- Norway royals to continue official duties amid stepson’s rape trial, crown prince says Reuters
- Marius Borg Høiby: Son of Norway’s crown princess charged with rape and abuse BBC
- Son of Norwegian princess charged with four rapes Dawn
- Son of Norway’s crown princess charged with rape, domestic violence Al Jazeera
- Prosecutors indict the son of Norway’s crown princess on multiple counts including rape CNN
Blog
-
Norway royals to continue official duties amid stepson's rape trial, crown prince says – Reuters
-
The collaborative evolution of trust, information flow, and social cooperation: a study on network stability based on dynamic game models
Interpersonal communication involves the exchange of information between individuals, and the quality and depth of this exchange can provide insights into the strength of communication and the nature of the relationship. The establishment of interpersonal interaction can be analyzed through the framework of complex networks, where each individual in society is represented as an independent node. These nodes form connections through continuous communication with other nodes, creating paths within the complex network. This section introduces a simulation model that simulates the formation of interpersonal networks by increasing the number of nodes participating in communication. It studies the characteristics of nodes and networks during the network formation process. Each node interacts with other nodes in each phase, and successful information transmission is regarded as successful cooperation. With each successful cooperation, both partners receive a positive score, while points are deducted in the event of interaction failure (i.e., failure in information transmission). This paper primarily focuses on the information interaction behaviors and characteristics during the formation of human social relationship networks, emphasizing the relationships established between individuals following successful information interactions.
The existing social relationship network models have limited fitting to real-life social relationship networks, which has aroused the interest of many researchers63. We used ER’s random graph model as the starting point for information system research in this experiment, and the simulation results of other network models are one of the possible extension directions of this study. The network information system designed in this article is to establish a trust foundation for a node within the scope of information dissemination. This system includes two types of scoring: X and Y. X algorithm: If there is already a history of cooperation between interactive nodes, the nodes can evaluate each other’s behavior on their own and determine whether its interacting node is worth investing in cooperation costs again (the higher the x, the more successful the cooperation between both parties). (Between nodes with interaction history, both parties develop a mutual understanding of each other’s behavioral patterns and cooperative intentions. If the behavior of the other party during period t continues to align with the initial assessment, then my expectations remain rational, and my original judgment regarding the other party is validated. Consequently, successful cooperation in this phase strengthens the trust foundational between the two parties, reflecting the value of time. For a more in-depth discussion of this concept, including instances of betrayal, please refer to20). Y is the evaluation of nodes without interaction history after observing the cooperative behavior of other nodes, simulating the social evaluation possessed by individuals, that is, their cooperation history represents the possibility of successful cooperation with them (higher Y values indicate the lowest risk of investment in cooperation costs). (In a cooperative network, nodes that successfully collaborate receive positive scores from their social environment (For strangers we never know, our social judgment of them comes from external factors added to them, such as educational experience and the continuity of marital relationships, which are important criteria for us to judge whether they can maintain a long-term and deep relationship). When a node achieves successful cooperation in phase t, its external evaluations remain unchanged (same logic as we develop X), indicating that there is no reason for questioning its cooperative behavior. Therefore, we propose that if a node exhibits no activity within the entire social environment, its social evaluation is solely influenced by its temporal presence in the network, specifically the duration of its existence). We set the basic model as following:
$$:text{G}=left(text{V},:text{E},text{Z}right)$$
(1)
G is a series of games and related relations in interactive cyberspace. The node set in this space represents each person in the cyberspace, denoted by V= (v1, v2…, vn), and edge set E denotes the relationships for each node. Z is the score system of nodes. The scoring system contains two dimensions.
$$:{text{X}}_{text{i}text{j}}^{text{t}}={text{X}}_{text{i}text{j}}^{text{t}-1}left(1+{uplambda:}right)$$
(2)
$$:{text{Y}}_{text{i}}^{text{t}}={text{Y}}_{text{i}}(1+{{uplambda:})}^{text{t}-1}$$
(3)
The formula (2) and (3) represents a time difference between the trust foundation of the previous period (t-1) and the trust foundation of the current period (t). The variable λ represents the time value of an individual in certain social structure. In the absence of behavior, a node’s reputation in the network accumulates over time according to λ, similar to how elderly individuals are respected in society. The variable t signifies different periods of network evolution. The trust basis in the next period is updated by the time value compared to the current period.
For any given node i, there is a probability q for it to interact with its neighboring node j, with a corresponding probability (:{q}_{1}) of unsuccessful interaction. Successful interactions result in benefits α for both parties, while unsuccessful interactions lead to a decrease in evaluation by β. For bystander node h, node i has probability (:{q}^{{prime:}}) of interaction and unsuccessful information dissemination probability (:{q}_{1}). Successful interactions yield benefits γ, while unsuccessful interactions result in a decrease in evaluation by δ. The consistent behavioral preferences of nodes can lead to similar mistakes in different social scenarios, hence the probability of unsuccessful information exchange is the same. The current score matrix of node i comprises two parts:
Table 1 illustrates the score structure of node i within the network. This article employs the Monte Carlo simulation method to construct the network. Table 1 offers a comprehensive overview of the scoring rules governing the nodes during the interaction process. In the first step, our research node (node a) interacts with its neighbor (node b), aiming to achieve successful information transfer. In the second step, the newly added node (node c) interacts with the target node (node a), while the previous period’s interactive object (node b) remains in a ‘wait and see’ state. In the third step, contingent upon the success of the prior interaction, the ‘observation’ node (node b) engages with the newly added node (node c) from the previous period. Simultaneously, node a interacts with another newly added node (node d) in this period’s network, while still actively engaging with nodes b and c according to Eq. (2) and our scoring rule. Simultaneously, nodes b and c observe the interaction. Each time the interaction is successful, the participating nodes update their (:{X}_{ij}^{t}) according to Eq. (2). Concurrently, other nodes in the network that do not engage in the interaction adjust their evaluation ((:{Y}_{i}^{t})) of the successful interaction node in accordance with Eq. (3). For every successful interaction, the participating node updates its score based on the aforementioned matrix.
Table 1 Score matrix of target node. Information dissemination and node heterogeneity in the process of network formation
This article employs a multi-agent simulation model to investigate the process of network formation. The number and sequence of nodes that interact directly have been previously introduced, along with a designated number of bystander nodes that do not participate in the interaction but still possess a certain probability of engaging with other nodes. Presented here are the experimental results derived from a configuration of 209 bystander nodes, selected as a representative and reader-friendly outcome from over 1,000 simulations. The network formation process is illustrated in Fig. 1.
