Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (222)

Search Parameters:
Keywords = circumstances of users

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
36 pages, 1201 KiB  
Article
Between Smart Cities Infrastructure and Intention: Mapping the Relationship Between Urban Barriers and Bike-Sharing Usage
by Radosław Wolniak and Katarzyna Turoń
Smart Cities 2025, 8(4), 124; https://doi.org/10.3390/smartcities8040124 - 29 Jul 2025
Viewed by 336
Abstract
Society’s adaptation to shared mobility services is a growing topic that requires detailed understanding of the local circumstances of potential and current users. This paper focuses on analyzing barriers to the adoption of urban bike-sharing systems in post-industrial cities, using a case study [...] Read more.
Society’s adaptation to shared mobility services is a growing topic that requires detailed understanding of the local circumstances of potential and current users. This paper focuses on analyzing barriers to the adoption of urban bike-sharing systems in post-industrial cities, using a case study of the Silesian agglomeration in Poland. Methodologically, the article integrates quantitative survey methods with multivariate statistical analysis to analyze the demographic, socioeconomic, and motivational factors that underline the adoption of shared micromobility. The study highlights a detailed segmentation of users by income, age, professional status, and gender, as well as the observation of profound disparities in access and perceived usefulness. Of note is the study’s identification of a highly concentrated segment of young, low-income users (mostly students), which largely accounts for the general perception of economic and infrastructural barriers. These include the use of factor analysis and regression to plot the interaction patterns between individual user characteristics and certain system-level constraints, such as cost, infrastructure coverage, weather, and health. The study’s findings prioritize problem-specific interventions in urban mobility planning: bridging equity gaps between user groups. This research contributes to the current literature by providing detailed insights into the heterogeneity of user mobility behavior, offering evidence-based recommendations for inclusive and adaptive options for shared transportation infrastructure in a changing urban context. Full article
Show Figures

Figure 1

47 pages, 5162 KiB  
Review
Drought Analysis Methods: A Multidisciplinary Review with Insights on Key Decision-Making Factors in Method Selection
by Abdul Baqi Ahady, Elena-Maria Klopries, Holger Schüttrumpf and Stefanie Wolf
Water 2025, 17(15), 2248; https://doi.org/10.3390/w17152248 - 28 Jul 2025
Viewed by 557
Abstract
Drought is one of the most complex natural hazards, characterized by its slow onset, persistent nature, diverse sectoral impacts (e.g., agriculture, water resources, ecosystems), and dependence on meteorological, hydrological, and socioeconomic factors. Over the years, significant scientific effort has been devoted to developing [...] Read more.
Drought is one of the most complex natural hazards, characterized by its slow onset, persistent nature, diverse sectoral impacts (e.g., agriculture, water resources, ecosystems), and dependence on meteorological, hydrological, and socioeconomic factors. Over the years, significant scientific effort has been devoted to developing methodologies that address its multifaceted nature, reflecting the interdisciplinary challenges of drought analysis. However, previous reviews have typically focused on individual methods, while this study presents a unified, multidisciplinary framework that integrates multiple drought analysis methods and links them to key factors guiding method selection. To address this gap, five widely used methods—index-based, remote sensing, threshold-level methods (TLM), impact-based methods, and the storyline approach—are critically evaluated from a multidisciplinary perspective. In addition, the study examines spatial and temporal trends in scientific publications, illustrating how the application of these methods has evolved over time and across regions. The primary objective of this review is twofold: (1) to provide a holistic, state-of-the-art synthesis of these methods, their applications, and their limitations; and (2) to evaluate and prioritize the critical decision-making factors, including drought type, data type/availability, study scale, and management objectives that influence method selection. By bridging this gap, the paper offers a conceptual decision-support framework for selecting context-appropriate drought analysis methods. However, challenges remain, including the vast diversity of methods beyond the scope of this review and the limited consideration of less influential factors such as user expertise, computational resources, and policy context. The paper concludes with insights and recommendations for optimizing method selection under varying circumstances, aiming to support both drought research and effective policy implementation. Full article
(This article belongs to the Section Hydrology)
Show Figures

