Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (4,071)

Search Parameters:
Keywords = vulnerable community

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
11 pages, 483 KiB  
Article
Consequences of Untreated Dental Caries on Schoolchildren in Mexico State’s Rural and Urban Areas
by José Cuauhtémoc Jiménez-Núñez, Álvaro Edgar González-Aragón Pineda, María Fernanda Vázquez-Ortíz, Julio César Flores-Preciado, María Eugenia Jiménez-Corona and Socorro Aída Borges-Yáñez
Dent. J. 2025, 13(8), 359; https://doi.org/10.3390/dj13080359 - 7 Aug 2025
Abstract
Background/Objectives: Dental caries is the most prevalent oral condition worldwide. Consequences of untreated dental caries (CUDC) can range from pulp damage and soft tissue ulceration due to root debris to more severe issues, such as fistulas and abscesses. Rural communities might be [...] Read more.
Background/Objectives: Dental caries is the most prevalent oral condition worldwide. Consequences of untreated dental caries (CUDC) can range from pulp damage and soft tissue ulceration due to root debris to more severe issues, such as fistulas and abscesses. Rural communities might be more vulnerable to CUDC because of lower socioeconomic status, poorer access to healthcare, and lower education levels. The objective of this study was to evaluate and compare the prevalence of CUDC in rural and urban areas in schoolchildren aged 8 to 12 years in the State of Mexico. Methods: A cross-sectional study was conducted using the PUFA index, considering the presence of pulp involvement (P), soft tissue ulcerations due to root remnants (U), fistulas (F), and abscesses (A). The independent variable was the geographic area (rural or urban), and the covariates were nutritional status, hyposalivation, having one’s own toothbrush, and having received topical fluoride in the last year. Logistic regression models were fitted, calculating odds ratios (ORs) and 95% confidence intervals (CIs). Results: The prevalence of CUDC (PUFA > 0) was 42.9% in rural areas and 25.9% in urban areas. Residing in a rural area (OR: 2.15, 95% CI 1.38–3.34, p = 0.001), hyposalivation (OR: 1.93, 95% CI 1.11–3.37, p = 0.020), and professional fluoride application (OR: 0.15, 95% CI 0.07–0.32, p < 0.001) were associated with the prevalence of CUDC. Conclusions: To prevent caries and its clinical consequences due to the lack of treatment, it is important to promote timely care seeking and access to dental care services, considering the conditions of each geographic area. Full article
Show Figures

Figure 1

22 pages, 728 KiB  
Article
Multi-Layered Security Assessment in mHealth Environments: Case Study on Server, Mobile and Wearable Components in the PHGL-COVID Platform
by Edi Marian Timofte, Mihai Dimian, Serghei Mangul, Alin Dan Potorac, Ovidiu Gherman, Doru Balan and Marcel Pușcașu
Appl. Sci. 2025, 15(15), 8721; https://doi.org/10.3390/app15158721 (registering DOI) - 7 Aug 2025
Abstract
The growing use of mobile health (mHealth) technologies adds complexity and risk to the healthcare environment. This paper presents a multi-layered cybersecurity assessment of an in-house mHealth platform (PHGL-COVID), comprising a Docker-based server infrastructure, a Samsung Galaxy A55 smartphone, and a Galaxy Watch [...] Read more.
The growing use of mobile health (mHealth) technologies adds complexity and risk to the healthcare environment. This paper presents a multi-layered cybersecurity assessment of an in-house mHealth platform (PHGL-COVID), comprising a Docker-based server infrastructure, a Samsung Galaxy A55 smartphone, and a Galaxy Watch 7 wearable. The objective was to identify vulnerabilities across the server, mobile, and wearable components by emulating real-world attacks and conducting systematic penetration tests on each layer. Tools and methods specifically tailored to each technology were applied, revealing exploitable configurations, insecure Bluetooth Low Energy (BLE) communications, and exposure of Personal Health Records (PHRs). Key findings included incomplete container isolation, BLE metadata leakage, and persistent abuse of Android privacy permissions. This work delivers both a set of actionable recommendations for developers and system architects to strengthen the security of mHealth platforms, and a reproducible audit methodology that has been validated in a real-world deployment, effectively bridging the gap between theoretical threat models and practical cybersecurity practices in healthcare systems. Full article
(This article belongs to the Special Issue Advances in Cyber Security)
Show Figures

