Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,708)

Search Parameters:
Keywords = illegal

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
18 pages, 2117 KB  
Article
Feeding Ecology and Reproductive Biology of the Common Smooth-Hound Shark Mustelus mustelus (Linnaeus, 1758) off the Coast of Türkiye
by Uğur Özden and Erhan Irmak
Fishes 2025, 10(10), 485; https://doi.org/10.3390/fishes10100485 (registering DOI) - 1 Oct 2025
Abstract
Sharks play critical roles in marine ecosystems as apex or mesopredators, regulating trophic dynamics and ecosystem stability. However, their populations are increasingly threatened due to overexploitation caused by targeted fisheries, bycatch, and illegal activities. This study investigates the feeding ecology and reproductive biology [...] Read more.
Sharks play critical roles in marine ecosystems as apex or mesopredators, regulating trophic dynamics and ecosystem stability. However, their populations are increasingly threatened due to overexploitation caused by targeted fisheries, bycatch, and illegal activities. This study investigates the feeding ecology and reproductive biology of the shark species Mustelus mustelus, which has been heavily fished across the Mediterranean, leading to significant population declines. A total of 333 specimens were collected between October 2019 and October 2022 from Türkiye’s Aegean Sea, Sea of Marmara, and Levantine Sea coasts. The total lengths of the specimens ranged from 42.1 to 173.0 cm, with an average of 73.5 cm ± 26.8, and their weights ranged from 205 to 22,470 g, with an average of 1840.2 g ± 2525.5. Stomach content analyses revealed that M. mustelus is a benthic predator with a broad diet. Regional and size-based comparisons indicated that crustaceans were the primary food source, followed by teleost fish and mollusks. Ontogenetic dietary shifts were evident, with juveniles feeding predominantly on crustaceans, while adults consumed more teleost fish and mollusca. The reproductive biology analysis showed placental viviparity in M. mustelus, with the smallest observed mature male measuring 75 cm TL and the smallest observed pregnant female measuring 96 cm TL. The uterine fecundity of pregnant females ranged from 8 to 29 embryos. Additionally, the pupping season of M. mustelus in the Aegean Sea was found to occur in March and April. M. mustelus populations have declined dramatically in the western Mediterranean and in many other parts of their range. The scarcity of data on this species in the eastern Mediterranean basin, including Türkiye, is noteworthy. Therefore, this study investigated the populations in the study area from a bioecological perspective and provides fundamental data to support the development of conservation strategies for the species. Full article
(This article belongs to the Section Biology and Ecology)
Show Figures

Figure 1

19 pages, 3105 KB  
Article
A Longitudinal Survey Exploring the Psychological Determinants of Concealed Smartphone Use While Driving: Insights from an Expanding Theory of Planned Behavior
by Qi Zhong, Rong Han, Jiaye Chen and Chunfa Sha
Appl. Sci. 2025, 15(19), 10582; https://doi.org/10.3390/app151910582 - 30 Sep 2025
Abstract
Concealed smartphone use while driving (CSUWD), a prevalent and covert form of distracted driving, poses significant threats to road safety. However, the psychological determinants underlying this illegal behavior remain underexplored. A two-wave longitudinal study based on the expanding theory of planned behavior (TPB) [...] Read more.
Concealed smartphone use while driving (CSUWD), a prevalent and covert form of distracted driving, poses significant threats to road safety. However, the psychological determinants underlying this illegal behavior remain underexplored. A two-wave longitudinal study based on the expanding theory of planned behavior (TPB) investigates the intention and prospective behavior of CSUWD in China. In the first wave, 256 respondents assessed the standard TPB constructs, alongside extended constructs of descriptive norms, moral norms, and perceived risks. Subsequently, 156 participants reported their actual behavior in the second wave. Hierarchical multiple regression results revealed that the traditional TPB variables accounted for 57.1% of intention variance and 45.2% of behavior variance, while extended variables contributed an additional 11.7% to intention variance. All variables, except perceived crash risk, emerged as significant determinants of intention. Notably, the perceived risk of being caught and fined inversely correlated with intention, suggesting a potential disinhibition effect. Both perceived behavioral control and intention were significant determinants of subsequent behavior. The findings underscore the validity of TPB in predicting CSUWD, informing the design of non-legal interventions (e.g., public education advertisement, road awareness campaigns, and technological interventions) to mitigate CSUWD-related distracted driving and promote sustainable transportation systems. Full article
(This article belongs to the Special Issue Traffic Safety Measures and Assessment: 2nd Edition)
Show Figures