Graphical abstract

26 pages, 1681 KiB  
Article
Net-Sufficiency Evaluation Method Focusing on Product Functions Based on the Living-Sphere Approach
by Hideki Kobayashi, Ryotaro Kaji and Hidenori Murata
Sustainability 2025, 17(12), 5269; https://doi.org/10.3390/su17125269 - 6 Jun 2025
Viewed by 603
Abstract
We are living in a world filled with artifacts, including daily-use and durable products. In the context of sustainable consumption and production (SCP), the term “sufficiency” is an essential keyword. The concept of sufficiency is important for grasping the overall contribution of product [...] Read more.
We are living in a world filled with artifacts, including daily-use and durable products. In the context of sustainable consumption and production (SCP), the term “sufficiency” is an essential keyword. The concept of sufficiency is important for grasping the overall contribution of product functions to the fulfillment of human needs in terms of social sustainability. Sufficiency is also understood to be a necessary component for reducing the environmental impact of daily-use and durable products on the natural environment. Therefore, sufficiency is regarded as a key factor in promoting environmental sustainability. Generally, a product itself is not as essential as the functions it provides to the user. However, product functions have not only positive aspects that satisfy human needs, but also negative aspects that do not. Most existing methods for assessing the satisfaction of human needs are based on direct approaches, such as life satisfaction surveys, which do not take product functions into account. In the previous study, we proposed a living-sphere approach that integrates the traditional engineering design framework with Max-Neef’s framework of needs, relating product functions to fundamental human needs. In Max-Neef’s framework, a key concept is the “satisfier,” which refers to a conceptual method of satisfying universal human needs; however, this concept varies according to regional or local circumstances, such as culture, climate, and history. This study proposes a method to evaluate net sufficiency, which is the overall impact of product functions, both positive and negative, on fulfilling fundamental human needs. Through introducing not only a satisfier that fulfills but also a barrier that obstructs fundamental human needs, it is possible to comprehensively evaluate the degree to which a product’s functions fulfill such needs. Two case studies from Osaka and Hanoi were carried out independently, showing that the proposed method enables comprehensive evaluation of the net sufficiency of meeting fundamental needs in terms of the positive and negative aspects of product functions. Full article
Show Figures

Figure 1

31 pages, 4745 KiB  
Article
Effect of Pre-Trip Information in a Traffic Network with Stochastic Travel Conditions: Role of Risk Attitude
by Yun Yu, Shiteng Zheng, Yuankai Li, Huaqing Liu and Jianan Cao
Systems 2025, 13(6), 407; https://doi.org/10.3390/systems13060407 - 24 May 2025
Viewed by 323
Abstract
Empirical studies have suggested that travelers’ risk attitudes affect their choice behavior when travel conditions are stochastic. By considering the travelers’ risk attitudes, we extend the classical two-route model, in which road capacities vary due to such shocks as bad weather, accidents, and [...] Read more.
Empirical studies have suggested that travelers’ risk attitudes affect their choice behavior when travel conditions are stochastic. By considering the travelers’ risk attitudes, we extend the classical two-route model, in which road capacities vary due to such shocks as bad weather, accidents, and special events. Two information regimes have been investigated. In the zero-information regime, we postulate that travelers acquire the variability in route travel time based on past experiences and choose the route to minimize the travel time budget. In the full-information regime, travelers have pre-trip information of the road capacities and thus choose the route to minimize the travel time. User equilibrium states of the two regimes have been analyzed, based on the canonical BPR travel time function with power coefficient p. In the special case p=1, the closed form solutions have been derived. Three cases and eleven subcases have been classified concerning the dependence of expected total travel times on the risk attitude in the zero-information regime. In the general condition p>0, although we are not able to derive the closed form solutions, we proved that the results are qualitatively unchanged. We have studied the benefit gains/losses by shifting from the zero-information to the full-information regime. The circumstance under which pre-trip information is beneficial has been identified. A numerical analysis is conducted to further illustrate the theoretical findings. Full article
Show Figures

