Vol. 1 No. 1 (December 2025)
-
Open Access
Articles

Hiroshi Tanaka
2025, 1(1): 1-12
67 (Viewed)
33 (Downloaded)
Download PDF
Wild soybean (Glycine soja), the wild ancestor of cultivated soybean (Glycine max), harbors abundant genetic diversity and valuable stress-resistant traits, which are crucial for soybean genetic improvement and sustainable agriculture. In this study, we systematically analyzed the genetic diversity of 286 wild soybean populations collected from major distribution areas in East Asia (China, Japan, Korea,...
more
-
Open Access
Articles

Elena S. Petrovic
2025, 1(1): 13-24
35 (Viewed)
29 (Downloaded)
Download PDF
Wheat landraces in the Mediterranean Basin are valuable genetic resources harboring rich diversity and adaptive traits, especially disease resistance, which is crucial for sustainable wheat production. In this study, 320 wheat landrace accessions collected from six Mediterranean countries (Spain, Egypt, Italy, Greece, Morocco, and Serbia) were analyzed for genetic diversity using 36 SSR markers and...
more
-
Open Access
Articles

Maria Garcia-Rodriguez
2025, 1(1): 25-36
36 (Viewed)
34 (Downloaded)
Download PDF
Security situation awareness (SSA) is essential for proactive defense in cloud-edge computing, but traditional methods struggle with heterogeneous entity mapping, multi-source data fusion and emerging threat prediction. Digital Twin (DT) offers a new technical path to address these bottlenecks. This study proposes a DT-Enabled SSA framework (DT-SSA), which builds a high-fidelity virtual mirror of cloud-edge...
more
-
Open Access
Articles

Rajesh K. Narayan
2025, 1(1): 37-48
31 (Viewed)
186 (Downloaded)
Download PDF
Cloud-edge convergence, integrating cloud scalability and edge real-time processing, has become the foundational architecture for latency-sensitive applications like autonomous driving and smart healthcare, while optimizing performance and cutting bandwidth costs. However, its distributed and heterogeneous nature brings unprecedented cybersecurity challenges beyond traditional centralized defense mechanisms. This study systematically analyzes cloud-edge vulnerabilities across four layers: edge...
more
-
Open Access
Articles

Anna Kowalska
2025, 1(1): 49-60
74 (Viewed)
60 (Downloaded)
Download PDF
Cloud-edge computing, integrating cloud computing’s robust computing capacity and edge computing’s low-latency response, underpins data-intensive applications like smart cities and industrial IoT. However, its distributed edge data carries severe privacy leakage risks during cloud transmission, and edge nodes’ open access makes systems vulnerable to malicious attacks. Federated Learning (FL), enabling collaborative model training without raw...
more