Fig. 1 The Evolution of Nodes’ Status in the Network Formation Process. Evolution of the individual interaction network under the cooperation strategy. Node importance is distinguished by node size, in which larger represents more importance and the shade of the line represents the importance of the connection in the network evolution.
Fig. 2 Depicts the relationship between network information synchronization for direct interacting nodes and bystander nodes, and the time needed for the network to achieve a stable state as the number of direct interacting nodes increases. The horizontal axis indicates the number of iterations, while the vertical axis shows the status of network information synchronization.The number of stable periods for network structure and the number of periods required for information synchronization between two types of nodes (interacting nodes and bystander nodes).
Figure 1 illustrates that as the number of nodes participating in the interaction increases, high-level nodes gradually emerge within the entire network. The identification of the heterogeneity of these nodes will be discussed in detail in Part Four. These high-level nodes possess the largest number of link paths within the network and play a decisive role in its formation. To investigate the state of information flow during this process, we analyzed both the information flow rate and the information propagation state of the entire network, as depicted in Fig. 2.
The bar chart in Fig. 2 illustrates the number of periods required for the network to achieve a stable state and its final stable value, signifying the completion of network construction. The line chart depicts the heterogeneity in information synchronization between nodes that interact directly and those that do so occasionally. Directly interacting nodes require fewer periods for information synchronization compared to bystander nodes, as interaction is essential for acquiring information. Bystander nodes experience a delay in forming cognition as they await the transmission of messages from interacting nodes. This observation elucidates why bystander nodes can still complete the information transmission process without engaging in direct interaction. Information can be synchronized at the overall network level, indicating that information exchange occurs not only among nodes directly involved in interactions but also across all nodes within the simulation. This finding is particularly intriguing as it suggests that, in real life, even in the absence of deliberate participation in information exchange, individuals are, to some extent, involved in various types of information flow. The information reception behavior of nodes can be both conscious and unconscious. Here we have obtained the ‘Image Scoring’ in Nowak’s work64, where the existence of indirect reciprocity necessarily involves the transmission of information through bystanders, thereby providing social feedback to collaborators. As members of this complex society, we are interconnected within various social networks, positioning us as nodes in the processes of information production, transmission, and re-manufacturing.
Based on the conclusions drawn from the above simulation, we posit that the primary factor influencing network formation is not merely the transmission of information, but rather additional determinants. Not all random nodes possess the capability to interact in a manner that results in the establishment of a network with a specific structure. The formation of a network necessitates the repeated flow of information between nodes, thereby fostering relatively stable relationships through continuous interactions. Throughout this process, nodes may encounter various challenges, including behavioral errors and information mismatches. It is only through persistent error correction and interaction that the connections between nodes can achieve stability.To investigate the information flow mechanisms of nodes, it is essential to examine their behaviors in receiving and sending information more closely. The X scoring system we have established reflects the final outcome of a node’s success or failure in cooperative interactive behavior. A high X score signifies that the frequency of successful interactions significantly surpasses that of interaction failures, as illustrated in the following figure (Fig. 3).
Fig. 3 Illustrates the score levels of both directly participating interactive nodes and bystander nodes throughout the iterative process of network formation with varying numbers of directly participating nodes (The number of observer nodes is randomly generated during the simulation process). The horizontal axis denotes different iteration periods, while the vertical axis indicates the score level. Node score status during network information synchronization process.
In a three-node network, where only three nodes engage in direct interaction, the scores of participating nodes are similar to those of non-participating nodes, indicating minimal heterogeneity. However, as the number of nodes involved in direct interaction increases, we observe significant differences in the efficiency of cooperative success among nodes with varying network statuses. The simulation results demonstrate that the success efficiency of nodes directly participating in the interaction is notably high, with scoring efficiency rising rapidly. These nodes emerge as key players within the overall social network organization. In a four-node network, nodes classified as either direct interaction or bystander nodes exhibit distinct rates of information exchange, while a five-node network shows fluctuations in scores for these node types. When the number of nodes participating in direct interaction exceeds five, the complex network begins to exhibit score fluctuations. These fluctuations occur not only among nodes directly interacting but also among those engaged in indirect interaction. Even when we define the initial form of network formation, these fluctuations persist. After repeated calculations of network dynamics, we find that this phenomenon arises due to the complexity of information transmission within networks beginning from the five-node configuration, necessitating a certain iterative period to synchronize network information. In networks comprising six and seven nodes, the scores of directly interacting nodes exhibit a rapid increase, leading to a significant enhancement in their success rates. A careful analysis of the nodes involved in these interactions reveals a distinct hierarchy among them. The node score depicted in Fig. 3 represents the average score of these nodes. Within the directly interacting nodes, the scores of higher-level nodes are markedly greater than those of lower-level nodes, while the scores of low-level nodes are even inferior to those of nodes that do not participate directly in the interaction. Bystander nodes experience fluctuations in their scores; however, these variations are not easily discernible due to their overall low score levels. A similar trend is observed in networks with eight and nine nodes, where the highest score attainable by heterogeneous nodes increases as the number of nodes engaged in direct interaction rises. The repeated fluctuations in scores reveal the true insight of cooperation. Node interactions cannot form stable network relationships as mentioned above. Only when behavioral deviations are corrected and trust relationships are re-established through continuous interactions can stable connections be formed during the repeated process of deviation. Only then can a network path be considered established. The formation of network pathways will further promote stable cooperation between nodes, as the cost of forgiving erroneous behavior is much lower than that of rebuilding new node pathways. However, this is not absolute. When the disappearance of nodes in the network continues to occur in our simulation, we realize that the forgiveness of node behavior is not endless. Further research on this issue requires a deepening of the model, which represents another potential research direction of this article.
This pattern remains consistent across all simulations conducted in our study. Furthermore, the exchange of information among nodes is pivotal in determining the overall efficiency of a network. The node score status depicted in Fig. 3 represents the outcomes of the first nine simulations conducted. It is important to note that the simulation process is ongoing. In our simulations, the number of designed nodes typically exceeds 200; diagrams featuring more than 300 nodes become overly complex, making the connections exceedingly difficult to display. After nine iterations, the simulation proceeds until the network cluster coefficient, illustrated in Fig. 2, attains a stable state, indicating that the network has reached a steady state.