Figure 1

17 pages, 1327 KB  
Article
African Conservation Success: Niokolo-Koba National Park (Senegal) Removed from the List of World Heritage in Danger
by Dodé Heim Myline Houéhounha, Simon Lhoest, Junior Ohouko, Djafarou Tiomoko, Mallé Gueye, Elise Vanderbeck and Cédric Vermeulen
Heritage 2025, 8(10), 403; https://doi.org/10.3390/heritage8100403 - 26 Sep 2025
Abstract
The Niokolo-Koba National Park (NKNP) was inscribed on the World Heritage List in 1981 for its exceptional biodiversity and unique ecosystem. However, due to poaching, livestock grazing, and dam construction projects in the Sambangalou area, the site was added to the List of [...] Read more.
The Niokolo-Koba National Park (NKNP) was inscribed on the World Heritage List in 1981 for its exceptional biodiversity and unique ecosystem. However, due to poaching, livestock grazing, and dam construction projects in the Sambangalou area, the site was added to the List of World Heritage in Danger in 2007. Through regional and international cooperation, enhanced monitoring, and community engagement in conservation efforts, the site was removed from the List of World Heritage in Danger in 2024. As a typical case of the entire process from inscription on to removal from the World Heritage List in Danger, the NKNP’s threats and successful removal experience profoundly reveal complex internal and external challenges and governance needs in heritage conservation. Its successful experience can provide valuable lessons for World Heritage sites around the world facing similar threats. As part of our qualitative research, we reviewed the literature from UNESCO and IUCN, which annually assessed the state of conservation of the NKNP between 2007 and 2024. In 2024, a field mission assessed on-site conservation progress and discussed challenges and responses to the NKNP management with 30 stakeholders. Our results highlight the lengthy and potentially costly process of removal, such as Senegal’s EUR 4.57 million Emergency Plan, the threats to the park’s integrity by the State itself, and the value placed on World Heritage status, further emphasizing the need for long-term investment from both the national government and international partners. Therefore, ensuring returns on such investment, whether through increased ecotourism, international recognition, or strengthened ecosystem services, is essential for sustainable conservation financing. The case of the NKNP also illustrates the positive impact of improved national governance and partnerships involving international and local NGOs, as well as the private sector, on conservation efforts. It also highlights the importance of a new collaborative governance paradigm for heritage sites facing severe human interference (poaching, illegal development) and governance challenges, particularly in ecologically fragile or socio-economically pressured regions, by strengthening national responsibility, leveraging international mechanisms, and activating local participation. Full article
Show Figures

