammonium and orthophosphate ions. Comparative analyses of six materials: natural zeolite, bentonite, and perlite, along with their modification with calcium and iron, were assessed after kinetic analysis of each material. Batch adsorption experiments were performed to evaluate the material’s performance in fresh and seawater. Fitting experimental data assessed adsorption kinetics to pseudo-second-order models. Furthermore, Langmuir isotherm models were employed to determine each material’s maximum adsorption capacity for ammonium and orthophosphate ion uptake. The results revealed that freshwater applications of modified zeolite or natural bentonite achieved better orthophosphate ion removal efficiency from seawater, whereas employing natural zeolite maximized the ammonium ion removal efficiency in freshwater bodies. Finally, orthophosphate and ammonium ion removal efficiency results for almost all materials were diminished in seawater. This research contributes valuable insights to the development of efficient and sustainable nutrient removal methodologies to remediate natural eutrophic water bodies and protect aquatic ecosystems. Full article
(This article belongs to the Section Pollution Prevention, Mitigation and Sustainability)
Show Figures

Figure 1

Figure 1
<p>Schematic diagram of preparation of the modified clay-based materials.</p>
Full article ">Figure 2
<p>(<b>a</b>) Langmuir fitting results for ammonium ion adsorption by (<b>a1</b>) N- zeolite, (<b>a2</b>) N-bentonite, and (<b>a3</b>) N-perlite; (<b>b</b>) pseudo-second-order kinetics of ammonium uptake by (<b>b1</b>) N- zeolite, (<b>b2</b>) N-bentonite, and (<b>b3</b>) N-perlite; (<b>c</b>) ammonium removal rate (%) of (<b>c1</b>) N-zeolite, (<b>c2</b>) N-bentonite, and (<b>c3</b>) N-perlite. The adsorption capacity was evaluated for freshwater (S = 0, results shown in green) and seawater (S = 35‰, results shown in blue) in a 1 mg NH<sub>4</sub><sup>+</sup>-N/L pollutant solution.</p>
Full article ">Figure 3
<p>(<b>a</b>) Langmuir fitting results for orthophosphate ion adsorption by (<b>a1</b>) N-zeolite, (<b>a2</b>) N-bentonite, and (<b>a3</b>) N-perlite; (<b>b</b>) pseudo-second-order kinetics of orthophosphate uptake by (<b>b1</b>) N-zeolite, (<b>b2</b>) N-bentonite, and (<b>b3</b>) N-perlite; (<b>c</b>) orthophosphate removal rate (%) of (<b>c1</b>) N-zeolite (<b>c2</b>) N-bentonite, and (<b>c3</b>) N-perlite. The adsorption capacity was evaluated for freshwater (S = 0, results shown in green) and seawater (S = 35‰, results shown in blue) in a 0.1 mg PO<sub>4</sub><sup>3−</sup>-P/L pollutant solution.</p>
Full article ">Figure 4
<p>(<b>a</b>) Langmuir fitting results for ammonium ion adsorption by (<b>a1</b>) modified zeolite, (<b>a2</b>) mod-bentonite, and (<b>a3</b>) modified perlite; (<b>b</b>) pseudo-second-order kinetics of ammonium-uptake by (<b>b1</b>) modified zeolite, (<b>b2</b>) modified bentonite, and (<b>b3</b>) modified perlite; (<b>c</b>) ammonium removal rate (%) of (<b>c1</b>) modified zeolite, (<b>c2</b>) modified bentonite, and (<b>c3</b>) modified perlite. The adsorption capacity was evaluated for freshwater (S = 0, results shown in green) and seawater (S = 35‰, results shown in blue) in a 1 mg NH<sub>4</sub><sup>+</sup>-N/L pollutant solution.</p>
Full article ">Figure 5
<p>(<b>a</b>) Langmuir fitting results for orthophosphate ion adsorption by (<b>a1</b>) modified zeolite, (<b>a2</b>) modified bentonite, and (<b>a3</b>) modified perlite; (<b>b</b>) pseudo-second-order kinetics of orthophosphate uptake by (<b>b1</b>) modified zeolite, (<b>b2</b>) modified bentonite, and (<b>b3</b>) modified perlite; (<b>c</b>) orthophosphate removal rate (%) of (<b>c1</b>) modified zeolite, (<b>c2</b>) modified bentonite, and (<b>c3</b>) modified perlite. The adsorption capacity was evaluated for freshwater (S = 0, results shown in green) and seawater (S = 35‰, results shown in blue) in a 0.1 mg PO<sub>4</sub><sup>3−</sup>-P/L pollutant solution.</p>