Figure 1

20 pages, 3615 KiB  
Article
Identification of Suitable Habitats for Threatened Elasmobranch Species in the OSPAR Maritime Area
by Moritz Mercker, Miriam Müller, Thorsten Werner and Janos Hennicke
Fishes 2025, 10(8), 393; https://doi.org/10.3390/fishes10080393 - 7 Aug 2025
Abstract
Protecting threatened elasmobranch species despite limited data on their distribution and abundance is a critical challenge, particularly in the context of increasing human impacts on marine ecosystems. In the northeastern Atlantic, species such as the leafscale gulper shark, Portuguese dogfish, spurdog, and spotted [...] Read more.
Protecting threatened elasmobranch species despite limited data on their distribution and abundance is a critical challenge, particularly in the context of increasing human impacts on marine ecosystems. In the northeastern Atlantic, species such as the leafscale gulper shark, Portuguese dogfish, spurdog, and spotted ray are facing pressures from overfishing, bycatch, habitat degradation, and climate change. The OSPAR Commission has listed these species as threatened and/or declining and aims to protect them by reliably identifying suitable habitats and integrating these areas into Marine Protected Areas (MPAs). In this study, we present a spatial modelling framework using regression-based approaches to identify suitable habitats for these four species. Results show that suitable habitats of the spotted ray (25.8%) and spurdog (18.8%) are relatively well represented within existing MPAs, while those of the deep-water sharks are underrepresented (6.0% for leafscale gulper shark, and 6.8% for Portuguese dogfish). Our findings highlight the need for additional MPAs in deep-sea continental slope areas, particularly west and northwest of Scotland and Ireland. Such expansions would support OSPAR’s goal to protect 30% of its maritime area by 2030 and could benefit broader deep-sea biodiversity, including other vulnerable demersal species and benthic communities. Full article
(This article belongs to the Special Issue Habitat Assessment and Conservation of Fishes)
Show Figures

Figure 1

21 pages, 559 KiB  
Review
Interest Flooding Attacks in Named Data Networking and Mitigations: Recent Advances and Challenges
by Simeon Ogunbunmi, Yu Chen, Qi Zhao, Deeraj Nagothu, Sixiao Wei, Genshe Chen and Erik Blasch
Future Internet 2025, 17(8), 357; https://doi.org/10.3390/fi17080357 - 6 Aug 2025
Abstract
Named Data Networking (NDN) represents a promising Information-Centric Networking architecture that addresses limitations of traditional host-centric Internet protocols by emphasizing content names rather than host addresses for communication. While NDN offers advantages in content distribution, mobility support, and built-in security features, its stateful [...] Read more.
Named Data Networking (NDN) represents a promising Information-Centric Networking architecture that addresses limitations of traditional host-centric Internet protocols by emphasizing content names rather than host addresses for communication. While NDN offers advantages in content distribution, mobility support, and built-in security features, its stateful forwarding plane introduces significant vulnerabilities, particularly Interest Flooding Attacks (IFAs). These IFA attacks exploit the Pending Interest Table (PIT) by injecting malicious interest packets for non-existent or unsatisfiable content, leading to resource exhaustion and denial-of-service attacks against legitimate users. This survey examines research advances in IFA detection and mitigation from 2013 to 2024, analyzing seven relevant published detection and mitigation strategies to provide current insights into this evolving security challenge. We establish a taxonomy of attack variants, including Fake Interest, Unsatisfiable Interest, Interest Loop, and Collusive models, while examining their operational characteristics and network performance impacts. Our analysis categorizes defense mechanisms into five primary approaches: rate-limiting strategies, PIT management techniques, machine learning and artificial intelligence methods, reputation-based systems, and blockchain-enabled solutions. These approaches are evaluated for their effectiveness, computational requirements, and deployment feasibility. The survey extends to domain-specific implementations in resource-constrained environments, examining adaptations for Internet of Things deployments, wireless sensor networks, and high-mobility vehicular scenarios. Five critical research directions are proposed: adaptive defense mechanisms against sophisticated attackers, privacy-preserving detection techniques, real-time optimization for edge computing environments, standardized evaluation frameworks, and hybrid approaches combining multiple mitigation strategies. Full article
Show Figures