Figure 1

32 pages, 4955 KB  
Review
Tin Mining and Post-Tin Mining Reclamation Initiatives in Indonesia: With Special Reference to Bangka Belitung Areas
by Pratiwi, Budi Hadi Narendra, Chairil Anwar Siregar, Iskandar, Budi Mulyanto, Suwardi, Dyah Tjahyandari Suryaningtyas, I Wayan Susi Dharmawan, Sri Suharti and Fenky Marsandi
Land 2025, 14(10), 1947; https://doi.org/10.3390/land14101947 - 25 Sep 2025
Abstract
Tin mining has played a central role in Indonesia’s economy, particularly in the Bangka Belitung Islands, but it has also caused severe environmental and socio-economic impacts. This study aims to critically review the consequences of tin mining and evaluate reclamation initiatives through a [...] Read more.
Tin mining has played a central role in Indonesia’s economy, particularly in the Bangka Belitung Islands, but it has also caused severe environmental and socio-economic impacts. This study aims to critically review the consequences of tin mining and evaluate reclamation initiatives through a narrative literature review of scientific publications, technical reports, and policy documents. The findings show that open-pit mining has led to deforestation, biodiversity loss, environmental degradation, and decreased soil fertility, while weak governance has fueled illegal mining and social conflicts. Rehabilitation strategies such as reforestation, agroforestry, aquaculture, and soil improvement have the potential to restore or reclaim degraded land and are proposed as a viable pathway to balance ecological improvement with socio-economic development. This study focuses on its interdisciplinary approach, integrating ecological, socio-economic, and institutional perspectives to propose a comprehensive, ecosystem-based framework for post-mining reclamation. By highlighting both challenges and opportunities, the study provides actionable insights for policymakers, mining companies, and local communities. Full article
Show Figures

Figure 1

20 pages, 857 KB  
Article
Media Bias in Immigration Reporting: A Comparative Study of Spanish Newspapers’ Source Usage
by Alberto Monroy-Trujillo and Graciela Padilla-Castillo
Journal. Media 2025, 6(4), 160; https://doi.org/10.3390/journalmedia6040160 - 23 Sep 2025
Viewed by 209
Abstract
This study examines the media coverage of illegal immigration in Spain during the first year of the war in Ukraine, focusing on the four most-read online newspapers: El Español, Okdiario, La Razón, and eldiario.es. The research aims to understand [...] Read more.
This study examines the media coverage of illegal immigration in Spain during the first year of the war in Ukraine, focusing on the four most-read online newspapers: El Español, Okdiario, La Razón, and eldiario.es. The research aims to understand how ideological differences influence source selection and framing of immigration issues. Using Source Credibility Theory as a framework, the study analyzes the frequency of coverage and types of sources used by each outlet. A mixed-methods approach was employed, combining quantitative analysis of source frequencies with qualitative examination of content. The results reveal significant disparities in coverage and source usage among the newspapers. Conservative outlets like Okdiario relied heavily on official sources (51.5%), while the progressive eldiario.es gave more weight to civil society sources (38.2%). El Español and Okdiario published more articles on illegal immigration compared to La Razón and eldiario.es. Notably, La Razón, also conservative, used hidden sources more frequently (17%) than other outlets. The findings highlight how ideological leanings shape journalistic practices in covering sensitive topics like immigration. Conservative media’s focus on institutional narratives contrasts with progressive outlets’ emphasis on human stories, potentially influencing public perception and discourse on immigration issues. This study contributes to understanding the role of media in shaping societal attitudes towards immigration and underscores the importance of diverse perspectives in news coverage. Full article
Show Figures

Figure 1

14 pages, 731 KB  
Article
Security-Aware Adaptive Video Streaming via Watermarking: Tackling Time-to-First-Byte Delays and QoE Issues in Live Video Delivery Systems
by Reza Kalan, Peren Jerfi Canatalay and Emre Karsli
Computers 2025, 14(10), 404; https://doi.org/10.3390/computers14100404 - 23 Sep 2025
Viewed by 213
Abstract
Illegal broadcasting is one of the primary challenges for Over the Top (OTT) service providers. Watermarking is a method used to trace illegal redistribution of video content. However, watermarking introduces processing overhead due to the embedding of unique patterns into the video content, [...] Read more.
Illegal broadcasting is one of the primary challenges for Over the Top (OTT) service providers. Watermarking is a method used to trace illegal redistribution of video content. However, watermarking introduces processing overhead due to the embedding of unique patterns into the video content, which results in additional latency. End-to-end network latency, caused by network congestion or heavy load on the origin server, can slow data transmission, impacting the time it takes for the segment to reach the client. This paper addresses 5xx errors (e.g., 503, 504) at the Content Delivery Network (CDN) in real-world video streaming platforms, which can negatively impact Quality of Experience (QoE), particularly when watermarking techniques are employed. To address the performance issues caused by the integration of watermarking technology, we enhanced the system architecture by introducing and optimizing a shield cache in front of the packager at the origin server and fine-tuning the CDN configuration. These optimizations significantly reduced the processing load on the packager, minimized latency, and improved overall content delivery. As a result, we achieved a 6% improvement in the Key Performance Indicator (KPI), reflecting enhanced system stability and video quality. Full article
(This article belongs to the Special Issue Multimedia Data and Network Security)
Show Figures