Full article ">Figure 6
<p>Removal of ammonium ions from aqueous solution with initial ammonium ion concentration of 1 mg/L and 0.01 g of adsorbent materials, pH = 7, T = 25 °C (<b>left</b>). Adsorption isotherms for ammonium ions using natural zeolite, natural bentonite, modified zeolite and modified bentonite in combined aqueous solutions. The quantity of the adsorbent materials was 0.01 g, pH = 7, T = 25 °C (<b>right</b>).</p>
Full article ">Figure 7
<p>Removal of orthophosphate ions from aqueous solution with initial orthophosphate ion concentration of 0.1 mg/L and 0.01 g of adsorbent materials, pH = 7, T = 25 °C (<b>left</b>). Adsorption isotherms for orthophosphate ions using natural zeolite, natural bentonite, modified zeolite and modified bentonite in combined aqueous solutions. The quantity of the adsorbent materials was 0.01 g, pH = 7, T = 25 °C (<b>right</b>).</p>
Full article ">
24 pages, 6345 KiB  
Review
Review of Voltage Balancing Techniques for Series-Connected SiC Metal–Oxide–Semiconductor Field-Effect Transistors
by Lucheng Sun, Mingzhong Qiao, Yihui Xia, Bo Wu and Fulin Chen
Energies 2024, 17(23), 5846; https://doi.org/10.3390/en17235846 - 22 Nov 2024
Viewed by 320
Abstract
Power devices in series are low-voltage power devices used in medium- and high-voltage applications in a more direct program. However, when power devices in series are used, because of their electrical performance parameters or external circuit conditions, there are unique short-circuit voltage imbalances, [...] Read more.
Power devices in series are low-voltage power devices used in medium- and high-voltage applications in a more direct program. However, when power devices in series are used, because of their electrical performance parameters or external circuit conditions, there are unique short-circuit voltage imbalances, a serious threat to the safety of the device. The article first summarizes the research status and characteristics of the four models of SiC MOSFETs based on the domestic and international research on the models of SiC MOSFETs in recent years; second, the voltage balancing technology of series-connected SiC MOSFETs is sorted out and summarized, and then the driving circuits of SiC MOSFETs are sorted out and summarized. Again, several voltage balancing techniques reviewed are compared in six different aspects: cost, modularity, complexity, speed of voltage balancing, losses, and effectiveness of voltage balancing. Finally, an outlook of voltage balancing techniques for series SiC MOSFETs is provided. Full article
(This article belongs to the Section F: Electrical Engineering)
Show Figures

Figure 1

Figure 1
<p>Typical applications and operating intervals of medium-voltage high-power equipment.</p>
Full article ">Figure 2
<p>Trends in power devices.</p>
Full article ">Figure 3
<p>Trends in power devices.</p>
Full article ">Figure 4
<p>Mathematical model of SiC MOSFET with high accuracy and strong convergence.</p>
Full article ">Figure 5
<p>SiC MOSFET metameric cell profiles and modeling of aggregate elements in different regions.</p>
Full article ">Figure 6
<p>Voltage balancing technology division figure.</p>
Full article ">Figure 7
<p>Typical snubber circuit structure.</p>
Full article ">Figure 8
<p>Snubber circuit structure with energy return function.</p>
Full article ">Figure 9
<p>RCD snubber and single drive signal mixing circuit structure.</p>
Full article ">Figure 10
<p>RCD snubber and single drive signal mixing circuit structure ((<b>a</b>) voltage regulator diode tube clamp circuit; (<b>b</b>) voltage regulator diode tube-capacitor clamp circuit).</p>
Full article ">Figure 11
<p>Hybrid circuit structure of snubber circuit and clamp circuit.</p>
Full article ">Figure 12
<p>Typical adjustment circuit for drive signal delay.</p>
Full article ">Figure 13
<p>Circuit structure based on clamp circuits and drive delay.</p>
Full article ">Figure 14
<p>Voltage balancing technique based on coupled inductors.</p>