Node behavior selection and the influence of social trust foundation
The construction of interpersonal relationships is predicated on a foundational level of trust20. The evolution of this trust is contingent upon the history of prior interactions. During these interactions, individuals may inevitably exhibit behavioral deviations, which refer to the extent to which their behaviors diverge from the expected norms of both parties involved. When such deviations occur, either party may opt to discontinue the interaction, as these behaviors can adversely affect the likelihood of successful cooperation and, consequently, undermine the initial investment in cooperation. However, in real-world scenarios, it is quite common for individuals to forgive the mistakes of others. This article introduces a metric, termed the ‘y-value,’ which primarily aims to observe the behavioral signals of interactive nodes as perceived by bystanders. It assigns scores to these nodes based on the observed signals, ultimately leading to an evaluation of the interactive nodes by bystanders. In essence, the y-value represents the trust foundation ascribed to behaving nodes by the entire network organization. If a node exhibits no behavior within the network, its y-value is derived from the time value accumulated during its presence in the network. The existence of such a node indicates that it occupies a functional role within the network, and its value is determined by the number of iterative periods of its existence.
The node with the highest Y value is likely to achieve the most successful cooperation. In the context of unfamiliar nodes, a higher Y value indicates a greater probability of successful collaboration, thereby minimizing potential cooperation costs. Our simulation reveals a co-integration relationship between the scores of X and Y, suggesting that nodes with elevated levels within the network typically possess exceptionally high Y values. When the score of a cooperative entity is significantly high, deviations from the rational expectations of interacting nodes may occur; however, the historical high score of this node contributes to its ‘social reputation,’ indicating a history of excellent behavior. Such deviations are often attributable to transient errors or mistakes made by its interactive counterparts. Consequently, errors committed by high-scoring nodes tend to be more readily forgiven by other nodes within the network. This forgiveness mechanism is reflected not only in the Y value but also in the X value. Forgiveness is justified by specific reasons, which may stem from familial ties or from the exemplary behavioral history of the node in question. In our simulation, we observed that the value of Y exhibits significant nonlinear characteristics.
X and Y together constitute the network information system. The presence of Y enhances the significance of successful cooperation between nodes, making it far more critical than merely completing the information flow. Given the interaction involves two types of information, the cost of unsuccessful cooperation can lead to a decline in network ratings (The credible threat mentioned above). Consequently, each node exercises extreme caution when selecting its behavior during interactions. As illustrated in Fig. 2, prior to reaching a stable state, the number of nodes actively participating in the network and the degree of network aggregation in the initial phase surpass the level of aggregation in its stable state. This indicates that during the early stages of network formation, there is a distinct period of ‘over trust,’ which we refer to as the ‘honeymoon period.’ In this initial phase, nodes exhibit cautious behavioral choices (Prosocial behavior beyond its cooperation preference), resulting in their Y values being inflated compared to their actual behavioral strategies. However, as iterations continue, nodes will ultimately employ their genuine behavioral strategies in cooperation. This may lead to errors in selecting behavioral strategies, causing fluctuations in the behavior information of nodes and increasing the complexity of the network information. The number of iteration periods required for network formation significantly exceeds the number of periods necessary for network information synchronization. The establishment of the final connection path within the network results from the continuous mistakes, forgiveness, and re-connections of nodes as informed by dynamic game theory. Ultimately, this process leads to the formation of a stable interaction relationship. The emergence of such a relationship implies that even if a network node deviates from expected behavior, the errors made by that node can be accommodated by the established stable path. When examining the prisoner’s dilemma, it is evident that the underlying motivation for repeated games is also rooted in repeated interactions, which dissuades rational opponents from opting to betray during a specific game. However, as previously mentioned, the capacity to forgive the other party’s transgressions is not limitless. In simulations, it is often observed that cooperative nodes may ‘die’ in the network in subsequent iterations due to the deduction of all their scores. Behavioral deviations can adversely affect an individual’s fitness within the social structure.
The presence of the y value provides a positive incentive for nodes that have already established connections within the network to promote cooperative behavior. The cooperative actions of a particular node yield significantly greater rewards than the actions themselves might suggest. Moreover, this behavior conveys information to other nodes in the network, indicating that the cooperative node is capable of fulfilling its commitments without resorting to deceit, thereby establishing its trustworthiness. Within the context of the information system discussed in this article, the ‘honeymoon period’ of nodes during the initial stages of network formation is evident; specifically, nodes participating in interactions for the first time tend to exhibit a preference for cooperation when selecting their behaviors.
Continue Reading
-
Two-year plans are up to 77 percent off
VPN users are overwhelmed with choice, and there are as many bad options out there as there are good ones. Luckily, NordVPN sits in the latter category, and right now Nord is offering discounted plans across its various tiers. If you take out a two-year NordVPN Plus plan (the company’s most popular plan) it’ll cost you $108 for the duration of the contract, with Nord throwing in three extra months at no extra cost. That’s 73 percent off the usual rate.
As well as Nord’s VPN service, a Plus plan also includes the Threat Protection Pro anti-malware tool, password management and an ad- and tracker-blocker. A Prime plan additionally comes with encrypted cloud storage or NordProtect, which insures you against identity theft and monitors dark web activity. That’s also on sale — down to $189 on the same two-year commitment with those three additional months thrown in, which works out to a 77 percent savings on the regular price.
Nord
When Engadget’s Sam Chapman reviewed NordVPN earlier this year, he praised its excellent download speeds, exclusive features and extensive server network. Less impressive is its clunky interface and inconsistent design when jumping between different platforms running a NordVPN app. While it doesn’t quite make the cut in our guide to the best VPNs available right now, it generally performed well in speed tests and Threat Protection Pro is really worth having.
Follow @EngadgetDeals on X for the latest tech deals and buying advice.
Continue Reading
-
Scientists put a dead cow on the seafloor, then came a surprise
Eight Pacific sleeper sharks showed up for dinner when researchers dropped a cow carcass to the seafloor of the South China Sea at 5,344 feet (1,629 meters) near Hainan Island.
The visit offered a rare observation of how these deep residents feed, wait, and make room for one another.
The species is hard to study because it ranges widely and spends much of its life in cold, dark water. Scientists struggle to track it across the North Pacific, from Japan and Alaska down to Baja California, and into a few tropical outposts.
Why put a cow on the seafloor?
A whale fall is what biologists call it when a dead whale sinks and turns the seafloor into a temporary buffet.