Figure 1

22 pages, 322 KB  
Article
Deconstructing Traditional Muslim Sexual Morality: Approaches to a New Understanding of Legal and Illegal Sex in Muslim Theology Based on the Principle of Sexual Autonomy
by Ali Ghandour
Religions 2025, 16(9), 1208; https://doi.org/10.3390/rel16091208 - 20 Sep 2025
Viewed by 4953
Abstract
This paper offers a critical analysis of traditional Muslim sexual morality and questions its validity in the present. It focuses on two elements: (1) nikāḥ as a legal marriage contract characterized by asymmetrical gender roles and (2) historically permitted sexual relations with enslaved [...] Read more.
This paper offers a critical analysis of traditional Muslim sexual morality and questions its validity in the present. It focuses on two elements: (1) nikāḥ as a legal marriage contract characterized by asymmetrical gender roles and (2) historically permitted sexual relations with enslaved women, as well as Muslim positions on sexual intercourse with minors. After a conceptual clarification of sexual autonomy, I examine the positions of different legal schools and contextualize their norms within broader social and intellectual histories. Building on the approach of “overcoming the text,” I argue that foundational religious texts can no longer serve as the normative basis for a contemporary sexual ethic. Instead, I redefine the notion of “illegitimate sexuality” (zinā) based on the principle of sexual autonomy and show how modern legal and social frameworks (rule of law, welfare state, medical evidence) render earlier functions of sexual regulation obsolete. The Qurʾanic concept of maʿrūf serves as a dynamic ethical reference point. The goal is a paradigm shift toward a Muslim sexual ethic that centers autonomy, equality, and human dignity while critically dismantling inherited structures. Full article
(This article belongs to the Special Issue Religion and Immigrants in Western Europe)
27 pages, 7618 KB  
Article
UAV-Based Transport Management for Smart Cities Using Machine Learning
by Sweekruthi Balivada, Jerry Gao, Yuting Sha, Manisha Lagisetty and Damini Vichare
Smart Cities 2025, 8(5), 154; https://doi.org/10.3390/smartcities8050154 - 18 Sep 2025
Viewed by 381
Abstract
Efficient transportation management is essential for the sustainability and safety of modern urban infrastructure. Traditional road inspection and transport management methods are often labor-intensive, time-consuming, and prone to inaccuracies, limiting their effectiveness. This study presents a UAV-based transport management system that leverages machine [...] Read more.
Efficient transportation management is essential for the sustainability and safety of modern urban infrastructure. Traditional road inspection and transport management methods are often labor-intensive, time-consuming, and prone to inaccuracies, limiting their effectiveness. This study presents a UAV-based transport management system that leverages machine learning techniques to enhance road anomaly detection and severity assessment. The proposed approach employs a structured three-tier model architecture: A unified obstacle detection model identifies six critical road hazards—road cracks, potholes, animals, illegal dumping, construction sites, and accidents. In the second stage, six dedicated severity classification models assess the impact of each detected hazard by categorizing its severity as low, medium, or high. Finally, an aggregation model integrates the results to provide comprehensive insights for transportation authorities. The systematic approach seamlessly integrates real-time data into an interactive dashboard, facilitating data-driven decision-making for proactive maintenance, improved road safety, and optimized resource allocation. By combining accuracy, scalability, and computational efficiency, this approach offers a robust and scalable solution for smart city infrastructure management and transportation planning. Full article
Show Figures