Full article ">Figure 15
<p>Circuit structure for mixing coupled inductor and RC snubber circuits.</p>
Full article ">Figure 16
<p>Single-drive magnetically coupled voltage-source gate driver.</p>
Full article ">Figure 17
<p>Voltage balancing technique for active closed-loop drives.</p>
Full article ">Figure 18
<p>Active driver based on Miller capacitance compensation.</p>
Full article ">Figure 19
<p>Circuit structure for single drive signal.</p>
Full article ">Figure 20
<p>Circuit structure of hybrid MOSFET-JFETs.</p>
Full article ">Figure 21
<p>Reference [<a href="#B83-energies-17-05846" class="html-bibr">83</a>] drive circuit.</p>
Full article ">Figure 22
<p>Summary of comparisons made between different voltage balancing techniques.</p>
Full article ">
16 pages, 2974 KiB  
Article
PA-Win2: In Silico-Based Discovery of a Novel Peptide with Dual Antibacterial and Anti-Biofilm Activity
by Jin Wook Oh, Min Kyoung Shin, Hye-Ran Park, Sejun Kim, Byungjo Lee, Jung Sun Yoo, Won-Jae Chi and Jung-Suk Sung
Antibiotics 2024, 13(12), 1113; https://doi.org/10.3390/antibiotics13121113 - 21 Nov 2024
Viewed by 377
Abstract
Background: The emergence and prevalence of antibiotic-resistant bacteria (ARBs) have become a serious global threat, as the morbidity and mortality associated with ARB infections are continuously rising. The activation of quorum sensing (QS) genes can promote biofilm formation, which contributes to the acquisition [...] Read more.
Background: The emergence and prevalence of antibiotic-resistant bacteria (ARBs) have become a serious global threat, as the morbidity and mortality associated with ARB infections are continuously rising. The activation of quorum sensing (QS) genes can promote biofilm formation, which contributes to the acquisition of drug resistance and increases virulence. Therefore, there is an urgent need to develop new antimicrobial agents to control ARB and prevent further development. Antimicrobial peptides (AMPs) are naturally occurring defense molecules in organisms known to suppress pathogens through a broad range of antimicrobial mechanisms. Methods: In this study, we utilized a previously developed deep-learning model to identify AMP candidates from the venom gland transcriptome of the spider Pardosa astrigera, followed by experimental validation. Results: PA-Win2 was among the top-scoring predicted peptides and was selected based on physiochemical features. Subsequent experimental validation demonstrated that PA-Win2 inhibits the growth of Bacillus subtilis, Escherichia coli, Staphylococcus aureus, Staphylococcus epidermidis, Pseudomonas aeruginosa, and multidrug-resistant P. aeruginosa (MRPA) strain CCARM 2095. The peptide exhibited strong bactericidal activity against P. aeruginosa, and MRPA CCARM 2095 through the depolarization of bacterial cytoplasmic membranes and alteration of gene expression associated with bacterial survival. In addition, PA-Win2 effectively inhibited biofilm formation and degraded pre-formed biofilms of P. aeruginosa. The gene expression study showed that the peptide treatment led to the downregulation of QS genes in the Las, Pqs, and Rhl systems. Conclusions: These findings suggest PA-Win2 as a promising drug candidate against ARB and demonstrate the potential of in silico methods in discovering functional peptides from biological data. Full article
(This article belongs to the Special Issue Antimicrobial Activity of Bioactive Peptides and Their Derivatives)
Show Figures

Figure 1

Figure 1
<p>Structural analysis of PA-Win2. Structural modeling showed (<b>A</b>) the secondary structure and (<b>B</b>) the molecular surface of the peptide. (<b>C</b>) The amino acid configuration of PA-Win2 within the α-helical structure was presented.</p>
Full article ">Figure 2