Figure 1

23 pages, 1050 KiB  
Article
Lattice-Based Certificateless Proxy Re-Signature for IoT: A Computation-and-Storage Optimized Post-Quantum Scheme
by Zhanzhen Wei, Gongjian Lan, Hong Zhao, Zhaobin Li and Zheng Ju
Sensors 2025, 25(15), 4848; https://doi.org/10.3390/s25154848 - 6 Aug 2025
Abstract
Proxy re-signature enables transitive authentication of digital identities across different domains and has significant application value in areas such as digital rights management, cross-domain certificate validation, and distributed system access control. However, most existing proxy re-signature schemes, which are predominantly based on traditional [...] Read more.
Proxy re-signature enables transitive authentication of digital identities across different domains and has significant application value in areas such as digital rights management, cross-domain certificate validation, and distributed system access control. However, most existing proxy re-signature schemes, which are predominantly based on traditional public-key cryptosystems, face security vulnerabilities and certificate management bottlenecks. While identity-based schemes alleviate some issues, they introduce key escrow concerns. Certificateless schemes effectively resolve both certificate management and key escrow problems but remain vulnerable to quantum computing threats. To address these limitations, this paper constructs an efficient post-quantum certificateless proxy re-signature scheme based on algebraic lattices. Building upon algebraic lattice theory and leveraging the Dilithium algorithm, our scheme innovatively employs a lattice basis reduction-assisted parameter selection strategy to mitigate the potential algebraic attack vectors inherent in the NTRU lattice structure. This ensures the security and integrity of multi-party communication in quantum-threat environments. Furthermore, the scheme significantly reduces computational overhead and optimizes signature storage complexity through structured compression techniques, facilitating deployment on resource-constrained devices like Internet of Things (IoT) terminals. We formally prove the unforgeability of the scheme under the adaptive chosen-message attack model, with its security reducible to the hardness of the corresponding underlying lattice problems. Full article
(This article belongs to the Special Issue IoT Network Security (Second Edition))
Show Figures

Figure 1

20 pages, 741 KiB  
Review
Exploring Design Thinking Methodologies: A Comprehensive Analysis of the Literature, Outstanding Practices, and Their Linkage to Sustainable Development Goals
by Matilde Martínez Casanovas
Sustainability 2025, 17(15), 7142; https://doi.org/10.3390/su17157142 - 6 Aug 2025
Abstract
Design Thinking (DT) has emerged as a relevant methodology for addressing global challenges aligned with the United Nations Sustainable Development Goals (SDGs). This study presents a systematic literature review, conducted following PRISMA 2020 guidelines, which analyzes 42 peer-reviewed publications from 2013 to 2023. [...] Read more.
Design Thinking (DT) has emerged as a relevant methodology for addressing global challenges aligned with the United Nations Sustainable Development Goals (SDGs). This study presents a systematic literature review, conducted following PRISMA 2020 guidelines, which analyzes 42 peer-reviewed publications from 2013 to 2023. Through inductive content analysis, 10 core DT principles—such as empathy, iteration, user-centeredness, and systems thinking—I identified and thematically mapped to specific SDGs, including goals related to health, education, innovation, and climate action. The study also presents five real-world cases from diverse sectors such as technology, healthcare, and urban planning, illustrating how DT has been applied to address practical challenges aligned with the SDGs. However, the review identifies persistent gaps in the field: the lack of standardized evaluation frameworks, limited integration across SDG domains, and weak adaptation of ethical and contextual considerations, particularly in vulnerable communities. As a response, this paper recommends the adoption of structured impact assessment tools (e.g., Cities2030, Responsible Design Thinking), integration of design justice principles, and the development of participatory, iterative ecosystems for innovation. By offering both conceptual synthesis and applied insights, this article positions Design Thinking as a strategic and systemic approach for driving sustainable transformation aligned with the 2030 Agenda. Full article
(This article belongs to the Section Sustainable Education and Approaches)
Show Figures