Figure 1

16 pages, 3025 KB  
Article
A Green Synthesis of Fluorescent Carbon Dots and Their Application to the Determination of Sunset Yellow
by Yujing Wang, Yiran Wang, Jiaxu Zou, Shuxin Tan, Feiyu Yan, Benxu Yang, Chao Li and Shufen Wu
Foods 2025, 14(18), 3221; https://doi.org/10.3390/foods14183221 - 17 Sep 2025
Viewed by 348
Abstract
Sunset yellow (SY) is a synthetic azo dye widely used in food and cosmetics. However, concerns have been raised about its potential health risks, including its nephrotoxicity and genotoxicity, when used in excessive amounts. Illegal addition of SY may cause allergic reactions or [...] Read more.
Sunset yellow (SY) is a synthetic azo dye widely used in food and cosmetics. However, concerns have been raised about its potential health risks, including its nephrotoxicity and genotoxicity, when used in excessive amounts. Illegal addition of SY may cause allergic reactions or genetic damage. Therefore, a rapid method for detecting SY is needed. To develop a rapid detection method for sunset yellow (SY) with the aim of preventing its illegal addition in food, this study utilized agricultural waste asparagus peel (AP) as a carbon source and synthesized amino-functionalized carbon quantum dots (AP-CDs) via a green hydrothermal method. A highly sensitive detection platform was established based on the fluorescence quenching mechanism of AP-CDs in the presence of SY. The microstructure of AP-CDs was characterized using transmission electron microscopy (TEM), Fourier transform infrared spectroscopy (FTIR), and X-ray photoelectron spectroscopy (XPS). Their optical properties were assessed via ultraviolet–visible absorption spectroscopy (UV-vis) and fluorescence spectroscopy (FS). Furthermore, key experimental parameters affecting SY detection were systematically optimized. Results revealed that the synthesized AP-CDs possessed surface hydrophilic functional groups, including hydroxyl, amide, and carboxyl groups, and were composed of carbon (C), oxygen (O), and nitrogen (N) elements. Optical performance studies demonstrated that AP-CDs exhibited a strong fluorescence emission at 470 nm under 380 nm excitation, with a quantum yield (Φ) of 15.9%. Under the optimized conditions (pH 7.0, 0.5 mg/mL AP-CDs), the fluorescence intensity showed a linear response to the concentration of SY over the range of 0.1 to 100 μM (R2 = 0.9929), achieving a detection limit of 0.92 μM. This strategy not only enables sustainable resource utilization but also provides a sensitive and practical approach for food safety monitoring, demonstrating significant potential for real-world applications. Full article
(This article belongs to the Section Food Biotechnology)
Show Figures