Research teams sometimes simulate that scene to study who arrives and how energy moves through the deep. The South China Sea team followed that playbook with cameras and a carefully placed cow.
These carcasses create waves of life that unfold in stages, starting with mobile scavengers, then opportunists, then long, slow bone feasts powered by microbes.
The point is not the species of the carcass, it is the sudden pulse of organic matter that draws in animals from far and wide.
The paper’s lead author is Han Tian of Sun Yat-sen University and the Southern Marine Science and Engineering Guangdong Laboratory.
The group partnered with the Institute of Acoustics (IOA) at the Chinese Academy of Sciences and an offshore engineering team to run the operation.
Sleeper sharks appeared unexpectedly
The sharks attacked, waited, and circled in turn, with body size shaping tactics. Individuals longer than 2.7 meters, 8.9 feet, hit the carcass directly, while smaller sharks moved carefully and held back.
They also queued in a rough order. “This behavior suggests that feeding priority is determined by individual competitive intensity, even in deep-water environments, reflecting a survival strategy suitable for non-solitary foraging among Pacific sleeper sharks,” explained Han Tian.
This was the first documented presence of Pacific sleeper sharks in the South China Sea, which expands the species’ known range in a warm basin long considered outside its core distribution.
The observation raises fair questions about how currents, food availability, or temperature structure their movements.
Past records already nudged the map south when sightings surfaced near the Solomon Islands and Palau, almost 1,250 miles below traditional range limits. Those scattered reports hinted at flexibility that formal surveys struggle to capture.
The pecking order at depth
Social rules showed up in the footage even without sound or light beyond the cameras.
Sharks yielded positions to an approaching neighbor and one animal carried a fin scar, a hint that status is negotiated with both restraint and force when necessary.
Scavenging order is not unique to this species, and researchers have documented multi-shark meals with shifting access on other large carcasses in blue water.
Field reports show oceanic whitetips and tiger sharks sharing a carcass with loose spacing and brief disputes, a pattern that mirrors what the cameras captured on the seafloor here.
The video picked up a quick eye retraction movement during feeding. That makes sense for a shark lineage that lacks a nictitating membrane, the third eyelid that many other sharks deploy as a shield.
A nictitating membrane slides across the cornea during risky moments and is common in ground sharks such as requiems and hammerheads, but not in all sharks, so animals without it rely on other defenses like rolling or retracting the eyes.
Breath and the spiracle question
Suspended particles were seen exiting the sharks’ spiracles, small openings behind the eye, which suggests these structures help route water when the mouth is busy with food.
Classic lab studies show that water can be taken in through the first gill slits to keep oxygen flowing when the mouth is obstructed, a practical workaround during feeding.
A spiracle is a modified first gill slit that, in many bottom-dwelling sharks, provides a pathway to ventilate the eye and brain while the rest of the body holds steady.
It is reduced in some fast swimmers and more prominent in species that rest on the seafloor, which fits a slow, patient hunter like a sleeper shark.
Parasites plague sleeper sharks
White, elongated copepods clung to the heads of several sharks.
Close relatives often carry eye parasites, and studies in Alaska found nearly universal infection of Pacific sleeper shark corneas by Ommatokoita elongata, with typical loads of one to two adults per infected eye.
Those parasites can scar the cornea, which makes non-visual senses even more important in the deep.
Other visitors wandered in and out of frame, including a snailfish and a crowd of amphipods with the occasional giant isopod.
The community that assembles around a carcass changes hour by hour as the meal is taken apart and the energy is spread into the sediment.
What it means for deep-sea food webs
Eight large scavengers arriving within hours means there is a network ready to respond when food drops.
That response plugs into a broader pattern in which carcasses feed mobile animals first, then fuel a long, microbial afterlife that supports worms and crustaceans for years.
The South China Sea sighting adds a piece to the puzzle of where these sharks live and how they share food.
It also shows that simple, well-designed experiments can turn a single drop into a map point, a behavior log, and a better grasp of who eats what in the dark.
The study is published in Ocean-Land-Atmosphere Research.
—–
Like what you read? Subscribe to our newsletter for engaging articles, exclusive content, and the latest updates.
Check us out on EarthSnap, a free app brought to you by Eric Ralls and Earth.com.
—–
Continue Reading
-
Predictive modeling of asthma drug properties using machine learning and topological indices in a MATLAB based QSPR study
Ong, K. Y. Whats new in the Global Initiative for Asthma 2018 report and beyond. Allergo J. Int. 28, 63–72 (2019).
Google Scholar
Mims, J. W. (2015). Asthma: definitions and pathophysiology. In International forum of allergy & rhinology (Vol. 5, No. S1, pp. S2-S6).
Patadia, M. O., Murrill, L. L. & Corey, J. Asthma: symptoms and presentation. Otolaryngol. Clin. North Am. 47(1), 23–32 (2014).
Google Scholar
Krishnan, J. A. et al. Asthma outcomes: symptoms. J. Allergy Clin. Immunol. 129(3), S124–S135 (2012).
Google Scholar
Tai, A. et al. Outcomes of childhood asthma to the age of 50 years. J. Allergy Clin. Immunol. 133(6), 1572–1578 (2014).
Google Scholar
Douwes, J., Boezea, M., & Pearce, N. (2009). Chronic obstructive pulmonary disease and asthma. Oxford textbook of public health, Volume 3: the practice of public health, (Ed. 5), 1021-1045.
To, T. et al. Global asthma prevalence in adults: Findings from the cross-sectional world health survey. BMC Public Health 12(1), 1–8 (2012).
Anderson, H. R. Is the prevalence of asthma changing. Arch. Dis. Child. 64(1), 172 (1989).
Google Scholar
Magnus, P. & Jaakkola, J. J. Secular trend in the occurrence of asthma among children and young adults: Critical appraisal of repeated cross sectional surveys. BMJ 314(7097), 1795 (1997).
Google Scholar
Mekenyan, O., Bonchev, D., Sabljic, A. & Trinajstic, N. Applications of topological indices to QSAR The use of the Balaban index and the electropy index for correlations with toxicity of ethers on mice. Acta Pharmaceutica Jugoslavica 37(1), 75–86 (1987).
Google Scholar
Estrada, E. & Uriarte, E. Recent advances on the role of topological indices in drug discovery research. Curr. Med. Chem. 8(13), 1573–1588 (2001).