Figure 1

12 pages, 812 KiB  
Essay
Semantic Communication Physical Layer Security Performance Analysis
by Xiaowei Wang and Fuchao Peng
Electronics 2025, 14(7), 1316; https://doi.org/10.3390/electronics14071316 - 26 Mar 2025
Viewed by 591
Abstract
Semantic communication based on deep learning technology extracts the meaning of the transmitted source to achieve spectrum resource savings and enhance anti-interference capabilities. The black-box nature of deep learning models increases the difficulty for eavesdroppers in intercepting information, thereby significantly improving transmission security [...] Read more.
Semantic communication based on deep learning technology extracts the meaning of the transmitted source to achieve spectrum resource savings and enhance anti-interference capabilities. The black-box nature of deep learning models increases the difficulty for eavesdroppers in intercepting information, thereby significantly improving transmission security under normal circumstances. However, eavesdroppers may utilize model theft techniques to acquire models that have similar functionality and performance to the victim’s model. Moreover, even if all users are legitimate, the private information of a specific legitimate user should not be accessible to other users, and this issue also requires attention. As the lowest layer of wireless communication, the physical layer has been proven to enhance the security performance of communication systems by leveraging the randomness of physical channels. Unlike traditional communication, which transmits bit streams, semantic communication transmits semantic streams. Therefore, this paper converts semantic streams into bit streams to analyze the security performance of semantic communication using traditional communication metrics. Specifically, this paper assumes that the performance of the eavesdropper’s stolen model is consistent with that of the original model (although this assumption is impossible) and conducts a derivation analysis of the Secrecy Outage Probability (SOP). Full article
(This article belongs to the Section Microwave and Wireless Communications)
Show Figures

Figure 1

21 pages, 4715 KiB  
Article
Development of a Functional and Logical Reference System Architecture in Automotive Engineering
by Jonas Krog, Caner Akbas, Bastian Nolte and Thomas Vietor
Systems 2025, 13(3), 141; https://doi.org/10.3390/systems13030141 - 20 Feb 2025
Viewed by 1357
Abstract
The automobile is evolving from a mechanically dominated to a cyber-physical, software-defined system. Future complex functionalities, such as autonomous driving, require multidisciplinary, interconnected systems. Hence, interdisciplinary architecture development based on Systems Engineering principles becomes essential, leading to a methodology for vehicle system architecture [...] Read more.
The automobile is evolving from a mechanically dominated to a cyber-physical, software-defined system. Future complex functionalities, such as autonomous driving, require multidisciplinary, interconnected systems. Hence, interdisciplinary architecture development based on Systems Engineering principles becomes essential, leading to a methodology for vehicle system architecture with the RFLP-Framework. For its application in the automotive industry, building upon the established mechanical and electronical platform approaches, the methodology incorporates the concept of a Reference System Architecture. This is defined as a basic architecture that sets out the common architectural specifications to support the efficient and systemic interdisciplinary architecture development across multiple projects. Its corresponding characteristics and quality criteria are defined and the understanding of the functional and logical reference architecture view, based on the RFLP-Framework, is described. Based on this understanding, an exemplary functional and logical Reference System Architecture for passenger vehicles is proposed. Its methodical user-oriented and knowledge-based development within the scientific circumstances is discussed and concluded. Full article
(This article belongs to the Section Systems Engineering)
Show Figures