Figure 1

35 pages, 5296 KiB  
Article
A Multi-Class Intrusion Detection System for DDoS Attacks in IoT Networks Using Deep Learning and Transformers
by Sheikh Abdul Wahab, Saira Sultana, Noshina Tariq, Maleeha Mujahid, Javed Ali Khan and Alexios Mylonas
Sensors 2025, 25(15), 4845; https://doi.org/10.3390/s25154845 - 6 Aug 2025
Abstract
The rapid proliferation of Internet of Things (IoT) devices has significantly increased vulnerability to Distributed Denial of Service (DDoS) attacks, which can severely disrupt network operations. DDoS attacks in IoT networks disrupt communication and compromise service availability, causing severe operational and economic losses. [...] Read more.
The rapid proliferation of Internet of Things (IoT) devices has significantly increased vulnerability to Distributed Denial of Service (DDoS) attacks, which can severely disrupt network operations. DDoS attacks in IoT networks disrupt communication and compromise service availability, causing severe operational and economic losses. In this paper, we present a Deep Learning (DL)-based Intrusion Detection System (IDS) tailored for IoT environments. Our system employs three architectures—Convolutional Neural Networks (CNNs), Deep Neural Networks (DNNs), and Transformer-based models—to perform binary, three-class, and 12-class classification tasks on the CiC IoT 2023 dataset. Data preprocessing includes log normalization to stabilize feature distributions and SMOTE-based oversampling to mitigate class imbalance. Experiments on the CIC-IoT 2023 dataset show that, in the binary classification task, the DNN achieved 99.2% accuracy, the CNN 99.0%, and the Transformer 98.8%. In three-class classification (benign, DDoS, and non-DDoS), all models attained near-perfect performance (approximately 99.9–100%). In the 12-class scenario (benign plus 12 attack types), the DNN, CNN, and Transformer reached 93.0%, 92.7%, and 92.5% accuracy, respectively. The high precision, recall, and ROC-AUC values corroborate the efficacy and generalizability of our approach for IoT DDoS detection. Comparative analysis indicates that our proposed IDS outperforms state-of-the-art methods in terms of detection accuracy and efficiency. These results underscore the potential of integrating advanced DL models into IDS frameworks, thereby providing a scalable and effective solution to secure IoT networks against evolving DDoS threats. Future work will explore further enhancements, including the use of deeper Transformer architectures and cross-dataset validation, to ensure robustness in real-world deployments. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