Google Scholar
Basak, S. C., Mills, D., Gute, B. D., Grunwald, G. D., & Balaban, A. T. (2002). Applications of topological indices in the property/bioactivity/toxicity prediction of chemicals. In Topology in Chemistry (pp. 113-184). Woodhead Publishing.
Pyka, A. Application of topological indices for prediction of the biological activity of selected alkoxyphenols. Acta Pol. Pharm. 59(5), 347–352 (2002).
Google Scholar
Natarajan, R., Kamalakanan, P., & Nirdosh, I. (2003). Applications of topological indices to structure-activity relationship modelling and selection of mineral collectors.
Mahboob, A., Rasheed, M. W., Bayati, J. H. H., & Hanif, I. (2023). Computation of several Banhatti and Reven invariants of silicon carbides. Baghdad Science Journal, 20(3 (Suppl.)), 1099-1099.
Hussein Bayati, J. H., Mahboob, A., & Rasheed, M. W. (2024). On Partition Dimension and Domination of Abid-Waheed ((AW)_{r}^{s}) Graph. Baghdad Science Journal, 21(5).
Balasubramaniyan, D. & Chidambaram, N. On some neighbourhood degree-based topological indices with QSPR analysis of asthma drugs. Eur. Phys. J. Plus 138(9), 823 (2023).
Google Scholar
Arockiaraj, M., Campena, F. J. H., Greeni, A. B., Ghani, M. U., Gajavalli, S., Tchier, F., & Jan, A. Z. (2024). QSPR analysis of distance-based structural indices for drug compounds in tuberculosis treatment. Heliyon, 10(2).
Mahboob, A., Rasheed, M. W., Dhiaa, A. M., Hanif, I., & Amin, L. (2024). On Quantitative Structure-Property Relationship (QSPR) Analysis of Physicochemical Properties and Anti-Hepatitis Prescription Drugs Using a Linear Regression Model. Heliyon.
Hasani, M. & Ghods, M. Topological indices and QSPR analysis of some chemical structures applied for the treatment of heart patients. Int. J. Quantum Chem. 124(1), e27234 (2024).
Kirana, B., Shanmukha, M. C., & Usha, A. (2024). A QSPR analysis and curvilinear regression for various degree-based topological indices of Quinolone antibiotics.
Huang, S., Xu, P. & Liu, Y. Machine learning applications for mass spectrometry-based metabolomics. Anal. Chim. Acta 914, 1–13 (2016).
Cheng, F., Li, W., Liu, G. & Tang, Y. Machine learning and cheminformatics approaches for drug discovery. Chem. Rev. 112(1), 379–434 (2012).
Lavecchia, A. Machine-learning approaches in drug discovery: Methods and applications. Drug Discov. Today 20(3), 318–331 (2015).
Google Scholar
T. Chen and C. Guestrin, XGBoost: A scalable tree boosting system, Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785-794, 2016.
Lo, Y.-C., Rensi, S. E., Torng, W. & Altman, R. B. Comparative analysis of machine learning algorithms for QSPR modeling of aqueous solubility. J. Chem. Inf. Model. 60(4), 1714–1723 (2020).
Gutman, I., & Trinajstic, N. (1972). Graph theory and molecular orbitals. Total f-electron energy of alternant hydrocarbons. Chemical physics letters, 17(4), 535-538.
Xu, K. The Zagreb indices of graphs with a given clique number. Appl. Math. Lett. 24(6), 1026–1030 (2011).
Google Scholar
Islam, S. R. & Pal, M. Second Zagreb index for fuzzy graphs and its application in mathematical chemistry. Iranian J. Fuzzy Syst. 20(1), 119–136 (2023).
Google Scholar
Mahboob, A., Rasheed, M. W., Amin, L. & Hanif, I. A study of novel molecular descriptors and quantitative structure-property relationship analysis of blood cancer drugs. Eur. Phys. J. Plus 138(9), 856 (2023).
Google Scholar
Randic, M. Characterization of molecular branching. J. Am. Chem. Soc. 97(23), 6609–6615 (1975).
Google Scholar
Du, Z., Jahanbai, A. & Sheikholeslami, S. M. Relationships between Randic index and other topological indices. Commun. Combinatorics Optim. 6(1), 137–154 (2021).
Google Scholar
Martinez-Martinez, C. T., Mendez-Bermudez, J. A., Rodriguez, J. M. & Sigarreta, J. M. Computational and analytical studies of the Randic index in Erdos-Renyi models. Appl. Math. Comput. 377, 125137 (2020).
Google Scholar
Ediza, S. et al. A note on QSPR analysis of total Zagreb and total Randic Indices of octanes. Eurasian Chemial Commun. 3, 139–45 (2021).
Shirdel, G. H., Rezapour, H., & Sayadi, A. M. (2013). The hyper-Zagreb index of graph operations.
Suresh, M., & Devi, G. S. (2020, November). Some operations in hyper Zagreb indices. In AIP Conference Proceedings (Vol. 2277, No. 1, p. 140003). AIP Publishing LLC.
Zhou, H., Mahboob, A., Rasheed, M. W., Ovais, A., Siddiqui, M. K., & Cheema, I. Z. (2023). On QSPR Analysis of Molecular Descriptor and Thermodynamic Features of Narcotic Drugs. Polycyclic Aromatic Compounds, 1-21.
Shanmukha, M. C., Basavarajappa, N. S., Shilpa, K. C., & Usha, A. (2020). Degree-based topological indices on anticancer drugs with QSPR analysis. Heliyon, 6(6).
Reti, T. On some properties of graph irregularity indices with a particular regard to the s-index. Appl. Math. Comput. 344, 107–115 (2019).
Google Scholar
Furtula, B. & Gutman, I. A forgotten topological index. J. Math. Chem. 53(4), 1184–1190 (2015).
Google Scholar
Mondal, S. & Das, K. C. Degree-Based Graph Entropy in StructureProperty Modeling. Entropy 25(7), 1092 (2023).
Google Scholar
Kulli, V. R. The Gourava indices and coindices of graphs. Ann. Pure Appl. Math. 14(1), 33–38 (2017).
Kulli, V. R. Status Gourava indices of graphs. International Journal of Recent Scientific Research, 11(1), 36770-36773.