Figure 1

16 pages, 292 KB  
Article
Methodology for Determining Potential Locations of Illegal Graffiti in Urban Spaces Using GRA-Type Grey Systems
by Małgorzata Gerus-Gościewska and Dariusz Gościewski
ISPRS Int. J. Geo-Inf. 2025, 14(9), 354; https://doi.org/10.3390/ijgi14090354 - 16 Sep 2025
Viewed by 352
Abstract
This paper defines the term “graffiti” and outlines the origins of this concept. The terminological arrangement allowed for the subject of this research, i.e., illegal graffiti, to be situated in reality, i.e., an urban space. It was assumed that the existence of the [...] Read more.
This paper defines the term “graffiti” and outlines the origins of this concept. The terminological arrangement allowed for the subject of this research, i.e., illegal graffiti, to be situated in reality, i.e., an urban space. It was assumed that the existence of the tag was associated with a disturbance of spatial order and had an impact on safety in a space. This, in turn, is related to whether the principles of sustainable development in the social dimension are applied. This paper makes reference to theories of security in a space (the “broken windows” theory and the strategy of Crime Prevention Through Environmental Design, CPTED) and shows the problem of illegal graffiti against the background of these theories. A new research aspect of the occurrence of illegal graffiti (scribbles and tags) within urban space is the features that determine its emergence in a spatial dimension. The aim of the analyses in this paper is to obtain information on which geospatial features are generators of illegal graffiti. The research field was limited to the space of one city—Olsztyn—with the assumption that the proposed research methodology would be useful for the spaces of other cities. The research methodology consists of several steps: firstly, we determined a list of features in the surroundings of illegal graffiti using direct interviews, and secondly, we analyzed the frequency of occurrence of these features in the researched locations in space. The next step was to standardize the obtained results using the quotient transformation method with respect to a reference point, where the reference point is the sum of all observations. After that, we assigned ranks for standardized results. The last stage involved an analysis using the GRA type of grey systems to obtain a sequence of strengths of relationships. This sequence allowed us to determine which of the features adopted for analysis have the greatest impact on the creation of illegal graffiti in a space. As indicated by the strength of the relationship, in the analyses conducted, geospatial features such as poor sidewalk condition and neglected greenery have the greatest impact on the occurrence of illegal graffiti. Other features that influence the occurrence of illegal graffiti in a given space include a lack of visibility from neighboring windows and the proximity of a two-way street. It can be assumed that these features are generators of illegal graffiti in the studied area and space. The poor condition of the facade has the least impact on the possibility of illegal graffiti occurring in a given space. Full article
17 pages, 4094 KB  
Article
Comparative Analysis of Perceived Threat Threshold from Various Drivers to Cranes Along Indus Flyway, Punjab, Pakistan
by Ayesha Zulfiqar, Xueying Sun, Qingming Wu, Abdul Rehman, Nasrullah Khan and Mah Noor Khan
Biology 2025, 14(9), 1275; https://doi.org/10.3390/biology14091275 - 16 Sep 2025
Viewed by 383
Abstract
Migratory birds globally face escalating anthropogenic threats, with crane species being particularly vulnerable. This study assessed human-perceived threats to cranes (Grus virgo & Grus grus) along Pakistan’s vital Indus Flyway using 400 stakeholder questionnaires across eight districts (2021–2024). We quantified perceived [...] Read more.
Migratory birds globally face escalating anthropogenic threats, with crane species being particularly vulnerable. This study assessed human-perceived threats to cranes (Grus virgo & Grus grus) along Pakistan’s vital Indus Flyway using 400 stakeholder questionnaires across eight districts (2021–2024). We quantified perceived threat based on frequency (1 = Very Rare; 5 = Very Frequent) and severity (1 = Not Severe; 5 = Extremely Severe), revealing poaching (illegal killing) as the dominant threat (frequency = 4.9; severity = 4.8), followed by illegal wildlife trade (4.7; 4.5) and taming (4.6; 4.3). Spatial analysis showed strikingly higher perceived threats in southern Pakistan (Rajanpur: frequency = 4.88, severity = 4.82) versus central regions (Khushab: 3.76, 4.02; p < 0.001), with riverbanks identified as high-risk poaching zones (42 incidents). Cluster analysis also confirmed Rajanpur as a critical hotspot within three distinct threat tiers. Critically, analysis of socio-demographic drivers revealed threat type (frequency: F = 104.92, p < 0.001; severity: F = 153.64, p < 0.001) and poaching method (frequency: F = 10.14, p < 0.001; severity: F = 15.43, p < 0.001) as significant perception-shapers, while education, occupation, and crane species preference (frequency: F = 1.17, p = 0.310) exerted a non-significant influence. These results highlight that individual backgrounds minimally modulate threat perceptions. The study aligns with global evidence of uniform crane threats demanding the following urgent conservation action: region-specific enforcement (especially southern hotspots), community-led anti-poaching initiatives, and targeted awareness programs to shift high-threat communities toward crane-friendly coexistence practices. Full article
(This article belongs to the Special Issue Bird Biology and Conservation)
Show Figures