40 pages, 87429 KiB  
Article
Optimizing Urban Mobility Through Complex Network Analysis and Big Data from Smart Cards
by Li Sun, Negin Ashrafi and Maryam Pishgar
IoT 2025, 6(3), 44; https://doi.org/10.3390/iot6030044 - 6 Aug 2025
Abstract
Urban public transportation systems face increasing pressure from shifting travel patterns, rising peak-hour demand, and the need for equitable and resilient service delivery. While complex network theory has been widely applied to analyze transit systems, limited attention has been paid to behavioral segmentation [...] Read more.
Urban public transportation systems face increasing pressure from shifting travel patterns, rising peak-hour demand, and the need for equitable and resilient service delivery. While complex network theory has been widely applied to analyze transit systems, limited attention has been paid to behavioral segmentation within such networks. This study introduces a frequency-based framework that differentiates high-frequency (HF) and low-frequency (LF) passengers to examine how distinct user groups shape network structure, congestion vulnerability, and robustness. Using over 20 million smart-card records from Beijing’s multimodal transit system, we construct and analyze directed weighted networks for HF and LF users, integrating topological metrics, temporal comparisons, and community detection. Results reveal that HF networks are densely connected but structurally fragile, exhibiting lower modularity and significantly greater efficiency loss during peak periods. In contrast, LF networks are more spatially dispersed yet resilient, maintaining stronger intracommunity stability. Peak-hour simulation shows a 70% drop in efficiency and a 99% decrease in clustering, with HF networks experiencing higher vulnerability. Based on these findings, we propose differentiated policy strategies for each user group and outline a future optimization framework constrained by budget and equity considerations. This study contributes a scalable, data-driven approach to integrating passenger behavior with network science, offering actionable insights for resilient and inclusive transit planning. Full article
(This article belongs to the Special Issue IoT-Driven Smart Cities)
11 pages, 671 KiB  
Article
Impact of Mattress Use on Sacral Interface Pressure in Community-Dwelling Older Adults
by Hye Young Lee, In Sun Jang, Jung Eun Hong, Je Hyun Kim and Seungmi Park
Geriatrics 2025, 10(4), 107; https://doi.org/10.3390/geriatrics10040107 - 6 Aug 2025
Abstract
Background/Objectives: Pressure injuries are a significant concern among older adults, particularly in community-based long-term care settings where prolonged immobility is prevalent. This study aimed to identify factors influencing sacral interface pressure in community-dwelling older adults, with an emphasis on support surface usage and [...] Read more.
Background/Objectives: Pressure injuries are a significant concern among older adults, particularly in community-based long-term care settings where prolonged immobility is prevalent. This study aimed to identify factors influencing sacral interface pressure in community-dwelling older adults, with an emphasis on support surface usage and clinical risk indicators. Methods: A total of 210 participants aged 65 years and older, all receiving long-term care services in South Korea, were enrolled in this study. Sacral interface pressure was measured in the supine position using a portable pressure mapping device (Palm Q7). General characteristics, Braden Scale scores, Huhn Scale scores, and mattress usage were assessed. Data were analyzed using descriptive statistics, t-tests, chi-square tests, and logistic regression. Results: Mattress non-use was identified as the strongest predictor of elevated sacral interface pressure (OR = 6.71, p < 0.001), followed by Braden Scale scores indicating moderate risk (OR = 4.8, p = 0.006). Huhn Scale scores were not significantly associated with interface pressure. These results suggest that support surface quality and skin condition have a stronger impact on interface pressure than mobility-related risk factors. Conclusions: The findings highlight the importance of providing high-quality pressure-relieving mattresses and implementing standardized nursing assessments to reduce the risk of pressure injuries. Integrating smart technologies and expanding access to advanced support surfaces may aid in developing tailored preventive strategies for vulnerable older adults. Full article
Show Figures