Figure 1

40 pages, 3190 KiB  
Review
Intelligence-Based Strategies with Vehicle-to-Everything Network: A Review
by Navdeep Bohra, Ashish Kumari, Vikash Kumar Mishra, Pramod Kumar Soni and Vipin Balyan
Future Internet 2025, 17(2), 79; https://doi.org/10.3390/fi17020079 - 10 Feb 2025
Cited by 2 | Viewed by 1412
Abstract
Advancements in intelligent vehicular networks and computing systems have created new possibilities for innovative approaches that enhance traffic safety, comfort, and transportation performance. Machine Learning (ML) has become widely employed for boosting conventional data-driven methodologies in various scientific study domains. The integration of [...] Read more.
Advancements in intelligent vehicular networks and computing systems have created new possibilities for innovative approaches that enhance traffic safety, comfort, and transportation performance. Machine Learning (ML) has become widely employed for boosting conventional data-driven methodologies in various scientific study domains. The integration of a Vehicle-to-Everything (V2X) system with ML enables the acquisition of knowledge from multiple places, enhances the operator’s awareness, and predicts future crashes to prevent them. The information serves multiple functions, such as determining the most efficient route, increasing the driver’s knowledge, forecasting movement strategy to avoid risky circumstances, and eventually improving user convenience, security, and overall highway experiences. This article thoroughly examines Artificial Intelligence (AI) and ML methods that are now investigated through different study endeavors in vehicular ad hoc networks (VANETs). Furthermore, it examines the benefits and drawbacks accompanying such intelligent methods in the context of the VANETs system and simulation tools. Ultimately, this study pinpoints prospective domains for vehicular network development that can utilize the capabilities of AI and ML. Full article
Show Figures

Figure 1

13 pages, 13701 KiB  
Article
Design and Implementation of Elevator Push-Buttons with Integrated Ultraviolet-C Light-Emitting Diode Light Sources for Disinfection
by Xing Qiu, Jeffery C. C. Lo, Yuanjie Cheng and S. W. Ricky Lee
Inventions 2025, 10(1), 4; https://doi.org/10.3390/inventions10010004 - 15 Jan 2025
Viewed by 1111
Abstract
Background: More effective and automated techniques for disinfecting elevator push-buttons currently need to be developed, especially given that they are frequently touched by hundreds of individuals. Methods: An automatic elevator push-button disinfection device equipped with four 265 nm ultraviolet-C (UVC) light-emitting diode (LED) [...] Read more.
Background: More effective and automated techniques for disinfecting elevator push-buttons currently need to be developed, especially given that they are frequently touched by hundreds of individuals. Methods: An automatic elevator push-button disinfection device equipped with four 265 nm ultraviolet-C (UVC) light-emitting diode (LED) packages has been developed for disinfection after each touch to reduce the risk of infection. In this paper, the UVC leakage test, UVC LED package reliability test, and bacteria disinfection efficiency test were performed. Results: The disinfection efficiency for Staphylococcus aureus and Escherichia coli can reach over 90% in 10 s, and end users can set multiple disinfection periods in light of their circumstances. The disinfection device is safe for the human body if the distance exceeds 120 mm. The accelerated aging test result demonstrates that the disinfection device is reliable under normal operation and end-users can increase the disinfection time by compensating for the irradiance drop. Conclusions: The automatic elevator push-button disinfection device provides a safe, highly efficient, and stable disinfection solution for elevator push-buttons. Full article
(This article belongs to the Section Inventions and Innovation in Advanced Manufacturing)
Show Figures