Continue Reading
-
Effect of caloric restriction on organ size and its contribution to metabolic adaptation: an ancillary analysis of CALERIE 2
Study design and participants
This was an NIH-funded ancillary study conducted in a subset of participants enrolled in the CALERIE 2 (NCT00427193) trial at Pennington Biomedical Research Center. CALERIE 2 was a multicenter randomized clinical trial that tested the efficacy of a 24-month intervention targeting a sustained 25% CR compared to a comparator group that ate AL13,20. The ancillary study protocol for this study was approved by the institutional review boards at Pennington Biomedical Research Center (Baton Rouge, LA) and Columbia University Irving Medical Center (New York, NY). All participants provided written, informed consent for study procedures prior to data collection, which was performed according to relevant guidelines and regulations.
Individuals in CALERIE 2 were healthy with a body mass index (BMI) between 22.0 to less than 28.0 kg/m2 at enrollment. Males were aged between 21 and 50 years and females were aged between 21 and 47 years to minimize the effects of menopause onset during the trial. Participants were randomized with a 2:1 allocation to either the CR or AL group, with randomization stratified by sex and BMI. Details about the intervention have previously been reported13. Briefly, the CR intervention targeted an immediate and sustained 25% restriction of energy intake from baseline energy requirements as determined by doubly labeled water24,25 for the first 12 months followed by 12 months of subsequent weight maintenance. A mathematical model predicting weekly changes in body mass was used to guide adherence to the intervention and CR participants followed an intensive behavioral intervention26,27. For the ancillary study analysis, we only included individuals that were “adherent” given their assigned treatment groups; that is, individuals that showed > 5% decrease in body mass at both follow-up time points if they were in the CR group, and individuals that showed < 5% change in body mass at both time points if they were in the AL group28. This criterion resulted in exclusion of two participants and a resulting sample size of 42 participants.
Assessments
Demographics, anthropometric variables, measures of body composition using dual energy X-ray absorptiometry (DXA), and sleeping energy expenditure in a whole room indirect calorimeter were collected as part of the parent study.
Demographic and anthropometric variables
Demographic variables including age and biological sex were collected at baseline. Height was measured in duplicate at baseline without shoes to the nearest 0.5 cm using a wall-mounted stadiometer. Body mass was measured in duplicate in the morning following an overnight fast at baseline, midpoint (12 months), and end (24 months) of the trial using an electric scale (Scale Tronix 5200; Welch Allyn) with participants wearing a hospital gown and no shoes. The weight of the gown was subtracted to obtain true metabolic body mass. BMI was calculated as body mass divided by meters squared.
Dual-energy X-ray absorptiometry for assessment of body composition
Body composition (i.e., fat mass and fat-free mass) was assessed using DXA at baseline, 12 months, and 24 months (Hologic 4500A, Delphi W or Discovery A scanners). Scans were performed following standardized procedures for subject positioning and scan mode, and all scans were analyzed at a central reading center by blinded analysts.
Magnetic resonance imaging for tissue and organ size
At baseline, midpoint (month 12), and end (month 24) of the trial, whole-body MRI scans were acquired in the Biomedical Imaging Core at Pennington Biomedical using a 3.0 T Sigma Excite system (General Electric, Milwaukee, WI). MRI images were acquired from the tips of the fingers with arms stretched above the head to the bottom of the feet29,30. A 3D gradient echo sequence with a repetition time of 3.5 ms and an echo time of 1.7 ms was used for acquisition of the whole-body MRI scans using a torso phase array coil. The acquisition matrix was 380 by 192, and the slice thickness of the contiguous axial slice was 3.4 mm. For brain imaging, axial contiguous brain MRI scans were acquired using a spin echo sequence with a slice thickness of 5 mm, a repetition time of 3500 ms, and an echo time of 98 ms. Following acquisition, images were segmented for adipose tissue, skeletal muscle, brain, liver, kidneys, and residual lean tissues (i.e., bones, tendons, connective tissue, and the digestive tract) at the Image Analysis Core Laboratory of New York Obesity Nutrition Research Center by a blinded experienced MRI technician using the image analysis software SliceOmatic 5.0 (Tomovision Inc., Montreal, Canada)31. Tissue compartment volume was calculated as previously described32. The intraclass correlation coefficient for volume rendering of brain, liver, kidneys, skeletal muscle, and adipose tissue for the same scan by the same analysts at the Image Analysis Core Laboratory of New York Obesity Nutrition Research Center is 0.95–0.9929,33,34. MRI volume estimates were converted to tissue mass by using the assumed density of 1.04 kg/L for skeletal muscle, liver, and kidneys; 1.03 kg/L for brain; and 0.92 kg/L for adipose tissue29,35,36. The images could not be segmented for heart because the MRI sequences were not cardiac gated so there was no clear separation between blood and cardiac muscle. To approximate heart mass, we used a previously published equation with trunk lean mass derived from DXA23,37: heart mass (kg) = 0.012 * trunk lean mass (kg)1.0499.
Energy expenditure assessments
Energy expenditure was assessed in a whole room indirect calorimeter as previously described25. Participants stayed in the room for 23.25 h and were provided with three meals and one snack at scheduled intervals with the instruction to consume all their food within 30 min. Meals were tailored such that individuals met the caloric target that aligned with their treatment group assignment; that is, participants in the CR group were fed 25% calories less than their baseline energy requirements, whereas participants in the AL group were fed to maintain energy balance28. Sleeping energy expenditure was calculated from VO2 and VCO2 according to the Weir equation38 between 2 and 5 am when motion detectors in the chamber were recording no activity. We specifically decided to use sleeping energy expenditure as a robust measure of resting energy expenditure given its repeatability of over 95% across repeated measures and precision with an estimated measurement error of only ~ 2%39.
Energy expenditure prediction
We derived three different prediction equations for sleeping energy expenditure at baseline. Firstly, we used multiple linear regression with sex, age, and body mass. Secondly, we built a model using sex, age, and fat mass and fat-free mass derived from DXA28. Thirdly, we employed previously established18 and validated19 values for tissue-specific energy expenditure to predict sleeping energy expenditure from sex, age, and adipose tissue, skeletal muscle mass, brain mass, liver mass, kidney mass, heart mass and residual lean mass from MRI. For comparison, and because we did not have a measurement of all organs included in the previously validated equation (i.e., heart mass), we also developed our own model using MRI-measured skeletal muscle, adipose tissue mass, and the combined mass of organs and tissues available (i.e., brain, liver, kidney, spleen, and residual lean tissue), in addition to age and sex.