Figure 1

26 pages, 514 KiB  
Article
Improving Voice Spoofing Detection Through Extensive Analysis of Multicepstral Feature Reduction
by Leonardo Mendes de Souza, Rodrigo Capobianco Guido, Rodrigo Colnago Contreras, Monique Simplicio Viana and Marcelo Adriano dos Santos Bongarti
Sensors 2025, 25(15), 4821; https://doi.org/10.3390/s25154821 - 5 Aug 2025
Abstract
Voice biometric systems play a critical role in numerous security applications, including electronic device authentication, banking transaction verification, and confidential communications. Despite their widespread utility, these systems are increasingly targeted by sophisticated spoofing attacks that leverage advanced artificial intelligence techniques to generate realistic [...] Read more.
Voice biometric systems play a critical role in numerous security applications, including electronic device authentication, banking transaction verification, and confidential communications. Despite their widespread utility, these systems are increasingly targeted by sophisticated spoofing attacks that leverage advanced artificial intelligence techniques to generate realistic synthetic speech. Addressing the vulnerabilities inherent to voice-based authentication systems has thus become both urgent and essential. This study proposes a novel experimental analysis that extensively explores various dimensionality reduction strategies in conjunction with supervised machine learning models to effectively identify spoofed voice signals. Our framework involves extracting multicepstral features followed by the application of diverse dimensionality reduction methods, such as Principal Component Analysis (PCA), Truncated Singular Value Decomposition (SVD), statistical feature selection (ANOVA F-value, Mutual Information), Recursive Feature Elimination (RFE), regularization-based LASSO selection, Random Forest feature importance, and Permutation Importance techniques. Empirical evaluation using the ASVSpoof 2017 v2.0 dataset measures the classification performance with the Equal Error Rate (EER) metric, achieving values of approximately 10%. Our comparative analysis demonstrates significant performance gains when dimensionality reduction methods are applied, underscoring their value in enhancing the security and effectiveness of voice biometric verification systems against emerging spoofing threats. Full article
(This article belongs to the Special Issue Sensors and Machine-Learning Based Signal Processing)
Show Figures

Figure 1

23 pages, 7533 KiB  
Article
Risk Management of Rural Road Networks Exposed to Natural Hazards: Integrating Social Vulnerability and Critical Infrastructure Access in Decision-Making
by Marta Contreras, Alondra Chamorro, Nikole Guerrero, Carolina Martínez, Tomás Echaveguren, Eduardo Allen and Nicolás C. Bronfman
Sustainability 2025, 17(15), 7101; https://doi.org/10.3390/su17157101 - 5 Aug 2025
Abstract
Road networks are essential for access, resource distribution, and population evacuation during natural events. These challenges are pronounced in rural areas, where network redundancy is limited and communities may have social disparities. While traditional risk management systems often focus on the physical consequences [...] Read more.
Road networks are essential for access, resource distribution, and population evacuation during natural events. These challenges are pronounced in rural areas, where network redundancy is limited and communities may have social disparities. While traditional risk management systems often focus on the physical consequences of hazard events alone, specialized literature increasingly suggests the development of a more comprehensive approach for risk assessment, where not only physical aspects associated with infrastructure, such as damage level or disruptions, but also the social and economic attributes of the affected population are considered. Consequently, this paper proposes a Vulnerability Access Index (VAI) to support road network decision-making that integrates the social vulnerability of rural communities exposed to natural events, their accessibility to nearby critical infrastructure, and physical risk. The research methodology considers (i) the Social Vulnerability Index (SVI) calculation based on socioeconomic variables, (ii) Importance Index estimation (Iimp) to evaluate access to critical infrastructure, (iii) VAI calculation combining SVI and Iimp, and (iv) application to a case study in the influence area of the Villarrica volcano in southern Chile. The results show that when incorporating social variables and accessibility, infrastructure criticality varies significantly compared to the infrastructure criticality assessment based solely on physical risk, modifying the decision-making regarding road infrastructure robustness and resilience improvements. Full article
Show Figures