Figure 1

14 pages, 208 KiB  
Article
Social Media, Informed Consent, and the Harm Principle
by Charles Foster
Philosophies 2025, 10(1), 5; https://doi.org/10.3390/philosophies10010005 - 11 Jan 2025
Viewed by 3425
Abstract
This article examines whether social media users can validly consent to their own use of social media. It argues that, whether or not social media use is analogous to public health interventions, there is an obligation to provide users with information about risks [...] Read more.
This article examines whether social media users can validly consent to their own use of social media. It argues that, whether or not social media use is analogous to public health interventions, there is an obligation to provide users with information about risks and benefits, and absent that provision, there is no valid consent. Many or most users, in any event, do not have the capacity to consent, according to the criteria for capacity articulated in the ‘four abilities’ model: the ability to express a choice, the ability to understand the facts pertinent to the decision in question, the ability of a subject to believe that the information applies to them, and the ability to reason—in the sense of being able to consider and weigh (with reference to the patient’s own concerns, circumstances, and values) the main possible outcomes of the decision to opt for the intervention and the decision to opt not to undergo it. Even if an individual social media user is capacitous according to these criteria, many will fail to be judged capacitous if (as it is argued should be the case), a further criterion, identified by Jennifer Hawkins must be satisfied, namely that the individual can look after their own interests at least as well as most other people can. It follows from this consideration that not only can regulation of social media (in the form of a ban) be justified under Mill’s harm principle, but that non-regulation cannot be justified. Full article
(This article belongs to the Special Issue The Ethics of Modern and Emerging Technology)
22 pages, 2620 KiB  
Article
The Role of Small Rural Grocery Stores in Northern Bavaria: Findings of a Quantitative Customer Survey
by Pinar Akbaba, Jürgen Rauh and Sebastian Rauch
Sustainability 2025, 17(2), 388; https://doi.org/10.3390/su17020388 - 7 Jan 2025
Cited by 1 | Viewed by 1155
Abstract
Grocery shopping is an integral part of everyday life in every household. Due to the increasing decline in the number of grocery stores, it is difficult to find grocery shops close to home, especially in rural areas. For certain population groups, such as [...] Read more.
Grocery shopping is an integral part of everyday life in every household. Due to the increasing decline in the number of grocery stores, it is difficult to find grocery shops close to home, especially in rural areas. For certain population groups, such as older people and/or people with limited mobility, people living alone and single parents, as well as households without a car, it is difficult to get groceries within walking distance. In addition, the gaps in local supply also mean a decline in the quality of life of the affected population. This study addresses the question of what role small rural grocery stores play in the shopping behavior of residents of rural areas and how they rate them. Using a quantitative consumer survey (n = 238), the shopping behavior and relationship to five sites in the Main-Spessart region of Bavaria, Germany were analyzed. The surveyed customers visit the rural stores several times a week (57.1%), especially for necessities (62.2%) and weekly shopping (13.1%). The product range (including fresh products), proximity to the place of residence, as well as the social function are most valued. Four different customer types were identified: the Uninvolved (35.6%), the Supporters (15.5%), the Motivated (25.8%) and the Socials (23.2%). The study shows that small rural grocery stores can contribute significantly to the food supply in poorly supplied areas. The degree of use varies depending on the individual life circumstances and needs. Using the location as a place for social exchange is a very relevant factor (60.5%). The targeted use of the store as a social meeting place is highly dependent on the additional infrastructure provided (e.g., a café corner). These results can help decision-makers to gain a better understanding of the users and consequently to better assess potentials of small rural grocery stores. Full article
(This article belongs to the Section Sustainable Urban and Rural Development)
Show Figures

Figure 1

29 pages, 8028 KiB  
Article
Developing a Hybrid Approach with Whale Optimization and Deep Convolutional Neural Networks for Enhancing Security in Smart Home Environments’ Sustainability Through IoT Devices
by Kavitha Ramaswami Jothi and Balamurugan Vaithiyanathan
Sustainability 2024, 16(24), 11040; https://doi.org/10.3390/su162411040 - 16 Dec 2024
Cited by 1 | Viewed by 1176
Abstract
Even while living circumstances and construction techniques have generally improved, occupants of these spaces frequently feel unsatisfied with the sense of security they provide, which leads to looking for and eventually enacting ever-more-effective safety precautions. The continuous uncertainty that contemporary individuals experience, particularly [...] Read more.
Even while living circumstances and construction techniques have generally improved, occupants of these spaces frequently feel unsatisfied with the sense of security they provide, which leads to looking for and eventually enacting ever-more-effective safety precautions. The continuous uncertainty that contemporary individuals experience, particularly with regard to their protection in places like cities, prompted the field of computing to design smart devices that attempt to reduce threats and ultimately strengthen people’s sense of protection. Intelligent apps were developed to provide protection and make a residence a smart and safe home. The proliferation of technology for smart homes necessitates the implementation of rigorous safety precautions to protect users’ personal information and avoid illegal access. The importance of establishing cyber security has been recognized by academic and business institutions all around the globe. Providing reliable computation for the Internet of Things (IoT) is also crucial. A new method for enhancing safety in smart home environments’ sustainability using IoT devices is presented in this paper, combining the Whale Optimization Algorithm (WOA) with Deep Convolutional Neural Networks (DCNNs). WOA-DCNN hybridization seeks to enhance safety measures by efficiently identifying and averting possible attacks in real time. We show how effective the proposed approach is in defending smart home systems from a range of safety risks via in-depth testing and analysis. By providing a potential path for protecting smart home surroundings in a world that is growing more linked, this research advances the state of the art in IoT security. Full article
Show Figures