Figure 1

19 pages, 279 KB  
Article
The Illegal Catch-and-Release of Wallabies
by Geoff Kaine and Vic Wright
Animals 2025, 15(18), 2700; https://doi.org/10.3390/ani15182700 - 15 Sep 2025
Viewed by 292
Abstract
Internationally, introduced invasive species inflict incalculable damage on native species and primary production. In New Zealand, wallabies, which were introduced from Australia, are damaging the native and agricultural environments, and their range is spreading. As a first step towards the long-term goal of [...] Read more.
Internationally, introduced invasive species inflict incalculable damage on native species and primary production. In New Zealand, wallabies, which were introduced from Australia, are damaging the native and agricultural environments, and their range is spreading. As a first step towards the long-term goal of eradicating wallabies from New Zealand, the Tipu Mātoro National Wallaby Eradication Programme has the immediate goal of restricting wallabies to containment areas designated in regional pest management plans and to eliminate outlier populations by 2025. The success of this strategy is put at risk if people catch wallabies and release them outside the containment areas. We sought to characterise the motivations, beliefs, and attitudes of members of the public who might engage in this illegal behaviour by surveying members of the New Zealand public. We discovered that a very small proportion of the public supported the illegal catch-and-release of wallabies. Respondents, including hunters, that supported catch-and-release believed that wallabies create economic benefits and do not severely damage the environment. They also believed that hunting helps control wallaby numbers. These results yielded a variety of specific policy implications required to reduce catch-and-release behaviour. Full article
(This article belongs to the Section Ecology and Conservation)
33 pages, 8991 KB  
Article
Towards Sustainable Waste Management: Predictive Modelling of Illegal Dumping Risk Zones Using Circular Data Loops and Remote Sensing
by Borut Hojnik, Gregor Horvat, Domen Mongus, Matej Brumen and Rok Kamnik
Sustainability 2025, 17(18), 8280; https://doi.org/10.3390/su17188280 - 15 Sep 2025
Viewed by 305
Abstract
Illegal waste dumping poses a severe challenge to sustainable urban and regional development, undermining environmental integrity, public health, and the efficient use of resources. This study contributes to sustainability science by proposing a circular data feedback loop that enables dynamic, scalable, and cost-efficient [...] Read more.
Illegal waste dumping poses a severe challenge to sustainable urban and regional development, undermining environmental integrity, public health, and the efficient use of resources. This study contributes to sustainability science by proposing a circular data feedback loop that enables dynamic, scalable, and cost-efficient monitoring and prevention of illegal dumping, aligned with the goals of sustainable waste governance. Historical data from the Slovenian illegal dumping register, UAV-based surveys and a newly developed application were used to update, monitor, and validate waste site locations. A comprehensive risk model, developed using machine learning methods, was created for the Municipality of Maribor (Slovenia). The modelling approach combined unsupervised and semi-supervised learning techniques, suitable for a positive-unlabeled (PU) dataset structure, where only confirmed illegal waste dumping sites were labeled. The approach demonstrates the feasibility of a circular data feedback loop integrating updated field data and predictive analytics to support waste management authorities and illegal waste dumping prevention. The fundamental characteristic of the stated approach is that each iteration of the loop improves the prediction of risk areas, providing a high-quality database for conducting targeted UAV overflights and consequently detecting locations of illegally dumped waste (LNOP) risk areas. At the same time, information on risk areas serves as the primary basis for each field detection of new LNOPs. The proposed model outperforms earlier approaches by addressing smaller and less conspicuous dumping events and by enabling systematic, technology-supported detection and prevention planning. Full article
(This article belongs to the Section Waste and Recycling)
Show Figures