Figure 1

17 pages, 590 KiB  
Article
Regional Differences in Awareness of Oral Frailty and Associated Individual and Municipal Factors: A Cross-Sectional Study
by Nandin Uchral Altanbagana, Koichiro Irie, Wenqun Song, Shinya Fuchida, Jun Aida and Tatsuo Yamamoto
Healthcare 2025, 13(15), 1916; https://doi.org/10.3390/healthcare13151916 - 5 Aug 2025
Abstract
Background/Objectives: Despite growing interest in oral frailty as a public health issue, no nationwide study has assessed regional differences in oral frailty awareness, and the factors associated with such differences remain unclear. This study investigated regional differences in oral frailty awareness among [...] Read more.
Background/Objectives: Despite growing interest in oral frailty as a public health issue, no nationwide study has assessed regional differences in oral frailty awareness, and the factors associated with such differences remain unclear. This study investigated regional differences in oral frailty awareness among older adults in Japan and identified the associated individual- and municipal-level factors, focusing on local policy measures and community-based oral health programs. Methods: A cross-sectional analysis was conducted using data from the 2022 wave of the Japan Gerontological Evaluation Study. The analytical sample comprised 20,330 community-dwelling adults aged ≥65 years from 66 municipalities. Awareness of oral frailty was assessed via self-administered questionnaires. Individual- and municipal-level variables were analyzed using multilevel Poisson regression models to calculate prevalence ratios (PRs). Results: Awareness of oral frailty varied widely across municipalities, ranging from 15.3% to 47.1%. Multilevel analysis showed that being male (PR: 1.10), having ≤9 years (PR: 1.10) or 10 to 12 years of education (PR: 1.04), having oral frailty (PR: 1.04), and lacking civic participation (PR: 1.06) were significantly associated with lack of awareness. No significant associations were found with municipal-level variables such as dental health ordinances, volunteer training programs, or population density. Conclusions: The study found substantial regional variation in oral frailty awareness. However, this variation was explained primarily by individual-level characteristics. Public health strategies should focus on enhancing awareness among socially vulnerable groups—especially men, individuals with low educational attainment, and those not engaged in civic activities—through targeted interventions and community-based initiatives. Full article
(This article belongs to the Special Issue Oral Health and Rehabilitation in the Elderly Population)
Show Figures

Figure 1

36 pages, 21951 KiB  
Article
The Collective Dwelling of Cooperative Promotion in Caselas
by Vanda Pereira de Matos and Carlos Alberto Assunção Alho
Buildings 2025, 15(15), 2756; https://doi.org/10.3390/buildings15152756 - 5 Aug 2025
Abstract
To solve the present housing crisis, the Support for Access to Housing Program, in the context of PRR, mainly focuses on social housing to be built or on housing of social interest to be regenerated. To approach this problem, a research question was [...] Read more.
To solve the present housing crisis, the Support for Access to Housing Program, in the context of PRR, mainly focuses on social housing to be built or on housing of social interest to be regenerated. To approach this problem, a research question was raised: “What is the significance of the existing cooperative housing in solving the current housing crisis?” To analyze this issue, a multiple case study was adopted, comparing a collective dwelling of cooperative promotion at controlled costs in Caselas (1980s–1990s) with Expo Urbe (2000–2007) in Parque das Nações, a symbol of the new sustainable cooperative housing, which targets a population with a higher standard of living and thus is excluded from the PRR plan. These cases revealed the discrepancy created by the Cooperative Code of 1998 and its consequences for the urban regeneration of this heritage. They show that Caselas, built in a residential urban neighborhood, is strongly attached to a community, provides good social inclusion for vulnerable groups at more affordable prices, and it is eligible for urban regeneration and reuse (for renting or buying). However, the reuse of Caselcoop’s edifices cannot compromise their cultural and residential values or threaten the individual integrity. Full article
Show Figures