Metabolic adaptation (MA)
Predicted values for sleeping energy expenditure were generated from each linear regression equation developed at baseline (body mass, DXA and MRI) for month 12 (the midpoint) and month 24 (end of the trial) using the actual body mass and composition values at those time points. The differences in the measured and predicted energy expenditure values (termed “residuals”) while accounting for the baseline error were calculated as a measure of metabolic adaptation (also termed adaptive thermogenesis); i.e., a change in energy expenditure that was not explained by the observed changes in tissue mass.
Statistical analysis
The primary outcome of this analysis was to more precisely quantify MA by considering changes in organ sizes as assessed via MRI in comparison to simpler models including either fat mass and fat-free mass derived from DXA, or body mass alone. All analyses were conducted in R (version 4.3.2). Baseline participant characteristics are presented as means (standard deviation) or N (percent) for continuous or categorical variables, respectively. Changes in outcome variables from baseline were analyzed using a linear mixed model with fixed effects for time and treatment group, the interaction thereof, and a random effect for participant to account for repeated measures. Within- and between-group effect estimates alongside corresponding 95% confidence intervals as derived from the model are reported for these analyses. Residuals (i.e., the difference between measured and predicted energy expenditure values) were derived from the different prediction equations while accounting for the error at baseline. These residual values were compared against zero to determine if statistically significant metabolic adaptation occurred. This was done with linear mixed models with fixed effects for the method of prediction and time as well as the interaction thereof, and a random effect for participant. Additionally, the different prediction methods were modeled as a continuous variable representing the increase in granularity of tissue assessment, and the interaction between this slope and the treatment group were assessed using a linear mixed model. Furthermore, individuals were classified categorically as having metabolic adaptation (or not) if the residual (i.e., the unexplained decrease in SleepEE) was greater than the measurement error of SleepEE, estimated at 2%39. Finally, the magnitude of metabolic adaptation was calculated as a percentage of SleepEE at each respective time point.
Continue Reading
-
Swiatek’s summer surge carries her back to No. 2
Just two months ago, Iga Swiatek had slipped to No. 8 in the PIF WTA Rankings. She hadn’t won a title or reached a final in more than a year. Her once-iron grip on the No. 1 ranking had passed to Aryna Sabalenka, and even her hold on Roland Garros had been broken.
Still just 24, Swiatek responded by claiming two titles for the first time in her career — Wimbledon, her sixth major crown, and Cincinnati, her first hard-court WTA 1000 title since Indian Wells a year ago.
That No. 8 ranking already seems like a distant memory. Swiatek climbs back up one place this week to No. 2, just in time for US Open seedings — displacing Coco Gauff to No. 3.
Paolini, Kudermetova, Krejcikova, Gracheva on the rise again
- Jasmine Paolini, who was ranked No. 4 after winning her second WTA 1000 title in Rome this spring, had fallen to No. 9 before Cincinnati after her points from the 2024 Roland Garros and Wimbledon finals dropped off. More worryingly, she entered the tournament following back-to-back losses to players ranked outside the Top 50 — Kamilla Rakhimova at Wimbledon and, from match point up, Aoi Ito in Montreal. But the Italian responded in style, upsetting Gauff along the way to her second WTA 1000 final of the year. She moves up one spot to No. 8.
- Former World No. 9 Veronika Kudermetova had slumped down to No. 77 last November after compiling a negative 18-25 record in 2024. But the 28-year-old has steadily worked her way back up the rankings this year — and in Cincinnati, her improved form paid off with a run to her third career WTA 1000 semifinal, and first since Rome 2023. Kudermetova’s season record is already 33-20 (25-18 in WTA main draws), and she jumps 10 places this week to No. 26. It’s the first time she’s been ranked inside the Top 30 since May 2024.
- Two-time major champion Barbora Krejcikova missed the first six months of 2025 with a back injury, and went into Cincinnati ranked No. 80 — her lowest ranking since October 2020. But the Czech reached the last 16 after winning three matches in a single tournament for the first time since the 2024 Paris Olympic Games. She is back up 19 places to No. 61 this week.
- Between September 2020 and June 2025, Varvara Gracheva spent all but three weeks inside the Top 100. But the Frenchwoman failed to win consecutive tour-level matches through the first half of this year, falling to No. 111 in June. A semifinal run in Eastbourne put the former No. 39 back on the right track, and last week she defeated Sofia Kenin and Karolina Muchova en route to the first WTA 1000 quarterfinal of her career in Cincinnati. Gracheva returns to the Top 100 with the largest numerical jump inside that echelon this week, climbing 20 places from No. 103 to No. 83.
Alexandrova, Jovic, Ito, Seidel reach new career highs
- Ekaterina Alexandrova is quietly putting together one of her most consistent seasons to date. In 2025, the 30-year-old has won the Linz title, reached semifinals in Doha, Charleston and ‘s-Hertogenbosch and made the second week of both Roland Garros and Wimbledon. Last week, she added a run to the Cincinnati fourth round and climbs two places to a new career high of No. 14.
- Iva Jovic’s steady rise continued in Cincinnati. The 17-year-old American fell in qualifying to eventual quarterfinalist Gracheva, but entered the main draw as a lucky loser. Jovic proceeded to score her first career Top 30 win over Linda Noskova on her way to the third round, where she took Krejcikova to three sets. She rises 12 spots to No. 76 this week.
- Aoi Ito has been a breakout player on the North American hard-court swing, with an unorthodox game and a relaxed demeanor. The Japanese 21-year-old qualified and made the third round in Montreal, then repeated the feat in Cincinnati via an upset of Anastasia Pavlyuchenkova. Ito rises another 12 places to No. 82.
- Ella Seidel had never competed in a WTA 1000 main draw before qualifying for Cincinnati last week, and her only pair of tour-level quarterfinals had come at WTA 250 level (Budapest and Prague last year). But the 20-year-old German showed that her big-hitting game could stand up to the best as she notched her first career Top 20 win over Emma Navarro, then escaped McCartney Kessler from match point down to make the fourth round. Seidel soars 20 places to No. 105.
Other notable rankings movements
Sorana Cirstea, +26 to No. 112: The 35-year-old Romanian reached the fourth round of Cincinnati with wins over Donna Vekic, Magdalena Frech and Yuan Yue.
Clervie Ngounoue, +32 to No. 179: Ngounoue qualified for Cincinnati, then defeated Hailey Baptiste to notch her first career WTA main-draw victory. The 19-year-old American rises to a new career high.
Himeno Sakatsume, +26 to No. 201: Sakatsume, 24, won last week’s Saskatoon ITF W50 event, defeating Anca Todoni in the final.