<p>Evaluation of cytotoxicity in human normal cell lines upon PA-Win2 treatment. To assess the cytotoxicity of PA-Win2, various concentrations of the peptide were applied to human cell lines (<b>A</b>) HaCaT, (<b>B</b>) ADMSC, and (<b>C</b>) HDFα. While no significant cytotoxicity was observed in HaCaT cells, concentrations above 64 μg/mL significantly decreased cell viability in ADMSC and HDFα cells. ** <span class="html-italic">p</span> &lt; 0.01 and *** <span class="html-italic">p</span> &lt; 0.001 compared with control group. Con: control.</p>
Full article ">Figure 3
<p>The bactericidal efficacy of PA-Win2 was evaluated using time-kill curve assays. The bactericidal effect of PA-Win2 was assessed against (<b>A</b>) <span class="html-italic">Bacillus subtilis</span>, (<b>B</b>) <span class="html-italic">Escherichia coli</span>, (<b>C</b>) <span class="html-italic">Pseudomonas aeruginosa</span>, and (<b>D</b>) MRPA CCARM 2095 using time-kill analysis. Bacterial strains were treated with 1× minimum bactericidal concentration for 6 h. Viable bacterial cells were measured every hour, where complete eradication was achieved across all strains within 4 h.</p>
Full article ">Figure 4
<p>Bacterial cytoplasmic membrane disruption by PA-Win2 treatment. Membrane depolarization was assessed using 3,3′-dipropylthiadicarbocyanine iodide (DiSC<sub>3</sub>(5)) dye following treatment with PA-Win2. As a positive control, 0.5% sodium dodecyl sulfate (SDS) was used to cause complete bacterial membrane disruption. The effects of peptide or 0.5% SDS are presented as an arbitrary fluorescent intensity. PA-Win2 treatment induced a rapid release of DiSC<sub>3</sub>(5) in (<b>A</b>) <span class="html-italic">B</span>. <span class="html-italic">subtilis</span>, (<b>B</b>) <span class="html-italic">E</span>. <span class="html-italic">coli</span>, (<b>C</b>) <span class="html-italic">P</span>. <span class="html-italic">aeruginosa</span>, and (<b>D</b>) MRPA CCARM 2095.</p>
Full article ">Figure 5
<p>Suppression of gene expressions associated with bacterial growth and survival by PA-Win2. The mRNA expression levels of genes (<span class="html-italic">gyrA</span>, <span class="html-italic">MurD</span>, <span class="html-italic">parC</span>, <span class="html-italic">pbp2</span>, <span class="html-italic">rpoB</span>, <span class="html-italic">rpsL</span>) were analyzed using reverse transcription-quantitative polymerase chain reaction (RT-qPCR). mRNA expression in (<b>A</b>) <span class="html-italic">P</span>. <span class="html-italic">aeruginosa</span> and (<b>B</b>) MRPA CCARM 2095 was suppressed when treated with 4 μg/mL or 2 μg/mL PA-Win2, respectively. Significant differences are indicated as * <span class="html-italic">p</span> &lt; 0.05 and ** <span class="html-italic">p</span> &lt; 0.01 compared with the control group. Con: control.</p>
Full article ">Figure 6
<p>The effect of PA-Win2 on the formation and inhibition of biofilms. Representative images of crystal violet (CV) staining were used to assess biofilm formation and inhibition in (<b>A</b>,<b>C</b>) <span class="html-italic">P</span>. <span class="html-italic">aeruginosa</span> under static conditions and (<b>B</b>,<b>D</b>) MRPA CCARM 2095 under shaking conditions after treatment with PA-Win2. CV staining was eluted and quantified relative to the control group. The quantified data are presented in bar graphs. *** <span class="html-italic">p</span> &lt; 0.001 compared with control group. Con: control, EtOH: Ethanol.</p>
Full article ">Figure 7
<p>Downregulation of quorum sensing genes by PA-Win2 treatment. The mRNA expression levels of quorum sensing (QS) genes (<span class="html-italic">Lasl</span>, <span class="html-italic">LasR</span>, <span class="html-italic">PqsA</span>, <span class="html-italic">PqsR</span>, <span class="html-italic">RhlI</span>, <span class="html-italic">RhlR</span>) in <span class="html-italic">P</span>. <span class="html-italic">aeruginosa</span> and MRPA CCARM 2095 were evaluated following treatment with PA-Win2 at concentrations 4 μg/mL or 1 μg/mL, respectively. In <span class="html-italic">P</span>. <span