Figure 1

22 pages, 4594 KiB  
Article
Testing Exhaust Emissions of Plug-In Hybrid Vehicles in Poland
by Jacek Pielecha and Wojciech Gis
Energies 2024, 17(24), 6288; https://doi.org/10.3390/en17246288 - 13 Dec 2024
Viewed by 1107
Abstract
The article addresses the usage patterns of plug-in hybrid vehicles (PHEVs) under Polish conditions. The conventional approach to operating such vehicles assumes that they are used with a fully charged battery at the start. However, the economic circumstances of Polish users often do [...] Read more.
The article addresses the usage patterns of plug-in hybrid vehicles (PHEVs) under Polish conditions. The conventional approach to operating such vehicles assumes that they are used with a fully charged battery at the start. However, the economic circumstances of Polish users often do not allow for daily charging of vehicles from the domestic power grid. As a result, these vehicles are used not only in a mode powered solely by the internal combustion engine but also in a mode where the internal combustion engine is primarily utilized to charge the battery. An analysis was conducted on various ways of operating plug-in vehicles, evaluating not only harmful emissions but also fuel consumption (for battery states of charge: SOC = 100%, SOC = 50%, SOC = 0%, and SOC = 0 → 100%—forced charging mode). The study focused on the most characteristic vehicle segment in Poland, SUVs, and employed a methodology for determining exhaust emissions under real-world driving conditions. Results indicate that forced charging of such a vehicle’s battery leads to over a 25-fold increase in carbon dioxide emissions (fuel consumption) in urban areas compared to operating the vehicle with a fully charged battery (CO—25× increase, NOx—12× increase, PN—11× increase). Operating a plug-in SUV without charging it from the power grid results in a 13-fold increase in fuel consumption compared to using the vehicle with a fully charged battery (CO—10× increase, NOx—6× increase, PN—4× increase). The emission results were used to evaluate Poland’s charging infrastructure in the context of PHEV usage. The current state of the infrastructure and its development plans for 2030 and 2040 were analyzed. It was found that significant reductions in fuel consumption (by approximately 30%) and CO2 emissions are achievable by 2040. Emissions of CO, NOx, and PN are expected to decrease by about 10%, primarily due to the internal combustion engine operating at high load conditions in non-urban or highway scenarios. Full article
Show Figures

Figure 1

10 pages, 1711 KiB  
Article
Different Deeds, Different Needs—Types of Violence Against Women and Social Support Sought Online
by Tinkara Pavšič Mrevlje and Vanja Ida Erčulj
Behav. Sci. 2024, 14(11), 1066; https://doi.org/10.3390/bs14111066 - 7 Nov 2024
Viewed by 1237
Abstract
Women, as victims of violence, among which intimate partner violence prevails, venture online to seek a supportive community. Members of online support groups differ in the experiences and needs they have and support they seek. The objective of this research was to explore [...] Read more.
Women, as victims of violence, among which intimate partner violence prevails, venture online to seek a supportive community. Members of online support groups differ in the experiences and needs they have and support they seek. The objective of this research was to explore the difference in types of support sought and support received between women who self-report having been a witness/victim of violence and others who directly ask for help without explaining their circumstances. For this purpose, content analysis of 600 randomly selected starting posts from an online support community was performed. The results reveal an association between the needs expressed and the experience of violence described. Although users most frequently sought informational support, those recounting sexual violence more often asked for emotional support or were looking for an emotional release. Posts describing a different kind of violence were more likely to bring more support than short posts directly asking for help. The findings are important since women in a violent relationship tend to become more isolated or controlled by their partners, pointing to the crucial role of online support in helping and encouraging those women to take the first step in seeking help from formal institutions. Full article
Show Figures