Figure 1

16 pages, 495 KB  
Article
Compulsory Black-Box Traceable CP-ABE with Outsourcing of Computation
by Ying Hu, Huidong Qiao, Jiangchun Ren, Zhiying Wang, Junxian Li and Peng Han
Symmetry 2025, 17(9), 1539; https://doi.org/10.3390/sym17091539 - 15 Sep 2025
Viewed by 206
Abstract
As an asymmetric encryption method capable of performing one-to-many encryption, the ciphertext-policy attribute-based encryption (CP-ABE) is widely recognized as an ideal cryptographic tool for cloud-based applications. It can empower data owners to independently and flexibly define and enforce access control policies for cloud-stored [...] Read more.
As an asymmetric encryption method capable of performing one-to-many encryption, the ciphertext-policy attribute-based encryption (CP-ABE) is widely recognized as an ideal cryptographic tool for cloud-based applications. It can empower data owners to independently and flexibly define and enforce access control policies for cloud-stored data. However, the practical implementation of CP-ABE-based cryptographic access control remains hindered by critical challenges. Firstly, malicious users may engage in key abuse by delegating attribute keys to unauthorized parties or exploiting their keys to construct decryption black-boxes for providing illegal decryption services. Consequently, a secure CP-ABE scheme must incorporate the capability to trace such malicious users who misuse their privileges. Secondly, for resource-constrained IoT devices, the substantial computational overhead of CP-ABE becomes prohibitive, making its deployment in scenarios like IoT-cloud services particularly challenging. In this paper, we propose a new CP-ABE scheme with black-box traceability and computational outsourcing capabilities. Our scheme can improve the tracing efficiency from O(N3) or O(rlogN) (as seen in traditional schemes) to O(1), where N is the number of system users. Furthermore, the proposed scheme features compulsory traceability and maintains outstanding performance in the aspects of encryption, decryption, and tracing operations. Full article
(This article belongs to the Special Issue Symmetry and Asymmetry in Information Security and Network Security)
Show Figures

Figure 1

16 pages, 341 KB  
Article
Variant Poisson Item Count Technique with Non-Compliance
by Man-Lai Tang, Qin Wu, Daisy Hoi-Sze Chow and Guo-Liang Tian
Mathematics 2025, 13(18), 2973; https://doi.org/10.3390/math13182973 - 14 Sep 2025
Viewed by 231
Abstract
In this article, we propose a variant Poisson item count technique (VPICT) that explicitly accounts for respondent non-compliance in surveys involving sensitive questions. Unlike the existing Poisson item count technique (PICT), the proposed VPICT (i) replaces the sensitive item with a triangular model [...] Read more.
In this article, we propose a variant Poisson item count technique (VPICT) that explicitly accounts for respondent non-compliance in surveys involving sensitive questions. Unlike the existing Poisson item count technique (PICT), the proposed VPICT (i) replaces the sensitive item with a triangular model that combines the sensitive and an additional non-sensitive item; (ii) utilizes data from both control and treatment groups to estimate the prevalence of the sensitive characteristic, thereby improving the accuracy and efficiency of parameter estimation; and (iii) limits the occurrence of the floor effect to cases where the respondent neither possesses the sensitive characteristic nor meets the non-sensitive condition, thus protecting a subset of respondents from privacy breaches. The method introduces a mechanism to estimate the rate of non-compliance alongside the sensitive trait, enhancing overall estimation reliability. We present the complete methodological framework, including survey design, parameter estimation via the EM algorithm, and hypothesis testing procedures. Extensive simulation studies are conducted to evaluate performance under various settings. The practical utility of the proposed approach is demonstrated through an application to real-world survey data on illegal drug use among high school students. Full article
(This article belongs to the Section D1: Probability and Statistics)
Show Figures

Figure 1

Back to TopTop