Figure 1

26 pages, 2459 KiB  
Article
Urban Agriculture for Post-Disaster Food Security: Quantifying the Contributions of Community Gardens
by Yanxin Liu, Victoria Chanse and Fabricio Chicca
Urban Sci. 2025, 9(8), 305; https://doi.org/10.3390/urbansci9080305 - 5 Aug 2025
Viewed by 7
Abstract
Wellington, New Zealand, is highly vulnerable to disaster-induced food security crises due to its geography and geological characteristics, which can disrupt transportation and isolate the city following disasters. Urban agriculture (UA) has been proposed as a potential alternative food source for post-disaster scenarios. [...] Read more.
Wellington, New Zealand, is highly vulnerable to disaster-induced food security crises due to its geography and geological characteristics, which can disrupt transportation and isolate the city following disasters. Urban agriculture (UA) has been proposed as a potential alternative food source for post-disaster scenarios. This study examined the potential of urban agriculture for enhancing post-disaster food security by calculating vegetable self-sufficiency rates. Specifically, it evaluated the capacity of current Wellington’s community gardens to meet post-disaster vegetable demand in terms of both weight and nutrient content. Data collection employed mixed methods with questionnaires, on-site observations and mapping, and collecting high-resolution aerial imagery. Garden yields were estimated using self-reported data supported by literature benchmarks, while cultivated areas were quantified through on-site mapping and aerial imagery analysis. Six post-disaster food demand scenarios were used based on different target populations to develop an understanding of the range of potential produce yields. Weight-based results show that community gardens currently supply only 0.42% of the vegetable demand for residents living within a five-minute walk. This rate increased to 2.07% when specifically targeting only vulnerable populations, and up to 10.41% when focusing on gardeners’ own households. However, at the city-wide level, the current capacity of community gardens to provide enough produce to feed people remained limited. Nutrient-based self-sufficiency was lower than weight-based results; however, nutrient intake is particularly critical for vulnerable populations after disasters, underscoring the greater challenge of ensuring adequate nutrition through current urban food production. Beyond self-sufficiency, this study also addressed the role of UA in promoting food diversity and acceptability, as well as its social and psychological benefits based on the questionnaires and on-site observations. The findings indicate that community gardens contribute meaningfully to post-disaster food security for gardeners and nearby residents, particularly for vulnerable groups with elevated nutritional needs. Despite the current limited capacity of community gardens to provide enough produce to feed residents, findings suggest that Wellington could enhance post-disaster food self-reliance by diversifying UA types and optimizing land-use to increase food production during and after a disaster. Realizing this potential will require strategic interventions, including supportive policies, a conducive social environment, and diversification—such as the including private yards—all aimed at improving food access, availability, and nutritional quality during crises. The primary limitation of this study is the lack of comprehensive data on urban agriculture in Wellington and the wider New Zealand context. Addressing this data gap should be a key focus for future research to enable more robust assessments and evidence-based planning. Full article
Show Figures

Figure 1

31 pages, 6551 KiB  
Article
Optimization Study of the Electrical Microgrid for a Hybrid PV–Wind–Diesel–Storage System in an Island Environment
by Fahad Maoulida, Kassim Mohamed Aboudou, Rabah Djedjig and Mohammed El Ganaoui
Solar 2025, 5(3), 39; https://doi.org/10.3390/solar5030039 - 4 Aug 2025
Viewed by 311
Abstract
The Union of the Comoros, located in the Indian Ocean, faces persistent energy challenges due to its geographic isolation, heavy dependence on imported fossil fuels, and underdeveloped electricity infrastructure. This study investigates the techno-economic optimization of a hybrid microgrid designed to supply electricity [...] Read more.
The Union of the Comoros, located in the Indian Ocean, faces persistent energy challenges due to its geographic isolation, heavy dependence on imported fossil fuels, and underdeveloped electricity infrastructure. This study investigates the techno-economic optimization of a hybrid microgrid designed to supply electricity to a rural village in Grande Comore. The proposed system integrates photovoltaic (PV) panels, wind turbines, a diesel generator, and battery storage. Detailed modeling and simulation were conducted using HOMER Energy, accompanied by a sensitivity analysis on solar irradiance, wind speed, and diesel price. The results indicate that the optimal configuration consists solely of PV and battery storage, meeting 100% of the annual electricity demand with a competitive levelized cost of energy (LCOE) of 0.563 USD/kWh and zero greenhouse gas emissions. Solar PV contributes over 99% of the total energy production, while wind and diesel components remain unused under optimal conditions. Furthermore, the system generates a substantial energy surplus of 63.7%, which could be leveraged for community applications such as water pumping, public lighting, or future system expansion. This study highlights the technical viability, economic competitiveness, and environmental sustainability of 100% solar microgrids for non-interconnected island territories. The approach provides a practical and replicable decision-support framework for decentralized energy planning in remote and vulnerable regions. Full article
Show Figures

Figure 1

Back to TopTop