Teodora Kostovic, +56 to No. 265: Former junior No. 4 Kostovic captured her first ITF W75 title last week on home soil in Kursumlijska Banja. The 18-year-old Serb rockets to a new career high.
Kayla Day, +97 to No. 419: Former No. 84 Day was sidelined for six months between October 2024 and April 2025 with an ankle surgery. She picked up the first title of her comeback at the Southaven ITF W35 two weeks ago.
Hannah Klugman, +102 to No. 567: British 15-year-old Klugman, the current junior No. 3, reached her first professional final two weeks ago at the Roehampton ITF W35.
Alicia Dudeney, +323 to No. 701: University of Florida alumna Dudeney, 22, won her first professional title at the Roehampton ITF W35 two weeks ago, defeating Klugman in an all-British final. She soars to a new career high.
Continue Reading
-
Samsung Electronics Debuts Odyssey G7 Monitors, Showcasing Top Games on Its Displays at Gamescom 2025 – Samsung Newsroom
- Samsung Electronics Debuts Odyssey G7 Monitors, Showcasing Top Games on Its Displays at Gamescom 2025 Samsung Newsroom
- Samsung Launches World’s First 500 Hz OLED Gaming Monitor and New Odyssey G7 Lineup TechPowerUp
- Samsung Cranks Out a 500Hz OLED Gaming Monitor IGN
- Asus releases ROG Strix OLED XG27AQDPG globally with Samsung beating pricing Notebookcheck
- Samsung’s 500Hz OLED G6 gaming monitor now widely available, significantly cheaper than the pre-order price PC Guide
Continue Reading
-
Review of Patient-Reported Outcomes in Melanoma Reveals Need for Validation, Standardization
Artistic depiction of a melanoma cell targeted by shields, illustrating the cellular fight against skin cancer, emphasizing research and cure: © Татьяна Креминская – stock.adobe.com
A systemic review evaluating patient-reported outcomes (PROMs) commonly used in melanoma research and clinical practice revealed high heterogeneity as 124 studies used 110 unique PROMs, with only 17 PROMs (15%) using melanoma-specific validation data, according to a study published in JAMA Dermatology.1 The study underscores the need for standardized, validated tools to ensure accurate measurement of PROMs.
The findings illustrate the challenge to compare results across research or translate data to clinical practice. The most commonly measured outcomes included emotional and psychological well-being (25% of PROMs), health-related quality of life (19%), and self-functioning, efficacy, and coping strategies (18%).
A total of 18 studies were identified that reported melanoma-specific validation data for these 17 PROMs, of which 14 (78%) were specifically psychometric validation studies and only 7 (41%) had a validation score of 4 or greater. Although only the Functional Assessment of Cancer Therapy-Melanoma (FACT-M) questionnaire was fully validated, other tools such as the Melanoma Concerns Questionnaire, the Supportive Care Needs Survey-Melanoma Module (SCNS-MM), and the Fear of Cancer Recurrence Inventory were partially validated.
This lack of validation raises concerns about whether these tools accurately capture the experiences of melanoma patients, particularly in longitudinal studies where detecting meaningful changes over time is critical.
Study Details
A total of 30,895 abstracts were screened from 136 articles detailing 124 studies compiled from MEDLINE, Embase, Web of Science Index Medicus, CINAHL, the Cochrane Central Register of Controlled Trials, and PsychINFO databases, which totalled 32,784 patients.
Eligible study designs included individually and cluster randomized clinical trials, quasi-experimental trials, pre-post studies (controlled and uncontrolled), intermittent time series, cohort studies, and cross-sectional studies. Meta-analyses, systematic reviews, and Cochrane reviews were also reviewed to identify any individual studies missed by the search strategy. The full cohort of studies included 52 cross-sectional studies (41%), 31 randomized clinical trials (25%), 23 longitudinal studies (19%), 8 pre-post studies (6%),6 cohort studies (5%), 1 retrospective analysis (1%), 1 phase IV trial (1%), 1 protocol (1%), and 1 quasi-experimental trial (1%).
Ineligible studies included case series, case studies, case reports, opinion, editorial, and commentary articles, letters to the editor, and conference abstracts.
Male and female patients of any age with any-stage cutaneous melanoma were included. Patients with other cancer types were only included if outcomes were reported separately for patients affected by melanoma. Patients with ocular melanoma, mucosal melanoma, or patients at high for melanoma but who were not diagnosed were excluded.
Clinical Implications
The investigators identified a number of implications after conducting this review. Unvalidated tools may lead to measurement errors, misinforming treatment decisions or support strategies. The high heterogeneity makes study comparisons difficult and hinders efforts to consolidate the available evidence for meta-analysis.
As a result, it poses a challenge for clinical practice guidelines to recommend appropriate PROMs for a specific outcome in routine practice. The investigators recommend that PROMs that are validated for use in melanoma populations should be prioritized in future research.
Further, 85% of the identified PROMs did not have melanoma-specific validation data available. The review emphasizes the importance of core outcome tests and recommends using validated melanoma-specific PROMs where available. For example, to measure health-related quality of life, the FACT-M or Melanoma Concerns Questionnaire are suggested. For assessing unmet needs, the SCNS-MM is recommended, whereas the Fear of Cancer Recurrence Questionnaire-7 item is highlighted for evaluating recurrence anxiety.
The investigators concluded that although PROMs are important for capturing patients perspectives in their care, variability and lack of validation lack their utility. For now community oncologists should critically evaluate the PROMs they use, favoring melanoma-specific validated tools where available.
REFERENCE:
Thompson JR, McCutcheon TB, Martin LK, Saw RPM, Bartula I, Boyle F. Patient-Reported Outcome Measures and Validation Data Used in Melanoma Research and Routine Practice: A Systematic Review. JAMA Dermatol. Published online July 30, 2025. doi:10.1001/jamadermatol.2025.2287
Continue Reading
-
Canadian Women’s Open 2025: schedule, field, and how to watch – olympics.com
- Canadian Women’s Open 2025: schedule, field, and how to watch olympics.com
- How to Watch the 2025 CPKC Women’s Open LPGA
- What has been giving Henderson the most trouble this year? TSN
- Maria Fassi, Ruihan Kendria Wang, Celina Yeo and Joline Truong earn final four spots into 2025 CPKC Women’s Open Golf Canada
- Top pros in Canada and the world will tee off next week in Mississauga INsauga
Continue Reading