class="html-italic">aeruginosa</span>, significant downregulation of QS genes was observed in both (<b>A</b>) biofilm formation and (<b>C</b>) biofilm inhibition, except for <span class="html-italic">PqsA</span> in the biofilm formation. In MRPA CCARM 2095, PA-Win2 induced suppression of QS-related gene in (<b>B</b>) biofilm formation and (<b>D</b>) biofilm inhibition, except for <span class="html-italic">PqsA</span>. Statistical significance is indicated as * <span class="html-italic">p</span> &lt; 0.05, ** <span class="html-italic">p</span> &lt; 0.01, and *** <span class="html-italic">p</span> &lt; 0.001 compared with the control group. Con: control.</p>
Full article ">
24 pages, 25658 KiB  
Article
AI Threats to Politics, Elections, and Democracy: A Blockchain-Based Deepfake Authenticity Verification Framework
by Masabah Bint E. Islam, Muhammad Haseeb, Hina Batool, Nasir Ahtasham and Zia Muhammad
Blockchains 2024, 2(4), 458-481; https://doi.org/10.3390/blockchains2040020 - 21 Nov 2024
Viewed by 357
Abstract
The integrity of global elections is increasingly under threat from artificial intelligence (AI) technologies. As AI continues to permeate various aspects of society, its influence on political processes and elections has become a critical area of concern. This is because AI language models [...] Read more.
The integrity of global elections is increasingly under threat from artificial intelligence (AI) technologies. As AI continues to permeate various aspects of society, its influence on political processes and elections has become a critical area of concern. This is because AI language models are far from neutral or objective; they inherit biases from their training data and the individuals who design and utilize them, which can sway voter decisions and affect global elections and democracy. In this research paper, we explore how AI can directly impact election outcomes through various techniques. These include the use of generative AI for disseminating false political information, favoring certain parties over others, and creating fake narratives, content, images, videos, and voice clones to undermine opposition. We highlight how AI threats can influence voter behavior and election outcomes, focusing on critical areas, including political polarization, deepfakes, disinformation, propaganda, and biased campaigns. In response to these challenges, we propose a Blockchain-based Deepfake Authenticity Verification Framework (B-DAVF) designed to detect and authenticate deepfake content in real time. It leverages the transparency of blockchain technology to reinforce electoral integrity. Finally, we also propose comprehensive countermeasures, including enhanced legislation, technological solutions, and public education initiatives, to mitigate the risks associated with AI in electoral contexts, proactively safeguard democracy, and promote fair elections. Full article
(This article belongs to the Special Issue Key Technologies for Security and Privacy in Web 3.0)
Show Figures

Figure 1

Figure 1
<p>The figure provides an overview of the different advantages and threats of using AI in elections, political campaigns, and electoral management.</p>
Full article ">Figure 2
<p>Overview of the Blockchain-based Deepfake Authenticity Verification Framework (B-DAVF). This diagram illustrates the six major components of the B-DAVF: (1) content creation, (2) registering the asset, (3) tracking modifications, (4) storing the provenance, (5) verification process, and (6) flagging and reporting.</p>
Full article ">Figure 3
<p>A visual representation of countermeasures against AI threats. This diagram outlines key strategies to mitigate AI risks. The main categories include Regulatory Measures, Technological Solutions, Public Awareness and Education, and Suggestions for Policymakers and Researchers. Each category is further broken down into specific actions to mitigate the potential risks posed by AI in elections.</p>
Full article ">
Back to TopTop