Figure 1

29 pages, 4444 KiB  
Article
A Stochastic Approach to the Power Requirements of the Electric Vehicle Charging Infrastructure: The Case of Spain
by Oscar Castillo, Roberto Álvarez Fernández and Mario Porru
Energies 2024, 17(21), 5314; https://doi.org/10.3390/en17215314 - 25 Oct 2024
Cited by 1 | Viewed by 1105
Abstract
Battery electric vehicles represent a technological pathway for reducing carbon emissions in personal road transport. However, for the widespread adoption of this type of vehicle, the user experience should be similar to that of combustion engine vehicles. To achieve this objective, a robust [...] Read more.
Battery electric vehicles represent a technological pathway for reducing carbon emissions in personal road transport. However, for the widespread adoption of this type of vehicle, the user experience should be similar to that of combustion engine vehicles. To achieve this objective, a robust and reliable public charging infrastructure is essential. In Spain, the electric recharging infrastructure is growing quickly in metropolitan areas but much more slowly on roads and highways. The upcoming charging stations must be located along high-volume traffic corridors and in proximity to the Trans-European Transport Network. The main contribution of this research is to offer a method for examining the essential electricity infrastructure investments required in scenarios involving substantial electric vehicle adoption. The methodology includes a sensitivity analysis of fleet composition and market share, recharging user behavior, charging station density, and vehicle efficiency improvements. To this end, the authors have developed a simplified probabilistic model, addressing the effect of the involved parameters through a comprehensive scenario analysis. The results show that the actual number of high-capacity charging plugs on Spanish roads is significantly lower than the European regulation requirements for the year 2030 considering an electric vehicle market share according to the Spanish Integrated National Energy and Climate Plan 2021–2030 objectives and it is far from the necessary infrastructure to cover the expected demand according to the traffic flow. Under these circumstances, the charging peak power demand reaches over 7.4% of the current Spanish total power demand for an electric vehicle fleet, which corresponds to only 12% of the total. Full article
(This article belongs to the Section E: Electric Vehicles)
Show Figures

Figure 1

21 pages, 12484 KiB  
Article
Assessment of Future Water Security under Climate Change: Practical Water Allocation Scenarios in a Drought-Prone Watershed in South Korea
by Wonjin Kim, Sijung Choi, Seongkyu Kang and Soyoung Woo
Water 2024, 16(20), 2933; https://doi.org/10.3390/w16202933 - 15 Oct 2024
Cited by 1 | Viewed by 1797
Abstract
Seomijn River Basin has numerous hydraulic structures designed to satisfy water demands and mitigate future droughts. However, the increasing water demand and export to neighboring areas cause water deficits and conflicts between water users. Therefore, practical strategies to mitigate the potential damage from [...] Read more.
Seomijn River Basin has numerous hydraulic structures designed to satisfy water demands and mitigate future droughts. However, the increasing water demand and export to neighboring areas cause water deficits and conflicts between water users. Therefore, practical strategies to mitigate the potential damage from climate change are essential. In this study, we aimed to propose practical strategies under climate change by examining the future water security of the Seomjin River Basin under five different water allocation scenarios referenced from the practical policies of various countries. Future climate models determined based on extreme precipitation indices of the ETCCDI were used to investigate their impact on water security, which was evaluated using unmet demand; demand coverage; reliability, resilience, and vulnerability; and aggregation index metrics. We found that prioritizing domestic and industrial water use is the optimal water security strategy, and unconditional allocation of instream flow can cause a significant water deficit for other water uses. However, prioritizing all water uses equally also proved effective under some conditions. Thus, our study highlights the importance of adaptive management and suggests that the optimal water allocation strategy lies in its flexibility in response to varying circumstances. Full article
Show Figures

Figure 1

Back to TopTop